[Chapter In Litigation Services Handbook, Third Edition] THE ROLE OF THE FORENSIC ACCOUNTANT IN INTERNAL CORPORATE INVESTIGATIONS Jonny J. Frank, J.D., LL.M. Michael D. Carey FCA, CFE* Contents 1 Introduction 2 Categories of Fraud 3 Whether to Conduct an Investigation 4 The Accountant's Role In The Investigation 5 The Investigative Plan 6 The Planning Phase 6.1 Role of the Accountant 6.2 Assembling the Investigative and Legal Team 6.2.A Independence 6.2.B Experience and Abilities of Team 6.2.C Familiarity with Employee 6.2.D Investigative Resources 6.3 Scope of the Investigation 6.4 Legal and Business Implications 6.4.A Legality of Investigative Techniques 6.4.A.1 Electronic Surveillance 6.4.A.2 Workplace Searches 6.4.A.3 Polygraphs 6.4.A.4 Restrictions on Employee Interviews 6.4.A.5 Corporate Miranda Warnings 6.4.A.6 Defamation 6.4.B Business Implications 6.4.B.1 What To Do With The Employee 6.4.B.2 Informing The Troops and Others 6.4.B.3 Disclosure of Allegations of Law Enforcement Authorities 6.4.B.4 Third Party Liabilities 6.5 The Engagement Letter 7 The Covert Phase 7.1 Role of the Accountant 7.2 Investigative Techniques 7.2.A Forensic Accounting 7.2.B Commercial Databases/Internet/Public Records 7.2.B.1 Commercial Databases vs. The Internet 7.2.B.2 On-Line Media Sources 7.2.B.3 On-Line Public Records -1- 7.2.B.4 Other On-Line Sources 7.2.B.5 The Internet 7.2.C Computer Forensics 7.2.D Workplace Evidence 7.2.E Field Interviews 7.2.F Surveillance 7.2.G Undercover Operations 8 The Transition Phase 8.1 Role of the Accountant 8.2 Who Confronts The Subject 8.3 Location of the Confrontation 8.4 Confrontation of the Subject 8.5 Contingency Planning 9 The Overt Phase 9.1 The Investigative Mentality 9.2 Advice to Employees 9.3 Document Gathering and Examination 9.4 Interviews 9.5 The Investigative Report 10 The Remedial Phase 11 Conclusion 12 Notes 1. Introduction It happens eventually to almost every company. An anonymous letter, a phone call or perhaps an audit tips the company off to serious employee wrongdoing. Sometimes the wrongdoing exposes the company to civil or criminal liability. More frequently, the wrongdoing involves theft of company assets, including proprietary or confidential information critical to the company’s financial well being. In either event, the company must investigate the allegations.1 Nobody instructs you on conducting corporate criminal investigations when you go to school to become an accountant. Yet corporate clients routinely turn to accountants for guidance when these situations arise. This chapter discusses the issues that face an accountant when allegations arise of misconduct by or against the corporate client. 2. Categories of Fraud The potential for fraud and misconduct reaches far and wide within any company, including procurement2, sales and marketing3, finance and accounting4, operations5, foreign and domestic subsidiaries, portfolio companies, joint ventures, merger and acquisition targets. Generally, the categories of corporate fraud and misconduct include: -2- External Fraud and Misconduct External/Internal Fraud: Collusion With Insiders Internal Fraud and Misconduct Within each of these categories, the accountant and investigative team must distinguish fraud/misconduct, which exposes the company to potential criminal or civil liability from fraud/misconduct, which victimizes the company. Sometimes, the company can simultaneously lose money and face potential liability to third parties. Examples of external fraud and misconduct include (i) procurement fraud, (ii) theft of inventory and property, (iii) theft of intellectual property and proprietary information and (iv) false statements of acquired companies and strategic relationships. Examples of frauds involving collusion between outsiders and insiders include (i) conflicts of interest schemes, (ii) commercial bribery and (iii) accounts payable fraud schemes. Examples of internal frauds include (i) travel and expense schemes, (ii) phantom vendors, (iii) misappropriation of corporate assets, and (iv) theft of trade secrets. 3. Whether to Conduct An Investigation The client may first ask for counsel as to whether even to initiate an investigation. One of the most important factors in deciding whether to conduct an investigation are the circumstances giving rise to the allegations. Has the company learned of the allegations from the commencement of legal proceedings such as the execution of a search warrant or receipt of a grand jury subpoena? Typically, if a prosecutor is conducting an investigation or has served a subpoena or executed a search warrant, a company has no choice but to conduct an internal investigation and assess the viability of the allegations. The more difficult decision is when the company is aware of internal allegations of wrongdoing, but no private lawsuit has been filed, or the government has not initiated an investigation. Should the company investigate claims, which, if true, may subject the company to civil or criminal liability? Should the company throw good money after bad when it has been the victim of a fraud? Is it better to ignore the problem and hope that the allegations will never become public? While there is no hard and fast rule, generally the law, good business judgment and common sense favor conducting an investigation. Knowledge of the facts will enable management to examine options and respond effectively, and enable the company to decide whether it is necessary to disclose the allegations and the company's findings in response to the government. An internal investigation -3- enables management to fulfill its duty of care and receive the protection of the business judgment rule. The disadvantage of conducting an internal investigation must also be considered. For example, an investigation may yield damaging information that may be subject to discovery in litigation. In addition, the cost of conducting the investigation, of both the actual expenditures as well as lost in management and employee time can be quite high. Further, the company must be aware and be prepared to deal with the consequences if what begins as a narrow, focused inquiry leads to discovery of deeper, broader-based corporate misconduct. Notwithstanding the potential disadvantages of conducting an internal investigation, on balance the advantages of commencing an investigation clearly outweigh the disadvantages in most circumstances. When confronted with allegations of wrongdoing, an internal investigation is necessary to uncover the facts so the viability of the claim can be assessed, and appropriate remedial action taken. 4. The Accountant's Role In The Investigation The accountant's role in the investigation will depend upon the nature of the allegations, the resources of the accounting firm, and the relationship with the client. The accountant frequently will assume a primary role with responsibility for managing the investigation. This typically occurs where the allegations involve a crime or fraud against the company. As the project manager, the accountant will devise the investigative plan, supervise the investigation and advise the client regarding the business implications as well as the short-term and long-term consequences of the investigation. In many instances, the accountant will serve in a supporting role. For example, where the allegations involve allegations of misconduct by the company, it is likely that in-house or outside counsel will be leading the investigation. In these instances, the accountant typically will be performing forensic accounting and auditing either in relation to determining the ultimate facts and/or quantifying damages. The accountant likely will be assisting to develop controls to prevent a recurrence of the misconduct. These tasks are discussed separately in this chapter as well as other chapters of this book. 5. The Investigative Plan Investigative engagements are generally organized into progressive phases, namely, the planning phase, a covert phase, a transition phase, an overt phase, and a remedial phase. The role of the accountant in these phases is discussed below. -4- The planning phase requires both short-term and long-term planning and involves an evaluation of the investigative needs and objectives. The covert phase consists of investigative activity taken before the subject of the investigation becomes aware that an investigation has been implemented. The transition phase occurs just immediately before or contemporaneous to the subject's learning of the investigation. The overt phase, which occurs after the subject is aware of the investigation and typically is the most extensive phase for the accountant, involves more traditional investigative and audit techniques. The remedial phase involves both financial recovery and/or settlement of criminal and civil liabilities as well as the development of controls to ensure that the misconduct does not recur. While these phases generally follow one another, in a larger internal investigation the investigative plan must allow for the flexibility to switch back and forth between phases; that is, changing the circumstances may require the investigative team to return to the covert or transition phases even though the investigators and accountants are already conducting an overt investigation. 