Internal Investigation - Louisiana Government Finance Officers

advertisement
How to Conduct An Internal Investigation
D. Larry Crumbley, CPA, CFF, Cr.FA, MAFF, FCPA
KPMG Endowed Professor
Department of Accounting
Louisiana State University
Room 2833, Business Education Complex
Baton Rouge, LA 70803
225-578-6231
225-578-6201 Fax
dcrumbl@lsu.edu
Dr. Crumbley is the
Editor of the Journal of Forensic & Investigative Accounting.
Former editor of the Journal of Forensic Accounting: Auditing,
Fraud, and Risk,
Former chair of the Executive Board of Accounting Advisors of
the American Board of Forensic Accountants,
Former member of the NACVA’s Fraud Deterrence Board, and
On the AICPA’s Fraud Task Force (2003-2004).
A frequent contributor to the Forensic Examiner and Value
Examiner, Professor Crumbley is an author of more than 55
books and 350 articles. His latest book entitled Forensic and
Investigative Accounting, 5th edition, is published by Commerce
Clearing House (800-224-7477). Some of his 13 educational
novels, e.g., Trap Doors and Trojan Horses and The Big R: A
Forensic Accounting Action Adventure, have as the main
character a forensic accountant. His goal is to create a
television series based upon the exciting life of a forensic
accountant and litigation consultant.
1
Wide Variety of Investigations















Fraud investigation
Tracing assets
Damages calculations
Valuation calculations
Witness location
Employment investigations
Worker compensation claims
Private family investigations
Homicide
Suicide
Missing person investigation
Personal background checks
Corporate investigations
Civil investigations
Negligence or criminal investigations
Source: Erik Laykin, Investigative Computer Forensics, Hoboken, N.J.: John Wiley, 2013, p.130.
2
SAS No. 99: SKEPTICISM



An attitude that includes a
questioning mind and a critical
assessment of audit evidence.
An auditor is instructed to conduct
an audit “with a questioning mind
that recognizes the possibility that
a material misstatement due to
fraud could be present, regardless
of any past experience with the
entity and regardless of the
auditor’s belief about
management’s honesty and
integrity.”
“Things are not always as they
appear, sonny boy.” James
Patterson, Honeymoon, Warner
Books, 2006.
3
Mind-Set: SKEPTICISM
Ronald Reagan said with respect to Russia,
“Trust, but verify.”
FA’s motto should be “Trust no one; question
everything; verify.”
As Charles Manson said, “Total paranoid is total
awareness.”
----------------------------------------------------Ron Durkin says auditors must go beyond
skepticism to “thinking forensically.” [More than
skeptical ]
----------------------------------------------------This ain’t my first rodeo
I didn’t make it all the way through school.
But my mama didn’t raise no fool.
I may not be the Einstein of our time.
But honey, I’m not dumb and I’m not blind.
Vern Gosdin
4
Predication




The ACFE group indicates that
in the private sector, a fraud
investigation should not be
conducted without proper
predication.
Examples: Anonymous tips,
complaints, audit inquires,
conflict of interest.
Thus, predication is the basis
for undertaking a fraud
investigation.
Without predication, the target
might be able to sue for real or
imaginary damages.
5
Be An Investigator
“Because I was an investigator,” he said.
“O.K.,” she said. “Investigators investigate.
That, I can follow. But don’t they stop
investigating? I mean, ever? When they know
already?”
“Investigator never know,” he said. “They
feel, and they guess.”
“I thought they dealt in facts.”
“Not really,” he said. “I mean, eventually
they do, I suppose. But ninety-nine percent of
the time it’s ninety-nine percent about what
you feel. About people. A good investigator
is a person with a feel for people.”
Lee Child, Echo Burning, N.Y.: Jove Books, 2001, p. 281.
6
Investigative Technique
“You know how it goes,” I said. “You get a case. You
just keep poking around, see what scurries out.” p.
144.
-----------------------------------------------------------“How,” Susan said, “on earth are you going to
unravel all of that?”
“Same way you do therapy,” I said.
“Which is?”
“Find a thread, follow it where it leads, and keep on
doing it.”
“Sometimes it leads to another thread.”
“Often,” I said.
“And then you follow that thread.”
“Yep.”
“Like a game,” Susan said.
“For both of us,” I said.
Susan nodded. “Yes,” she said, “tracking down of a
person or an idea or an evasion.”
pp. 270 – 271.
-------------------------------------------------------------------------------Source: R.B. Parker, Widow’s Walk, Berkley Books, 2002.
7
Fraud Detection Process
Discuss facts and objectives with client/attorney (e.g.,
conflict of interests).
2.
Evaluation whether to accept the engagement.
3.
Prepare a work program.
4.
Develop time and fee schedule.
5.
Obtain approval of work program, staff assignments,
and fee estimates.
6.
Obtain an engagement letter.
7/8.
Identify fraud exposures and symptoms.
9/10.
Evaluate evidence obtained and determine if more
evidence is needed.
11/12. Search for and evaluate additional evidence.
13.
Discuss preliminary findings with client/attorney.
14.
Draft a final report.
15.
Review the report and work papers.
16.
Resolve professional disputes.
17.
Clear review points and open items.
18.
Communicate report or findings.
19.
Help attorney prepare court case/testify.
20.
Perform follow-up procedure.
21.
File work papers/report.
1.
Source: Carmichael et. al, PPC Fraud Detection, Vol.1, Ch. 2 (2002).
8
Wandering Around
• Informal observations while in the
business.
• Especially valuable when assessing
the internal controls.
• Observe employees while entering and
leaving work and while on lunch
break.
• Observe posted material, instructions,
job postings.
• Observe information security and
confidentiality.
• Observe the compliance with
procedures.
• Appearance is not necessarily reality.
Man of La Mancha
9
Investigative Techniques
“Facts weren’t the most important part of
an investigation, the glue was. He said
the glue was made of instinct,
imagination, sometimes guesswork and
most times just plain luck.” (p. 163).
-------------------------------------------------“In his job, he [Bosch] learned a lot
about people from their rooms, the way
they lived. Often the people could no
longer tell him themselves. So he
learned from his observations and
believed that he was good at it.” (p. 31).
-------------------------------------------------Michael Connelly, The Black Ice, St. Martin’s
Paperbacks, 1993.
10
Investigative Techniques and Evidence



