See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/354365978 SUPPLEMENTARY LECTURE NOTE ON FORENSIC ACCOUNTING & FRAUD MANAGEMENT Book · September 2021 CITATIONS READS 0 7,024 1 author: Godwin Emmanuel Oyedokun Lead City University Ibadan 199 PUBLICATIONS 540 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Informal sector tax administration and monitoring in Nigeria View project forensic accounting View project All content following this page was uploaded by Godwin Emmanuel Oyedokun on 08 August 2022. The user has requested enhancement of the downloaded file. Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE NOTE ON FORENSIC ACCOUNTING, AUDIT, INVESTIGATION & FRAUD MANAGEMENT Professor Godwin Emmanuel Oyedokun ND (Fin), HND (Acct.), BSc. (Acct. Ed), BSc (Fin.), LLB., MBA (Acct. & Fin.), MSc. (Acct.), MSc. (Bus &Econs), MSc. (Fin), MSc. (Econs), PhD (Acct), PhD (Fin), PhD (FA), CICA, CFA, CFE, CIPFA, CPFA, CertIFR, ACS, ACIS, ACIArb, ACAMS, ABR, IPA, IFA, MNIM, FCA, FCTI, FCIB, FCNA, FCFIP, FCE, FERP, FFAR, FPD-CR, FSEAN, FNIOAIM godwinoye@yahoo.com; godwin.oyedokun@lcu.edu.ng +2348033737184, & +2348132445878 Cite this Lecture note as follows: Oyedokun, G. E. (2020). Fundamentals of forensic accounting & fraud Investigation. 2nd Edition, Lagos, Nigeria. Association Forensic Accounting Researchers (AFAR). ISBN: 978-978-56462-6-9 COURSE DESCRIPTION This course is packaged to expose students to the basic knowledge of Forensic Accounting, and it will be conducted largely on a seminar basis with intensive discussion given to contemporary issues in forensic accounting and fraud examination. The course is designed primarily to expose students to forensic accounting and fraud examination at an advanced level by deepening the knowledge of students in forensic thereby widening their view on the subject matter. COURSE OBJECTIVE At the end of this course therefore, students should be able to: 1. Explain the basic concept of Forensic Accounting; 2. Be able to relate and distinguish between forensic accounting, auditing, and investigation; 3. Explain the importance of the roles of forensic accounting in fraud detection, investigation, and fraud risk assessment in an organization; 4. Understand the need for the adoption of forensic accounting techniques in resolving the problem of financial crimes and cyber-crime in Nigeria. COURSE CONTENTS INTRODUCTION TO FORENSIC ACCOUNTING 1. 2. 3. 4. 5. 1 Concept of Forensic Accounting Objective of Forensic Accounting Justification for Forensic Accounting Forensic Accounting Skill Set Forensic Accounting Engagements www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun FRAUD EXAMINATION/INVESTIGATION 1. 2. 3. 4. 5. Concept of Fraud Examination/Investigation Anatomy of Fraud Fraudulent Financial Reporting Fraud Theories Fraud Deterrence Cycle FORENSIC ACCOUNTING OPERATIONS 1. 2. 3. 4. Planning the Audit and formation of robust action plan Forensic Accounting Techniques Data Mining Evidence Gathering CREATIVE ACCOUNTING 1. Concepts in Creative Accounting a. Creative Accounting b. Window Dressing c. Earnings Management d. Aggressive Accounting e. Accounts Manipulation f. Profit Smoothing g. Fraudulent Financial Statement h. Fraudulent Financial Reporting 2. Implications of Creative Accounting 3. Ethical Issues in Creative Accounting 4. Curbing Creative Accounting FORENSIC ACCOUNTING INVESTIGATIONS 1. Concept of Investigation 2. Types of Investigation a. Interview b. Interrogation 3. Techniques in Investigation 4. Forensic Investigation 5. Formation of Investigation Team 6. Forensic Investigation Evidence FORENSIC AUDITING 1. 2. 3. 4. 5. 2 Concept of Forensic Auditing Principles of Forensic Auditing Legal Liability and Rule-Based Practice from Performance Audit Forensic Auditing practice, engagement and application Techniques and Challenges of Forensic Auditing www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun MONEY LAUNDERING 1. 2. 3. 4. 5. 6. Concept of Money Laundering Economic and Social Impact of Money Laundering Methods of Money Laundering Fraud and Money Laundering Financial Institution and Money Laundering Investigating Money Laundering DIGITAL FORENSICS 1. Concept of Digital Forensics 2. Computer Forensics 3. Terminology in Computer Forensics 4. Techniques in Computer Forensics 5. Uses of Computer Forensics 6. Guidelines of Digital Forensics 7. Tools of Digital Forensics 8. Stages in Digital Forensics 9. Digital Forensic and other Disciplines 10. Issues facing Digital Forensics 11. Concept of Cloud Computing 12. Digital Evidence: Uses and Control 13. Data Recovery and control 14. Electronic Mail Investigation 15. Computer Networking and Investigation 16. Cyber Crime Investigation EVIDENCE AND EVIDENCE HANDLING TECHNIQUES 1. 2. 3. 4. 5. 6. 7. 8. Concept of Evidence Forms of Evidence Types of Evidence Admissibility of Evidence Evidence Collection Process Evidence gathering procedure Best Evidence Rule Electronic Evidence Rule FORENSIC REPORT WRITING AND TECHNIQUES 1. 2. 3. 4. 5. 3 Reporting the outcome of investigation Expert Report Standards of Reporting Rule of Guilt and Innocence Contents of Forensic Report www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 6. 7. 8. 9. 4 Prof. Godwin E. Oyedokun Report Discovery Attorney-Client Doctrine Avoidable Mistakes in Report Writing Guidelines to writing an Expert Report www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 1 INTRODUCTION TO FORENSIC ACCOUNTING INTRODUCTION It is important to state that Audit, investigation and Forensic Accounting are not the same. However, one can help lead to the other. Also, Forensic Accounting takes end position. Investigation can never take first position. It is only necessary when the situation is shrouded in complexity. But taking Forensic Accounting routes is inevitable. Audit is also the one that takes the lead. It's just to exam and report. Forensic accounting plays a vital role in preventing, detecting and minimising accounting frauds and eliminating their existence in an organisation. The role of forensic accountants in combating frauds and other related financial crimes both in the private and the public sectors cannot be overemphasized. Hence, forensic accountants must possess the requisite accounting, auditing, and investigative skills in order to provide evidence suitable for use in the court when fraud exists within an organization. However, the procedures for a thorough forensic audit demands a high level of understanding in the provision of auditing, investigations techniques, accounting rules, wide economic references and other legal obligations. Forensic accountants draw conclusions which calculate values and identify irregular or suspicious transactions by critically analysing the financial data. They provide an accounting analysis to the court of law for any dispute resolution and the economic investigative explanations of the fraud that has been committed. FORENSIC ACCOUNTING Forensic accounting has risen to prominence because of increased financial frauds are popularly known as white collar crimes. Forensic accounting can be described as a specialized field of accountancy which investigates fraud and analyze financial information to be used in legal proceedings. Forensic accounting 5 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun uses accounting, auditing, and investigative skills to conduct investigations into theft and fraud. It encompasses both Litigation Support and Investigative Accounting. Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that describes engagements that result from actual or anticipated disputes or litigation. "Forensic" means "suitable for use in a court of law", and it is to that standard and potential outcome that forensic accountants generally have to work. Forensic accountants, also referred to as forensic auditors or investigative auditors, often have to give expert evidence at the eventual trial (ICMAI, 2014). According to the Journal of Forensic Accounting, “Forensic accounting is sufficiently thorough and complete so that an accountant, in his/ her considered independent professional judgment, can deliver a finding as to accounts, inventories, or the presentation thereof that is of such quality that it would be sustainable in some adversarial legal proceeding, or within some judicial or administrative review.” Forensic accounting falls within the context of our environmental needs. That is, to give forensic assistance in accounting issues. This is very vital in the environment that is flooded with fast moving businesses and polluted with politicians who have powers to corrupt well-meaning businessmen. This normally happens in detriment of well-planned public projects that are roughly implemented. In terms of qualities of a forensic accountant, Fitzhugh (2010) mentioned that by the nature of the job, forensic accounting favours individuals who have prior work experience in fields like law enforcement and auditing. Maturity and prior professional knowledge give forensic accountants a frame of reference to utilizing their professional judgment and frequently a "gut" instinct developed from years of experience. Definitions of Forensic Accounting KPMG (1999) defines forensic accounting as assistance in disputes which are likely to involve litigation, arbitration, expert determination, mediation or an enquiry by an appropriate regulatory authority, and investigation of suspected frauds, irregularity or impropriety which could potentially lead to civil, criminal or disciplinary proceedings; while focusing primarily on accounting issues. Chilvers (2000) defined “Forensic Accounting” as the use of investigative techniques, integrated with accounting and business skills, to develop information and opinions for evidence in court and for use by expert witnesses. 6 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Forensic accounting is recognized as a form of professional expertise and endowed with specific attributes; the recognition comes from possessing a formal certification in forensic accounting which provides symbolic value (Williams, 2002). Forensic accounting is the specialty area of the accountancy profession which describes engagements that result from actual or anticipated disputes or litigation. “Forensic” means “suitable for use in a court of law,” and it is to that standard and potential outcome that forensic accountants generally should work (Crumbley, Heitger, & Smith, 2005). In the view of Howard and Sheetz (2006), forensic accounting is the process of interpreting, summarizing and presenting complex financial issues clearly, succinctly and factually often in a court of law as an expert. Degboro and Olofinsola (2007) noted that forensic investigation is about the determination and establishment of fact in support of the legal case. That is, to use forensic techniques to detect and investigate a crime is to expose all its attending features and identify the culprits. Due to the common nature of the various definitions reside in the areas of litigation services, accounting investigation and preparing courtready evidence all of which are of great importance to the banking industry. Forensic accounting may be one of the most effective and efficient ways to reduce and prevent fraudulent activities as it is concerned with the evidentiary nature of accounting data, and as a practical field concerned with: i. Accounting fraud and forensic auditing; ii. Compliance, iii. Due diligence and risk assessment; iv. Detection of financial misrepresentation and financial statement fraud (Skousen & Wright, 2008). Forensic accounting is that aspect of accounting that provides analysis that is suitable to the court which will form the basis for discussion debate and ultimately disputes resolution (Wallace, 1991). However, Forensic accounting is different from the old debit and credit accounting as it provides an accounting analysis that is suitable to the organization which will help in resolving the disputes that arise in the organization (Mohammed, 2008). Hopwood, Leiner, and Young (2008) argued that forensic accounting is the application of investigative and analytical skills for resolving financial issues in a manner that meets standards required by courts of law. 7 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Forensic accounting is a science dealing with the application of accounting facts and concepts gathered through auditing methods, techniques and procedures to resolve legal problems which require the integration of investigative, accounting, and auditing skills (Arokiasamy & Cristal, 2009; Dhar & Sarkar, 2010). Dhar and Sarkar (2010) defined forensic accounting as the application of accounting concepts and techniques to legal problems. It demands reporting, where accountability of the fraud is established and the report is considered as evidence in the court of law or in administrative proceedings. It is concerned with the use of accounting discipline to help determine issues of facts in business litigation (Okunbor & Obaretin, 2010). Forensic accounting is a discipline that has its own models and methodologies of investigative procedures that search for assurance, attestation and advisory perspective to produce legal evidence. It is concerned with the evidentiary nature of accounting data, and as a practical field concerned with accounting fraud and forensic auditing; compliance, due diligence and risk assessment; detection of financial misrepresentation and financial statement fraud; tax evasion; bankruptcy and valuation studies; violation of accounting regulation (Dhar and Sarkar, 2010). Stanbury and Paley-Menzies (2010) stated that forensic accounting is the science of gathering and presenting information in a form that will be accepted by a court of jurisprudence against perpetrators of economic crime. The America Institute of Certified Public Accountants (AICPA) defines forensic accounting as services that involve the application of specialized knowledge and investigative skills possessed by Certified Public Accountants. Forensic accounting services utilize the practitioner’s specialized accounting, auditing, economic, tax, and other skills (AICPA 2010). Singleton and Singleton (2010), said forensic accounting is the comprehensive view of a fraud investigation. It includes preventing frauds and analyzing antifraud control which includes the gathering of nonfinancial information. According to the Institute of Forensic accountancy (IFA) of Nigeria, forensic accounting is the specialty practice of accounting that describes engagement that results from anticipated disputes or litigations. Forensic accounting to the Webster’s dictionary means’ belonging to use in or suitable to court to jurisdiction or to public discussion debate. Forensic audit or forensic accounting can be used 8 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun interchangeably; forensic accountants often should give expert evidence at the eventual trial. All of the larger accounting firms, as well as many medium sized and boutique firms, have a specialist forensic accounting department, within this groups, there may be further sub-specialization for example, some forensic accountant may just specialize in insurance claims, personal injury claims, fraud construction or royalty audit (Timbee, 2011). According to Oyedokun (2013), forensic accounting is said to be a scientific accounting method of uncovering, resolving, analysing and presenting fraud matters in a manner that is acceptable in the court of law. This has been criticized as not covering the intent of forensic accounting and its full scope. Limiting the definition of forensic accounting to fraud matters skewed it too close to the meaning of fraud examination or fraud investigation. Notwithstanding all about definition of forensic accounting, Oyedokun (2018) give a compressive definition of forensic accounting as “as a scientific accounting method of uncovering, analysing, resolving and presenting fraud and white-collar crime matters in a manner that produces admissible evidence which is capable of proving or disproving facts in issue suitable in the court of law”. Similarly, in his study, Oyedokun (2018) contributed to the existing knowledge in terms of forensics concepts, where new definitions were brought forward as a result of the findings herein. These are tax accounting, forensic taxation, forensic tax audit, forensic tax investigation, and forensic tax justice among others. These are briefly discussed below: a. Forensic Tax Accounting: Forensic tax accounting is the forensic accounting processes that focus on tax issues including ensuring correct filing of tax returns and planning for future tax responsibilities - as opposed to the preparation of financial statements. Forensic tax accounting is a specialized field of forensic and accounting where accountants focus on the preparation of tax returns as well as tax planning for future taxable years while considering the skills in preparation of financial accounting and having in mind that the report could be used in court (Tax Appeal Tribunal). b. Forensic Taxation: Forensic taxation is the application of taxation skills, accounting skills, auditing skills and investigative skills for the purpose of ensuring that the taxes due by taxpayers are 9 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun adequately assessed, collected, accounted for and that taxpayers remit their tax returns to the tax authorities as at when due in a manner suitable to law. c. Forensic Tax Audit: Forensic tax audit is the integration of taxation skills, auditing skills, accounting skills and investigative skills by tax authorities in examining taxpayers’ tax affairs, closely and verifying that the income and deductions are accurate stated. d. Forensic Tax Investigation: Forensic tax investigation is the application of auditing skills, accounting skills and investigative skills in taxation by tax authorities for an in-depth examination in tax affairs of the taxpayers, in order to uncover and recover tax undercharged in previous years of assessment. e. Forensic Tax Justice: Forensic tax justice is the application of taxation and forensic investigative skills in ensuring that those charged with governance of stated are examined with a view to reinstating the utilisation of tax revenue in a manner that brings about development in the state. The role of a Forensic Accountant as follows: 1. Investigating financial accounts for illegal activity such as white-collar crime. 2. Interprets findings of an investigation to determine if there's a problem. 3. Examines financial data regarding alleged criminal activity such as fraud, money laundering, illegal transactions, and embezzlement. 4. These financial records may include bank accounts, records, or financial transactions. 5. Using knowledge of the law and accounting to determine whether there is fraudulent activity. 6. Working with law enforcement, private investigators or lawyers while conducting investigations. 7. Testifies in court about the investigation. 8. Assist the courts, solicitors, and clients to understand the complex financial and accounting issues and presenting that information in a manner that all users can understand. Forensic Accountants helps at a number of different levels in the litigation process including: i. Assisting in initial discovery ii. Applying our commercial knowledge and expertise iii. Providing expert evidence both written and oral iv. Independence v. Criminal Investigations vi. Shareholders' and Partnership Disputes vii. Personal Injury Claims/Motor Vehicle Accidents 10 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management viii. Business Interruption/Other Types of Insurance Claims ix. Business/Employee Fraud Investigations x. Matrimonial Disputes xi. Business Economic Losses xii. Professional Negligence xiii. Mediation and Arbitration Prof. Godwin E. Oyedokun Competencies Required by a Forensic Accountant A set of competencies required by a forensic accountant have been identified. These skills include i. Good analytical skills ii. Creative thinking skill, iii. Strong knowledge of the legal environment iv. Unstructured problem-solving competence, v. Investigative flexibility, vi. Analytical proficiency including oral communication ability, written communication ability, vii. Practical business experience A forensic accountant is expected to have competence in a broad spectrum of disciplines including accounting, law, auditing, criminology, and information technology and communication skills. Application of Forensic Accounting by Forensic Accountants Forensic Accounting may be conducted into the following: i. Fraud and white-collar crime investigations; ii. Criminal and civil investigations; iii. Preparation of expert reports, reviews, and evidence; iv. Testifying as an expert witness; v. Insolvency and liquidation support investigation; vi. Fraud prevention and awareness strategies; vii. Fraud and fund tracing; viii. Civil and criminal actions regarding fraud and financial irregularities; ix. Breach of contract; x. Breach of warranty, particularly on company acquisitions; xi. Insurance claims; xii. Liquidation support; 11 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management xiii. Regulatory enquiries; xiv. Special and confidential investigations; xv. Financial Surveillance xvi. Anti-Money Laundering Programs xvii. Fraud and risk management surveys and reports xviii. Background checks Prof. Godwin E. Oyedokun A forensic accounting engagement and investigation is typically substantially longer than any other investigation. Continuity of staff on the part of the client is therefore often difficult to maintain. This makes it more essential that the forensic accountant conducts his work in a manner which is concise, detailed document. Please let me know if there is any question. Take it easy, read at your time, attend to Quizzes a d Examination Questions as much as possible 12 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 2 FRAUD EXAMINATION AND INVESTIGATION The increasing incidence of fraud, fraudulent activities, and corrupt practices in Nigeria and around the world has necessitated the relevance of forensic accounting. Forensic accounting arises because the audit system in an organization had failed to detect certain errors. Forensic accounting covers all activities involved in fraud investigation, forensic accounting investigation and forensic audit. Forensic accountants are employed to look into the possible suspicion of fraudulent activities or hired by a company who may just want to prevent fraudulent activities from occurring. Definition of Fraud According to the Institute of Turkish History (1998), fraud means a deceptive trick, scam, game artifice, cabal which is committed to cheating, mislead someone and contributing something useless to something in order to gain an advantage. According to Arzova (2003), fraud is meant to create a misjudgment or maintain an existing misjudgment to induce somebody to make a contract. However, one should not mix fraud with fault, which means “wrong, mistake, error committed involuntarily and unconsciously”. Fault stems from the deficiencies originated from a person or an environment. Therefore, intention is the most important element which distinguishes fraud from fault. Fraud can be referred to as intentional act of using an unfair or dishonest act to illegally deprive another person or entity of money, assets, or legal rights which includes misappropriation, and misrepresentation or non-disclosure of a material fact. According to Black’s Law Dictionary, fraud is “a knowing misrepresentation of the truth or concealment of a material fact to induce another to act to his or her detriment.” Elements of Fraud There are basically 4 elements that prove the commission of fraud. They are: A misrepresentation or non-disclosure of a material fact: non-disclosure or misrepresentation of material fact is the major element and necessary condition that proves the commission of a fraud (Fraud Examiner’s Manual, 2020). Knowledge of falsehood: There must be knowledge of misleading and non-disclosure of the fact. 13 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Intention to deceive: There must be an intentional act to conceal or misrepresent facts. Actual loss or injury suffered: There must be loss or injury suffered by the victim as a result of relying on the deception or misrepresentation of the fraudster. However, for some fraudulent acts, this might not be necessary. Different types of fraudsters Fraudsters usually fall into one of three categories: 1. Pre-planned fraudsters, who start out from the beginning intending to commit fraud. These can be short-term players, like many who use stolen credit cards or false social security numbers; or can be longerterm, like bankruptcy fraudsters and those who execute complex money laundering schemes. 