6. The Planning Phase There will be a natural tendency and almost immediate and irresistible impulse to confront and/or suspend the individuals alleged to have engaged in wrongdoing. Understandably, management will want to get to the bottom of the problem as quickly as possible. Where internal fraud is alleged, the prospect of having a criminal continue his employment, and perhaps his wrongdoing, is intolerable. Indeed, management must consider the prospect of criticism from regulators, law enforcement authorities and civil attorneys if immediate, aggressive action is not taken, especially if the illegal conduct continues. Accordingly, management will frequently opt to confront and/or suspend the suspected employee(s) and confront third parties at the outset of the investigation. While such a decision may appear to be entirely appropriate and perhaps necessary under the circumstances, it must be balanced against the extent to which critical fact-finding will be impeded at an essential stage in the investigation. Pre-confrontation investigation will frequently uncover important facts reflecting the nature and extent of the misconduct, enabling the company to assess the harm it has suffered. Facts directly or circumstantially implicating the subject may also be uncovered, thereby enhancing the likelihood of a successful confrontation. Additionally, prior to the confrontation, the company must consider and evaluate the legality of certain investigative techniques, the subject’s rights and the business implications of the employee’s possible dismissal. Moreover, in situations where substantial funds are stolen, the company should determine if it can recover a portion or all of the funds through asset searches and legal process. In short, when serious allegations of misconduct arise, a company and its management must address a myriad of investigative, legal and business issues -5- that have both short-term and long-term consequences. Only by carefully considering these issues in advance can a company effectively design a strategy for confronting the employee, remedying the damage caused by the wrongdoing and instituting measures to prevent it from happening again. 6.1 Role of the Accountant The accountant should seek a major role in the planning phase regardless if serving a primary or support role in the investigation. Invariably, there will be a financial aspect to the alleged wrongdoing. The accountant's advice will be necessary regarding the staffing of the investigative team, defining the scope of the investigation, devising an investigative plan, and counseling on the business consequences of the investigation. 6.2 Assembling the Investigative and Legal Team The decision as to who will participate in the investigation is crucial and merits considerable thought and discussion. Corporate counsel and management have a number of options to choose from: in-house resources such as legal, human resources or security departments, and/or outside resources, such as law, investigative and accounting firms. If the allegations are significant, the company must assemble a multi-disciplinary team. Professionally trained investigative resources will be needed to develop the facts and evidence. Experienced legal counsel may be necessary to manage the various legal issues affecting the investigation, including issues of labor law and corporate civil and criminal liability. Among the factors that must be considered in making this determination are: Independence The issue of independence must be considered in determining who conducts the investigation. An in-house investigator may have difficulty maintaining his or her independence when interviewing employees and providing the employees with legal advice. Further, an in-house investigator’s judgment may be affected or criticized by previous biases or political considerations, whether real or not. For example, it may not be desirable for an in-house professional to investigate the conduct of his or her superiors. Also, in-house professionals who have witnessed the underlying conduct should not participate in an internal investigation. Lastly, in-house professionals must be cognizant of appearances should litigation ensue. The objectivity and independence of an “insider,” may be questioned by the employee’s counsel or in legal actions initiated by other interested parties such as shareholders or investors. These parties will invariably claim that the inhouse investigative team was partial and attempted to scapegoat an employee to cover up more serious corporate misdeeds. -6- Experience and Abilities of the Investigative and Legal Team The ability to investigate and interview effectively is an acquired skill. Only through experience and training can one prepare and execute an investigative plan designed to gather evidence logically and efficiently. Such a plan may encompass obtaining information from internal sources such as employee interviews, financial records, computers, travel and expense reports records and personnel files, as well as external sources such as former employees, vendors, industry sources, on-line databases and public records. Specialized resources and expertise will be required to conduct the investigation, including access to and experience in database research, computer forensics and electronic surveillance. In addition to the “nuts and bolts” of the investigation, the investigative team must be mindful of the various legal and business implications of the investigation and the techniques used to gather evidence relevant to the allegations. Structuring an interview to obtain maximum information, either through careful questioning or through exploiting the weaknesses in an interviewee’s story requires substantial preparation and analysis of all available evidence. The company must consider the circumstances of the interview and the backgrounds of the interviewees in selecting the interviewer. Familiarity with Employee The working relationship between an in-house corporate investigator and suspected employee may create an awkward investigative atmosphere. Investigations led by in-house representatives may create or exacerbate morale problems. In the event the allegations are not proven, the future working relationship with the employee(s) may well be strained. The hiring of outside consultants to respond to allegations may be viewed as responsible corporate conduct rather than politically or personally motivated acts if led by corporate insiders. Investigative Resources Outside firms are generally better equipped to investigate allegations of misconduct by or against a corporation, having substantial staff dedicated to and experienced in corporate fraud investigations. Depending upon the nature of the allegations, the company must consider the geographic resources as well as the industry expertise in assembling the investigative and legal team. Moreover, sophisticated computer database research is now the norm, with detailed background information readily available on individuals and entities, including, asset ownership, civil litigation, criminal convictions, bankruptcy filings and business relationships. Outside firms also provide services such as forensic -7- accounting and computer data retrieval which are frequently necessary to learn the particulars of a fraudulent scheme. 6.3 Scope of the Investigation The company will have more flexibility if the company if the company learns of the allegations of wrongdoing before the government has initiated an investigation, or a private lawsuit has been filed. The company will need to investigate all plausible allegations of misconduct and ensure that the investigative leads are followed. All potential witnesses should be interviewed, and potentially relevant documents should be reviewed. But there are limits. Credibility and common sense are determinant. The company should not finance a wild goose chase or investigate baseless or frivolous allegations. It must, however, be prepared to expand the investigation as needed and to justify any limitations placed on the investigative team. 6.4 Legal and Business Implications The investigative advisers must carefully consider and plan for a host of legal and business implications. Chief among these concerns is the propriety of the investigative techniques, the rights of the suspect employee, the company’s relationships with third parties and the company’s ability to function in the wake of the investigation. A recent addition to the list of issues that must be addressed concerns whether a report will be produced following the investigation. Although companies frequently request a report, especially if negative employment action or referral to law enforcement agencies is contemplated, a recent Federal Trade Commission (“FTC”) staff opinion letter concluded that outside attorneys or investigators might be considered “consumer reporting agencies” under the Fair Credit Reporting Act, thereby obligating the employer to notify employees under investigation and furnish them with copies of the investigative report. Following publication of the staff letter, a number of commentators and practitioners expressed concern that the staff letter would inhibit companies’ ability to hire experienced attorneys and investigative firms to fully investigate allegations of wrongdoing. In response, the FTC issued a letter that sought to “clarify, and perhaps soften,” the implications of the staff opinion letter. The letter, however, did not suggest that the staff letter was incorrect in its interpretation of the FCRA; instead, it merely provided advice for dealing with the