•
•
•



Documentary evidence – written evidence
on paper or computer medium.
Testimonial evidence – testimony of
individuals.
Observational evidence – evidence, actions,
or observations seen by an investigator.
Physical examination of evidence (e.g.,
counts or inspections).
Fixed point observations of activities (e.g.,
watching a scene and recording).
Moving observations.
Invigilation – strict temporary controls are
imposed so that fraud virtually impossible.
Keep detailed records.
Covert observations.
Forensic document examination.
Source: D.R. Carmichael et.al., Fraud Detection, Vol. I,
Practitioners Publishing Co., 2002, pp. 3-1 to 3-4
11
Documentation
The forensic accountant needs to track
and document the steps in any
investigation process, including:
• Items maintained as privileged or
confidential.
• Requests for documents, electronic
data, and other information.
• Memoranda of interviews
conducted.
• Analysis of documents, data, and
interviews and conclusions drawn.
Source: Managing the Business Risk of Fraud: A Practical Guide, IIA, AICPA,
ACFE; http://www.acfe.com/documents/managing-business-risk.pdf,
12
2008, p. 43.
Chain of Custody





Just as in the movies or on a television
show such as CSI, forensic accountants
must safeguard evidence through a
financial chain of evidence (e.g., fraud in
a computer).
There must be a way to show that the
evidence has not been tampered with or
damaged.
If documents are seized, the forensic
accountant should put his or her initials
and date of the seizure on the back of
each document.
Or put the document in a transparent
envelope and write a description on the
envelope.
Store the original and work only with a
copy.
13
Enforcement Manual
Enforcement Manual
History and Custody of Documents
U.S. Department of Labor
Pension and Welfare Benefits
Administration
Date _______________________________
Case Number________________________
Case Name __________________________
22. How were the documents obtained?
____ By consent (note any significant comments of the principal or third party witness
and any unusual circumstances which occurred)?
____ By legal process (describe).
2.
What is the relationship between the documents and the person submitting them?
22. Were manual transcripts or facsimile copies made of any of the documents
either in whole or in part?.
______ Yes ______No
If Yes, list documents copies. Manner of reproduction
22. Have all copies been compared with the original documents and identified?
_____Yes _____No
If No, why not?
22. Were the original documents described herein under your control or
supervision at all times prior to their return to the principal, third party witness, or
representative?
_____Yes _____No
If No, set forth circumstances of any transfer in control.
22. Did the principal, third party witness, or a representative request access to the
documents during your custody?
___ Yes ___ No
If Yes, who requested access and what action was taken?
Signature ___________________
Title ________________________
PWBA 219
(May 1987)
14
Principles of Investigation
Documentation
1.
2.
3.
4.
5.
Take notes on everything you do.
Document every effort to contact a witness and
all surveillance in the running resume.
Prepare a report whenever there is a possibility
you will have to testify.
Take verbatim statements from hostile or
unhelpful witnesses; obtain declarations from
friendly witnesses.
Provide all of the case’s documents to the client
at the conclusion of the case – or have a
document retention policy that decrees the
maintenance of most records for at least five
years.
P.A. Becnel, IV and S.J. Krischke, Principles of Investigative Documentation, Springfield, IL: C. C. Thomas
Publisher, 2012, 172 pp.
15
Scienter Necessary
To prove any type of fraud,
prosecutors must show that scienter
was present.
 That is, the fraudster must have
known that his or her actions were
intended to deceive.
------------------------------------------------The allure of numbers to most of us, is
like the excitement of settling sand--a
narcoleptic surety. Crafty criminals
prey on this boredom. They pile on the
numbers, spewing meaningless
records in the false books.

Cory Johnson
16
Two Major Types of Fraud Investigations


Reactive: Some reason to
suspect fraud, or occurs after a
significant loss.
Proactive: First, preventive
approach as a result of normal
operations (e.g., review of
internal controls or identify
areas of fraud exposure). There
is no reason to suspect fraud.
Second, to detect indicia of
fraud.
Source: H.R. Davia, “ Fraud Specific Auditing,” Journal of
Forensic Accounting, Vol. 111, 2002, pp. 111-120
17
Proactive Is Beneficial

The threat of a future investigation reduces
the occurrence of fraudulent behavior from
75% to only 43%.

The larger the pay-off, the more likely a
person will commit fraudulent behavior.

Give the fox a key to the hen house and he/
she is going to eat hens.
Source: S. L. Tate et. al, “The Small Fraud Paradigm: An
Examination of Situational Factors That Influence the
Non-Reporting of Payment Errors,” J. of Forensic
Accounting, Vol.7, 2006, p. 406.
---------------------------
The greater the risk of detection, the less
likely a person is to violate the law.
Jeremy Bentham
18th Century Philosopher
18
Proactive vs. Reactive Approaches
Proactive approaches include
 Effective internal controls,
 Financial and operational
audits,
 Intelligence gathering,
 Logging of exceptions, and
 Reviewing variances.
Reactive detection techniques
include
 Investigating complaints and
allegations,
 Intuition, and
 Suspicion.
Jack Bologna and Robert Lindquist, Fraud Auditing and Forensic Accounting, 2d
Edition, New York: John Wiley, 1995, p. 137.
19
Proactive Is Best



When the IRS began requiring banks
to issue Form 1099s reporting interest,
the reported interest income increased
by $8 billion (even though for 3 years
the IRS did not have computer
matching capacity).
When the IRS began to require
taxpayers to list a social security
number for dependents, the next year
the number of reported dependents
dropped by seven million. More than
11,000 of these taxpayers claimed
seven or more dependents in 1986, but
they claimed none in 1987.
When the IRS began to require
taxpayers to list a name, address, and
social security number for babysitters,
two years later 2.6 million babysitters
disappeared.
20
Fraud Deterrence Better Than Fraud
Investigation
1.
2.
3.
4.
5.
Fraud deterrence less
expensive.
Deterrence is more
comprehensive.
Fraud deterrence produces
greater savings.
Deterrence is faster.
Fraud deterrence promotes
better customer relations.
Daniel Finnegan, “Deterring Fraud,” Quality Planning
Corporation, 1991.
21
Fraud Deterrence Review
Analysis
of selected records and
operating statistics.
Identify operating and control
weaknesses.
Proactively identify the control structure
in place to help prevent fraud and operate
efficiently.
Not an audit; does not express an
opinion as to financial statements.
May not find all fraud especially where
two or more people secretively agree to
purposely deceive with false statements
or by falsifying documents.
[Always get a comprehensive, signed
engagement letter defining objectives.]
22
Financial Fraud Detection Tools