2. Intermediate fraudsters, who start off honest but turn to fraud when times get hard or when life events, such as irritation at being passed over for promotion or the need to pay for care for a family member, change the normal mode. 3. Slippery-slope fraudsters, who simply carry-on trading even when, objectively, they are not in a position to pay their debts. This can apply to ordinary traders or to major business-people Fraud may also be categorized into three groups, namely; i. Internal: Internal fraud relates to those committed by members of staff and directors of the organizations. ii. External fraud: external fraud is committed by persons not connected with the organization and iii. Mixed fraud: this involves outsiders colluding with the staff and directors of the organization. Fraud Examination Fraud examination is the methodology of resolving allegations from inception to disposition including obtaining evidence, interviewing suspects, writing reports and assisting in detection and deterrence of fraud (ACFE, 2022). Fraud examination draws its common body of knowledge from four areas: accounting and auditing, fraud investigation, legal elements of fraud and criminology. It is hereby recommended that all would be forensic accountants/investigators, fraud/forensic auditors, statutory auditors, and investigative accountants should be well equipped with forensic accounting techniques in obtaining admissible evidence suitable for litigation purposes. All fraud investigations are forensic accounting investigation but not all forensic accounting investigations are a fraud investigation. This is where forensic accountant and fraud examiners come in. Certified Fraud Examiners are currently in 14 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun great demand, with the public need for honesty, fairness and transparency in reporting increasing exponentially. Fraud Investigation Fraud investigation deals with the investigation of fraudulent activities. The outcome of fraud investigation may or may not be used for legal purposes. Fraud investigation is often associated with the investigation of criminal matters. All fraud investigations are forensic accounting investigation but not all forensic accounting investigations are a fraud investigation. Forensic accounting is the umbrella that covers fraud investigation, forensic accounting investigation and forensic audit. Fraud alerts Fraud alerts have been described as specific events or red flags, which may be indicative of fraud. A list of possible fraud alerts is provided below. This should not be considered an exhaustive list, as alerts will appear in many different guises according to circumstances. i. Anonymous emails/letters/telephone calls. ii. Emails sent at unusual times, with unnecessary attachments, or to unusual destinations. iii. Discrepancy between earnings and lifestyle. iv. Unusual, irrational, or inconsistent behaviour. v. Alteration of documents and records. vi. Extensive use of correction fluid and unusual erasures. vii. Photocopies of documents in place of originals. viii. Rubber Stamp signatures instead of originals. ix. Signature or handwriting discrepancies. x. Missing approvals or authorisation signatures. xi. Transactions initiated without the appropriate authority. xii. Unexplained fluctuations in stock account balances, inventory variances and turnover rates. xiii. Inventory adjustments. xiv. Subsidiary ledgers, which do not reconcile with control accounts. xv. Extensive use of ‘suspense’ accounts. xvi. Inappropriate or unusual journal entries. xvii. Confirmation letters not returned. xviii. Supplies purchased in excess of need. xix. Higher than average number of failed login attempts. xx. Systems being accessed outside of normal work hours or from outside the normal work area. xxi. Controls or audit logs being switched off. 15 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun ANTI-FRAUD TEAM The anti-fraud teams according to Ekeigwe (2010) comprises of those that are responsible for controlling and preventing fraud and as well prosecuting fraudsters as they include, i. Fraud Examiner: Also known as fraud investigator is a person who conducts civil and criminal investigations to identify a scam. He tracks all the events and examines all the evidence in situations where fraud may have been committed. ii. Auditors: They are those charged with the responsibility of examining and reporting on the financial statements so as to detect any misappropriations or fraudulent practices. iii. Security: Usually a detective, they investigate what could be described as a traditional fraud offences, such as banking fraud, insiders billing fraud, etc. They are usually armed in case of any emergency. iv. Human Resource Personnel: They are those charged with the responsibility of implementing strategies and policies that are capable of curbing fraudulent acts. v. Management Representative: This is a representative of the organization in which the investigation is been carried out. He has a first-hand information concerning the issue investigated on. vi. Legal Counsel: They are those who give legal advice. vii. Information System personnel: They are those involved in processing data concerning the investigation. viii. Accountants: Ovute, in one of his classes stated that “Accountants here examines the accounts and records of an organization un behalf of a client for a special purpose in terms of business”. Approaches to Forensic Accounting Assignment Each forensic accounting assignment is unique and has a peculiar approach. In general, many forensic accounting assignments will include the steps that must be carried out by forensic accountant and are detailed below; 1. Meet with the Client It is very important to meet with the client in order to have a clear understanding of the important facts, players and issues at hand. 2. Perform Conflict Check A conflict check should be carried out as soon as the relevant parties are established. 16 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 3. Prof. Godwin E. Oyedokun Perform Initial Investigation Preliminary investigations should be carried out prior to the development of a detailed plan of action. This will allow subsequent plans to be based upon a more complete understanding of the issue. 4. Develop an Action Plan This plan will take into account the knowledge gained by meeting with the client in carrying out the initial investigation and will set out the objectives to be achieved and the methodology to be utilized to accomplish them. 5. Obtain the Relevant Evidence Depending on the nature of the case this may involve locating documents, economic information, and asset, a person or the company, another expert or proof of the occurrence of an event. 6. Perform the Analysis The actual analysis performed will be dependent upon the nature of the assignments and may involve: i. Calculating economic damages ii. Summarizing a large number of transactions iii. Performing a tracing of assets iv. Performing a present value calculation by utilizing appropriate discount rates v. Performing a regression or sensitivity analysis vi. Utilizing a computerized application such as a spreadsheet, database or computer model vii. Utilizing charts and graphics to explain the analysis 7. Prepare the Report Often a report will be prepared which may include sections on the nature of the assignment, scope of the investigation, approach utilized, and limitations of scope and findings and/or opinions. The report will include schedules and graphics necessary to properly support and explain the findings. 17 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 3 FORENSIC AUDITING With the increase in fraudulent activities in financial accounting in the global economy, forensic auditing has become an emerging discipline of great importance for academia and the real sector. Therefore, determining how efficient and the extent to which forensic auditing are meeting up with the desired goal needs to be taken into consideration. Forensic auditing is perceived to have evolved in response to certain emerging fraud related cases. The scandals that recently rocked the corporate world with classical examples. The increasing sophistication of financial fraud requires that forensic auditing is added to the tools necessary to bring about the successful investigation and prosecution of those individuals involved in criminal activities. Forensic accountants, also referred to as forensic auditors or investigative auditors, often have to give expert evidence at the eventual trial. The concept of Forensic Auditing A forensic audit is summarizing and adapting investigative auditing, criminology, litigation services, and financial skills in detecting fraud. The cumulative complexity of fraud requires that forensic auditing is involved in the tools required to successfully investigate and prosecute cases of fraud and those involved in fraudulent practices (Njanike, Dube & Mashayanye 2009). Fraud auditors are generally accountants or auditors, who, by their attitudes, attribute, skills, knowledge, and experience, are experts at detecting and documenting frauds in books of records of accounting and financial transactions and events. Curtis (2008) argues that fraud can be subjected to forensic auditing, since fraud encompasses the acquisition of property or economic advantage by means of deception, through either a misrepresentation or concealment. Bhasin (2007) notes that the objectives of forensic auditing include: i. Assessment of damages caused by an auditor’s negligence, ii. Fact-finding to see whether an embezzlement has taken place, in what amount, and whether criminal proceedings are to be initiated; iii. Collection of evidence in criminal proceedings; and iv. Computation of asset values in divorce proceedings. 18 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun He argues that the primary orientation of forensic auditing is explanatory analysis (cause and effect) of the phenomenon- including the discovery of deception (if any), and its effects-introduced into the accounting domain. According to Bhasin (2007), forensic auditors are trained to look beyond the numbers and deal with the business realities of situations. Analysis, interpretation, summarization and the presentation of complex financial business-related issues are prominent features of the profession. He further reported that the activities of forensic auditors involve: i. Investigating and analyzing financial evidence; ii. Developing computerized applications to assists in the analysis and presentation of financial evidence; iii. Communicating their findings in the form of reports, exhibits and collections of documents; and iv. Assisting in legal proceedings, including testifying in courts as an expert witness and preparing visual aids to support trial evidence. Principles of Fraud Auditing The following among others are principles of fraud auditing: 1. Fraud auditing is unlike financial auditing. It is more a mind-set than a methodology. 2. Fraud auditors are unlike financial auditors. Fraud auditors focus on exceptions, oddities, accounting irregularities, and patterns of conduct, not on errors and omissions. 3. Fraud auditing is learned primarily from experience, not from audit text books or last year’s work papers. Learning to be a fraud auditor means learning to think like a thief— “Where are the weakest links in this chain of internal controls?” 4. From an audit perspective, fraud is intentionally misrepresenting financial facts of a material nature. From the fraud-audit perspective, fraud is an international misrepresentation of finance facts. 5. Frauds are committed for economic, egocentric, ideological, and psychotic reasons. Of the four, the economic motive is the most. 6. Fraud tends to encompass the theory structure around the motive, opportunity, and benefit 7. Fraud is a computerized accounting environment can be committed at any state of processing input, throughout, or output. Input frauds (entering false and fraudulent data) are the most common 8. The most common fraudulent schemes by lower-level employees involve disbursement (payable, payroll, and benefit and expense claims). 9. The most common fraudulent schemes by higher-level managers involve “profit smoothing” (deferring expenses, booking sales too early, overstating inventory). 19 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun 10. Accounting-type frauds are caused more often by the absence of controls than by loose controls. 11. Fraud incidents are not growing exponentially, but lose are. 12. Accounting frauds are discovered more often by accident than by financial audit purposes or design. Over 90 per cent of financial frauds is discovered. 13. Fraud prevention is a matter of adequate controls and works environment that places a high value on personal honesty and fair dealing. Application of Forensic Audit It will be useful therefore to discuss forensic as being either “proactive or reactive”. 1. Proactive Forensic: This audit helps businessmen to ensure that their processes stay robust, and it can be viewed from different aspects depending on its application as discussed by Ezeilo (2010) below: a. Statutory Audit: In this case, auditing standard prescribe that internal control should be studied and evaluated in respect of safeguarding assets and resources when performing regularity and financial audit, and in assisting management in complying with laws and regulations when performing compliance auditing. b. Regulatory Compliance: This technique is usually used by government departments or agencies to access compliance with regulations governing payments or grants or subsides. Performance auditors could also use this technique while auditing such governmental programs. c. Diagnostic Tool: Forensic auditing can be used either by management or by auditors to carry out general reviews of activities to highlight risk arising either out of fraud or from any other source, with the purpose of initiating focused reviews on particular areas and targeting specific threats to the organization. d. Investigation of Allegation: The techniques of forensic auditing are useful in this case, in the sense that various complaints and allegations could be used as a guild for gathering evidence used in investigation. This is cited as being proactive because it is widely felt that the existence of a system of investigation in such cases is significant deterrent to fraud and corruption (Ezeilo, 2010). 2. Reactive Forensic: The objective of this audit is to investigate cases of suspected fraud so as to prove or disprove the suspicious and if proven, the person involved is to be identified; the findings are to be supported by evidence, after which it is presented in an acceptable format in any subsequent discipline or criminal proceedings (Ezeilo, 2010). Due to the processes involved in reactive forensic audit, it is important therefore to keep in view the following: i. Working relations with the investigating prosecuting agencies. ii. Authorization and control of the audit investigation. 20 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun iii. Documentation of relevant information and safeguarding all prime records pertaining to the case. iv. Rules of evidence on government admissibility or authentication of records. v. Confidentiality of evidential document. vi. Evaluation of the evidence to assess whether the case is sustainable. vii. Legal advice where appropriate. viii. Reporting the findings in a manner that needs legal requirements. Important aspects of Forensic Audit i. Recovery of data that has been deleted intentional or accidentally ii. Ensure that the digital evidence have not been damaged, changed or modified in any way as you need to preserve the evidence in its original state. iii. Confirm the authenticity of the digital evidence. iv. Maintain the chain of custody of the evidence. Otherwise, it may become contaminated and worthless for the case. v. Ability to determine the special and unique characteristics of a piece of evidence be it digital or otherwise. vi. The use of forensic software and hardware in the gathering of digital evidence Techniques of Forensic Audit The following are the techniques involved in forensic accounting as espoused by ICMAI (2014) i. Benchmarking: comparing one financial period with another or the performance of one cost Centre, or business unit, with another, overall business performance with its standards defined. ii. Ratio analysis: used to identify any abnormal trends and changes. iii. System analysis: to examine the systems in place and identifying any weaknesses that could be opportunities for the fraudsters. iv. Specialist software: like audit tools for data matching analysis can prove very useful. v. Exception reporting: that generates automatic reports that unchangeable for results that fall outside of predetermined threshold values, enabling immediate identification of results deviating from the norms. 21 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 4 FORENSIC ACCOUNTING INVESTIGATIONS Forensic accounting investigators take the position that the typical financial statement auditor may wait too long before calling in the forensic accounting investigator. But no savvy auditor will fail to notice the possibility of bias in the statement. The thoughtful and efficient use of forensic accounting investigators often offers the right balance between conducting routine audits and investigating for possible fraud. A predicate must exist before an investigation is undertaken. A predicate is the totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe a fraud has occurred, is occurring, and/or will occur. Predication is the basis for undertaking a fraud investigation. It would be inappropriate and a violation of the Association of Some auditors may call in forensic accounting investigators at the slightest suspicion of fraud. Year after year, they may bring in these forensic accounting investigators as the same client; their mindset is to consult early and often not only with forensic accounting investigators but also with industry experts and the risk-andquality auditors who typically provide, from the center of major accounting firms, an internal consulting service for audit teams in the field. According to Hopwood, Leiner and Young (2012), the fraud investigation process involves systematically gathering and reviewing evidence for the purpose of documenting the presence or absence of fraud. Fraud investi¬gations normally commence as a result of some indication that fraud may have occurred. Forensic Investigation and Forensic Audit are better forensic strategies in resolving the allegations of fraudulent activities as signs of financial crime can be initially detected in a variety of ways; by accident, by whistleblowing, by auditors, by data mining, by controls and testing, or by the organization's top management requesting an inspection on the basis of mere suspicion. In virtually all cases, the fraud investigator must assume that the matter under investigation will eventually conclude in civil or criminal courts. As a result, fraud investigations must be conducted systematically and with the utmost care from the very beginning. A forensic accounting investigation is a practice of lawfully establishing evidence and facts that are to be presented in a court of law (Oyedokun, 2015b). The term is used for nearly all investigations, ranging from cases of financial fraud to murder. When most people think about forensics, they think about crime scene 22 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun investigation, in which physical evidence is gathered. There are other forms of forensic investigation, however, such as computer forensics and sub-fields that focus on dentistry or insects and crime scenes (Taylor, 2017). Concept of Investigations The investigation is the act or process of investigating or the condition of being investigated. The investigation is a searching inquiry for ascertaining facts; detailed or careful examination (dictionary.reference.com). The investigation is a vital part of forensic accounting and auditing process but only applied when the event or transaction is beclouded. It is carried out when lapse has been established to ascertain who is responsible, the reason for the action including the extent of damage if any. It could be referred to as a detailed verification and clarification of doubt about a transaction or event. Forensic Investigation Forensic accounting is investigative. Instead of seeking conformance, you are looking for outliers or specific patterns. Generally, in support of some sort of legal process, the outcome is less general (an audit report), and is generally useful as evidence in court regarding certain occurrences (where did my cash go; why did this customer get 10% discounts; why am I paying three times the going rate for sand; etc.). Forensic accounting is much more thorough and focused, principally to fully recognize a specific issue or family of issues and often used in resolving disputes, including litigation support. Forensic accounting as simplified by Oyedokun (2014) means effective evidence gathered by auditors which are appropriate for use in a court of law and frequently used by government agencies. Whereas forensics is principally conducted with an assumption that there may be something that has gone wrong, and sufficient papers should be built up to establish the same. The primary purpose is evidence collection to establish a possible misappropriation, misstatement or a fraud. Forensic accounting is designed for use in a court of law, so forensic accountants develop evidence that cannot be shredded by opposing lawyers. Forensic accounting investigators thus often have the task of conveying to all constituencies that the results of the investigation will be more reliable if all participants and interested parties work together and contribute their specific expertise or insight with truth-seeking objectivity. Forensic investigations include lots of other accounting work designed to support legal action such as disputes with ex-employees who were sacked because of allegations of incompetence; summarising the effects of complicated financial transactions; business valuations needed for a messy divorce, family disputes; finding deleted incriminating evidence on computers. 