FCRA’s provisions. For example, the letter recommended that employers obtain employee consent at the start of employment to procure consumer reports, thereby relieving the employer of the duty to disclose. Although the FTC’s opinions regarding the FCRA do not have the force of law, its interpretation of the FCRA must be considered prior to issuing an investigative report. -8- Legality of Investigative Techniques In most circumstances, an aggressive investigation is necessary to uncover the full extent of the wrongdoing and damages sustained by the company. As described below, investigators must be familiar with statutory and common-law prohibitions or restrictions on certain investigative techniques. Electronic Surveillance Tapping telephones is perilous – the federal wiretap statute, commonly known as Title III, makes it a crime to “intentionally intercept any wire, oral or electronic communication.”6 An employer, however, may use an extension telephone to monitor employee calls made in the ordinary course of business.7 Criminal conduct overheard during the course of monitoring could be used by the employer to take remedial employment action and would be admissible in court. However, it is important to note that the recording must be related to legitimate business interests and cannot be used merely as a pretext for conducting an investigation into suspected wrongdoing.8 Title III also permits the taping of telephone conversations as long as one of the parties to the conversation has consented.9 However, state laws vary, with twelve states requiring approval by all parties to the conversation prior to taping.10 Workplace Searches Generally, the workplace is under the control of the employer, and property provided by the employer to the employee, such as lockers and desks, typically may be searched without the employee’s consent.11 Computer hard drives and networks, as well as e-mail, are generally subject to search12, although companies in at least two states, Maryland and Florida, cannot monitor e-mail absent employee consent. However, the ability to search work areas and items within those areas is not absolute. Searches may be limited depending upon the employee’s privacy expectations and the employer’s express or implied recognition of those expectations. For example, allowing employees to use personal locks on lockers may restrict an employer’s ability to search for evidence of wrongdoing. 13 Unless the employer has written policies concerning unannounced searches, and obtains signed waivers by employees, careful consideration should be given to the scope of searches conducted in the course of the investigation. Polygraphs -9- In anticipation of the suspected employee’s denial of wrongdoing, consideration should be given to a polygraph examination. Although the use of polygraphs in the workplace was severely restricted by the Employee Polygraph Protection Act of 1988 (“EPPA”)14, polygraphs are permitted if their use is related to the investigation of a specific incident. Employers may request that an employee submit to a polygraph examination if: (1) the test is part of an ongoing investigation involving economic injury; (2) the employee had “access” to the property that is the subject of the investigation; (3) the employer has a reasonable suspicion that the employee was involved in the activity under investigation, and (4) the employer executes a statement detailing requirements (1) through (3).15 Although evidence obtained from the polygraph may not, in itself, constitute the basis of an adverse employment action16, the results may, when taken with other evidence, justify suspension or termination. The employer has little recourse, however, should the employee refuse to take a polygraph examination. Many states prohibit employers from requiring that employees take polygraphs as a condition of continued employment, and frequently grant employees the right to counsel if a polygraph examination is sought.17 Lastly, the Department of Labor, which administers the EPPA, can assess civil penalties of up to $10,000 against the employer and seek remedial relief for the employee. The employee is also authorized to file suit.18 Restrictions on Employee Interviews Although employees of private entities do not, in the context of an internal investigation, enjoy constitutional protections such as the right to counsel, they may possess contractual rights that must be respected during the course of the investigation. For example, a union member may be entitled to have a union representative present during an interview that may lead to disciplinary action. 19 The collective bargaining agreement may contain other employee rights and benefits and should be reviewed prior to interviewing union members. Notwithstanding any bargained for rights, employees are obligated under state statutes or common law to cooperate in the employer-employee relationship, including complying with reasonable requests during an internal investigation.20 If the employee refuses to cooperate, the company generally may terminate the employee. It is prudent, however, to review all aspects of the employeremployee relationship, including company policies, contractual relationships and prevailing law in plotting the investigation’s course. Corporate Miranda Warnings If an attorney for the company interviews the employee, the attorney must advise the employee that the interview is being conducted on behalf of the company and that the attorney represents the company, not the employee. Further, the - 10 - employee should be told that the information obtained from the interview will be protected within the company’s attorney-client privilege, but that the company may choose to waive the privilege and disclose the contents of the interview without the employee’s consent. In sum, there should be no confusion on the employee’s part as to which counsel is representing in the investigation. Defamation The threat of defamation lawsuits always looms overhead when accusations of wrongdoing are leveled at employees. Assuming the employee can establish that defamatory statements were made and “published,” i.e. communicated to at least one other person, the most frequently raised defense is that of qualified business privilege. This privilege requires that the statement (1) was made in good faith; (2) concerned a subject in which the person making the statement had an interest or duty; and (3) was made to a person having a corresponding interest or duty. Accordingly, statements made in the context of an internal investigation generally will be protected, provided the investigation is conducted properly and discreetly. Business Implications Allegations of criminal conduct frequently result in a disruption of the company’s business, as senior management directs its energies toward the problem and away from company’s daily operations. Moreover, a host of issues concerning the ongoing business in the wake of the allegations must be considered prior to confronting the employee. What To Do With the Employee When serious allegations of misconduct are directed toward an employee, the company must react. Absent the rights and benefits accorded union members, the company may generally choose to suspend the employee with or without pay, terminate him or allow him to continue working. Because of the tremendous impact this decision will have on the course of the investigation, management should consult with its investigative team before taking any action. Generally, suspending or terminating an employee will severely limit the investigator’s ability to confront the employee under conditions carefully designed and structured to maximize the likelihood of a confession. In other words, it is vitally important for the investigator to control the environment in which the interview is to take place. The element of surprise is critical, as the employee will not have had an opportunity to plan and rehearse an explanation for the conduct. Moreover, the interviewer will be able to gauge the employee’s reaction to particular questions, and will be prepared to present contradictory evidence if necessary. - 11 - If the employee is alerted to the allegation, which is inevitable if he is suspended or terminated, the likelihood of a successful confrontation is diminished, especially if counsel is retained. In addition, proactive efforts to obtain damaging evidence against the employee through surveillance or sting operations will, in all likelihood, are lost. Lastly, the employee may make efforts to influence witnesses or third parties with knowledge of the misconduct, or destroy documents or other evidence relevant to the investigation. Of course, there will be circumstances in which the company will have no choice but to suspend or terminate an employee. For example, if the company will suffer irreparable harm by allowing the employee to continue working, even for one day, suspension is appropriate. These situations arise most frequently in the intellectual property area, where disclosure of trade secrets or other confidential information can spell financial ruin for the company. In the absence of a genuine threat to the company’s financial well being, the better course is to wait until the confrontational interview has taken place. Informing the Troops and Others If the employee performs an important function, the company must prepare contingency plans to deal with his possible departure. A temporary or permanent