Interviewing the executives
Analytics
Percentage analysis




Horizontal analysis
Vertical analysis
Ratio analysis
Using checklists to help detect fraud




SAS checklist
Attitudes/Rationalizations checklist
Audit test activities checklist
Miscellaneous fraud indicator checklist
“Objectively obtaining and evaluating evidence is the
essence of auditing.”
(AAA, Committee on Basic Auditing Concepts, 1973, 2)
23
Analytical Procedures
Analytical procedures involve the study or
comparison of the relationship between
two or more measures for the purpose of
establishing the reasonableness of each
one compared. Five types of analytical
procedures help find unusual trends or
relationships, errors, or fraud:
 Horizontal or Percentage Analysis
 Vertical Analysis
 Variance Analysis
 Ratio Analysis or Benchmarking
 Comparison with other operating
information
Source: D.L. Crumbley, J.J. O’Shaughnessy, and D.E.
Ziegenfuss, 2002 U.S. Master Auditing Guide,
Chicago: Commerce Clearing House, 2002, p.
592.
24
Financial Statement Fraud Audit
1.
2.
3.
4.
5.
6.
7.
8.
Obtain current year’s financial
statements.
Obtain prior 3 years’ financial
statements.
Perform vertical/ horizontal analysis
of the 4 years, plus all current
quarters.
Pay attention to footnotes.
Analysis of %s and footnotes by senior
auditors.
Nonsense %s and footnotes inquire
explanations from financial
management.
Interview lower level financial
employees who approved
questionable journal vouchers.
Combine explanations with visits to
accounting records/ source
documents.
25
Horizontal Analysis
Suppose advertising in the base year
was $100,000 and advertising in the
next three years was $120,000,
$140,000, and $180,000. A
horizontal comparison expressed as
a percentage of the base year
amount of $100,000 would appear
as follows:
Dollar
Amount
Horizontal
Comparison
Year 4
Year 3
Year 2
Year 1
$180,000
$140,000
$120,000
$100,000
180%
140%
120%
100%
26
Red Flags with Horizontal Analysis




When deferred revenues (on the balance sheet)
rise sharply, a company may be having trouble
delivering its products as promised.
If either accounts receivable or inventory is rising
faster than revenue, the company may not be
selling its goods as fast as needed or may be
having trouble collecting money from customers.
For example, in 1997 Sunbeam’s revenue grew
less than 1% but accounts receivable jumped 23
percent and inventory grew by 40 percent. Six
months later in 1998 the company shocked
investors by reporting a $43 million loss.
If cash from operations is increasing or decreasing
at a different rate than net income, the company
may be being manipulated.
Falling reserves for bad debts in relation to
account receivables falsely boosts income (cookie
jar accounting).
27
More Red Flags








Look for aggressive revenue recognition
policies (Qwest Communication, $1.1 billion
in 1999-2001). Beware of hockey stick
pattern.
Beware of the ever-present nonrecurring
charges (e.g., Kodak for at least 12 years).
Check for regular changes to reserves,
depreciation, amortization, or comprehensive
income policy.
Related-party transactions (e.g., Enron).
Complex financial products (e.g.,
derivatives).
Unsupported top-side entries (e.g.,
WorldCom).
Under-funded defined pension plans.
Unreasonable management compensation
Source: Scott Green, “Fighting Financial Reporting Fraud,”
Internal Auditor, December 2003, pp. 58-63.
28
Ink Analysis





Martha Stewart was undone by a blue
ballpoint pen.
Stockbroker belatedly inserted a note to
help cover up Ms. Stewart’s improper
stock trading. Blue ballpoint ink used is
different from ink elsewhere on the
trading worksheet.
Prosecutors used forensic ink analysis in
Rite Aid case to show that certain
documents were backdated (ink used to
sign letter was not commercially available
until 3 months after the letter was dated).
Xerox laser printers now encode the serial
number of each machine in tiny yellow
dots in every printout, nestled within the
printed words and margins. It tracks
back to you like a license plate.
Advice for fraudsters: use pencils.
Source: Mark Maremont, “In Corporate Crimes, Paper Trail
Often Leads to Ink Analysts’ Door,” Wall Street J., July 1,
2003, p. A-1.
29
Invigilation




Invigilation is a rather expensive
investigating technique that can be
used in potential fraud situations to
discover the fraud and can later be
used in the courtroom.
Here detailed records are kept
before and after the invigilation
period to determine the amount of
fraud.
During the invigilation period strict
controls are imposed (e.g., cameras)
so that the fraud is virtually
impossible.
Or the invigilation period could be
while the suspect is on vacation.
30
Invigilation Technique
No controls
Controls or
vacation
No controls
14 days
14 days
14 days
$67,000 lost
$0 lost
$62,000 lost
31
When Fraud Is Discovered
1.
2.
3.
4.
Notify management or the board when the
incidence of significant fraud has been
established to a reasonable certainty.
If the results of a fraud investigation
indicate that previously undiscovered
fraud materially adversely affected
previous financial statements, for one or
more years, the internal auditor should
inform appropriate management and the
audit committee of the board of directors
of the discovery.
A written report should include all findings,
conclusions, recommendations, and
corrective actions taken.
A draft of the written report should be
submitted to legal counsel for review,
especially where the internal auditor
chooses to invoke client privilege.
32
E-ZPass Catching Cheaters