23 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Forensic investigation is the utilization of specialized investigative skills in carrying out an inquiry in such a manner that the outcome will have an application to a court of law. Such forensic investigation may be in accounting, computer, medicine, engineering or some other disciplines. Phases in Engagement Approach to Forensic Accounting Renick (2007) in his article “a Phased Engagement Approach to Forensic Accounting” opined that there are several approaches to a forensic investigation. He recommended a phased engagement approach in managing the investigation efficiently as its controls the engagement with decision points throughout the process (Renick, 2007). The phases are as listed below: Phase 1: Exploration and Evaluation Before any work can begin, the client and the forensic accountant must define the problem, the issues involved, and the scope of the engagement. Then a projection of the timeframe, cost, and expected deliverables for each phase can be determined. Phase 1 concludes with a report of preliminary findings, written or oral. The report should indicate what additional information and documents are needed, a recommendation on how to proceed, and the identification of any potential risks. These might include risks to the business from public disclosure or government scrutiny, and to clients for their actions or inactions, as well as litigation risk. Forensic accountants must bear in mind that all written communications may be subject to discovery. At this point, a determination must be made whether to continue to phase 2 (i.e., expansion of scope) or to conclude the engagement. Phase 2: Expansion of Scope Tracking and tracing: Phase 2 commences with specific document analysis. This analysis is more in-depth than in phase 1; it will probably include a review of many more transactions, books, records, and documents requested from the opposing side. Phase 2 may also include the verification of certain findings from third parties. Preparing the analysis: In preparing an analysis, it is important for a forensic accountant to trace transactions from beginning to end as well as from end to beginning including reviewing supporting documentation. One example would be a purchase. The beginning-to-end tracing may start with the request by the factory 24 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun foreman for certain materials. The tracing would include requisition and inventory logs, the purchase journal, the accounts payable subsidiary ledger, the cash disbursements journal, and the general ledger. The documents related to that request might include the materials requisition, the purchase order, the warehouse receipts journal, the voucher payable, and the cancelled check (Oyedokun, 2015c). Reconstruction of books and records: At times, the forensic accountant may have to reconstruct books and records, or specific transactions, from whatever information is available. The specific information needed may not be readily available or may not be in a form that the forensic accountant needs or can use. Third-party verification and confirmation: At times, the forensic accountant may need to obtain third-party verification to confirm matters that arise during the investigation. These third parties may include vendors, customers, and banks. The conclusion of Phase 2: Phase 2 concludes with the delivery of a report to the client. As compared to the report issued in phase 1, the phase 2 report is almost always in writing and more formal. The report in phase 2 should include detailed findings, any additional potential risks that the forensic accountant believes are present, any additional information that might still be needed, and a recommendation as to whether the forensic accountant believes there is sufficient evidence or information for the process to continue. Like phase 1, a determination as to how to proceed must be made: whether to expand the investigation even further, whether to seek depositions and further discovery, or whether to conclude the matter for lack of sufficient cause or evidentiary matter, or because of potential risks. Basic elements to consider for inclusion in a report of forensic investigation i. Identify your client ii. State in broad terms what you were asked to do iii. Describe your scope, including the period examined iv. Include mention of any restriction as to distribution and use of the report v. Identify the professional standards under which the work was conducted vi. Identify exclusions in the reliance on your report 25 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Forensic Audit Investigation Methodology Forensic investigation is the utilization of specialized investigative skills in carrying out an inquiry conducted in such a manner that the outcome will have an application to a court of law. Forensic Investigators are being grounded in accounting, medicine, engineering or some other discipline. Forensic investigation is the examination of evidence regarding an assertion to determine its correspondence to established criteria carried out in a manner suitable to the court. According to Umeraziz (2014), the methodologies are as follows: 1. Analyzing data which is available 2. Creating a hypothesis based on such data 3. Testing the hypothesis 4. Refining and altering the hypothesis 5. Communicating Results The Fraud Investigation Process The fraud investigation process involves a series of four steps: i. The engagement process; ii. The evidence collection process; iii. The reporting process; iv. The loss recovery process Consider Legal Issues in Forensic Investigation Before an investigation is launched, the entity must consider any legal issues that could affect the scope and manner of the investigation. Some examples include: a. Rights of Workers or Other Suspects under Investigation: These include any rights created by applicable federal or state laws, employment contracts, and collective bargain-ing agreements that restrict or define ways in which investigations must be conducted. For example, a collective bargaining agreement might require that the entity give formal notice to an employee under investigation with the right of union representation in any investigation related interviews or meetings between the employee and the entity, b. The Possibility of Conducting the Investigation under Attorney-Client Privilege: Depending on the legal jurisdiction, the work product of the corporate legal staff might be protected under attorney-client privilege. In some cases, it might be necessary to conduct the investigation under the general umbrella of an outside attorney in order to obtain attorney-client protection. 26 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management c. Prof. Godwin E. Oyedokun Evaluation of the Evidence: The entity must determine whether there is sufficient evidence and legal justification to immediately fire a worker or to place the worker on administrative leave with or without pay. d. Rights of Investigating Employers: Employers have a general right to require their employees to assist in investigations and can terminate employees who refuse to cooper-ate. Unless there are specific laws or contractual obligations to the contrary, employers have a general right to search an employee's offices, office computers, and possibly even their briefcases and cars that are on company property. e. The extent to which a government entity may be directly or indirectly involved in the investigation to the extent to which a government agency is involved in an investigation or that the private entity acts on behalf of the government, the employee might have constitutional rights that limit the entity's powers of investigation. Failure to respect those rights could lead to a lawsuit by the employee or prevent evidence from being admissible in court. f. Reporting Obligations: Consideration should be given regarding any obligations to report the incident to law enforcement or government regulations. 27 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 5 THEORIES RELATING TO FRAUD EXAMINATION AND FORENSIC ACCOUNTING Definition of Theory Using composite definitions from several dictionaries, we can assert that theory is: i. an arrangement of results or a body of theorems presenting a systematic view of some subject. ii. that branch of an art or science consisting in knowledge of its principles and method rather than in its practice. iii. a formulation of apparent relationships or underlying principles of certain observed phenomena which has been verified to some degree iv. Theory is defined as “a set of interrelated constructs (concepts), definitions and propositions that present a systematic view of the phenomena by specifying relationships among variables with the purpose of explaining and predicting the phenomena”. Whereas, concepts, A theory, therefore, includes propositions linking concepts in the form of hypotheses to be tested. The elements included in a theory are concepts, propositions and hypotheses, linked in a systematic structure to allow explanation and prediction. Functions and structure of a theory A theory is identifiable by its function and structure. It is the structure and function a theory performs that helps in the meeting of the need of a particular discipline. According to John Harvard and Sheth Jagish, the functions of theory can be categorized into four broad areas, namely: i. description, ii. delimitation, iii. generation, and iv. integration. The most popularly mentioned by business related researchers are description and prediction. i. The descriptive function: the function answers the question of why. It consists of the use of concepts and their relationships to describe or give the best explanation to a particular phenomenon and forces underlying it. ii. The delimitation function: it consists of the selection of the set of favorite events to be explained and assigning meaning to the formulated abstractions of the descriptive stage. 28 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun iii. The generative function: it is the ability to generate testable hypotheses, which are the main objective of a theory, or to provide ideas from which hypotheses can be developed. iv. The integrative function: it is the ability to present a coherent and consistent integration of the various concepts and relations of a theory. According to S.C. Dodd, a good theory must possess the following to mention but few: i. Accuracy ii. Reality iii. Controllability iv. Consistency v. Durability vi. Simplicity vii. Stability viii. Popularity ix. Translatability x. Efficacy, etc. FORENSIC ACCOUNTING THEORIES Different theories as relating to forensic accounting have evolved over time as the field of forensic accounting gains popularity. However, different scholars have developed different theories relating to forensic accounting and fraud examination. This chapter will, therefore, provide an exposition to the various theories relating to forensic accounting and fraud examination in no particular order. 1. Agency Theory 2. White Collar Crime Theory 3. Theory of Triangle of Fraud Action 4. Theory of Fraud Triangle 5. Theory of Fraud Diamond 6. Fraud Scale Theory 7. Deterrence Theory 8. Theory of Crime and Corruption 9. The Pentagon Fraud Theory 10. Anomie Theory 11. Differential Association Theory 12. Labeling Theory 29 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 13. Social Control Theory 14. Strain Theory 15. The Gone Theory Prof. Godwin E. Oyedokun I will now discuss them hereunder: AGENCY THEORY Jensen and Meckling (1976) defined an agency relationship as a “contract under which one or more persons (the principal(s)) engage another person (the agent) to perform some service on their behalf which involves delegating some decision-making authority to the agent. If both parties to the relationship are utility maximizers, there is a good reason to believe that the agent will not always act in the best interests of the principal”. Agency Theory explains how to best organize relationships in which one party determines the work while another party does the work. In this relationship, the principal hires an agent to do the work or to perform a task which he is unable or unwilling to do (Seven Pillars Institute for Global Finance and Ethics). “The principal can limit divergences from his interest by establishing appropriate incentives for the agent and by incurring monitoring costs designed to limit the aberrant activities of the agent. In addition in some situations, it will pay the agent to expend resources (bonding costs) to guarantee that he will not take certain actions which would harm the principal or to ensure that the principal will be compensated if he does take such actions (Jensen and Meckling, 1976). Agency theory was also explained as “a simple agency model suggests that, as a result of information asymmetries and self- interest, principals lack reasons to trust their agents and will seek to resolve these concerns by putting in place mechanisms to align the interests of agents with principals and to reduce the scope for information asymmetries and opportunistic behaviour (Institute of Chartered Accountants in England and Wales 2005). The Institute of Chartered Accountant in England and Wales (ICAEW) (2006) in Millichamp and Taylor (2008), stated that “in principle, the agency model assumes that no agent is trustworthy and if they can make themselves richer at the expense of their principals they will. The principal has no alternative but to compensate the agents well for their endeavour so that they will not be tempted to go into business for themselves by using the principal’s assets to do so”. 30 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun According to Millichamp and Taylor (2008), the agency is the name given to the practice by which productive resources owned by one person or group are managed by another person or group of person. Agency theory, on the other hand, is the recognition that the inclinations of agents, in this case, the directors or manager of the business, is to act rather more in their own interests than those of their employers, the shareholder (Millichamp and Taylor, 2008). WHITE COLLAR CRIME THEORY White collar crime is a crime committed by a person of respectability and high social status in the course of his occupation (Sutherland, 1949). Chandra and Showkat (2014) also tried applying a criminal law definition to white-collar crime by saying white-collar crimes are those criminally illegal acts committed during the course of one’s job. Here are a few examples: An accountant embezzles funds from his employer; two nurses steal drugs from their workplace and sell them to addicts; a financial investor steals investors’ money; a prosecutor accepts a bribe to drop criminal charges; two investors share inside information that allows them to redirect their stock purchases while a disgruntled employee destroys the computer records of a firm upon her resignation. These acts are instances where the criminal law has been violated during the course of employment. Shanikat and Khan (2013) established that there is an increase in white collar crimes where evidence is comparatively more obscure and difficult to detect. Furthermore, it is imperative to equip auditors and investigators with forensic skills, due to the emerging threats in the recent times. In general, this theory assesses white-collar crime as a natural product of conflicting values within our economic and class structures and the white-collar criminal as an individual who, through associations with colleagues who define their offences as "normal" if not justified, learns to accept and participate in the anti-legal practices of his occupation. THEORY OF TRIANGLE OF FRAUD ACTION The study of Dada (2014); Albrecht, Hill and Albrecht (2006); and Kranacher et al (2011) which described the action an individual must perform to perpetrate as follows: the Action which is the execution of the fraud, embezzlement, cheque kiting or material fraudulent financial reporting, Concealment which is the hiding of the fraud action by raising false journal, falsification of bank reconciliation and destroying files and Conversion which is the process of turning the gains from fraud into something useable by the perpetrator for instance, money laundered, cars or houses. 31 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Dada (2014) averred that the triangle of fraud action can be documented, controlled and detected by antifraud professionals. Where fraud triangle points investigators to why people might commit fraud, the evidentiary trail might be weak or non-existent for instance, pressure and rationalization are not directly observable. It should be noted that a lack of fraud evidence is not a proof that fraud had not occurred. Hence, anti-fraud professionals need an evidence-based approach to conduct an investigation. The triangle of a fraud action, therefore, helps in detecting white collar crimes and obtaining prosecutorial evidence where it makes it difficult to argue that the fraudulent acts were incidental. THEORY OF FRAUD TRIANGLE Fraudsters are constantly searching for more efficient, more sophisticated methods of fraud by thoroughly investigating the company’s environment, accounting and internal control systems, by analyzing the company’s financial condition and results of operation, and by evaluating a number of other factors (Mackevicius & Giriunas, 2013). Fraud triangle originated from Donald Cressey and is a theory developed as an idea to explain the causes of fraud. There are three major factors in which the proponent captured to be the cycle of committing fraud by a fraudster. They include pressure, opportunity and rationalization While working on his PhD Cressey (1940), focused his research on embezzlers. His findings resulted in a theory which, over the years, has become known as the fraud triangle. One leg of the triangle represents a perceived non-sharable financial need. The second leg is for the perceived opportunity, and the final is for rationalisation. The role of the non-sharable problem is important. Cressey (1940) said, “when the trust violators were asked to explain why they refrained from violation of other positions of trust they might have held at previous times, or why they had not violated the subject position at an earlier time, those who had an opinion expressed the equivalent of one or more of the following quotations: (a) ‘There was no need for it like there was this time.’ (b) ‘The idea never entered my head.’ (c) “I thought it was dishonest then, but this time it did not seem dishonest at first”. In his view, Cressey (1940) opined that there were two components of the perceived opportunity to commit a trust violation: general information and technical skill. General information is simply the knowledge that the employee’s position of trust could be violated. This knowledge might come from hearing of other embezzlements, from seeing dishonest behaviour by other employees, or just from generally being aware of the fact that the employee is in a position where he could take advantage of his employer’s faith in him. Montgomery, Beasley, Menelaides, and Palmrose (2002) also discussed the concept of “The Fraud Triangle” as consisting of three conditions generally present when fraud occurs: Incentive/Pressure, Opportunity, and Attitude/ Rationalizations. Technical skill refers to the abilities needed to commit the 32 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun violation. These are usually the same abilities that the employee needs to obtain and keep his position in the first place (Fraud examiner manual, 2014). THEORY OF FRAUD DIAMOND Fraud diamond theory is an extension of the fraud triangle theory which was introduced by Wolf and Hermanson in 2004 in which they presented another view of the factors to fraud. The theory adds fourth variable “capabilities” to the three-factor theory of fraud triangle postulated by Cressey (1950). As indicated by Wolfe and Hermanson (2004), opportunities open the doorway to fraud, incentive and rationalization can draw the person toward it. But the person must have the capability to recognize the open doorways as an opportunity and to take advantage of it by walking through, not just once, but over and over again. Rudewicz (2011) identified that individuals with certain characteristics and personality traits will increase the likelihood for fraud to occur. Wolfe and Hermanson (2004) also summarized six traits, associated with the capability element which is that a person in a position of authority has more influence over particular situations which will enable him to commit fraud; the fraudster is smart enough to understand and exploit internal weakness and to use position, function or authorized access to the greatest advantage; the fraudster must have a strong ego and the fraud perpetrator must be a person who can coerce and pursue others to commit fraud for him or alongside with him; the fraudster, in order to avoid detection, must able to lie convincingly and consistently; the fraudster must be able to control their stress as committing the fraudulent act and keeping it concealed can be exceedingly stressful. Thus, forensic accountants should keep in mind that pressure/motive to commit fraud can be either personal pressure, employment pressure, or external pressure and each of these types of pressure can also happen because of financial and non-financial pressure. Forensic accountants also need to understand the opportunity for fraud to help them in identifying which fraud schemes an individual can commit and how fraud virus occurs when there is an ineffective or missing internal control. FRAUD SCALE THEORY Albrecht, Howe & Romney (1984) developed the fraud scale theory as an alternative to the fraud triangle model. The fraud scale includes personal integrity instead of rationalization and it is particularly applicable to financial reporting fraud where sources of pressure (e.g. analysts’ forecasts, managements’ earnings guidance, a history of sales and earnings growth) are more observable. Personal integrity is associated with the personal code of ethical behaviour each person adopts. 33 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun They also argued that unlike rationalization in the fraud triangle, personal integrity can be observed in both an individual’s decisions and the decision-making process which can help in assessing the integrity and determining the likelihood that an individual will commit fraud. Various authors have also supported the fraud scale theory that fraud and other unethical behaviours often occur due to an individual’s lack of personal integrity or other moral reasoning because moral and ethical norms play essential roles in an individual’s decisions and judgment. DETERRENCE THEORY The deterrence theory can be traced to the early works of classical philosophers such as Thomas Hobbes (1588–1678), Cesare Beccaria (1738–1794), and Jeremy Bentham (1748–1832). Deterrence theory is a theory of crime that presumes that human beings are rational enough to consider the consequences of their actions and to be influenced by those consequences. Some theorists believe that crime can be reduced through the use of deterrence. The goal of deterrence, crime prevention, is based on the assumption that criminals or potential criminals will think carefully before committing a crime if the likelihood of getting caught and or the fear of swift and severe punishment is present. The theory of deterrence that has developed from the work of Hobbes, Beccaria and Bentham relies on three individual components: i. Severity, ii. Certainty, and iii. Celerity. The more severe a punishment, it is thought, the more likely that a rationally calculating human being will desist from criminal acts. To prevent crime, therefore, criminal law must emphasize penalties to encourage citizens to obey the law. The punishment that is too severe is unjust, and punishment that is not severe enough will not deter criminals from committing crimes. THEORY OF CRIME AND CORRUPTION Sociologist Gross (1963) has asserted that all organisations are inherently criminogenic (that is, prone to committing a crime), though not necessarily criminal. Gross makes this assertion because of the reliance on “the bottom line.” Without necessarily meaning to, organisations can invite fraud as a means of obtaining goals. It is believed by Shanikat and Khan (2013) that the rise in the white-collar crimes, where evidence are comparatively more obscure and difficult to detect (Gottschalk, 2011), has necessitated equipping of auditors and investigators with forensic skills, particularly over the recent years (DiGabriele, 2009; Carnes & Gierlasinski, 2001). Criminologist Oliver Williamson noted that because of a department’s concern with 34 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun reaching its goals, managers might tend to maximise their department’s own interests to the detriment of the organisation. (Fraud examiner manual, 2014) As a strategy to control crime, deterrence is designed to detect law violations, determine who is responsible, and penalise offenders in order to deter future violations. Deterrence systems try to control the immediate behaviour of individuals, not the long-term behaviours targeted by compliance systems. Deterrence theory assumes that humans are rational in their behaviour patterns. Humans seek profit and pleasure while they try to avoid pain. Deterrence assumes that an individual’s propensity towards law-breaking is in inverse proportion to the perceived probability of negative consequences (Fraud examiner manual, 2014). THE PENTAGON FRAUD THEORY The Pentagon Fraud Theory is also called Crowe’s Fraud Pentagon Theory. This theory was initially used in financial audits and was put forward by Albrecht et al. (2011) and Connolly et al. (2006). The Fraud Pentagon Theory is an extension of the Fraud Triangle Theory and Fraud Diamond Theory. The Fraud Pentagon Theory dimension explains several reasons or factors why someone commits fraudulent acts (Akomea-Frimpong