replacement should be waiting in the wings to ensure minimal business interruption. Statements should be prepared informing company personnel of the termination and assuring them that the situation is under control. Although perhaps ineffective, personnel should also be instructed not to discuss the matter further amongst themselves or with third parties. Plans to contact and inform customers and third parties affected by the misconduct must be developed. If called for, the company should consider hiring a crisis management team to advise it during this period. Disclosure of Allegations to Law Enforcement Authorities At the outset of the investigation, the company must begin its evaluation of whether or not it will disclose the misconduct to law enforcement authorities. If there is no legal obligation to report the misconduct, voluntary referral requires careful consideration of the effect disclosure may have on the company’s business operations. Generally, absent a statutory reporting requirement, such as in the case of federally insured financial institutions or publicly traded companies21, a company is not required to report knowledge or evidence of criminal conduct to law enforcement authorities.22 The misprision of felony statute is violated only if an individual, having knowledge of the commission of a felony both fails to notify authorities and deliberately takes and affirmative step to conceal the crime.23 Mere silence is insufficient to establish the affirmative step element of the crime.24 - 12 - Although the company may not be required to report criminal conduct, it must consider voluntarily disclosing the conduct to the authorities. In determining whether voluntary disclosure is appropriate, the company must first assess any liability it may incur through the criminal behavior of its employee. For example, if the conduct appears isolated, aberrant and restricted to a lower-level employee, it is unlikely that a prosecutor would pursue criminal sanctions against the company. If, on the other hand, the criminal activity is pervasive and implicates senior management, or if it victimizes the government, law enforcement authorities may very well consider prosecuting the organization. Under these circumstances it may be prudent for the company to voluntarily disclose the conduct and take the opportunity to present mitigating circumstances, possible defenses and exculpatory evidence. Coming forward before any government investigation is initiated, coupled with evidence that the company promptly responded to the allegations and instituted remedial measures, may persuade the prosecutor to proceed against the individual wrongdoers and not the company. In the event the company is prosecuted, enters a guilty plea, cooperates and accepts responsibility for its wrongdoing, it will benefit from its voluntary disclosure under the United States Sentencing Guidelines.25 Lastly, if the company does business with the federal government, a number of agencies, including the Department of Defense and the Internal Revenue Service, have created formal voluntary disclosure programs. Again, promptly disclosing the improper activity may enable the company to argue persuasively that declination of prosecution is appropriate. Another factor the company must consider in determining whether or not to report the allegation is the effect a government investigation will have on its business. Government prosecutors and agents are very busy, with many matters under investigation and prosecution. Unless the magnitude of the misconduct at issue is such that prosecutor and investigator deem it a priority, the investigation will proceed at a deliberate pace, leaving an ominous cloud hanging over the company for an extended period of time. A lengthy law enforcement investigation will also distract employees and result in workplace inefficiencies and morale problems. Most important, the existence of a criminal investigation may have serious business implications for the company, including, restrictions on third-party financing, vendor reluctance to supply materials other than on a C.O.D. basis, customer concerns about timely shipping and receipt of products, and reputation damage in the business community. In most circumstances, the decision as to whether or not to report the conduct to criminal authorities, and when, is complex and requires a weighing of many - 13 - factors. It is important to evaluate these factors at the earliest stages of the investigation. Third-Party Liabilities The company must also evaluate whether any potential liabilities exist with respect to its suppliers and customers. If, for example, customers were defrauded, efforts must be made to make the customers whole and restore confidence in the business relationship. Other times the company will be the victim, and consideration must be given to the manner in which remedies will be pursued, if at all, against third-parties. 6.5 The Engagement Letter The accountant should not participate in an active investigation until an engagement letter has been executed. Issues to be addressed in the engagement letter include: 7. The Scope of Services Timetable Fees Confidentiality Ownership of Working Papers Liability and Indemnification The Covert Phase The initial confrontation of the suspect individual(s) is critical. A company frequently has only one opportunity to confront an officer, employee or third party. Oftentimes, the company enjoys the benefit of the element of surprise, which enables management to obtain information and gauge an individual's reaction and responses when confronted. Accordingly, great care should be taken to ensure that that opportunity presented by the confrontation is not squandered. Obtaining accurate information about the wrongful conduct at an early stage of the investigation enables the company to immediately deal with the problem, remedy damage caused by the wrongdoing and institute measures to prevent its reoccurrence. Initially, facts should be developed discreetly to avoid possible obstructive conduct such as document destruction, records’ alteration and witness tampering. A variety of investigative techniques have been developed to gather facts before the subject of the investigation becomes aware that an investigation has been implemented. 7.1 Role of the Accountant - 14 - An accountant generally performs a very limited role in the covert phase of the investigation with the exception of analysis of records and the preparation of a visual link analysis. It is essential, however, that an accountant be familiar with the availability of covert techniques so that he can advise the client as needed. Moreover, the accountant needs to work in tandem with the covert investigative team. 7.2 Investigative Techniques Forensic Accounting Forensic accountants piece together financial data and search for anomalies and irregularities that are the hallmarks of fraud. Depending upon the circumstances, the client may be about to furnish the forensic accountant with key data without jeopardizing the secrecy of the investigation. Financial transactions that directly implicate the subject or corroborate evidence obtained through other investigative techniques constitute powerful ammunition with which to confront the alleged wrongdoer. Commercial Databases/Internet/Public Records The explosion of information sources available on the Internet and through commercial online services has revolutionized the investigative process. Virtually every business investigation now begins with some form of online research. In a matter of hours, a skilled investigator can develop information, which can provide critical leads and make connections that may never be found through traditional field investigation. As a practical matter, an accountant will probably not be trained in these various database sources. The accountant, however, needs to be familiar with the sources of information that are available so that he can bring the proper resources to the investigation. The subject is discussed at some length because this investigative resource has become so crucial. Commercial Databases vs. the Internet For certain types of information, the Internet cannot match the offerings of commercial services. For others, the Internet is the best and only place to find information. Knowing when to use the commercial databases and when to use the Internet is key to developing a comprehensive and thorough investigative strategy. Whether to rely on the Internet or commercial databases will depend on the nature and extent of the information you are seeking. Before going online, the - 15 - investigator will need to identify which databases or Internet sites are most likely to contain information most relevant to the target of your investigation, in terms of both geographic location and subject matter. As more information is made available on the Internet, the best approach is to use these research tools in tandem, and to become familiar with the best sources of information to suit the particular needs of the investigation. On-Line Media Sources Whether retrieved from commercial databases or the Internet, the most valuable sources of information fall into two main categories, news and media sources, and public record sources. It is usually best to start the online investigative process with a media search, one of the key sources for historical and background information regarding entities and individuals. These sources include