E-ZPass and similar electronic toll collection
systems are emerging as a new and powerful
means to prove infidelity.
Generally mounted inside a vehicle's windshield
behind the rearview mirror, the remote-sized, EZPass devices communicate with antennas at toll
plazas, automatically deducting money from the
tag-holder's prepaid account and recording when
and where the vehicle crossed the toll.
Many states provide electronic toll information in
response to court orders for criminal and civil
cases, including divorces, which are used to
prove the defendant was not where he or she
claimed to have been.
"E-ZPass is an E-ZPass to go directly to divorce
court, because it's an easy way to show you took
the off-ramp to adultery," said Jacalyn Barnett, a
New York divorce lawyer who has used E-ZPass
records a few times.
Chris Newmarker, “E-ZPass records out cheaters in divorce court.” AP, 2007.
33
Seven Investigative Techniques
1.
2.
3.
4.
5.
6.
7.
Public document review and
background investigation (nonfinancial documents).
Interviews of knowledgeable
persons.
Confidential sources.
Laboratory analysis of physical
and electronic evidence.
Physical and electronic
surveillance.
Undercover operations.
Analysis of financial transactions.
Source: R.A. Nossen, The Detection, Investigation and Prosecution of
.
Financial Crimes, Thoth Books, 1993
34
Investigation Tasks
1) Interviewing, including:
a) Neutral third-party witnesses.
b) Corroborative witnesses.
c) Possible co-conspirators.
d) The accused.
2) Evidence collection, including:
a) Internal documents, such as
i) Personnel files.
ii) Internal phone records.
iii) Computer files and other electronic devices.
iv) E-mail.
v) Financial records.
vi) Security camera videos.
vii) Physical and IT system access records.
b) External records, such as
i) Public records.
ii) Customer/vendor information.
iii) Media reports.
iv) Information held by third parties.
v) Private detective reports.
3) Computer forensic examinations.
4) Evidence analysis, including:
a) Review and categorization of information collected.
b) Computer-assisted data analysis.
c) Development and testing of hypotheses.
Source: Managing the Business Risk of Fraud: A Practical Guide, IIA, AICPA, ACFE;
http://www.acfe.com/documents/managing-business-risk.pdf, 2008, pp. 42-43.
35
Some Important Stuff
• Once a USB has been imaged, a forensic
accountant should use a read-only copy
and investigate the file structure for
evidence of financial fraud.
• MD5 hashes verified that two files are
exactly the same.
• Hash values allow forensic accountants to
determine if two financial files are exactly
the same.
• The hash calculator can be downloaded
for free.
• Disk Investigator can be used to discover
what is hidden on a hard drive and help
recover lost data.
36
Evidence Requests
• Once legal requests for electronic evidence are
received, such normal business practices need
to be stopped and hard drives need to be
imaged.
• Evidence requests likely to include all e-mails;
e-mail headers; e-mail logs; all data files
created with word processing, spreadsheet,
accounting software, sound recordings, or
presentation software; network activity logs;
task lists; databases; and e-calendars. All such
requests encompass the data on servers,
workstations, laptops, floppy disks, only
repositories, tapes, voice messaging systems,
CDs, DVDs, memory sticks, cell phones, iPads,
and all stored backups of data.
• After this request and until the pertinent drives
are imaged, new files should not be saved to
working computers.
37
So You Find Fraud
•
Criminal referral — The organization may refer the
problem to law enforcement voluntarily, and, in some
situations, it may be required to do so. Law enforcement
has access to additional information and resources that
may aid the case. Additionally, referrals for criminal
prosecution may increase the deterrent effect of the
organization’s fraud prevention policy. An appropriate
member of senior management, such as the chief legal
counsel, should be authorized to make the decision as to
whether pursuing criminal prosecution is appropriate.
• Civil action — The organization may wish to pursue its
own civil action against the perpetrators to recover funds.
• Disciplinary action — Internal disciplinary action may
include termination, suspension (with or without pay),
demotion, or warnings.
• Insurance claim — The organization may be able to
pursue an insurance claim for some or all of its losses.
Source: Managing the Business Risk of Fraud: A Practical Guide, IIA, AICPA, ACFE;
http://www.acfe.com/documents/managing-business-risk.pdf, 2008, pp. 43-45.
38
KPMG provides 10 steps to follow when an
organization finds or suspects fraud:
1.
2.
3.
4.
5.
Shut the door! Keep assets secure until
you can provide appropriate long-term
security.
Safeguard the evidence. Ensure that all
records and documents necessary for an
investigation remain intact and are not
altered by you or anyone else.
Notify your insurer. Failure to notify may
negate your coverage.
Call a professional. Do not confront or
terminate the employment of a
suspected perpetrator without first
consulting your legal advisor.
Prioritize your objectives. What’s most
important: punishment, loss recovery,
prevention, detection of future
occurrences?
39
KPMG’s 10 steps to follow contd..
6.
7.
8.
9.
10.
Consider prosecution. Before you make
the call, weigh the plusses and minuses
and determine if your insurance
company requires prosecution.
Terminate business relations. If the fraud
is external, business relations with the
suspect individual or organization should
be terminated.
Seek advice and assistance. An
important consideration is whether you
have the knowledge and resources
necessary to effectively manage the
process.
Prepare a witness list. It is important that
statements be taken before a “party line”
can develop.
Consider the message. Whatever you do
will affect future situations. Now may be
the time to change the way your business
operates.
40
Where Details Communicated
Internally
Source: Who is the Typical Fraudster (2011)
KPMG
41
Where Details Communicated
Externally
Source: Who is the Typical Fraudster (2011)
KPMG
42
Outcomes & Responses
Source: Who is the Typical Fraudster (2011)
KPMG
43
Interview vs. Interrogation
Interview-non-accusatory
process
where person asks questions to
develop factual information (e.g.,
who, what, when, where, how).
Interrogation-accusatory interview
to obtain an admission of guilt.
-----------------“Doubt leads to inquiry, and inquiry
leads to the truth.”
Saint Thomas Aquinas
44
Selecting the Right
Interviewees
“Someone knows what is going on. If you tune in,
you will get a feel for it.”
Lorraine Horton, Kingston, R.I.
-------------------------------------------------------------“It is important that you select the right person to
interview, and be conversant in interviewing
techniques. For instances, pick someone from
customer complaints or an employee who didn’t
get a raise for two years, as they would be likely
to provide the needed information.”
R.J. DiPasquale, Parsippany, N.J.
Source: H.W. Wolosky, “Forensic Accounting to the Forefront,” Practical
Accountant, February 2004, pp. 23-28
---------------------------------------------------------------------------------------------
Listen to rouges and whistle-blowers who
complain.
45
Differentiate Between the Two
Interview
Interrogation
Involves a witness
Involves a suspect
Involves a victim
Involves custody
No Miranda rights
Requires Miranda rights
General information
Specific facts
Less demanding
More demanding
Casual
Highly structured
Interview in the field
Interrogate at the office
Information not known
Confirm known information
Scattershot approach
Pin-down approach
Don Rabon, Interviewing and Interrogation, Durham: Carolina Academic Press,
1992, p.5.
46
Moving from Unwilling to Willing Chair
Ask general questions.
Win them over.
Make them feel that this is what’s
best for them.
Take away the foundation.
Gain their confidence.
Explain the facts.
Relate to them.
Deescalate the crisis.
Give them a way out.
Explain the advantages of
cooperation.
Give them a change to explain.
Lie to them.
Downplay the disadvantages of
cooperation.
Understand them.
Hang it on them.
Use deception.
Put it on them.
Play on their sympathy.
Threaten them.
Play on their conscience.
Get them to trust.
Determine their frame of mind.
Mimic their manner.
Talk to them.
Empathize.
Know how far to push.
Show them what they’re looking
at.
Get on their level.
Show them acceptance.
Speak their language.
Develop a rapport.
Show them.
Tell them.
Don Rabon, Interviewing and Interrogation, Durham: Carolina Academic Press,
47
1992, p.8.
Advantage and Disadvantages
 Advantages
accusatory)
of an interview (non-
 Facilitates
the development of
cooperation.
 Easier to develop rapport.
 More effective way of developing usable
information.
 Disadvantages of
interrogation
 Interviewee
may be alienated and refuse
to speak to anyone later.
 If interviewee will not speak to anyone,
ability to obtain information or admission
is diminished.
Source: John E. Reed Associates, Inc.
48
Interview Room Layout
49
Room Layout with Witness
50
Room Arrangement Details
Establish a sense of privacy.
 No locks or physical impediments.
 Room plain color (e.g. no pictures,
etc.)
 Lighting should provide good, but
not excessive or glaring
illumination of interviewee’s face.
Same for interviewer.
 No telephones, cell phones, or
beepers.