et al., 2016; Kassem and Higson, 2012; Pedneault et al., 2012; Vousinas, 2019). The Five Elements of the Fraud Pentagon Arrogance: According to Albrecht et al. (2011), Connolly et al. (2006), arrogance is the characteristic of superiority regarding the rights that people have and the feeling that internal controls and company policies do not apply to them. Pressure: According to Albrecht (2012), pressure stems from someone feeling the need to commit fraudulent behavior. "The intended pressure may come from the closest people like parents, siblings or friends” (Hartano, 2012). Olejnik and Holschuh (2007) describe academic pressures as responses that arise owing to too many demands and tasks that must be done by students. Opportunity: According to Albrecht (2012), opportunity is when someone feels that he or she has a combination of situations and conditions that allow him or her to commit academic fraud and not be detected. In this research opportunity arises, intentionally or unintentionally, in situations that compel someone to commit academic fraud. Rationalization: Rationalization is an internal conflict within the offender and is an attempt to justify the act of fraud he or she has committed (Dorminey et al., 2012; Girgenti and Hedley, 2011; N’Guilla et al., 35 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun 2018). Rationalization is self-justification for wrong behavior (Albrecht, 2012). Students who exhibit academic fraudulent behavior constantly look for justification by saying that academic fraud is justified for a variety of reasons. A morally-acceptable attitude or rationalization needs to occur before fraudulent behavior is executed. In other words, rationalization allows the perpetrator to see illegal actions as acceptable actions (Ruankaew, 2016). Competence: The Fraud Pentagon Theory, proposed by Albrecht et al. (2011); Connolly et al. (2006), states that competence can be interpreted as ability in the Diamond Fraud Theory. According to Albrecht et al. (2011); Connolly et al. (2006), competence or capability is the ability to ignore internal controls, develop concealment strategies, and control social situations for personal benefits. Wolfe and Dana (2014), state that to improve fraud prevention and detection, it is important that elements of competence and capability are taken into account. In addition to dealing with pressure, opportunity and rationalization, an individual’s capability must also be considered. The individuals’ capabilities include personal traits and abilities, which play a major role in the academic fraud that might actually occur, even in the presence of the three other elements. ANOMIE THEORY This theory is seen as a condition of malaise in individuals, characterized by an absence or diminution of standard of values. When applies to a government or institutions anomie implied a social unrest or chaos or disorder (Chandola, 2009). DIFFERENTIAL ASSOCIATION THEORY This theory is of the premise that through interaction with others, individuals learn the values, attitudes, techniques and motives for criminal behavior, and that if employees are shielded from bad influences and exposed to good role models, the incidence of fraud will be low (Ekeigwe, 2010). LABELING THEORY Also known as social reaction theory, it is concerned with how the self-identity and behavior of an individual is influenced, categorized and described by others in their society. It also focuses on the linguistic tendency of majorities to negatively label minorities. Tennenbaum and Becker (2008). SOCIAL CONTROL THEORY This theory proposes that people’s relationships, commitments, values, norms and beliefs encourage them not to break the law, and that if morals codes are internalized, individuals will voluntarily limit their 36 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun propensity to commit deviant acts. As this acts are undertaken in the pursuit of self-interest and self-control (Gottfredson & Hirschi, 1990). STRAIN THEORY This theory states that social structures with society may encourage citizens to commit fraud. When the goals of a society become significant to the individual, achieving them becomes more important than the means adopted, as there is usually an encouragement to strive for monetary success, with little or no emphasis placed on the legitimate means of achieving them (Ekeigwe, 2010). THE GONE THEORY Another theory used to examine the causes for academic fraud among students is the Gone Theory. Ismatullah and Elan (2016), states that there are four factors that compel a person to commit fraud, namely Greed, Opportunity, Need, and Exposure, better known as the GONE theory. This theory was first put forward by Jack Boulogue in the book Fraud Auditing and Forensic Accounting: New Tools and Techniques (1995). According to Bologna in Lisa (2013) in Zaini (2015), the Gone Theory reveals four factors why fraud occurs: 1. Greed is related to the existence of behavior potentially possessed by every individual. 2. Opportunity is related to certain circumstances of organizations, institutions or societies, which open up opportunities for someone to commit fraud. 3. Need is related to the factors necessitated by individuals to support their normal lives. 4. Exposure is related to punishment or consequences faced by the perpetrators of fraud when they are caught. If one of the four behavioral factors compelling fraud can be minimized, the rate of fraud will be lower. If the four behavioral factors causing fraud cannot be minimized, the rate of fraud will be higher. 37 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 6 CREATIVE ACCOUNTING AND FRAUDULENT FINANCIAL REPORTING INTRODUCTION Application of International Financial Reporting Standard (IFRS) and other relevant accounting standards with appropriate disclosures lead to the fair presentation of the financial statement. The International Accounting Standard 8 (IAS 8) which is on Accounting Policies, Changes in Accounting Estimates and Errors emphasizes on the selection and application of appropriate accounting policies so as to reflect the true presentation of the financial statements. Fair presentation encompasses a range of different figures due to the fact that; alternative accounting policies can produce different results while application of accounting in accordance with IAS 8 is often based on estimates and judgments. A comprehensive basis of accounting comprises a set of criteria used in preparing the financial statements which applies to all material items and which has a substantial support. Financial statements that are not prepared to meet the common information needs of a wide range of users may be prepared to meet the financial information needs of specific users and as such the different basis of accounting should be well defined since the information needs of users will determine the applicable financial reporting framework (ICAN-NSA32, 2008). Thus, creative accounting will ordinarily produce different financial results, especially when applying different policies like different depreciation rates, different income recognition approach and using various operational techniques and methods by different organizations. Nobes and Parker (2010) observed that differences in accounting practice which include the difference in culture, the legal system, tax system, mode of financing, presentation and reporting format often results in significant differences in the reported incomes and other financial statement items. What is Creative Accounting? There are various definitions of creative accounting in the literature, but they all boil down to the same idea. Bhasin (2016) describes creative accounting as an accounting practice that may (or may not) adhere to accounting principles and standards, but deviates from what those principles and standards intend to achieve, in order to present the desired business image. In other words, creative accounting is the process of transforming accounting information from what it actually is to what the company wants it to be, using the benefits (or loopholes) in the existing rules or by ignoring part of the rules. Creative accounting can also 38 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun be described as a series of actions initiated by the company’s management that affect the reported business result, which, however, do not bring true economic benefits to the company, but can instead result in great damages in the long term (Merchant, & Rockness, 1994). Shah (1998) in turn, defined creative accounting as a process in which managers utilise the so-called loopholes and ambiguities in accounting standards to demonstrate financial success in a biased manner. Since creative accounting often does not violate legal rules, the question is whether it is good or bad. This depends on the basic purpose for which it is used and the manner in which it is applied. Bhasin (2016) describes it in a very picturesque way: creative accounting is like a double-edged sword – management can either use it in a positive sense, or it can abuse it. Thus, the idea to present the business in a better light can ultimately result in a total loss of company image. Creative Accounting refers to the use of accounting knowledge to influence the reported figures, while remaining within the jurisdiction of accounting rules and 'taws, so that instead of showing the actual performance or position of the company, they reflect what the management wants to tell the stakeholders, purposeful intervention in the external financial reporting process with the intent of obtaining some exclusive gain. Why Creative Accounting? Management of organizations are been motivated towards creative accounting behaviour and what motivates these steps are highlighted below according to Hameed and Ajide (2014), a. The existence of tax levies based on income, b. Confidence by shareholders and workers in management that is able to report stable earnings and psychological expectations relating to increases or decreases in anticipated income. c. In countries with highly conservative accounting systems, the income smoothing' effect can be particularly pronounced because of the high level of provisions that accumulate. d. Another bias that sometimes arises is called 'big bath accounting’, where a company making a bad loss seeks to maximize the reported loss in that particular year so that future years will appear better. e. Other motivations for creative accounting include those provided when significant capital market transactions anticipated, and when there, is a gap between the are the performance of the firm and analysts' expectations. A variant -on income smoothing is to manipulate profit to tie in forecasts. 39 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun CONSEQUENCES OF USING CREATIVE ACCOUNTING In the preceding paragraphs it became clear that the consequences of creative accounting are undesirable in many cases. To confirm this, it is important to consider the consequences of using creative accounting. i. Reduction of Company Value - Decisions taken to influence short-term profits through the use of creative accounting may impair the health of “long-term" economical entity. ii. Violation of Ethical Standards - Even if inventive accounting practices do not violate IFRSs, they are a controversial ethical practice. Creative accounting resembles a steep path with minor accounting frauds, which become more aggressive until they create distortions in the financial statements. iii. Hiding Unit Operational Problems - Creative accounting can be practiced at lower managerial levels so that operational problems can be kept hidden by senior managers Some Preventive Measures Preventing creative accounting practices, the use of which has resulted in many bankruptcy cases of major companies in the world such as Enron, WorldCom, or Parmalat, requires the involvement of many stakeholders from organizations that set accounting rules and standards for government up to companies or different industry branches. i. The ability to choose different accounting methods can be reduced by reducing the number of possible methods or specifying the cases when each method can be used. Another way of preventing it is to seek consistency in the use of methods. If a company has used a certain method when its financial condition was good, it should continue to use the same method even if the advantage is not in her side. ii. Regarding to the abusing judgment or prediction, there are three ways to prevent it. The first is the adoption of rules that minimize cases of use of judgment or prediction by companies. The second concerns the obligation to have a consistency or continuity of the method used in the trial. So if the company has evaluated something in a certain way, there is no reason why it should change this method if it does not use it anymore. Third, auditors need to intensify their efforts in detecting inaccurate manipulative projections. Once auditors audit the company's financial statements, they should carefully check whether the anticipation made by the managers are normal or obvious signs of falsehood. iii. Artificial transactions can be prevented by using the concept of "substance over form". So, the companies should use more economic restraint in the accounting records of these transactions than its legal form. It is necessary for the procedure to be economically conceived and to recognize its economic effect and not to be abused with the legal form which, despite being legally regular, does not represent the economic reality of any action. iv. Regular transactions are difficult to prevent and becomes a moral responsibility for the company executives. However, the possibility to use it as a manipulation tool can be limited by setting the constant 40 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun assessment of fixed assets and long-term investments so that the loss or gain from their valuation or impairment is recognized in the relevant period and not just in a period. v. Since the market and the economy are increasingly evolving, chances that certain specific business areas are not well covered by accounting rules. This problem can be reduced through extended review of current standards and their completion with new standards for problem areas such as accounting for stock exchange operations. Problems with the reclassification or presentation of financial numbers can be solved by setting up unique standards for the presentation and classification of financial statements and the items included in them. Earnings Management Earnings management is a type of creative accounting where an attempt is made by management so as to influence or manipulate reported earnings by using specific accounting methods or changing the methods previously used. Earnings management techniques include deferring or accelerating expense or revenue transactions or using other methods designed to influence short-term earnings. Earnings management is the use of accounting techniques to produce financial reports that present an overly positive view of a company's business activities and financial position. Many accounting rules and principles require company management to make judgments. Earnings management takes advantage of how accounting rules are applied and create financial statements that inflate earnings, revenue or total assets. Window Dressing This depicts a situation where an entity enters into a transaction during a particular financial year and reverses such transaction immediately after the year-end. The main motive for doing this is to artificially improve profitability and liquidity in the financial statements. Window dressing is a strategy used by mutual fund and other portfolio managers near the year or quarter end to improve the appearance of a fund’s performance before presenting it to clients or shareholders. To window dress, the fund manager sells stocks with large losses and purchases high-flying stocks near the end of the quarter. These securities are then reported as part of the fund's holdings. Aggressive Earnings Management Aggressive earnings management is a manipulated means of misleading the stakeholders especially about an entity's performance and profitability. Companies could carry out various ugly means to achieve their aims. According to Sanusi (2010), some banks normally engage in manipulation of their books by colluding 41 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun with other banks to artificially enhance financial positions and therefore stock prices, practices such as converting non-performing loans into commercial papers and bank acceptances and setting up off-balancesheet special purpose techniques so as to hide their losses. This shows the extent to which some banks could go on creative accounting and aggressive earnings. Although, the Central Bank of Nigeria (CBN) had put in place various stringent measures in order to put an end to this menace and other related practices in the banking industry. Big Bath Accounting This refers to recognizing all the bad news in one year so that later years can look stronger. If a company expects disappointing results it might decide to make them even worse by writing down assets and recognizing liabilities. In future years the assets could be used without any corresponding cost and a decision made that the liabilities are no longer required. They would then be reversed back through the statement of profit or loss. Motives for applying creative accounting The main motives for applying creative accounting are: i. Obtaining personal gain; ii. Competition; iii. Attracting investors; iv. Increasing or maintaining the level of capital; v. Buying time for not settling debts; vi. Beating analysts’ forecasts about future company performance. In order to present their business in the best possible light, companies use various techniques to manipulate financial information. Manipulations usually occur where accounting standards require accounting estimates. The most widely used creative accounting techniques are: i. Manipulation of off-balance sheet financing items; ii. Changes in accounting policies and depreciation methods; iii. Manipulation of other income and expense items; iv. Changes in the value of money; v. Overestimation of revenues by recording fictitious sales revenues; vi. Manipulation of receivables write-offs; vii. Manipulation of accruals. 42 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Since creative accounting is increasingly being used in a negative sense, resulting in numerous accounting scandals with huge consequences, it is necessary to establish efficient methods that will limit or minimise manipulation of financial information. Techniques for preventing creative accounting Efficient techniques for preventing creative accounting include: i. Adaptation of accounting standards in terms of limited use of estimates and consistency in the application of accounting methods; ii. Recognising and insisting on the role of internal and external audit in identifying and reporting unfair estimates, and preventing accounting manipulations; iii. Change of audit service providers from one accounting period to another; iv. Hiring independent directors and members of the audit committee; v. Establishing effective corporate governance controls; vi. Company persistence in developing a whistleblower policy; vii. Continuously making employees aware of the code of ethics; viii. Placing emphasis on the development and application of forensic accounting; ix. Making investors aware of the practice of manipulating financial information; x. Consistent enforcement of penalties by national authorities. Ethical consideration in creative accounting and aggressive earnings by organizations is a concerned issue which requires a critical look and with a view of recommending appropriate checks. Creative accounting includes a situation where some of the accounting laid down rules, laws and regulations have been manipulated, modified or readjusted so as to produce another result other than the initial result if no manipulations are involved. Creative accounting should involve a fair presentation of financial statement by directors to the shareholders and stakeholders as some of them might rely on the information therein to make certain decisions. Fair presentation means that the financial statements should be presented fairly (truly, accurately, detailed and in an understandable format) showing the financial position, financial performance and cash flows statement of an entity. Fair presentation requires the faithful representation of the effects of transactions, other events and conditions in accordance with the definitions and recognition criteria for assets, liabilities, income, and expenses set out in the standards (Greuning, 2006). 43 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 7 COMPUTER CRIMES Knowledge of Information and Communication Technology (ICT) is a must for Forensic Accountants and Fraud Examiners. Tools available in ICT are majorly the target when compromises will occur. Therefore, Computer crimes are illegal and unethical activities which involve the use of information technology or other means to gain an unauthorised access to a computer system with the intent of damaging, deleting or altering computer data, including software piracy and malicious software. They also include activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes may include the manipulation of confidential data and critical information. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have necessitated the introduction and use of newer and more effective security measures. Computer crime is referred to other names like Cybercrime, hi-tech crime and electronic crime. Computer crimes are basically classified into: i. Computer fraud; ii. Malicious software (also known as malware); and iii. Software and copyright piracy COMPUTER FRAUD These are physical and electronic fraudulent practices other than malicious software and software piracy which can be perpetrated with the intent to cause system interferences, misuse of devices, identity theft and altering of computer data. Computer frauds include, but are not limited to, the following: Hacking: The activity of breaking into a computer system to gain an unauthorised access and make an illegal use of the same is known as hacking. It is also the act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system. The unauthorised revelation of passwords with intent to gain an unauthorised access to the private communication of an organisation of a user is one of the widely known computer crimes. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities. 44 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun For example, a hacker can view credit card numbers or even top secret government information. It should be stated here that hacking gives impetus to the intruder to perpetrate other forms of computer fraud which will be discussed below. Cyber Stalking: The use of information and communication technology (mainly the Internet and mobile devices) to persecute other individuals is known as cyber stalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyber stalking activities. Cyber stalkers make use of online forums, chat rooms and social networking websites such as Twitter and Facebook to defame and threaten individuals. Other forms of cyber stalking include: sending obscene mails, abusive phone calls. Phishing: This is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. When Internet users are making use of the www facility on the Internet, an effort should be made to distinguish between organisations with related URLs since computer fraudsters can develop a URL and website that are much similar to address and contents of the real organisation, which make the users, feel safe to enter their details there. For example, there is a difference between these two URLs www.cibn.com and www.cibng.org. The first is a Christian association and the second is a Nigerian banking professional institute. In phishing, let us assume the first URL is a fake website built and disguise as CIBN website, then CIBN users can be lured to believe the website is a genuine website of the CIBN. Scavenging: Also referred to as dumpster diving, or trashing, this is the name given to a very simple type of security attack which involves scavenging, searching illegally through materials that is regarded as being redundant or discarded by the authorised and the original user. Searching for unwanted file itself might not look illegal but the use to which it is applied. Data Diddling: Sometimes called false data entry, this involves modifying data before or after it is entered into the computer. In other words, it is the falsification of entries in a record to be processed either before or during processing. It is as simple as a data processing officer entering false payroll information using tactics that might make this illegal act to be difficult to detect. For example, if the processing officer is a good computer savvy, he can easily instruct the computer either through a special computer program or existing package in the system to calculate artificial and inflated figures into the payroll elements of some staff. 