local, national and international newspapers, magazines, trade publications, and television and radio broadcast transcripts. Often, a subject’s legal, financial or business troubles are written about in the news media in wellresearched and thoughtful articles. Media can also be helpful in identifying a subject’s prior employment and personal history. When using the commercial media databases, the researcher should give careful thought as to which databases to use. In general, Lexis-Nexis26, Dialog27, Datastar28 and Dow Jones29 provide the most extensive news and media coverage. Each database provides different levels and types of local, national and international coverage. The database vendors are constantly adding new and removing underused sources. Paying attention to content must be an ongoing process. Researchers must check their habits and change their search strategies accordingly. On-Line Public Records After exhausting online media sources, the next stop in the online investigation is to search the vast compilation of abstracted public record information. This resource includes: federal and state civil court proceedings, federal criminal records, federal bankruptcy court records, UCC filings and other asset locators, corporate records, property records, judgment indices, motor vehicle records, regulatory agencies actions, professional registration and licensing information, Securities and Exchange Commission (SEC) records and other business databases. On-line public records information is perhaps the fastest growing area of online information and is routinely included in any business investigation. The availability of on-line public records information varies from state to state and covers variable time periods, so the extent of coverage in a particular jurisdiction must be carefully considered. Another word of caution: online records are often inaccurate and incomplete. While a great source of leads, online research should never be exclusively relied upon. Investigators encounter situations in which a manual search of the public record reveals significant litigation matters - 16 - that were not identified online, despite the fact that court records were supposedly online for that particular jurisdiction and time period. Additionally, many of the online records, most of which are abstracted, are likely to contain only a portion of the information available from the original document. A combination of online searching and onsite searching at relevant courthouses or agencies is the best approach. Further, in international investigations, only limited public records information is available online. The reasons for this are twofold. First, many records, such as lawsuits and bankruptcies, are not considered public information. Second, other countries tend to lag behind the U.S. when it comes to automating their publicly available information into searchable online databases. Even in those foreign countries that do have some information available online, it is generally limited to corporate records, some Dun & Bradstreet company reports, and varying degrees of media. There are also CD-ROM products available that have international corporate records. Again, it is important to know specifically what is available in the jurisdictions you are concerned about in order to maximize the information you can obtain from these sources. In general, the most used public records database providers are Lexis-Nexis30, CDB Infotek31, Information America 32, Autotrack33, Pacer34, Courtlink 35, and Superior Information Services.36 All of the commercial database providers provide some form of “global” search capability, which allows the user to search simultaneously millions of records from across the country. Because there is a great deal of overlap in the content of these databases, however, the accountant must retain an on-line database and Internet investigator who is well acquainted with the unique public record sources that each database provides. In cases of overlap, an investigator may base the decision to use one over the other on cost and search features, which differ widely across the public record databases. In addition to the commercial vendors, many state and federal regulatory agencies now make records available directly on the Internet.37 Some of the commercial vendors also offer a web-based product.38 While the availability is increasing at a fast pace, presently public records offerings on the Internet remain insignificant when compared to the commercial services. Even though some public record information is available, the Internet is not a viable alternative to the commercial vendors. However, used in tandem with commercial databases, the Internet can provide valuable leads and critical information about individuals and entities. Other On-Line Sources In addition to media and public record sources, several other online investigative sources deserve mention. These include Dun & Bradstreet, which provides selfreported business and credit information on both public and private, domestic - 17 - and international companies39, and people locator services, which can be critical in locating key witnesses.40 The Internet Despite its shortcomings when compared to the commercial online databases for purposes of media and public record searching, the Internet has spawned a number of unique research resources. By virtue of the extraordinary pace at which it reinvents itself, this medium demands creative thinking for use as an investigative tool. Message Boards Most search engines, as well as many Internet sites, "message boards", "bulletin boards" or “discussion groups” locate sites where people can inquire about and respond to various topics. Researchers can both monitor ongoing discussion or search the vast pool of archived postings. These sites can provide a wealth of information, particularly in a litigation context. Home Pages Most companies, and even many individuals, have their own website. These sites can provide a wealth of information relating to a company’s sales information, geographic territory, biographical information of corporate officers, names of joint venture partners, and updated product information. A private company may provide a more detailed history or corporate structure on its home page than it provided to a commercial credit reporting service. It may also inadvertently leave outdated – but perhaps useful – information on its Web site that a commercial vendor will delete once the information is updated.41 Other Sites The Internet investigator can use the Internet for other purposes. If the company or individual being investigated does not have a website, information might be located in other websites. Websites exist to allow the investigator to quickly locate individuals or businesses across the country as well as conducting reverse telephone directory services. There are even web services available, which, for a nominal fee, will verify an academic degree and professional certifications. The Internet is also a useful tool for locating outside experts to assist in difficult investigations. Computer Forensics Frequently, computer forensic professionals are able to retrieve deleted, encrypted and password sensitive files, as well as e-mail, that may bear directly on the alleged wrongdoing. Potential sources include the subject's desktop and laptop computers, the subject's secretary's computer, the subject's electronic - 18 - organizer, the server, backup tapes, voicemail systems, floppy disks, and home computers. This data often includes "smoking gun" evidence. The investigative team must ensure to retrieve the data in a manner that meets evidentiary requirements for admission in subsequent legal proceedings. Workplace Evidence Frequently, more traditional evidence gathering techniques can prove even more successful than the high tech efforts described above. Desk and file searches frequently yield incriminating evidence, as do personnel files, travel and expense reports, telephone records and statements (including office, cellular and calling card) and company credit card statements. Field Interviews Interviews of employees, former employees and third parties such as vendors, suppliers and customers many times provide insight into the suspected employee’s activities and, perhaps, the alleged wrongdoing itself. However, the risk that the suspected employee will learn of the investigation and attempt to subvert the fact-finding process through document destruction and/or witness manipulation must be considered. Surveillance Physical, audio and video surveillance should be considered provided the activity is ongoing and susceptible to this investigative technique. Surveillance is generally most successful when the improper activity involves theft of physical property or trade secrets. Sting Operations If circumstances permit, sting operations should be considered as a means to obtain unequivocal proof of misconduct. For example, in the case of ongoing misconduct, undercover operatives may pose as willing purchasers of stolen trade secrets or merchandise or as vendors seeking to obtain business from a purchasing agent suspected of taking kickbacks in exchange for the awarding of contracts. 