F.E. Inbau, “Essentials of the Reid Technique: Criminal Interrogation and Confessions,”
Sudbury, MA: Jones & Bartlett Publishers, 2005,
pp. 28-33.
51
Room Arrangement Details
Chairs about 4 feet apart. Straightback. No rollers. Facing each
other.
 Both chairs at the same level (both
at same eye level).
 Observation room arrangement if
possible (or video). Record it, no
video.
 In case of a female, another
female should be present.
 Not at suspect’s home or office
 No bad breath odor.

F.E. Inbau, “Essentials of the Reid Technique: Criminal Interrogation and Confessions,”
Sudbury, MA: Jones & Bartlett Publishers, 2005,
pp. 28-33.
52
Interviewer’s Demeanor
Civilian clothes. No uniform.
Conservative suit, jacket, or dress.
 Relaxed and comfortable.
 No smoking.
 Questions in conversational tone.
Non-accusatory.
 Keep eye contact. Neither person
should wear dark glasses.

F.E. Inbau, “Essentials of the Reid Technique: Criminal Interrogation and Confessions,”
Sudbury, MA: Jones & Bartlett Publishers, 2005,
pp. 41-43.
53
Interviewer’s Demeanor
Take written notes (but not in an
interrogation).
 Use simple language.
 Never scold or reprimand if the
suspect is caught in a lie.
 Do not pace around the room.

F.E. Inbau, “Essentials of the Reid Technique: Criminal Interrogation and Confessions,”
Sudbury, MA: Jones & Bartlett Publishers, 2005,
pp. 41-43.
54
Make Interviewee Comfortable
He puts a strong hand on my shoulder. “I
appreciate you helping us out, Michael." Unlike
the FBI polo crew, he's wearing a gray suit with a
small stain on his right lapel. His tie is pulled
tight, but the top button on his stark white shirt is
open. The effect is the most subtle hint of
casualness in his otherwise professional
demeanor.
"Quite a day, huh, Michael?" It's the third time
since we've met that he's said my name, which I
have to admit sets off my radar. As my old crime
law professor once explained, name repetition is
the first trick negotiators use to establish an
initial level of intimacy. The second trick is
physical contact. I look down at his hand on my
shoulder.”
Source: Brad Meltzer, The First Counsel, Grand Central
Pub. NY., 2001, p.86
55
The Reid Nine Steps of
Interrogation
1.
2.
3.
4.
5.
The investigator directly and
positively confronts the suspect.
The investigator introduces an
interrogation theme.
The investigator handles the
initial denials of guilt.
The investigator overcomes the
suspect’s objections.
The investigator gets and retains
the suspect's attention and
clearly displays sincerity in what
he says.
F.E. Inbau, “Essentials of the Reid Technique: Criminal Interrogation and Confessions,”
Sudbury, MA: Jones & Bartlett Publishers, 2005,
pp. 125.
56
6.
7.
8.
9.
The Reid Nine Steps of
Interrogation
The investigator recognizes the
suspect’s passive mood.
The investigator uses an
alternative question- a suggestion
of a choice to be made by the
suspect concerning some aspect
of the crime.
The investigator has the suspect
orally relate the various details of
the offense that will serve
ultimately to establish legal guilt.
The verbal confession is converted
into a written or recorded
statement.
F.E. Inbau, “Essentials of the Reid Technique: Criminal Interrogation and Confessions,”
Sudbury, MA: Jones & Bartlett Publishers, 2005,
pp. 125.
57
Some Persuasive Techniques
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Indirect Approach.
Complete-file approach.
I-know-everything approach.
Utility technique.
Quick questioning approach.
Incentive approach.
Repetition technique.
Silent approach.
Change-of-scene technique.
Emotional approach.
Psychological technique.
Good-guy, bad guy approach.
Cold shoulder approach.
Don Rabon, Interviewing and Interrogation, Durham: Carolina Academic
Press, 1992, p.8.
58
Verbal and Nonverbal Behavior
Verbal behavior includes not only
words, but timing, pitch, rate, and
clarity of the responses.
Nonverbal behavior includes body
movement, position changes
gestures, eye contact, and facial
expressions.
See “Interviewing & Interrogation,” The Reid Technique,
John E. Reid Associates, Inc., L.E.R.C Law Enforcements.
59
Nonverbal Language
 60%
of communication is nonverbal.
 Previous contact with person helpful.
 During President Bill Clinton’s testimony
he touched his nose several times when
he was lying, but did not touch his nose
during truthful testimony.
 Two-thirds of truth interviewees cross their
legs.
Source: “Lying 101: There May Be Nonverbal Indicators of
Lying,”
http://members.tripod.com/nwacc_communication/id25.htm.
60
Posture Language
 Truthful
 Frontally
aligned.
 Upright or forward.
 Open (perhaps crossed legs).
 Dynamic, comfortable changes.
 Deceptive
 Non-frontally
aligned.
 Slouched, retracted or leaning.
 Barriers (crossed arms, purse in lap).
 Frozen and rigid.
Source: John E. Reid Associates, Inc.
61
Some Lying Signs




