45 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Wiretapping: This is another serious another electronic crime that involves an intruder (third party) breaking into a communication network without the authorisation or knowledge of the participants. It is much feasible in telephone and computer network communication and transmission. This is much common though in the Western world since it requires special skills, knowledge and devices. Criminals sometimes use wiretapping methods to eavesdrop on communications either for personal advantage or for sinister reasons. It is unfortunately quite easy to tap many types of network cabling. For example, a simple induction loop coiled around a terminal wire can pick up most voice and RS232 communications. More complex types of eavesdropping can be set up as well. In order to forestall wiretapping, it is important to physically secure all networks cabling to protect it both from interception and vandalism. Salami Technique or French Round-Off: this type of fraud, which is common in the finance industry, involves rounding off balances and crediting the rounded off amount to a specific account created for that purpose. The fraud might for a long time undetected since it involves accumulating fractional portion of customers’ account balances which might not be significant to attract suspicion even by the customers. For a hypothetical illustration, let us assume that savings account in a typical Nigerian bank earns 2.3% interest annually, if we calculate the interest element on two different account balances of =N=1,530,703 and =N=857,030. The annual interest elements are =N=35,206.169 and =N=19,711.69 respectively. The perpetrator might credit only =N=35,206 and =N=19,711 and slice the addition of 169k and 69k into the account created for this fraudulent act. The addition of this will result into 238k or =N=2.38. You can see this is an iota; the criminal will make more money depending on the number of transactions he undertakes. Let us imagine =N=2.38 is made on two customers’ accounts. Calculate what will be made on 250,000 customers on the average. 250000/2*=N=2.38 will produce =N=297,500 annually. Piggybacking: This involves following an authorised person into a restricted area, i.e. a building or a computer room. For example, someone who wants to gain access to a restricted area might show up at a secured door, carrying a heavy armload of computer equipment, at the same time as an authorised employee arrives, looking as if they belong. The authorised employee kindly holds the door open, and the intruder tags along into the area. Of course, there is nothing high-tech about this; it is the same principle burglars follow to gain entry to apartments. It is easy enough to prevent piggybacking: guards and access methods like turnstiles and mantraps (which allow only one user to enter at a time). User education is also a very important deterrent. 46 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Masquerading: This is termed as impersonation in some quarters. It occurs when one person uses the identity of another person to gain an access to computer resources. This may be done in person or remotely. We describe basic masquerading in this section, but masquerading is an attack that spans the boundaries of the categories that will be discussed here. There are both physical and electronic forms of masquerading. In person, a criminal may use an authorised user's identity or access card to get into restricted area where he will have access to computers and data. This may be as simple as signing someone else's name to a signin sheet at the door of a building. It may also be as complex as playing back a voice recording of someone else to gain entry via a voice recognition system. (The movie titled, Sneakers, had some nice scenes showing how this could work). Trap Door: This is a form of loophole created intentionally or unintentionally by the programmer which give a route to the criminals to get access to the system for their criminal use. It allows quick access to the program by evading all security measures built into the program. To a programmer, trap doors might make sense. If a programmer needs to modify the program sometimes in the future, he can use the trap door instead of having to go through all of the normal, customer-directed protocols just to make the change. Trap doors, of course, should be closed or eliminated in the final version of the program after all testing is completed, but, intentionally or unintentionally, some are left in place. Other trap doors may be introduced by error and only later discovered by crackers who are roaming around, looking for a way into system programs and files. Typical trap doors use such system features as debugging tools, program exits that transfer control to privileged areas of memory, undocumented application calls and parameters, and many others: 1. Identity Theft: This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity. It is the act of pretending to be someone else by using someone else's identity as one's own. Financial identity theft involves the use of a false identity to obtain goods and services and a commercial identity theft is the use of someone else’s business name or credit card details for commercial purposes. Identity cloning is the use of another user's information to pose as a false user. Illegal migration, terrorism and blackmail are often made possible by means of identity theft. 2. Session Hijacking: This is a relatively new type of attack in the communications category. Some types of hijacking have been around a long time. In the simplest type, an unauthorized user gets up from his terminal to go get a cup of coffee. Someone lurking nearby (probably a co-worker who is not authorised to use this particular system) sits down to read or change files that he would not ordinarily be able to access. 47 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Some systems do not disconnect immediately when a session is terminated. Instead, they allow a user to re-access the interrupted program for a short period. A cracker with a good knowledge of telephone and telecommunications operations can take advantage of this fact to reconnect to the terminated session. 3. Password Sniffing: Password sniffers are able to monitor all traffic on areas of a network. Crackers must have installed them on networks used by systems that they especially want to penetrate. Password sniffers are programs that simply collect the first 128 or more bytes of each network connection on the network that is being monitored. When a user types in a user name and a password as required when using certain common Internet services like FTP (which is used to transfer files from one machine to another) or Telnet (which lets the user log in remotely to another machine), the sniffer collects that information. Additional programs sift through the collected information, pull out the important pieces (e.g., the user names and passwords), and cover up the existence of the sniffers in an automated way. Best estimates are that in 1994 as many as 100,000 sites were affected by sniffer attacks. 4. Social Engineering: This is also known as social hacking. It is the name given to a category of attacks in which someone uses human and social skills, including coercion, to steal system-related information such as physical or electronic keys, access codes and cards, electronic tokens, and toll calls. It involves tricking, coercing or manipulating others (users or staff members) to reveal information that can be used to steal data or subvert systems. Such attacks can be very simple or very complex. In one low-tech case we know about, a man posing as a magazine writer was able to get valuable information over the telephone from the telephone company simply by asking for it supposedly for his story. He then used that information to steal more than a million dollars in telephone company equipment. 5. Eavesdropping: This is a process whereby connection (electronic or physical) is made to private conversations of others for the purpose of listening, monitoring, and/or examining someone without their permission and/or knowledge. Eavesdropping can be done over telephone lines (wiretapping), e-mail, instant messaging and other methods of communication considered private. 6. Password Cracking: Attackers often aim to gain entrance to a system. If the establishment of an anonymous connection cannot be accomplished, the attacker will resort to establishing an authenticated connection. To do so, a valid combination of username and password is required. Using default account names facilitates the work of the attacker, as he then only has to crack the password. Using blank or weak passwords facilitates this task even more. 48 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 7. Prof. Godwin E. Oyedokun Shoulder Surfing: This is an attempt to obtain information illegally by looking across the shoulders of a computer operator. 8. Super Zapping: This lets system administrators or other highly trusted individuals override system security to quickly repair or regenerate the system, especially in an emergency. Similar utilities are found on many other types of computer systems. Programs of this kind can be thought of as the master key to the system. Because superzapping leaves no evidence of file changes, managers may assume that the loss of funds is a data entry or application program problem. The only reliable way to detect this technique is by comparing current data files with previous generations of the same files. 9. IP Spoofing: This is also known as IP address forgery or a host file hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a website, hijack or gain access to a network. IP spoofing is perpetrated by computer criminals to not get caught when spamming, denying or degradation of service. These are attacks that involve massive amounts of information being sent to computers over a network in an effort to crash the entire network. An IP (Internet Protocol) address is the address that reveals the identity of the internet service provider and the personal Internet connection. The address can be viewed during Internet browsing and in all correspondence that is sent. The hijacker obtains the IP address of a legitimate host and alters packet headers for the purpose of sending and receiving data over the Internet and computers that are connected to a network so that the legitimate host appears to be the source. Measures to Prevent Computer Fraud 1. Encryption of data and programs should be emphasized. 2. The use of password should be encouraged. 3. Access to computer rooms, sensitive data should be restricted. 4. There should be segregation of duties of electronic data processing personnel. 5. Rotation of users or personnel on their duties should be carried out. 6. Regular information system auditing should be carried out. 7. CCTV should be installed in the computer environment. MALICIOUS SOFTWARE (MALWARE) This is a software deliberately designed to attack other programs and files in computers. Malicious software is generally referred to as malwares and they include viruses, worms, spywares and Trojan horses. 49 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Computer Viruses: A virus is a program which attaches itself to other programs to cause undesirable effects on all programs attached to. Many people do take viruses and worms to mean the same thing; both can be introduced into systems via Trojan horses. Viruses spread to other computers through network file system, through the network, the Internet or by means of removable devices like USB disks and CDs. Computer viruses are, after all, forms of malicious codes written with an aim to harm a computer system and destroy information. Writing computer viruses is a criminal activity as virus infections can crash computer systems, thereby destroying great amounts of critical data. However, if a virus infects a program which is copied to a disk and transferred to another computer, it could also infect programs on that computer. This is how a computer virus spreads. The spread of a virus is simple and predictable and it can be prevented. Computers Worms: Unlike a virus, a worms a standalone program in its own right. It exists independently of any other programs. To run, it does not need other programs. A worm simply replicates itself on one computer and tries to infect other computers that may be attached to the same network. They are like computer viruses, in the fact that they self-replicate in the computer system. However, a computer worm does not have to attach itself to a program in your system like a computer virus does in order to function. However, computer worms may have a "payload" that can delete files, encrypt files or email files on the host computer. A very common payload for a worm is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author. Spyware and Adware: Spyware is a newer type of program that damages a computer system. Spyware is also not a computer virus in the traditional sense, but it is harmful. Spyware works by getting into a computer system for the purpose of taking partial control over usage, or collecting personal information without your knowledge. Spyware often ends up on the computer after downloading and installing free software. Some spyware software can change computer settings or install additional software, but it can also have an impact on the computer’s performance, slowing down the system and limiting the speed of network traffic. They can collect information about users without their consent or knowledge, including personal information such as Internet surfing habits and user logins. Bots: These are sometimes called Internet bots or zombies. They are types of malware which allow an attacker to gain complete control over the affected computer. Computers that are affected with a ‘bot’ are generally referred to as ‘zombies’. Attackers are able to access lists of ‘zombie’ PCs and activate them to help execute DoS (denial of service) attacks against web sites, host phishing attack web sites or send out thousands of spams. Bots are good at hiding in the shadows of a computer; they often have file and process 50 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun names that are similar to normal system file names and processes so that the users won’t think twice if they do see them. Trojan Horse: This is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. Trojan horses do not replicate themselves, but they can be just destructive. One of the most insidious types of Trojan horse is a program that claims to rid the computer of viruses but instead introduces viruses to the computer. Consider this typical situation: a Trojan horse is hidden in an application program that a user is eager to try, something like a new game or a program that promises to increase efficiency. Inside the horse is a logic bomb that will cause the entire system to crash the third time the user runs the new program. If he is lucky, the user will thoroughly enjoy the program the first two times it is run, because when he tries to use it the third time, the program he was eager to try will disable his whole system. Rootkits: These are types of malicious software aiming to offer the attacker continuous access to an infected computer and are usually designed to hide their existence from detection. Rootkits are installed by an attacker once they have obtained administrator (or root) access to the system, either by direct attack or by relieving the login data of privileged user. Once installed, the attacker will try to hide evidence of the intrusion as well as maintain privileged access to the system through the rootkits. There are different kinds of rootkits, such as application kernel and userland rootkits. Logic Bomb: This is a special piece of software embedded in a proper working program to cause catastrophic or undesirable effect in the computer’s operating system. It is a time-bomb since it will only occur over a certain time, though; time criterion is not only the condition to set off logic bombs. Others include, but are not limited to, installation of certain programs, running or regular usage of some programs after a certain number of times, and occurrence of certain or special events. Safeguarding Computer against Malicious Software The following steps programs and devices could help safeguard your computer against malicious softward: 1. Install and run anti-virus and anti-spy software and intrusion detection system regularly. Some of the popularly tested and effective anti-malicious software are: COMODO, AVG Antispyware, Avast, Kapersky, Norton Anti-virus and Internet Security. 51 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 2. Prof. Godwin E. Oyedokun Refrain from downloading and using freeware and sharewares, most especially from unknown websites. Meanwhile, these freeware sites have relatively stood the test of time. They are: BitComet, CNET and 4shared. 3. Avoid the use of all forms of foreign (unknown) peripherals and software, i.e. disc, keyboard, etc., on the computer system. 4. Indiscriminate copying and downloading of data and programs should be discouraged, most especially on a file sharing network because of bundling. Bundling is a method whereby a malware, i.e. Trojan horse, is included as part of a software as application downloaded from a file-sharing network. 5. Access to computer system should be restricted using passwords, encryption techniques, log and biometric controls. 6. Back up your files regularly on CDs or DVDs. Perform virus scanning prior to backing up to ensure: i. Buying and downloading of only original software; ii. Discarding and not responding to spam and unsolicited mails; iii. Avoid exposing discs, tapes, USB and other computer peripherals to heat and sunlight. SOFTWARE PIRACY This is referred to as unauthorised copying and/or selling of data and programs in violation of the copyrights for personal and economic benefit. Too many people do not take copyrights seriously, law-abiding people everywhere think nothing of copying games and other utility software to share with friends, or office software for home use. Bulletin board systems (BBS) often make pirated software available for downloading or swapping. In a recent case, an MIT (Massachusetts Technology) student was accused of running a BBS that was used in this way. Charges against him were eventually dropped, however, based on the fact that the federal wire fraud statute did not apply to a case involving copyright infringements. Only the copyright statute would apply, and it was not applicable where the infringing person did not intend to profit from this conduct. 52 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 8 DIGITAL FORENSICS INTRODUCTION Digital forensics is also known as computer forensics or cyber-crime forensics. Professionals who manage or administer information systems and networks should understand computer forensics. Forensics is the process of using scientific knowledge for collecting, analysing, and presenting evidence to the courts. The word forensics means “to bring to the court”. Forensics deals primarily with the recovery and analysis of latent evidence. What is Computer Forensics? Computer forensics is a discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law. Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines and faces similar issues. Digital forensics is the process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. 53 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Forensic investigators typically follow a standard set of procedures: After physically isolating the device in question to make sure it cannot be accidentally contaminated, investigators make a digital copy of the device's storage media. Once the original media has been copied, it is locked in a safe or another secure facility to maintain its pristine condition. All investigation is done on the digital copy. Objectives of Computer Forensics The main objectives of computer forensics can be summarized as follows: a. To recover, analyze, and preserve the computer and related materials in a manner that can be presented as evidence in a court of law. b. To identify the evidence in a short amount of time, estimate the potential impact of the malicious activity on the victim, and assess the intent and identity of the perpetrator. The two basic types of data collected in computer forensics are as follows: a. Persistent Data: Persistent data is the data that is stored on a local hard drive (or another medium) and is preserved when the computer is turned off. b. Volatile Data: Volatile data is any data that is stored in memory or exists in transit, that will be lost when the computer loses power or is turned off. Volatile data resides in registries, cache, and random access memory (RAM). Since volatile data is ephemeral, it is essentially an investigator knows reliable ways to capture it. More recently, commercial organisations have used computer forensics to their benefit in a variety of cases such as: a. Intellectual Property theft b. Industrial espionage c. Employment disputes d. Fraud investigations e. Forgeries f. Bankruptcy investigations g. Inappropriate email and internet use in the workplace h. Regulatory compliance Explanation of the Principles 1. All digital evidence is subject to the same rules and laws that apply to documentary evidence. An explanation of the above principles is as follows: 54 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 2. Prof. Godwin E. Oyedokun The doctrine of documentary evidence may be explained thus: the onus is on the prosecution to show to the court that the evidence produced is no more and no less now than when it was first taken into the possession of law enforcement. 3. Operating systems and other programs frequently alter, add and delete the contents of electronic storage. This may happen automatically without the user necessarily being aware that the data has been changed. 4. In order to comply with the principles of digital evidence, wherever practicable, proportionate and relevant an image should be made of the device. This will ensure that the original data is preserved, enabling an independent third party to re-examine it and achieve the same result, as required by principle. 5. This may be a physical / logical block image of the entire device, or a logical file image containing partial or selective data (which may be captured as a result of a triage process). Investigators should use their professional judgment to endeavour to capture all relevant evidence if this approach is adopted. 6. In cases dealing with data which is not stored locally but is stored at a remote, possibly inaccessible location it may not be possible to obtain an image. It may become necessary for the original data to be directly accessed to recover the data. With this in mind, it is essential that a person who is competent to retrieve the data and then able to give evidence to a court of law makes any such access. Due consideration must also be given to applicable legislation if data is retrieved which resides in another jurisdiction. 7. It is essential to display objectivity in a court of law, as well as the continuity and integrity of evidence. It is also necessary to demonstrate how evidence has been recovered, showing each process through which the evidence was obtained. Evidence should be preserved to such an extent that a third party is able to repeat the same process and arrive at the same result as that presented to a court. 