8. The Transition Phase The transition phase is a critical, albeit very brief, phase of a corporate internal investigation. It is that moment that the subject of the investigation becomes aware that he or she is the subject of an investigation. - 19 - The investigator has a distinct advantage - - only he is aware that an investigation has commenced. A skilled investigator seeks to exploit that advantage and the element of surprise by careful planning including: Selecting the person(s) to confront the subject Choosing the time, order and location of the confrontation Determining the best approach toward the confrontation The transition phase also requires contingency planning for next steps. The investigative team must plan and guard the preservation of documentary, physical and electronic evidence. Additionally, the investigative team, together with the client, must plan for the on-going operation of the business, including the possibility of a disruption of relations with employees, vendors and customers and, where the circumstances are newsworthy, the public. 8.1 Role of the Accountant The accountant performs a vital role in the planning of the transition phase. The accountant's role in the actual confrontation of the subject varies depending upon the accountant's experience and the circumstances of the investigation. An accountant's presence, for example, is absolutely critical in internal investigations of finance and accounting personnel as well as in investigations of accounting irregularities. Effective confrontation of the subject in these sort of cases demand the technical expertise of an accountant. Investigators and lawyers frequently, however, consider the confrontation of the subject to be within their exclusive domain. The accountant should gauge the facts and circumstances to determine whether his presence is essential and, if so, be prepared to insinuate himself even if uninvited. 8.2 Who Confronts The Subject Planning the transition phase requires careful consideration of the most effective team for confronting the subject. Usually a two-person team is most effective. Two people are required so that there is a witness if the subject later disavows his or her earlier statements. More than a two person team risks being too intimidating. An experienced interviewer should lead the confrontation of the subject. The more difficult decision usually concerns the second person. Depending upon the circumstances, the second team member might include the subject's immediate supervisor, a senior company official, a human resources representative, another member of the investigative team, or counsel. - 20 - The presence of an attorney has its benefits and disadvantages. In most situations, the attendance of counsel heightens the seriousness of the matter. Conversely, including an attorney can have a chilling effect. Moreover, counsel is likely to administer corporate Miranda warnings. Counsel will warn the subject that lawyer represents only the company and not the employee. Note that these warnings arise solely from an attorney's obligations under the lawyers' code of ethics. The warnings are not required as a matter of law nor are they required if a non-attorney is conducting the interview. Rather, the warnings are designed to ensure that the subject understands that the attorney does not represent his interests. No warnings are thus required where a non-attorney conducts the interview. Although it may not be desirable to have counsel present with the subject, it is helpful to have counsel available for consultation during the confrontation. The subject frequently will pose questions or seek guarantees concerning potential civil/criminal liability and/or severance agreement. Legal input is necessary if such questions arise. 8.3 The Location of the Confrontation The confrontation of the subject ordinarily occurs in a neutral setting in the facility where the subject is employed. The investigative team should consider whether there would be a tactical advantage in having the subject travel to company headquarters or to an off-site location. Occasionally, it is advantageous to confront the subject at home. Off-site and home visits are most useful when the investigative team is seeking to gain the subject's cooperation to further the investigation. Maintaining the secrecy of the confrontation enables the investigation to remain secret if the subject agrees to cooperate. An off-site location might also be chosen if there is any concern about violence or other disruption of the workplace as a result of confrontation of the subject. The investigative team should also consider the psychological impact of an offsite confrontation. Confronting a subject at home, for example, can be very effective if the team is concerned that the employee will give false information to protect the company. A home confrontation conversely can backfire as it might offend the subject. The team must balance the benefits and disadvantages. 8.4 Confronting the Subject The investigative team must plan on how best to approach and question the subject. In this regard, there really is no substitute for investigative experience. - 21 - A critical question is how much information should be disclosed to the subject. Sometimes, it is most effective simply to confront the subject with the allegation and gauge the reaction. In other instances, it is more effective to disclose some or all of the evidence that has been adduced in the discreet phase. The hope is to persuade the subject to capitulate and cooperate. There is no bright line rule or easy answer. More often than not, a subject will admit culpability (or partial culpability) if he or she believes that the investigative team will ultimately be successful in finding evidence of guilt. It is essential, of course, to consider how the investigation might be affected by disclosing information to the subject. The investigative team must strike a balance between the effort to secure a confession with compromising the investigation. Other critical issues are the method and type of questioning. We address these topics in the discussion on interviewing. 8.5 Contingency Planning Both the investigation and the business environment will change significantly once the investigation moves from the covert to the overt phase. The investigative team must plan prior to the confrontation of the subject with a plan contingent upon the results. An effective confrontation of the confrontation usually leads to some admission of wrongdoing by the subject. The admission, however, is likely to be partial and frequently contains additional facts and information not previously known or suspected. It is common for the subject to implicate others in the company or the company itself. A subject frequently will seek to justify his or her own misconduct by pointing to unrelated misconduct by the company. A succession plan needs to be established since it is likely that the subject will resign, be dismissed or suspended following the confrontation. Additionally, the client must take precautions to change the physical and computer security to ensure that the subject does not have access to company property or proprietary information. The investigative team must also plan for the post-confrontation investigation. Confrontation of the subject frequently involves simultaneous or almost simultaneous physical searches of the subject's work area as well as his personal computer, e-mail and computer network. - 22 - Additionally, the company must plan for external communications. Depending upon the allegations and results of the confrontation, the company needs to be prepared to inform employees, vendors and customers. Where the allegations are newsworthy, it is critical that the client includes its public relations network to respond to inquiries from the media. 9. The Overt Phase The overt or open phase involves more traditional investigative techniques and typically is the most extensive phase of a corporate internal investigation. It is during this phase that the accountant and other members of the investigative team conduct witness interviews, analyze and reconstruct data, financial records and other documentary evidence, examine physical evidence and issue an investigative report. 9.1 The Investigative Mentality Corporate internal investigations rarely require highly sophisticated technical accounting skills. Rather, the challenge for most accountants and auditors is developing the necessary investigative mentality. The investigative mentality will be counterintuitive to some. Materiality, for example, means something quite different to an investigative accountant than to a financial auditor. Financial auditors primarily are interested only on issues that have a potential material financial impact. An investigative accountant maintains a much more expansive view. Even the smallest detail can be material to an internal investigation. An accountant who joins an investigation thus must be prepared to shake his or her traditional orientation and assume an investigative mindset. The characteristics of an effective investigator should include: • skepticism, the investigator does not assume that management or employees are honest and telling the whole truth until the facts are gathered and the inquiries are complete; • imagination, sufficient to develop theories against which to compare factual evidence as it develops; • communication skills, that will enable the investigator to encourage people to be helpful and volunteer useful information; • determination, to persevere until the anomalies are resolved and the fact pattern is thoroughly understood; and, most importantly, - 23 - • 9.2 patience, to