Covering mouth with hand.
Rubbing nose.
Frequent blinking.
Biting lip.
Moving or tapping foot.
Crossing arms.
Leaning forward.
Handling objects (e.g., pencil, pen).
Avoiding eye contact or averting eyes.
Clearing the throat.
Closing and opening coat.
Picking at lint on clothing.
Playing with collar.
Moving away.
Shrug gestures.
Slow response.
Higher pitch.
Long answer.
Gap between words becomes longer.
Non-words such as uh.
Source: “Lying 101: There May Be Nonverbal Indicators of
Lying,”
62
http://members.tripod.com/nwacc_communication/id25.htm
.
Deception Indicators
1.
2.
Dryness of mouth
Restlessness
A.
B.
C.
D.
E.
F.
G.
3.
4.
5.
6.
7.
8.
9.
Frequent changes in position
Tapping of feet
Fidgeting
Gripping arms of the chair
Elbows held close to the body
Running hands through the hair
Chewing of fingernails, pencils, or other
objects
Excessive sweating
Pulsation of the carotid artery
Pallor, flushing, or change in complexion, color
Excessive swallowing
Avoiding direct gaze
Appearance of being disturbed and/or very tense
Audible turbulence in the stomach.
Don Rabon, Interviewing and Interrogation, Durham: Carolina Academic Press,
1992, p.139.
63
Establishing a Baseline
Dance continued to ask about his life [the bad guy] in
Seaside and in prison, observing him the whole while: how
he behaved when she asked the questions and how he
behaved when he answered. She wasn’t doing this to get
information-She’d done her homework and knew the
answers to everything she asked-but was instead
establishing his behavioral baseline.
In spotting lies, interrogators consider three factors:
nonverbal behavior ( body language, or kinesics), verbal
quality ( pitch of voice or pauses before answering) and
verbal content (what the suspect says). The first two are
far more reliable indications of deception, since it’s much
easier to control what we say than how we say it and our
body’s natural reaction when we do.
The baseline is a catalog of those behaviors exhibited
when the subject is telling the truth. This is the standard
the interrogator will compare later with the subject’s
behavior when he might have a reason to lie. Any
differences between the two suggest deception.
Finally Dance had a good profile of the truthful Daniel
Pell and moved to the crux of her mission.
Source: Jeffrey Deaver, The Sleeping Doll, London: Hodder & Stoughton,
2007, p.8.
64
Establishing a Baseline (cont.)
Still relaxed. The body language wasn’t any different from
his baseline. He was showing only emblems-common
gestures that tended to substitute for words, like shrugs and
finger pointing. There were no adaptors, which signal
tension, or affect displays-signs that he was experiencing
emotion.
‘Not Really.’
Which wasn’t an answer to a yes-or-no question; it was
even more slippery than ‘I don’t recall.’ Dance noticed too
that pell had put his hands, tipped with long, clean nails, on
the table at the word ‘ relatives’. This was a deviation from
base-line behavior. It didn’t mean lying, but he was feeling
stress. The questions were upsetting him.
Source: Jeffrey Deaver, The Sleeping Doll, London: Hodder &
Stoughton, 2007, p.9-11.
65
Studying and Mirrors



He was in no hurry [the bad guy]; interviewers and
interviewees share mutual curiosity. (She told the
students in her interrogation seminars, “They’re studying
you as hard as you’re studying them-usually even harder,
since they have more to lose.”
Mirrors weren’t placed in interrogation rooms to hide
cameras and witness-there are far better high-tech ways
to do so –but because people are less inclined to lie
when they see themselves.
Dance gave a faint smile. ‘ And you understand that you
can withdraw from this interview anytime you want and
that you have a right to an attorney?’
Source: Jeffrey Deaver, The Sleeping Doll, London: Hodder
& Stoughton, 2007, p.6-7.
66
Conducting Effective Interviews
Preferable to use copies of
documents rather than originals.
 Interview one person at a time.
 Location to be chosen to ensure
privacy and to minimize
interruptions.
 Use of cell phones is discouraged.
 Interview may be protected by
legal privilege if the forensic
accountant has been hired by
counsel.