8. It should be noted that the application of the principles does not preclude a proportionate approach to the examination of digital evidence. Those making decisions about the conduct of a digital investigation must often make judgements about the focus and scope of an investigation, taking into account available intelligence and investigative resources. This will often include a risk assessment based on technical and non-technical factors, for example, the potential evidence which may be held by a particular type of device or the previous offending history of the suspect. Where this is done it should be transparent, decisions should be justifiable, and the rationale recorded. Stages of Digital Forensic Examination Digital forensic examination process can be divided into six stages, presented in their usual chronological order as follows: 55 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 1. Identification 2. Readiness 3. Evaluation 4. Collection 5. Preservation 6. Analysis 7. Presentation 8. Review 9. Reporting Prof. Godwin E. Oyedokun What is Digital Evidence? Digital Evidence refers to digital data that establish that a crime has been committed. It can provide a link between a crime and its victim or can provide a link between a crime and the perpetrator. Digital Evidence is any information that can be secured from an information system and used during the course of any civil or criminal legal proceedings. This extends to internal disciplinary hearings, employment tribunals, arbitration plans and all courts of law. Digital Evidence will also have to sit alongside other forms of evidence (witness testimonies, paper documents and other kinds of forensic evidence). Key Facts about Digital Evidence 1. Many types of crime involve digital evidence. 2. Every crime scene is a digital evidence crime scene. Investigators must apply the same level of care, custody, and control to ensure their personal safety and to preserve all types of evidence. 3. Digital evidence can be fragile. If not handled properly, heat, cold, and magnets can destroy it. Digital evidence can also be damaged by dropping it. 4. Digital evidence can be easily altered. If a computer is off, leave it off. Just turning it on or taking a quick peek at the files can change the data. If the computer is on, perform a proper shutdown or ask a digital forensics Examiner for assistance. When in doubt, leave the device “off.” 5. The digital fraud examiner should never assume that digital evidence is destroyed. Role of Digital Evidence When intruders bypass the security settings of a victim’s computer or network, they often leave evidence that can serve as clues to document the attack. Certain factors that can contain valuable evidence include: 56 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 1. Prof. Godwin E. Oyedokun Use/abuse of the Internet, indicating the intruder probably exchanged some type of communication or was able to install malware on the victim’s computer 2. Production of false documents and accounts, which indicates that the intruder is probably concealing something 3. The encrypted or password-protected material, which indicates that the intruder is transferring or hiding some secret information 4. Abuse of the systems, as when the attacker is using the victim’s computer as a zombie or bot to further the attacker’s criminal activity 5. E-mail contact between suspects/conspirators, which could indicate that more than one intruder is involved and that some sort of collusion has taken place. 6. Theft of commercial secrets or proprietary information 7. Unauthorized transmission of confidential information 8. Records of movements within the company, allowing the attacker to benefit from insider knowledge 9. Malicious attacks on the computer systems themselves, up to and including denial-of-service attacks 10. Stealing the names and addresses of the user’s or company’s contacts Processing of Digital Evidence Digital evidence can be processed in the following ways. These include: 1. Assessment: Computer forensic examiners should assess digital evidence thoroughly with respect to the scope of the case to determine the course of action to take. 2. Acquisition: Digital evidence, by its very nature, is fragile and can be altered, damaged, or destroyed by improper handling or examination. The examination is best conducted on a copy of the original evidence. The original evidence should be acquired in a manner that protects and preserves the integrity of the evidence. 3. Examination: The purpose of the examination process is to extract and analyze digital evidence. Extraction refers to the recovery of data from its media. Analysis refers to the interpretation of the recovered data and putting it in a logical and useful format. 4. Documenting and reporting: Actions and observations should be documented throughout the forensic processing of evidence. This will conclude with the preparation of a written report of the findings. 57 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Criminal Uses of Digital Evidence Digital information is created, stored, processed, and/or translated by an electronic device. To better understand how digital information can be a factor in a criminal investigation, the following are important: 1. A computer or digital evidence item may play a role in a crime. Therefore, during the investigation, it’s necessary to determine the item’s role in order to handle and treat it properly. 2. Digital evidence could play any or all of three roles in a crime: a. The target of a crime b. The instrument of a crime c. Repository of evidence that documents the crime itself. Identifying Digital Evidence Digital evidence typically falls into four distinct categories. These include: Commonplace: Commonplace digital media can include any of the following: a. Cell Phones b. Thumb Drives c. Digital Cameras d. DVD/CDs e. MP3 Players f. Flash Memory Cards Obscure: Non-traditional digital media that are present during the execution of a digital search warrant but are often not noticed, thought of or identified as an item containing usable or relevant digital media. Obscure digital media can include: a. Printers with Smart Media or Internal Memory b. Digital Video Recorder (i.e., DVRs, aka “TiVo®”) c. Answering Machines d. GPS Receivers (e.g., Garmin devices) e. Game Consoles (e.g., Xbox, PlayStation) f. Digital Voice Recorders. 58 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Protected: Non-traditional digital media that include those meant to prevent unauthorized access or to conceal data through either encryption or biometric verification. These devices include: a. Iris Scanners b. Fingerprint Readers c. Access Cards Concealed: Digital media designed to disguise or conceal their true purpose and are easily hidden and/or transported on one’s person. If law enforcement personnel do not conduct a thorough and proper search, they very likely won’t recover concealed media, which can include: a. Computers disguised as boxes or bottles b. USB flash drives disguised as wristbands, pens, watches, earrings, pocket knives, credit cards, toys, and everyday objects. 59 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 9 MONEY LAUNDERING AND TERRORISM FINANCING INTRODUCTION We now live in an era of international money laundering controls. The Anti-Money Laundering (AML) field and brought into stark relief the threat of the movement and disguising of funds and introducing a whole new effort to combating money laundering. As a result of the governmental reaction in virtually all countries, banks, non-bank financial institutions and nonfinancial businesses face tougher national and international legal requirements and harsher penalties than ever before. By the same token, the regulators of those businesses and the law enforcement agents and prosecutors who enforce the criminal laws also face greater challenges and responsibilities in their work. As a result of this, the jobs of the professionals who strive to ensure that their organizations are protected from being used for money laundering are now much more demanding and the job pressures are more severe. The Financial Action Task Force (FATF) of the organization for Economic Cooperation and Development (OECD) has defined money laundering as the goal of a large number of criminal acts is to generate profit for the individual or group that carries out the act. Money laundering is the processing of these criminal proceeds to disguise their illegal origin. This process is of critical importance, as it enables the criminal to enjoy these profits without jeopardizing their source. What is Money Laundering? The term “money laundering” describes a range of practices used to disguise the source of illicit profits and integrate them into the legitimate economy. Simply put, money laundering means ‘washing’ dirty money so that it appears clean. Corrupt officials and other criminals use money laundering techniques to hide the true sources of their income. This allows them to avoid detection by law enforcement and to spend their profits freely. Money laundering in some form is an essential part of most illicit enterprises, although methods vary widely. Large drug-trafficking organizations and corrupt public officials use complex, multijurisdictional layering schemes; small-time criminals use simpler strategies. Money laundering involves taking criminal proceeds and disguising their illegal source in anticipation of ultimately using the criminal proceeds to perform legal and illegal activities. Simply put, money laundering is the process of making dirty money look clean. The Financial Action Task Force (FATF) is a Paris-based multinational or inter-governmental body formed in 1989 by the Group of Seven industrialized nations to 60 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun foster international action against money laundering. According to the Financial Action Task Force (FATF), crimes such as illegal arms sales, narcotics trafficking, smuggling and other activities of organized crime can generate huge amounts of proceeds. Embezzlement, insider trading, bribery and computer fraud schemes can also produce large profits, creating the incentive to “legitimize” the ill-gotten gains through money laundering. Money laundering is the process of creating the appearance that large amounts of money obtained from serious crimes, such as drug trafficking or terrorist activity, originated from a legitimate source. Money laundering happens in almost every country in the world, and a single scheme typically involves transferring money through several countries in order to obscure its origins. Money laundering is a crucial step in the success of drug trafficking and terrorist activities, not to mention white collar crime, and there are countless organizations trying to get a handle on the problem. When a criminal activity generates substantial profits, the individual or group involved must find a way to use the funds without drawing attention to the underlying activity or persons involved in generating such profits. Criminals do this by disguising the sources, changing the form or moving the money to a place where it is less likely to attract attention. Stages in the Money Laundering Cycle Stage One: Placement This is the first stage in the washing cycle. Money laundering is a "cash-intensive" business, generating vast amounts of cash from illegal activities (for example, street dealing of drugs where payment takes the form of cash in small denominations). The monies are placed into the financial system or retail economy or are smuggled out of the country. The aims of the launderer are to remove the cash from the location of acquisition so as to avoid detection from the authorities and to then transform it into other asset forms; for example traveller's cheques, postal orders, etc. Placement is the physical disposal of cash or other assets derived from criminal activity. During this initial phase, the money launderer introduces the illegal proceeds into the financial system. Often, this is accomplished by placing the funds into circulation through financial institutions, casinos, shops and other businesses, both domestic and international. This phase can involve transactions such as: a. Breaking up large amounts of cash into smaller sums and depositing them directly into a bank account. b. Transporting cash across borders to deposit in foreign financial institutions, or to buy high valued goods such as artwork, antiques, and precious metals and stones that can then be resold for payment by check or bank transfer. 61 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Stage Two: Layering In the course of layering, there is the first attempt at concealment or disguise of the source of the ownership of the funds by creating complex layers of financial transactions designed to disguise the audit trail and provide anonymity. The purpose of layering is to disassociate the illegal monies from the source of the crime by purposely creating a complex web of financial transactions aimed at concealing any audit trail as well as the source and ownership of funds. In other words, layering involves the separation of illicit proceeds from their source by layers of financial transactions intended to conceal the origin of the proceeds. This second stage involves converting the proceeds of the crime into another form and creating complex layers of financial transactions to disguise the audit trail, source and ownership of funds. This phase can involve transactions such as: a. Sending wire transfers of funds from one account to another, sometimes to or from other institutions or jurisdictions. b. Converting deposited cash into monetary instruments (e.g. traveller’s checks). c. Reselling high-value goods and prepaid access/stored value products. d. Investing in real estate and legitimate businesses. e. Placing money in investments such as stocks, bonds or life insurance f. Using shell companies or other structures whose primary intended business purpose is to obscure the ownership of assets. Stage Three: Integration: Justification The goal in this stage is to create an apparent legal origin for the criminal proceeds. This can be done by: i. Doing business with yourself (e.g. falsifying sources of income, capital gains and/or loans) ii. Disguising the ownership of assets iii. Using the criminal proceeds in transactions with third parties The money launderer creates an apparent legal origin of the money by fabricating transactions which are supported by falsified and fabricated documents such as invoices, reports, contracts, agreements, bookkeeping entries, and deeds as well as false statements, both written or spoken. Common justification methods used include: i. Fabricating a loan (e.g. loan-back or back-to-back) ii. Fabricating a rise in net worth (e.g. buying and selling real estate and other items, fabricating casino winnings, lottery prizes, inheritance, etc.) iii. Disguising the ownership of assets and interest in businesses (e.g. through the use of relatives, foreign legal entities, nominees, etc.) iv. 62 Price-manipulating (e.g. over- and under-invoicing) www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management v. Prof. Godwin E. Oyedokun Manipulating turnover/sales by commingling illicit and legal sources of income Integration: Investment The goal in this final stage is to use criminal proceeds for personal benefit. Cash, electronic money and crypto currencies can be used for: i. Safekeeping: e.g. cash on hand, crypto currencies in a wallet ii. Consumption: e.g. day to day expenditures, lavish lifestyle, jewelry, vehicles, yachts, art iii. Investing: e.g. bank accounts, real estate, stocks, securities, receivables, funding of legitimate and illicit business activities, repayment of loans Methods of Money Laundering Banks and Other Depository Institutions Banks have historically been, and continue to be, an important mechanism for the disposal of criminal proceeds. There are some special areas of interest and concern for money laundering through banks and other depository institutions. These include 1. Electronic Transfers of Funds Some indicators of money laundering using electronic transfers of funds include the following: a. Funds transfers that occur to or from a financial secrecy haven, or to or from a high-risk geographic location without an apparent business reason, or when the activity is inconsistent with the customer’s business or history. b. Large, incoming funds transfer that is received on behalf of a foreign client, with little or no explanation or apparent reason c. Many small, incoming transfers of funds that are received, or deposits that are made using checks and money orders. Almost immediately, all or most of the transfers or deposits are wired to another account in a different city or country in a manner inconsistent with the customer’s business or history. d. Funds activity that is unexplained, repetitive or shows unusual patterns. e. Payments or receipts are received that have no apparent link to legitimate contracts, goods or services. f. Funds transfers that are sent or received from the same person to or from different accounts 2. Correspondent Banking: Correspondent banking is vulnerable to money laundering for two main reasons: a. By their nature, correspondent banking relationships create a situation in which a financial institution carries out financial transactions on behalf of customers of another institution. This indirect 63 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun relationship means that the correspondent bank provides services for individuals or entities for which it has neither verified the identities nor obtained any first-hand knowledge. b. The amount of money that flows through correspondent accounts can pose a significant threat to financial institutions, as they process large volumes of transactions for their customers’ customer. This makes it more difficult to identify the suspect transactions, as the financial institution generally does not have the information on the actual parties conducting the transaction to know whether they are unusual. Additional risks incurred by the correspondent bank include the following issues: a. While the correspondent bank may be able to learn what laws govern the respondent bank, determining the degree and effectiveness of the supervisory regime to which the respondent is subject may be much more difficult. b. Determining the effectiveness of the respondent bank's Anti-Money Laundering (AML) controls can also be a challenge. While requesting compliance questionnaires will provide some comfort, the correspondent bank is still very reliant on the respondent doing some due diligence on the customers it allows to use the correspondent account. c. Some banks offering correspondent facilities may not ask their respondents about the extent to which they offer such facilities to other institutions (nesting). This adds another layer and means the correspondent bank is even further removed from knowing the identities or business activity of these subrespondents, or even the types of financial services provided. 3. Payable-through Accounts: Elements of a payable-through accounts (PTAs) relationship that can threaten the correspondent bank’s money laundering defences include: a. Payable-through accounts (PTAs) with foreign institutions licensed in offshore financial services sectors with weak or absent bank supervision and weak licensing laws. b. Payable-through accounts (PTAs) arrangements where the correspondent bank regards the respondent bank as its sole customer and fails to apply its Customer Due Diligence policies and procedures to the customers of the respondent bank c. Payable-through accounts (PTAs) arrangements in which sub-account holders have currency deposit and withdrawal privileges d. Payable-through accounts (PTAs) used in conjunction with a subsidiary, representative or another office of the respondent bank, which may enable the respondent bank to offer the same services as a branch without being subject to supervision. 64 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management 4. Prof. Godwin E. Oyedokun Concentration Accounts: Banks that use concentration accounts should implement adequate policies, procedures and processes covering operation and recordkeeping for these accounts. Here are some anti-money laundering practices for these accounts. a. Requiring dual signatures on general ledger tickets b. Prohibiting direct customer access to concentration accounts. c. Capturing customer transactions in the customer’s account statements. d. Prohibiting customers' knowledge of concentration accounts or their ability to direct employees to conduct transactions through the accounts e. Retaining appropriate transaction and customer identifying information f. Reconciling accounts frequently by an individual who is independent of the transactions. g. Establishing a timely discrepancy resolution process h. Identifying and monitoring recurring customer names 5. Private Banking: The following factors may contribute to the vulnerabilities of private banking with regard to money laundering: a. Perceived high profitability b. Intense competition c. Powerful clientele d. The high level of confidentiality associated with private banking e. The close relationship of trust developed between relationship managers and their clients. f. Commission-based compensation for relationship managers g. A culture of secrecy and discretion developed by the relationship managers for their clients h. The relationship managers becoming client advocates to protect their clients 6. Structuring: The processes of how foreign money brokers conduct structuring are highlighted below: a. A structurer, who is acting for a foreign money broker, opens numerous checking accounts in Country a using real and fictitious names. Sometimes the structure uses identification documents of dead people supplied by the money brokers. 65 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management b. Prof. Godwin E. Oyedokun With funds supplied by the money brokers, the structure opens the accounts with inconspicuous amounts, usually in the low four figures. c. To allay bank suspicions, the money brokers sometimes deposit extra funds to cover living expenses and to give the accounts an air of legitimacy. d. Once the accounts are opened, the structurer signs the newly-issued checks in blank, leaving the payee, date and amount lines blank. e. He sends the signed blank checks to the money broker in country B, usually by courier. f. A structurer may open as many as two dozen checking accounts in this fashion. It is not uncommon for brokers to have more than 20 of these checking accounts in Country A available at any given time. g. The checking accounts usually accumulate only a few thousand dollars before they are cleared out by checks drawn by the money brokers to pay for exports from Country A to Country B’s money brokerage customers. h. The availability of hundreds of these accounts to Country B’s money brokers leaves open the possibility that tens of millions of dollars could be passing through them each year 7. Bank Complicity: Economic and Social Consequences of Money Laundering Social Effects of Money laundering 1. Increased Crime and Corruption: Successful money laundering helps enhance the profitable aspects of criminal activity. When a country is seen as a haven for money laundering, it will attract people who commit a crime. Typically, havens for money laundering and terrorist financing have: a. A limited number of predicate crimes for money laundering b. Limited types of institutions and persons covered by money laundering laws and regulations c. Little to no enforcement of the laws, weak penalties, or provisions that make it difficult to confiscate or freeze assets related to money laundering If money laundering is prevalent, there is likely to be more corruption. Criminals may try to bribe government officials, lawyers and employees of financial or non-financial institutions so that they can continue to run their criminal businesses. 