attend to the smallest detail that less experienced people may overlook but that can provide that vital clue or inconsistency. Advice to Employees The first step in the open phase frequently involves advising company employees of the existence of the investigation. Some practitioners believe that it is better to refrain from announcing the investigation to corporation employees generally. They believe that the disadvantages of making an announcement are too great. Disadvantages include: the possibility of starting a rumor-mill, allowing potential witnesses to talk about the issues, compare notes and perhaps develop positions with respect to their activities, and danger of making unfounded or untrue allegations against the subject of the investigation, which could result in legal actions against the company. While it is certainly the case that these concerns have some merit, we take the view that, in most circumstances, the results achieved from properly communicating the existence of an open, honest, ethically undertaken internal corporate investigation often outweigh the potential disadvantages. One of the benefits of an internal corporate investigation is that the company is provided with a good opportunity to reinforce their message with respect to the culture, integrity and ethical compass of the organization. For this benefit to be obtained, it is vital that the conduct of the investigation itself is undertaken in a way that employees and management alike can view as fair and equitable. The announcement itself should probably be brief, should indicate that the investigation is being undertaken by outside expert consultants and should indicate that the Board of Directors or a special committee of the Board will supervise the investigation and consider findings from the investigation. The text of the announcement should discourage employees from internal discussion, especially if the investigation is being done by lawyers under privileged conditions, although it is naïve to expect there to be no conversations about the news. It is always a good idea in this initial announcement to advise employees that no documentation in the relevant departments or for the relevant periods should be destroyed. It may be necessary to be more specific about exactly what documentation should be retained. Internally, a hold should be placed on the normal routine of record destruction activities. - 24 - The extent to which the announcement of the investigation is distributed will depend heavily on the nature and scope of the investigation itself. It is often unnecessary to advise every employee of the company. Frequently, it is sufficient to advise members of only the relevant departments or divisions. Finally, the initial announcement should contain encouragement for any employee to discuss information or concerns that might be relevant to the investigation. It is helpful for the announcement to provide the name and telephone number of a person to contact, under confidential conditions, in such circumstances. 9.3 Document Gathering and Examination Documents generally fall into two categories: paper and electronic. The investigative accountant frequently assumes a lead role in document gathering and examination. The process must be thorough and well documented. The investigative team should be careful to search for all relevant documents. The investigative team must develop an understanding of how the client maintains and stores records. Moreover, the search should include informal as well as formal company records. In many companies, for example, employees maintain their own personal desk files in addition to the official company file. These need to be included in the search. The gathering of electronic documents, including e-mails, information stored on networks, floppy discs, back-up tapes and personal computers, requires special attention. Evidentiary rules and best practices for the handling of electronic evidence change constantly. Computers frequently contain smoking gun evidence. The company needs to ensure that such evidence is obtained in a way that will later stand up in court. The investigative team needs to meet with appropriate information technology personnel to ensure that all potentially relevant sources have been searched. The team will need to know (i) the type, make and model of computer used, (ii) the capacity of the internal hard disk and the external disk drives, (iii) the operating system, (iv) the applications used on the computer and where they are stored, the network system, and (v) the computer literacy of the subject(s). Electronic document searches frequently result in the recovery of too much data. Using selective word searches, the investigative team can filter large volumes of records and data into manageable amounts. There will be multiple copies of some documents. Retain copies of every important document - - they may include important margin notes; it may become important to know which individuals maintained a copy in his or her files; and one must compare versions of what appears to be the same document for alterations. - 25 - If possible, the investigative team should personally collect or supervise the collection of documents. Many companies leave document collection to business operations personnel. This can be a serious mistake. Business operations personnel rarely appreciate the need for an exhaustive search for documents. Important documents can be inadvertently (and sometimes intentionally) missed. The business units rarely make a precise record of the date and location of where documents are obtained. This casualness can create serious problems if the matter eventually ends up in court. The investigative team should obtain originals wherever possible. It is essential, however, that no member of the investigative team mark an original document in any way apart from the formal identification mark that may be employed. Accordingly, it is very useful to photocopy a set of documents to show witnesses and for inclusion in the investigative working papers. The investigative report should record the document collection efforts if this later may become an issue. The investigative working papers should include memoranda detailing the methodology and execution of the gathering of electronic and paper document gatherings. The examination of the records and documents naturally will vary upon the nature of the investigation. Specific techniques are addressed elsewhere in this and other books. As a general matter, the investigator needs to be observant about the details regarding the substance as well as the context and circumstances in which documents are prepared and maintained. Additionally, the team needs to be on the look out for alterations, white-out areas, erased margin notes, earlier drafts and documents that should be present but are missing. 9.4 Interviews Because of their background and training, accountants are vulnerable to focusing too much attention to document analysis and too little on obtaining information from people. Our experience is that the most essential information most often comes from interviews of current and former employees, outsiders and the subject himself. Witness statements generally comprise the most critical evidence in internal investigations. Documents often serve as the corroboration for witness testimony. Interviewees can steer the investigator to the key documents and explain the details and nuances. Effective interviewing is a skill that requires training and experience. There are entire courses, textbooks and programs dedicated to the subject. - 26 - There is no single right or wrong method for conducting an interview. What might work for one interviewer will be wrong for another. Following are some common characteristics of an effective interview: Preparation - An effective interviewer has a mental or written list of the areas to be covered. Copies of relevant documents are prepared in advance - sometimes with key sections highlighted. It usually is ineffective to write out precise questions or to follow a script. The interviewer must listen and follow whatever paths the interviewee takes. Order of Interviews - As a practical matter, most individuals are interviewed only once, although key individuals can be re-interviewed. The investigative team usually chooses between working up or down the ladder; that is, does the team interview the most senior people first and work down the hierarchy or does the team begin with interviews of junior staff? An early "tell me what you know" session is often effective where multiple interviews with the principal subjects are anticipated. Record analysis and junior interviews should follow. The closing interview then provides the investigator with the opportunity to compare the subject's statement and position with the statements of other witnesses and documents. Inconsistencies can then be challenged. Number of Interviews - Err on being over-inclusive rather than underinclusive. It is essential to interview all individuals with potential knowledge. Most importantly, it is often the low-level employee and/or former employee who provide the most valuable information. Too many investigations do not uncover critical information because the investigative team failed to interview secretaries, clerks, etc . . . Number of Interviewees and Interviewers - The investigative team should interview only one person at a time. Interviewees frequently will