Source: AICPA Forensic and Valuation Services Section, Conducting Effective
Interviews.
67
Interviewer










Ideally have two interviewers.
Encourage long answers.
Initial contact polite and professional.
Lead interviewer should focus on
questions. Maintain eye contact.
Interview partner take detailed notes.
Close on a positive note.
Prepare record of interview as soon as
possible.
If traveling away from office, let
someone know where you are
interviewing the person.
Conducted in business location.
Ask for a business card.
Source: AICPA Forensic and Valuation Services Section, Conducting Effective
Interviews.
68
Recording Interviews




If the decision is made to record interviews,
proper and reliable equipment is required and
a chain of custody for the recordings will be
necessary.
If recorded statements are used in a later
proceeding, the recordings will have to be
authenticated and any transcriptions will have
to be reviewed for accuracy.
While most recording equipment uses a digital
format, the digital recordings can easily be
altered. Therefore, the original recordings
must be retained where a proper chain of
custody and retention can provide assurances
that the original recoding has not been
changed.
Extreme care should be taken when making
copies of the original recording.
Source: AICPA Forensic and Valuation Services Section, Conducting Effective
Interviews.
69
Recording Interviews




When considering recording other
persons, most state laws require the
consent of one person to the
conversation, but other states require
the consent of all parties in the
conversation.
Surreptitious recordings also are
fraught with significant legal issues.
Consideration should be made to
address a situation where a person
may bring their own recorder to an
interview and insist on making their
own recording.
Proper planning of the investigation
with counsel should address these
issues.
Source: AICPA Forensic and Valuation Services Section, Conducting Effective
Interviews.
70
Upjohn Warning




In cases where illegal behavior is
suspected, interviews should not be
conducted until the client’s counsel has
been consulted.
If it is decided that an attorney will be
present during the interview, typically
the attorney will begin by giving the
witness an Upjohn warning.
An Upjohn warning is a disclaimer
issued by an attorney for a company to
an employee of the company.
In the Upjohn warning, the employee is
advised that the attorney does not
represent the employee, but rather
represents the company as a legal
entity.
Source: AICPA Forensic and Valuation Services Section, Conducting Effective
Interviews.
71
Do’s of Interviewing
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Consult counsel once allegations are made.
Prepare and discuss an interview plan or theme.
Conduct one interview at a time, unless the
situation dictates otherwise.
Arrange a safe and private interview location.
Gather and organize pertinent documents before
the interview.
Obtain information concerning the person being
interviewed before the interview.
Exhibit courteous and professional appearance
and behavior at all times.
Be punctual.
Conduct the interview with more than one person.
Establish rapport during initial contact.
Maintain control in the interview.
Close on a positive note for future contacts.
Prepare reports as close as possible to interview.
Listen to you instincts.
Source: AICPA Forensic and Valuation Services Section, Conducting Effective
Interviews.
72
Don’ts of Interviewing
1.
2.
3.
4.
5.
6.
7.
8.
9.
Conduct interview without a plan of
action.
Fail to discuss the interview with partner.
Argue with interviewee.
Lose objectivity during the interview.
Become judgmental during a confession.
Include personal opinions in notes or
written reports.
Provide promises or assurances.
Threaten interviewee with disclosure of
interview results, discipline, or job
security.
Discuss interviews with anyone outside
the investigation.
Source: AICPA Forensic and Valuation Services Section, Conducting Effective
Interviews.
73
Lying: James R. Brown Style
“I
lied in person to investors when I met
them. I lied in company’s filings. I lied in
the company’s press releases.” Adelphia
Communications vice-president of
finance.
 He had no formal training in accounting
and finance.
 Adelphia began manipulating its
financial reports soon after the company
went public in 1986.
 We regularly fabricated statistics on the
number of subscribers, cash flow, cablesystem upgrades, and other closely
followed metrics.
74
Lying: James R. Brown Style (cont.)
 Top
executives would meet on Saturdays
to determine if we were meeting loan
agreements. If not, we would make other
types of manipulations of either arbitrarily
moving expenses between companies or
adding invented affiliate income or
interest income from one internal
company to another.
 For more than 10 years we kept two sets
of books.
Source: Chad Bray, “Adelphia Witness Lays Out Lies,” WSJ, May 19,
2004, pp. C-1 and C-2.
----------------------------------------------------I swear on my heart
I was telling the truth
at the time.
Baby I lied. Baby I lied.
Deborah Allen
75
Fewer People Lie in E-mail
•
People tell fewer lies in e-mails
than in phone calls and face-toface conversations.
•
Possible reason: Most people
know that e-mails leave a record.
J. T. Hancock, Corporate Human Interaction
-------------------------------------------------
I got one thing to tell you,
I…oooo, I ain’t tryin’ to sell ya’,
No lies.
Grand Funk Railroad
76
Interviewing Techniques
“Bosch didn’t say anything. He
knew that sometimes when he
was quiet, the person he needed
information from would eventually
fill the silence.” (pp. 5-6).
-------------------------------------------“Just listen. You are a detective.
Detectives are supposed to listen.
You once told me that solving
murders are getting people to talk
and just listening to them.” (pp.
92-93).
-------------------------------------------------Source: Michael Connelly, The Black Ice, St. Martin’s
Paperback, 1993.
77
Progression of Interpersonal Communication
Investigative
Communication
Type
Investigative
Conversation
Structured
Investigative
Interviewing
Basic Forensic
Interrogation
Advanced
Forensic
Interrogation
Time
Requirements
Flexible
Thirty
minutes to
one hour
Three to
six hours
Three to
six hours
Required
Environment
Flexible
Private
setting
Intimate
setting
Intimate
setting
78
Progression of Interpersonal Communication
Skill/
Training
Requirements
Minimal
training
required.
Preferable to
have training
in active
listening
skills,
question
formulation
and basic
behavior
analysis as
well as
psychology
of
investigative
discourse.
Minimum
fifteen
hours
training in
structured
interview
formats
and
behavior
analysis.
Minimum
fifteen hours
interviewing
training plus
thirty hours
of training in
Reid Nine
Steps.*
Minimum
standards
for
structured
formats and
basic
interrogation
as well as
minimum ten
hours of
advanced
training.
*Inbau, F.E., Reid, J. E. & Budkley, J.P. (1986) Criminal Interrogation and
Confessions, third edition (Baltimore, Williams and Wilkins).
Source: William Morrisette, Intuition, 21 Garden Avenue, North Providence, R.I.
02911.
79
Progression of Interpersonal Communication
Appropriate Use
and
Restrictions
When you
are looking
for direction
in an
investigation
. Result is a
gamble
rather than a
predictable
outcome
When you
have
established
the need for
a formal
investigation
and are
interacting
with
witnesses,
victims,
complainant
s or
suspects.
Must accept
information
as it is
presented
without
confrontatio
When you are
interacting
with an
uncooperativ
e suspect
and require a
truthful
account of
that person’s
guilt. Make
use of
perception
manipulation
and as such
requires
comprehensive
quality
control.
Most desirous
form for
uncooperative
suspects of
severe
offences or
suspects who
may be
emotionally
unstable. Does
not use
perception
manipulation
and therefore
beneficial
when you need
to identify true
motivation for
the offense.
n.
Source: William Morrisette, Intuition, 21 Garden Avenue, North Providence, R.I.
02911.
A Thousand Lies
What is a man that stays true to the game
But has to cheat a little to get by
Well that is a person that I know too well
What if a man doesn’t stay true to the game
Don’t care for no one, only cares for his greed.
Machine Head
80
Chance of Confession
John Baldwin found in 600
investigative interviews that 35.7
percent of suspects confessed from
the outset and an additional 16.2
percent confessed initially to part of
the allegation.
“Police Interviewing Techniques,” British Journal of
Criminology, Vol. 33, 1993.
William Morrisette believes that
“an investigator who properly
identifies and implements the
appropriate investigative
communication type should be able to
achieve an 85 percent confession
rate through basic interrogation and a
95 percent rate by way of advanced
interrogation.”
81
Deception Variables
Some variables in the management
discussion and analysis section of annual
report can provide early fraud prediction rate
from 56% to 65%.
The presence of deceptions are
1. Less terms indicating positive emotions.
2. Less present tense verbs.
3. Presence of an increased number of words.
4. Fewer colons.
5. Fewer semicolons.
6. Lower use of “for example.”
7. Lower lexical diversity.
C.C. Lee, N. T. Churyk, and D.D. Clinton, Validating Early Fraud Prediction Using Narrative
Disclosures, JFIA, Vol. 5, No. 1, January – June, 2013.
82
Better Whistleblower Letters