2. Undermining the Legitimate Private Sector: 3. Weakening Financial Institutions: a. Loss of profitable business b. Liquidity problems through withdrawal of funds 66 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management c. Termination of correspondent banking facilities d. Investigation costs and fines e. Asset seizures f. Loan losses g. Reduced stock value of financial institutions Prof. Godwin E. Oyedokun Economic Effects of Money laundering The economic effects of money laundering include: 1. Loss of control of, or mistakes in, decisions regarding economic policy: 2. Economic Distortion and Instability: 3. Loss of Tax Revenue 4. Risks to Privatization Efforts: 5. Reputation Risk for the Country: 6. Social Costs:. Combating Money Laundering in Nigeria In the light of the underlined facts, money laundering in regarded as heinous crime which may undermine national growth and economic development because of its unproductive nature. It discourages reasonable investment, hence, the nation across the world put in place many anti-money laundering measures (AML) to combat the crime Nigeria Inclusive. However, the following are some of the legal framework that deals with money laundering. i. The Nigeria constitution ii. The EFCC Act iii. ICPC Act iv. BOFID 1990 v. Money laundering act vi. Audit standards vii. Accounting Standards viii. The customs ix. NDELA x. Immigration xi. Procurement Act xii. CBN Act 67 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun The relationship between Fraud and Money Laundering Although both fraud and money laundering are crimes based on deception and although the movement of funds obtained by fraud is a type of money laundering, fraud and money laundering are distinctly different and should not be confused. Money laundering has been defined in a number of ways, but essentially, it is a process undertaken by or on behalf of criminals with the object of hiding or disguising their criminal activities and the origin of their illicit proceeds. The goals are often achieved through a series of financial transactions, sometimes involving a number of countries and through a variety of financial products. Characteristics that distinguished Money Laundering from Fraud There are two important characteristics of money laundering distinguish it from fraud. These include: 1. Money laundering is far less likely to affect financial statements than the broad spectrum of frauds is because of the conduit phenomenon. Hence, it is highly unlikely that financial statement auditing procedures will identify or even stumble unto possible indications of money laundering. 2. Fraudulent activities usually result in the loss or disappearance of assets or revenue from the business whereas money laundering may actually create significant fee income because businesses may charge fees for the transactions that permit the illicit proceeds to be distanced from their source. Nevertheless, many conditions and control deficiencies that may contribute to fraud vulnerability may also contribute to money laundering vulnerability that is, the risk of criminal activities going undetected. Prominent among these are highlighted below: i. Lack of a strong control environment ii. Lack of a strong regulatory compliance function, in the absence of which a business is subject to high compliance risk and reputational risk iii. Lack of well-defined and well-communicated enterprise-wide ethical guidance and standards and related training programs iv. Lack of a robust internal audit compliance program v. Previous report of examiners or auditors, memorandums of understanding and past administrative and enforcement actions citing compliance problems, control deficiencies, or concerns over management's competence and/or integrity vi. Significant revenues stemming from assets or liabilities associated with high-risk jurisdictions notably bank secrecy havens vii. Abnormally high electronic funds transfer activity from and to high-risk jurisdictions with insufficient controls viii. 68 Lack of background checks on new employees www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management ix. Prof. Godwin E. Oyedokun Unreasonably infrequent or non-existent reviews of security software and systems Why combat Money Laundering? Fighting money laundering serves several purposes. i. Societal importance ii. To identify tax crimes & other financial crimes iii. To locate and confiscate criminal assets iv. Legal context 69 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 10 EVIDENCE AND EVIDENCE HANDLING TECHNIQUES INTRODUCTION In general terms, the evidence consists of anything that can be used to prove something. In a legal sense, evidence means an assertion of fact, opinion, belief, or knowledge whether material or not and whether admissible or not. According to ACFE Manual (2017), Evidence refers to an intricate set of principles developed and refined over hundreds of years, that are designed to ensure that only relevant and probative evidence is admitted in court proceedings, and that irrelevant, unreliable, and prejudicial evidence is excluded so that cases can be fairly and expeditiously decided. Every aspect of trying a case from filing the complaint through discovery, into the presentation of witnesses and exhibits is affected by rules of evidence. This body of law covers not just what counts as evidence, but how that evidence is gathered, handled, and presented. The rules of evidence can be complex, and counsel should be contacted if an important question of evidence arises in the course of a fraud examination. Additionally, rules of evidence vary by jurisdiction, even within the same country. For example, in the United States, state courts have different rules for the admissibility of evidence that the federal courts. Forms of Evidence The evidence is anything perceptible by the five senses, which is invoked in the process of arguing a case. Documents, spoken recollections, data of various sorts and physical objects are all potential evidence. Evidence is simply anything that relates to the proving or disproving of a fact or consequence. With the known universe available for court inspection, legal authorities have narrowed the field by setting up categories to evaluate evidentiary significance. There are three basic forms, as distinguished from types, of evidence and they are: a. Testimonial, b. Real, and c. Demonstrative. 1. Testimonial Evidence: This refers to the oral statements made by witnesses under oath. In general, there are two types of testimonial witnesses and they are: 70 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management a. Lay witnesses and b. Expert witnesses. Prof. Godwin E. Oyedokun A lay (or fact) witness is a non-expert witness who must testify from personal knowledge about a matter at issue. An expert witness is a person who, by reason of education, training, skill, or experience, is qualified to render an opinion or otherwise testify in areas relevant to the resolution of a legal dispute. 2. Real Evidence: This type of evidence describes physical objects that played a part in the issues being litigated. The term includes both documentary evidence such as cancelled cheques, invoices, ledgers, and letters as well as other types of physical evidence. Therefore, a typewriter or printer in a case involving questioned documents is clearly real evidence, as it is a tape recording since members of the court can hear the sounds at first hand. 3. Demonstrative Evidence: This is a tangible item that illustrates some material proposition, for example, a map, a chart, or a summary. It differs from real evidence because it was not part of the underlying event; it was created specifically for the trial. Its purpose is to provide a visual aid for the jury. Nonetheless, demonstrative evidence is evidence and can be considered by the jury in reaching a verdict. Admissibility of Evidence Not all evidence is admissible. To be admissible, it must satisfy certain requirements. But because civil law systems do not rely on juries like common law systems, there is a relative lack of restrictions on the admissibility of evidence in civil law systems. Thus, there are far fewer limitations on the admissibility of evidence in civil law trials than in common law ones. The admissibility of evidence depends, in large part, on the discretion of the trial judge. The evidence is relevant if it tends to make some fact at issue more or less likely than it would be without the evidence. The facts in issue, of course, vary according to the case, but generally can be said to be those that tend to prove the essential elements of the offence or claim as well as related matters such as motive, opportunity, the identity of the parties, and credibility. Whether a particular piece of evidence is relevant or not depends on what the evidence is offered to prove. An item of evidence might be relevant and admissible if offered to prove one thing, but not relevant and inadmissible if offered to prove something else. For example, evidence of other crimes, wrongs, or acts committed by the defendant would not be admissible if 71 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun offered to prove that the defendant is generally a bad person, and therefore is likely to have committed the crime with which he is charged. However, evidence would be admissible if offered to prove motive, intent, identity, the absence of mistake, or modus operandi, if such factors are at issue. If evidence of other wrongs or acts is admitted, the judge will instruct the jury that they may consider the evidence only as it relates to the narrow issue for which it was admitted and may not consider it for any other purpose. In common law systems, questions involving the admissibility of evidence occur when one party objects to another party's offer of evidence. If a judge sustains an objection, the evidence is not admitted. If, however, the judge overrules the objection, the evidence is admitted and can be considered by the fact finder. Also, in common law systems using adversarial processes, the fact that an item of evidence is relevant does not, however, automatically mean that it will be admitted. Relevant evidence still might be excluded if it is unduly prejudicial, threatens to confuse or mislead the jury, threatens to cause unnecessary delay or waste of time, or is merely cumulative. Relevant evidence also might be excluded if it is subject to certain privileges. Thus, evidence of drug addiction technically might be relevant to prove motive for embezzlement or fraud, but the judge still might exclude the evidence if he believes that its probative value is outweighed by the danger of prejudice to the defendant. There are two basic types of admissible evidence: i. Direct evidence and ii. Circumstantial evidence. 1. Direct Evidence: this is the evidence that tends to prove or disprove a fact in issue directly, such as eyewitness testimony or a confession. 2. Circumstantial Evidence: this is evidence that tends to prove or disprove facts in issue indirectly, by inference. Many fraud cases are proved entirely by circumstantial evidence, or by a combination of circumstantial and direct evidence, but seldom by direct evidence alone. The most difficult element to prove in many fraud cases fraud the client intent is usually proved circumstantially, and necessarily so, because direct proof of the defendant's state of mind, absent a confession or the testimony of a co-conspirator, is impossible. 72 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun In a circumstantial case, the court may instruct the jury that the prosecution must exclude all inferences from the facts other than its determination of guilt. Even if no such instruction is given, the Certified Fraud Examiner should apply the same standard in preparing a circumstantial case. The distinction between direct and circumstantial evidence, however, is more significant in common law systems than in civil law systems because, in civil law trials, the court weighs all relevant evidence, regardless of type, to reach its decision. Special Rules Concerning the Admission of Evidence in Adversarial Proceedings Common law systems that use adversarial processes have several rules that restrict the admission of evidence that is not present in civil law systems that use inquisitorial proceedings. While relevancy is a key part to the presentation of evidence in common law and civil law systems, evidence in common law systems is distinguished by special rules that exclude certain forms of evidence that lack reliability. The most common of these rules are: i. The rule against character evidence ii. The rule against opinion testimony iii. The rule of authentication iv. The best evidence rule v. The rule against hearsay EVIDENCE-GATHERING PROCEDURES According to Hopwood, Leiner and Young (2012), there are seven primary evidence gathering procedures that are available to the auditor: i. Confirmation, ii. Observation, iii. Physical examination, iv. Reperformance, v. Analytical-procedures, vi. Inquiry of the client, and vii. Documentation. 73 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun TYPES OF EVIDENCE SOURCE The general sources of evidence in fraud investigations include the following: i. Physical evidence, ii. Document evidence, iii. Observations, and iv. Interviews. The Steps in the Evidence Collection Process The Evidence collection process begins with a review of the physical and documentary evidence. The process then proceeds to observations and interviews. These steps are separately discussed below: Review the Physical and Document Evidence: Depending on the case, the review of the physical and documentary evidence may involve items such as accounting records, application forms, credit reports, bank statements, and tax returns. The objective of the physical and document review phase is to become as familiar as possible with the relevant business processes and individuals involved as well as the pos¬sible fraud scheme before conducting any interviews. This serves two main purposes: a. A thorough knowledge of the business processes and the physical and document evi-dence helps the investigator to know whom to interview, the order in which to interview individuals, and the questions to ask. b. In many cases, it is possible to keep the investigation secret while reviewing physical and documentary evidence. Once interviewing begins, it can be difficult to keep everyone, includ¬ing perpetrators, from knowing that an investigation is underway. Once perpetrators know that an investigation is underway, they may destroy evidence, disappear, or fabricate false stories. Observation There is nothing better than catching a fraudster in the actions of the fraud. Moreover, in some types of frauds, especially those that involve identity theft, this is frequently the only way to catch and convict a fraudster. The reason for the difficulty in cases of identity theft is that the investigator might know the fraudster only by the fraudster's assumed identity. It is obviously difficult to take legal action against a person whose identity is unknown. 74 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun In cases of internal asset misappropriation, catching a fraudster in the act may result in substantial savings in the cost of the fraud investigation. For example, in one case, a bookkeeper made thousands of false entries into the cash receipts journal and completely destroyed the accounts receivable files. It took a fraud examiner many months to recor¬d the corrupted accounting records and unravel the fraud scheme. However, tot, the fraud investigator, the bookkeeper had complete and uncorrupted copies of the records at his home. Had the fraud examiner caught the bookkeeper in the act at the of the investigation, the chances would have been very good that the bookkeeper would have confessed and turned over his home copies of the accounting records, saving the fraud examiner months of work that, were billed to the client at hundreds of dollars hour. However, the investigator never had an opportunity to catch the bookkeeper in the act because the business owner had confronted the bookkeeper before calling an Independent fraud investigator. As a result, the bookkeeper immediately quit and hired a lawyer r, who declined to permit the bookkeeper even to grant an interview to the fraud investigator. The importance of catching a fraudster in the act by a video recording, if possible, cannot be overemphasized; previously mentioned fraud investigations can be consuming and expensive. Therefore, at the beginning of any investigation, there is a need for serious consuming and during any investigation; the serious hope of simplifying the entire investigation is expedient. In some cases, this might require the assistance of a private detective with special equipment and skills useful for surveillance cases, legal counsel should be consulted to ensure that any surveillance is conducted lawful way. In considering the extent which to use observation, the investigator must weigh the benefits of catching the thief in the act versus the possibility of continuing losses. In many cases, the main priority is stopping the fraud scheme as soon as possible. Interviews Interviews are conducted after the investigator has carefully studied all other types of dents and have a fairly strong theory of the fraud scheme under consideration. The goal ideally, is best to record the suspect before he/she is aware that he is a suspect or is aware that a fraud investigation is underway. This step increases the possibility of catching the suspect making inconsistent statements or telling outright lies. 75 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun LECTURE 11 FORENSIC AND FRAUD INVESTIGATION REPORT WRITING INTRODUCTION Writing effective reports is a critical skill for Forensic Accountants. A thorough investigation or keen analysis will often do little good if the forensic accountants/fraud examiners cannot convey the information in a written format. Fraud examiners typically must be very flexible in their writing technique, because reports should generally be tailored to the situation, as well as to the needs of the party requesting the report. Even so, many aspects of good writing such as accuracy, relevancy, and clarity are universal to all reports (ACFE, 2019). Report of Investigation Documenting an investigation is as important as performing it. A poorly documented case file can lead to a disappointing conclusion, can result in a dissatisfied client, and can even damage the financial accounting investigator’s reputation and that of the investigator’s firm. The form of the report whether oral or written is a matter to be discussed with the client and with counsel. While it is not the responsibility of the forensic accounting investigator to advise on the legal perils associated with various forms of reporting, there are certain issues of which forensic accounting investigators should be aware as their clients debate the form of reporting that will conclude the investigator’s investigation. In the common circumstance, the conclusion cannot be decided at the inception of the engagement, it is required to conduct the investigation in a manner that will facilitate a comprehensive oral report, including the key documents and any exhibits necessary to illustrate the findings. Many investigations begin small, but there is no way to know with certainty where they will lead and what will be required at the conclusion. Although the client may not have requested a report at the outset of the investigation, some event during the investigation may change the client’s mind, the appropriate and effective response should be deciphered. For example, it may be observed during an investigation that an officer of the company violated a law or regulation, thereby requiring the company to consider self-reporting and possibly bringing a civil action against the officer and other third parties. Alternatively, it may be subpoenaed for a forensic investigator in an investigation that has captured the attention of regulatory agencies or law enforcement. 76 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Types of Report The following types of reports are relevant and they include: i. Written reports ii. Informal reports iii. Oral reports 1. Written Reports Reports documenting an investigation differ considerably from audit opinions issued under Generally Accepted Auditing Standards (GAAS). The investigative report writer is not constrained by the required language of a governing standard, and investigative reports differ from one another in organization and content depending on the client’s stated needs. In contrast, audit reports adhere to the set formula prescribed by the Generally Accepted Auditing Standards (GAAS). The uses of written reports also differ. The client could do any of the following things with an investigative report, among others. a. Distribute the report to a select group of individuals associated with the company in various capacities. b. Voluntarily give the report to a prosecutor as a referral for prosecution. c. Enter the report as evidence in a civil fraud proceeding. d. Give the report to outside counsel for use in preparing regulatory findings, entering negotiations, or providing other legal services on behalf of the company. A written report can be categorized into: i. Report of investigation: this form of written report is given directly to the client, which may be the company’s management, board, audit committee of the board, in-house counsel or outside counsel. The report should stand on its own; that is, it should identify all the relevant evidence that was used in concluding on the allegations under investigation. This is important because the client may rely on the report for various purposes such as corporate filings, lawsuits, employment actions, or alterations to procedures and controls. ii. Affidavits: These are voluntary declarations of facts and are communicated in a writta en form and sworn to by the witness (declarant) before an officer authorized by the court. 2. Informal Report These consist of memos to file, summary outlines used in the delivthe ery of an oral report, interview notes, spreadsheets listing transactions along with explanatory annotations, and other, less-formal written material prepared by the investigation team. 77 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun 3. Oral Reports Oral reports are usually given by the forensic accounting investigation engagement leader to those overseeing an investigation, such as a company’s board, or to those who represent the company’s interests, such as outside counsel. Fraud Examination Report A fraud examination report is a document written at the conclusion of a fraud examination. Generally, an organization will have an allegation or a suspicion of fraud and will conduct a fraud examination to determine whether fraud occurred, who may have been responsible, and the amount of loss. It may vary in length and style across entities and types of investigations, but it generally offers the same message to a similar audience, no matter the entity. Depending upon the structure of the organization, these reports may be written for management, the board of directors or audit committee, and possibly the internal audit team. There is customarily an executive summary at the beginning of the report, which includes the overarching themes of the investigation, as well as a conclusion, if possible. It also usually includes a detailed explanation of the activities performed in the investigation, evidence obtained, and justification for the conclusion that the fraud examiner reached. These reports may be very formal documents or simply internal memoranda. A fraud examination report documents the results of a fraud examination and is generally created by one or more critical members of the fraud examination team. Documenting results is a particularly important function in fraud examinations. The fraud examination report conveys all the evidence necessary to evaluate the case, and it can be used to corroborate previously known facts. An accurate report will add credibility to the fraud examination and to the fraud examiner’s work. Additionally, requiring a written report will force the fraud examiner to consider his actions during an investigation by requiring that he documents his process. And a well-written report will omit irrelevant information, thereby allowing pertinent facts to stand out. A first-rate fraud examination report is based on a first-rate fraud examination (ACFE, 2017) Summary of Tips for writing Fraud Examination Reports i. Know your reader. Readers of fraud examination reports include company insiders, attorneys, defendants, witnesses, judges, juries, and the media. ii. Understand your purpose. The primary purpose of a fraud examination report is to communicate the results of a fraud examination and document the work performed. iii. Use clear, simple language that is not subject to various interpretations. Where necessary, explain the meaning of complex or technical terms. Avoid jargon, slang, and colloquialisms as the fraud 78 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun examination report might be read by people, including jury members, who are not familiar with such language. iv. Prepare the fraud examination report during the course of the examination and not long after the fact in order to mitigate the risk of omitting or distorting important data. Transcribe interviews as soon as possible after the questioning and, upon completing the examination, prepare a final or interim report without delay. Timeliness preserves your memory of the interviews, enhances the accuracy of witness testimony, and ensures that opposing counsel cannot claim that the interview is unreliable because it was not recorded in a timely manner. v. Prepare a separate memorandum for each potential witness in order to safeguard confidentiality and avoid subjecting the entire fraud examination report to discover)' by opposing counsel. vi. List the memoranda in the order in which you conducted the interviews so the reader can follow the examination process as it progresses from one witness to the next. vii. Be mindful that information in the fraud examination report may be disclosed to adverse third parties, including opposing legal counsel. Choose your wording carefully, as you may have to defend every word. viii. Deal with sensitive company considerations, such as internal control deficiencies, in separate communications in order to maintain their confidentiality; fraud examination reports will likely be reviewed by people outside the company, including the general public and the opposition. ix. Include only those matters that are relevant to the examination in the fraud examination often yield information of which the relevance is not immediately such cases, opt for completeness. x. Maintain impartiality by including all relevant information regardless of which side it favours or what it proves or disproves. xi. Reconfirm the facts and ensure that the fraud examination report is accurate. Errors in dates, amounts, spelling, and even the most seemingly unimportant facts or details can leave the entire report open to question and criticism. Fraud examination reports are used as a basis for litigation and prosecution; defence attorneys can cite the smallest error as evidence that the entire document is inaccurate. xii. Use visual aids, including financial statement graphs, time flow diagrams, and matrices, to help the reader understand the case, especially when there are multiple witnesses, events, or other complex relationships involved. xiii. Clarify the fraud examination report until conclusions are self-evident. Your job as a fraud examiner is to find and present facts—not to express opinions or draw conclusions regarding guilt or innocence. The facts of your report should stand on their own, without embellishment or commentary. 79 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management xiv. Prof. Godwin E. Oyedokun Proofread the fraud examination report multiple times for content, accuracy, format, spelling, word usage, grammar, and punctuation. A poorly written report cannot communicate a message effectively to the reader. Fraud Risk Assessment Report A fraud risk assessment report is generally quite different from most other reports that a fraud examiner might write. It is likely to include less narrative and more charts, graphs, and other visual means to show the areas of highest risk (and thus, the greatest concern) to the organization. These reports are usually not publicly issued to avoid displaying particularly weak controls, audits, etc., to fraudsters that could take advantage of such information. Fraud risk assessments are frequently not issued as reports at all, but rather are kept in the documentation for developing audit plans (for auditors) and mitigating controls (for management). When fraud risk assessment reports are issued, they are typically high-level discussions of the general risks to the organization so as not to publicly divulge the detailed information. Audit Report There are two different types of auditors (external and internal), each of whom will issue different types of reports. These reports may be standard boilerplate reports or may be customized for the particular audit engagement. External Audit Report The most common and well-known report from external auditors is an opinion of the entity's financial statements, which is issued in conjunction with the entity's annual report. Since users prefer, or even require, financial information to be certified by an independent external auditor, many auditees rely on auditor reports to certify their information in order to attract investors, obtain loans, and improve public appearance. Such reports are typically derived from the standard template used by the Audit firm performing the audit. In addition to the report expressing an opinion on the financial statements, other examples of external audit reports include: i. Certification audit reports (e.g., an ISO 9000 audit report) ii. Compilations (not an audit, but requires a report) iii. Due diligence iv. Environmental audit report v. Financial forecasts vi. Filing of a public company's Form 10-Q and Form 10-K 80 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun vii. Agreed upon procedures viii. Internal audit reports ix. Compliance audit reports x. Regulatory inspection reports xi. Review of financial statements (an overview with very limited auditing procedures) xii. Fraud and materiality memo xiii. Second opinion xiv. Control reports on internal controls xv. Employee benefit plan audit reports Internal Audit Report Internal Audit's principal product is the final report in which the auditor expresses opinions, presents the audit findings, and discusses recommendations for improvements. Different entities use different formats for audit reports. For example, one entity might issue the entire report in a table that includes very few details regarding the procedures performed. Another entity may issue entirely narrative reports with specific details of the procedures performed, findings, and recommendations. The structure of the report depends upon the end users' needs and desires, but typically includes (at a minimum) the five (5) C's: i. Condition: What is the particular problem identified? ii. Criteria: What is the standard that was not met? The standard may be a company policy or other benchmark. iii. Cause: Why did the problem occur? iv. Consequence: What is the risk/negative outcome (or opportunity foregone) due to the finding? v. Corrective action: What should management do about the finding? What has it agreed to do and by when? Internal Audit Departments may also issue reports summarizing the quarters or the year's issued reports. These reports are similar in nature to the initial audit report, except that they will be at a higher level than the specific area-level audit report content. Insurance Loss Report If a loss is covered by insurance, a report may need to be prepared to the insurance company detailing the nature and amount of the loss. For example, many companies have a fidelity bond that insures an organization against losses due to any fraudulent or dishonest acts of its employees. In order to seek reimbursement under the terms of the bond, the insured organization may be required to submit a detailed 81 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun report to the insurer outlining how the loss occurred, who was responsible, and how the amount of loss was calculated. Additionally, the insurance company may require the filing of a "proof of loss" form or report. The insurance company will typically dictate what specific items may be required in the report. Generally, it is best to be as precise as possible when calculating or estimating losses because once the claim is paid, the insured may be prohibited from claiming any additional amounts due to that particular loss. Expert Reports Many fraud cases benefit from the assistance of an expert witness, who (unlike most witnesses) may provide technical opinions while testifying. Typically, fraud examiners who serve as expert witnesses in litigation are tasked with providing an expert report, which requires them to provide particular information about their qualifications, their opinions, the bases of those opinions, and various other pieces of information. The purpose of an expert report is to inform the parties, the judge, and the jury (if applicable) about the expert’s opinion of the case, as well as his credibility for commenting on such issues. The content of the expert report is highly dependent on the needs of the situation. For example, the expert witness might provide an expert opinion on an organization’s auditing practices. If the expert used a fraud examination report as part of the basis of forming the opinion, the fraud examination report would likely need to be attached to the expert report. However, each report in this scenario is a separate document with its own structure. In some situations, the person who wrote the fraud examination report might also be called as an expert witness, so it is important to keep in mind the different purposes of each report. Standards of Reporting Depending on professional affiliations, it is required to follow the reporting standards of one’s profession. For example, in the case of a certified fraud examiner (CFE), the applicable standards can be found in the Fraud Examiners Manual, published for its members by the Association of Certified Fraud Examiners. A certified public accountant (CPA) should follow the reporting standards required for consulting engagements and found in the AICPA’s Statement on Standards for Consulting Services. A qualified CFE and a CPA is required to follow the standards of both associations. Tips to Keep in Mind When Writing an Expert Report Be Honest and Stick to What You Know The first two rules of being an effective expert are to 1) be honest and tell the truth, and 82 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun 2) stick to what you know. An expert should always be truthful. Otherwise, any exaggeration or embellishment will likely come out during a deposition or cross-examination and impede on an expert's credibility and persuasiveness. Second, an expert must stay within his area of expertise. An expert who states an opinion in an area beyond their expertise is easily challenged on cross-examination. To accomplish this, an expert should do the following: • Only provide opinions that are within your true area of expertise. • Only use terms for which you know the definitions. • Avoid using legal terms (unless you are a legal expert). • Avoid expressing legal opinions (unless you are a legal expert). • Do not state opinions on cost estimates unless you are qualified to do so. Beware of Wandering into Legal Territory As noted above, an expert should avoid legal terms or opinions because generally, expert witnesses are not lawyers. Therefore, an expert witness may not understand many aspects of legal proceedings. An expert that uses legal terms in his report can expect to be closely questioned on such terms. In so doing, the opposing counsel will attempt to show that the expert was not sure what he was talking about when he used such terms, which can impede the expert's credibility by calling into question the entire report and/or the expert's qualifications. Talk to Your Attorney Before You Put Anything in Writing Before you put anything in writing, talk to your attorney first. It is important to discuss i contents of your written report with your retaining counsel before committing anything ii Make sure you discuss the following content issues with your attorney-client: • The purpose of the report. • The topics/issues you should address. • The topics/issues you should not address. • Find out and understand the legally important topics/issues you should address. • Express opinions or questions on any specific topics/issues your attorney raises. Additionally, different attorneys have different preferences and styles. Therefore, you should discuss the scope and length of the report with retaining counsel, including the level of detail desired. It is also 83 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun important to get the report's format from your retaining counsel, including items like page numbering, and what type of font or paragraph structure to use. State Only the Facts Do not guess or make assumptions in reports. If information is unknown, then that should clearly stated. A key purpose of the expert witness is to persuasively present his understanding of the facts to the reader in the form of an opinion. Therefore, an expert report must provide s factual information because vague statements of fact will damage the expert's credibility, factual sources should be citied, reminding the expert of information sources before test indicating that the expert meticulously researched and composed the report. Write for a Lay Audience Your report should be easy for practically anyone to understand. Remember that your retaining counsel, the opposing counsel, the judge, the jury, or anyone else reading your report have little to no education in the area of your expertise. Therefore, you must word your report so that lay individuals can understand what it is that you are trying to convey. Be Brief An expert is most effective when he uses brief language because the report must be prepared so that a nonexpert can understand it. Therefore, an expert should provide only essential information and write in short, uncomplicated sentences and concise paragraphs. A reader finds short sentences and paragraphs valuable because they are easy to read and understand. Conversely, long-running sentences and paragraphs are generally more difficult to understand and may discourage readers from even trying to comprehend the material. State Things Clearly and Directly Experts should also state things clearly and directly. After all, it is the expert's role to state and provide an opinion. A clearly and directly written opinion is not only easier to read, but it is also more persuasive. For this reason, experts should avoid needlessly technical language, which is distracting and has a tendency to diminish an expert's credibility. Use Precise Language An expert report should avoid ambiguity or inexact language and use precise language where possible. Using precise language will make the expert report more credible. Furthermore, the expert should avoid 84 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun generalizations and be specific. Since an expert writes a report to communicate his findings and opinions, the expert must convey his findings and conclusions clearly and confidently. Use Active Voice In grammar, voice indicates the relation of the subject to the action of the verb. When the verb is in the active voice, the subject acts; when it is in the passive voice, the subject is acted upon. Always try to use the active voice. Sentences that use the passive voice are wordy, indirect, more likely to be ambiguous, and tend to be more awkward. Sentences in the active voice are clearer and more persuasive. Use Objective Language The tone of an expert report must be objective. An expert is presumed to be an impartial, disinterested witness that represents his profession. An expert must not become an advocate for his "side." Doing so impugns an expert's credibility. The use of objective terms makes the expert more credible and persuasive. Avoid Bias Additionally, an expert must be thorough and avoid using language that could suggest bias and to avoid statements that the other side could misrepresent in court. Therefore, an expert report should avoid emphatic language and absolute words, such as always and never. Statements using such terms provide abundant material for cross-examination, allowing the opposing counsel to suggest that the expert is a "hired gun" who is merely offering statements to aid his "side." Such terms also make defending the report much more difficult. Finally, subjective statements rarely add any substance to the report while objective statements are more effective in conveying the expert's message. Avoid Argumentative Language An expert must avoid argumentative language. An expert is not an advocate. As stated above, the tone of an expert report must be objective. Like subjective language, argumentative language makes an expert appear biased, which will cause a loss in credibility. For example, if you disagree with an opposing expert's opinion, do not directly criticize it. Instead, deal with the opposing opinion in a reasoned method, making sure that your position is more persuasive. Do Not Comment on the Credibility of Witnesses Beware of commenting on the credibility of witnesses. It is the jury's duty, not the experts, to determine the truthfulness of each witness. Commenting about the veracity of others in a report may make the expert appear biased, causing a loss of credibility? 85 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun Avoid Broad Unsupported Statements of Opinions Statements of an expert's opinions should be supported with reasons justifying the opinions. When opinions are supported, they are more persuasive and the reader will likely give more weight to the expert's report. Unsupported opinions make the expert less credible and make the report more vulnerable to attacks. Do Not Speculate or Guess Experts should not speculate or guess in their reports because doing so undermines a report’s credibility. In addition, opposing counsel will use an expert's guesses or speculations a: trying to show that the opinion is not reliable because it relies on hunches. Expert Witness Report Must Be Consistent and Accurate An expert witness report must be consistent with previous reports, testimonies in other case, and/or other publications. The opposing attorney may try to get a copy of everything ever written, so it is best to be prepared to be relentlessly questioned on previous testimony and/or publications. In fact, a counsel that can point out inconsistencies within a report or discrepancies between an expert's other reports will create significant doubt about the expert's credibility. Thus, an expert must meticulously check the report for accuracy. Be Professional An expert must make the report look like it is worth what he is being paid for it. A well composed report will likely indicate to the reader that the expert is a methodical person, which will help bolster the expert's credibility and will be more likely to persuade the reader. There are numerous things an expert can do to make his report more professional. The following list provides some examples: i. Place the report in a report cover or binder. ii. Use a 12-point font that is easy to read and looks professional. iii. Use 1½ lines of space between each line, which will make the report easier to read and will provide space for the reader to make notes. iv. Include a well-drafted coyer page, which should include a title, case citation, the expert's name, and the expert's address. v. Provide an executive summary, especially when reports are long. An executive summary should include a brief summary of the expert's conclusions with supporting rationale. vi. Use topic headings to break up the report, making the report easier to read and navigate. vii. Headings may also be very useful to the expert who is using his report while testifying. viii. If the report is long, use tabbed dividers. 86 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management ix. Prof. Godwin E. Oyedokun Number the pages because the lack of page numbers often gives the report a sloppy and unprofessional appearance. Additional Considerations for Written Reports When preparing an expert report, keep the following issues in mind: • Clearly state the task or engagement: - Audience - Purpose - Limitations - Arrangement for fees • Identify participants. • Provide an executive summary of findings, conclusions, and recommendations. • Provide an analysis of transactions: - Chronology - Transaction-by-transaction • Include charts and graphs. • Summarize important facts. - The expert's report is usually the only opportunity other than the lawyer's statements for pertinent facts to be set forth in a narrative form. This is extremely important, particularly in the common instance where the report is actually admitted into evidence and submitted to the jury. A concise statement of the facts that support the expert's conclusions is therefore an integral part of the report. • Provide references to industry standards, if applicable. • Provide specific references to the data used to support the expert's opinions should be made, including references to any industry standards, market data, or other economic analysis that have been considered. • Provide analysis of alternatives and possible defenses. - Obviously, there are various elements that may be involved in any expert analysis, and in many cases, there are alternative approaches that can be taken to satisfy the overall objective. For example, in trying to calculate the damages suffered by a fraud victim, it might be helpful to look at the benefit of the bargain of the proposed fraudulent transaction, as compared to the opportunity cost of transactions that the victim gave up to pursue the fraudulent one. Often, alternative calculations of damages yield similar dollar 87 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun amounts; in such cases where more than one analysis yields similar results, the reliability of the damage calculation as being a realistic measure of the victim's loss is increased. • Present in narrative, graphic and financial statement formats. - Different people, including different judges and jurors, are more comfortable with information in different formats. Thus, the presentation of information in multiple formats is important to effectively communicate to the various people who will review it. For the same reason, it is often helpful to have multiple people involved in preparing the expert report—people whose skills and/or interests are most compatible with the particular at issue. • Summarize qualifications. - It is important to adequately identify the person(s) responsible for the expert report in order to satisfy legal requisites for expert testimony and to identify the expertise that should reflected in the report. • Summarize materials reviewed and/or relied upon. - Document identification and control are important aspects of lawsuit participation. Discover rules in litigation require disclosures, and the list in the expert report can help verify that proper disclosures have been made. In addition, the listing, together with the references to applicable standards, helps define the intellectual "domain" of the report can help avoid cross-examination that is too far afield or testimony in areas that have been adequately studied. • List witnesses and provide copies of statements. • Provide findings, conclusions, and recommendations. 88 www.oyedokungodwin.com Forensic Accounting, Audit, Investigation & Fraud Management Prof. Godwin E. Oyedokun TEXT REFERENCE: Oyedokun, G. E. (2020). Fundamentals of forensic accounting & fraud Investigation. 2nd Edition, Lagos, Nigeria. Association Forensic Accounting Researchers (AFAR). ISBN: 978-978-56462-69 ii. Mainoma, M.A. & Oyedokun, G.E. (2020). Guidance on Due-Diligent War in Nigeria: A Forensic Accounting Approach to Fight against Corruption. Lagos. Nigeria. Association of Forensic Accounting Researcher (AFAR). ISBN: 9789789787326 iii. Oyedokun, G. E. (2018). Fundamentals of forensic accounting & fraud Investigation. Lagos, Nigeria. Aaron & Hur Publishing. ISBN: 978-978-56462-6-9 iv. Oyedokun, G. E. (2018). Ethical justification for creative accounting: Fraud & forensic Accountants’ perspectives. Lagos, Nigeria. Aaron & Hur Publishing. ISBN: 978-978-56462- 9-2 v. Oyedokun, G. E. (2017). Compendium of writings in forensic accounting & fraud examination. Lagos, Nigeria. ASCO Publishers. ISBN: 978-978-55513-7-2 vi. AFAR Journal of Forensic Accounting & Fraud Investigation vii. Oyedokun, G. E. (2019). Lecture Note on Audit Assurance & Professional Ethic. i. 89 View publication stats www.oyedokungodwin.com