Self-reference, indicating first-hand knowledge of the
incident.

A higher level of writing.

As many examples (numeric lists, quantifiers, causal
relationships, citations, and explanations) requiring the
use of various styles (commas, semi-colons,
parentheses, and quotations) as possible documenting
the incident.
Source: Pope and Churyk, The Anatomy of A Whistleblower Letter: A Descriptive Study,
forthcoming, J. of Forensic & Investigative Accounting
Fraud Detection Questions
Question # 1 –
Reason Why? Do you know why you
are here today?
Principle: Innocent subjects will
acknowledge the reason for the
interview, while the guilty subject
will generally avoid indicating
knowledge of the issue.
Wayne Hoover, “Non-Confrontational Approach to Interviewing,” NACVA’s
Twelfth Annual Consultants’ Conference, Philadelphia, June 1-4,
2005.
84
Fraud Detection Questions
Question #2 –
Know/Suspect: Who do you think
may have taken that $5,000 from
the safe?
Principle: Innocent subjects are
more likely to volunteer a name or
offer a suspicion.
Wayne Hoover, “Non-Confrontational Approach to Interviewing,” NACVA’s
Twelfth Annual Consultants’ Conference, Philadelphia, June 1-4,
2005.
85
Fraud Detection Questions
Question #3 –
Vouch: Is there anyone that you work
with that you feel would not have taken
that $5,000 from the safe?
Principle: Innocent subjects will vouch for
others, while the guilty will vouch for
themselves or no one.
Wayne Hoover, “Non-Confrontational Approach to Interviewing,” NACVA’s Twelfth
Annual Consultants’ Conference, Philadelphia, June 1-4, 2005.
86
Fraud Detection Questions
Question #4 –
Think: Do you think that the $5,000
was actually stolen?
Principle: Innocent subjects will
generally agree that the money
was actually stolen.
Wayne Hoover, “Non-Confrontational Approach to Interviewing,” NACVA’s
Twelfth Annual Consultants’ Conference, Philadelphia, June 1-4,
2005.
87
Fraud Detection Questions
Question #5 –
Opportunity: Who do you think would
have the best opportunity to take that
$5,000 from the safe?
Principle: Innocent subjects will usually
offer a name of an individual or named
position who would have had the best
opportunity.
Wayne Hoover, “Non-Confrontational Approach to Interviewing,” NACVA’s Twelfth
Annual Consultants’ Conference, Philadelphia, June 1-4, 2005.
88
Fraud Detection Questions
Question #6 –
Happen: What do you think should
happen to the person who stole
that missing $5,000?
Principle: Innocent subjects will
generally offer harsher
punishment than the guilty.
Wayne Hoover, “Non-Confrontational Approach to Interviewing,” NACVA’s
Twelfth Annual Consultants’ Conference, Philadelphia, June 1-4,
2005.
89
Fraud Detection Questions
Question #7 –
2nd Chance: Would you be inclined to give
someone a second chance?
Principle: Innocent subjects generally
continue to offer harsh punishment,
while the guilty are more likely to offer
a second chance.
See Porter and Crumbley, Teaching Interviewing Techniques to
Forensic Accountants Is Critical, J. of Forensic & Investigative
Accounting, Vol. 4: No, 1, January – June 2012, pp. 122-126
Wayne Hoover, “Non-Confrontational Approach to Interviewing,” NACVA’s Twelfth
Annual Consultants’ Conference, Philadelphia, June 1-4, 2005.
90
Differences
Ronald L. Durkin suggests the
following differences in a forensic audit
versus a traditional audit:
•Not limiting the scope of the
engagement based upon materiality.
•Not accepting sampling as evidence.
•Not assuming management has
integrity.
•Seeking the best legal evidence.
•Melding the requirements of the
evidential matter standard with the
rules of evidence.
Source: R.L. Durkin, “Defining the Practice of Forensic
Accounting,” CPA Expert, Special Edition, 1999.
91
Inexperienced Forensic Auditors

Find out who did it. Do not worry about
all the endless details.

Be creative, think like the fraudster, and
do not be predictable. Lower the
auditing threshold without notice.

Take into consideration that fraud often
involves conspiracy.

Internal control lapses often occur during
vacations, sick outages, days off, and
rest breaks, especially when temporary
personnel replace normal employees.
H. R. Davia, Fraud 101, New York: John Wiley & Sons, 2000, pp.
42-45.
92
Download