request to be interviewed together to assist each other in the recollection of the events and to avoid making inconsistent statements. As a practical matter, interviewees can assist each to jog their memories. Nonetheless, group interviews should be avoided, particularly where there maybe a later concern or claim that the evidence was manufactured. Optimally, there should be two interviewers present. One interviewer should take the lead. Interviews conducted alone run the risk to avoid disputes over who said what. Moreover, it is difficult simultaneously to conduct an interview and take effective notes. Nonetheless, many - 27 - clients are unwilling to bear the extra cost of having more than one interviewer. With critical witnesses, the problem sometimes is that too many interviewers wish to be present. More than two interviewers should be avoided, and rarely should there be more than three interviewers. Skill Set of Interviewers - The combination of interviewers should be flexible and depend upon the background, age, gender, seniority and personality of the interviewee as well as the need for continuity among the investigative team. 80:20 Rule - An effective interview, even of the principal subject, ordinarily is more akin to an interview than an interrogation. The interviewee need not like the interviewer, but should at least have respect for the professionalism and preparedness of the investigative team. It essential that the interviewer remember that the purpose of an interview is to acquire knowledge, not disclose it. As a general rule, the interviewee should be talking 80% of the time, and the interviewer only approximately 20%. What To Ask - Naturally, the specific areas of interview depends upon the nature of the allegations. A couple of general points: Determine the interviewee's basis for information. The interviewee does not necessarily have to have personal knowledge, and it is acceptable to obtain hearsay information. The investigative team, however, needs to know upon what basis information is being provided. With respect to events (meetings, telephone calls, etc…) try to obtain the exact date, time, location, other attendees, and subjects discussed. Do not expect the interviewee to have an exact recollection of events that occurred sometime ago. It is the interviewers' obligation to refresh the interviewee's recollection with documents or other information. Avoid disclosing the sources of information received from other interviews. If possible, confirm information by reference to documentation and then refer to the document as a support for the fact. - 28 - Types of Questions - There are several types of interview questions. While they go under different names, the general categories include: Open - Open questions are the most effective for eliciting information because it is difficult to answer them "yes" or "no". One way of ensuring to ask an open question is to begin with the words, "who", "what", "where", "when" , "why" or "how" Illustration: What was the weather yesterday? Closed - Closed or leading questions, in contrast, are designed to be answered only by the words "yes" or "no". Illustration: Was it raining yesterday? Confirmatory - A confirmatory question validates a prior statement or fact. Illustration: It was raining yesterday, correct? Challenging - A challenging statement, in contrast, disputes a factual assertion. Illustration: It wasn't raining yesterday - was it? Restatement - This type of question tends to be used toward the end of interview session and confirms or restates what the witness had previously stated. Illustration: One of the subjects that we discussed was the weather yesterday. You indicated that it was raining yesterday. [Pause to allow interviewee to respond before moving to next topic.] You also indicated that . . . [next topic]. There are several ways of memorializing an interview just as there are several methods for conducting them. The most common and traditional method is for one person to make handwritten contemporaneous notes of the interview. The interview team then follows with a formal memorandum of interview. The original, handwritten contemporaneous notes may or may not be maintained. The investigative team should, however, be consistent. If contemporaneous notes are maintained for one interview, they should be maintained for all interviews. The investigative team will be subject to attack if handwritten notes are preserved only for selected interviews. - 29 - The memorandum of interview should begin with the time, location and list of participants at the interview. The memorandum should note if certain participants join late or leave early. The memorandum should also record any promises, representations or assurances provided to the witness. The memorandum should summarize the themes and subjects discussed during the interview. It is more important for the memorandum to contain a clear summary of the subjects discussed than it is for it to re-state each question and response in the order that it was asked and answered. An interview frequently will raise the same subject more than once during the interview. For example, the interviewer may return to a subject two or three times during the interview both for clarification and to test the consistency of the interviewee's statement. It is clearer if the interview memorandum discusses the subject as a whole rather than in the actual order discussed during the interview. Handwritten notes are preferred over notes keyed into a computer. Keying notes into a computer discourages an informal atmosphere. From the perspective of the interviewee, it appears that a stenographic transcript is being taken. Moreover, interviewers who key rather than write notes by hand are vulnerable to producing poor interview memoranda. Our experience is that keyed notes frequently result in "blow by blow" interview memoranda rather than well thought out discussion of the subjects. The investigative team will need to decide whether to record (voice, video, stenography) the interview. Recording of interviews is not recommended in most instances. Recording discourages the development of a rapport between the interviewer and interviewee. Recording of interviews is recommended when formality is desired or an exact record of what was asked and answered is needed. For example, recording the interview can be useful for foreign speaking interviewees who may later claim that they did not understand the question being asked. Similarly, recording the interview can be useful if the investigative team seeks to impress upon the interview the seriousness and importance of the interview. Absent unusual circumstances, the investigative team should obtain the consent of the interviewee prior to recording the interview. It certain States it is illegal to record an interview without consent. 9.5 The Investigative Report The organization, contents and style of the investigative report will vary from case to case. Some clients and companies will desire no written report. - 30 - Some internal investigations require no more than a short letter or discussion outline. More significant investigations often require lengthy reports including volumes of working papers. Discuss In Advance - Discussions concerning the content and form of the investigative report should be discussed very early in the engagement. Whether a report will be required will affect how the investigation is conducted as well as the budget. Assume That A Report Will Be Required - It is good practice to assume that a report will be required. Companies and clients frequently request a report even when their initial instruction is that no report will be needed. Additionally, anticipating a report provides a good structure for organizing the investigation and ensuring that all necessary investigative steps have been completed and properly documented. Begin Immediately - Many investigators make the mistake of postponing the preparation of the report until the investigation has concluded. They believe that the report cannot be written until all the facts have been determined. Report writing is very time consuming and can take as long as the investigation itself. The investigative team rarely will have the time to delay writing the report until all the facts have been gathered. The preparation of the report gives structure to the investigation. Experience shows that the investigations proceed more efficiently and effectively if the investigative report is written concurrently with the investigation. The report, moreover, will be more thorough. Elements of the Report - Following are various features that the accountant should include in the preparation of the report: Predication for Investigation - Predication refers to the basis upon which an investigation has been initiated. There is no legal requirement that there be a basis to commence an investigation. Nonetheless, it is useful to document the predication if a concern exists that a party will later allege that the company acted maliciously. Assignment and Disclaimers- It is common for an investigative report to begin with a summary of the scope of the assignment. The investigative team should also consider whether any disclaimers are appropriate. Public auditing firms, for example, frequently include the disclaimer that investigation does not constitute an audit conducted in accordance with generally accepted auditing standards, an examination of internal controls, or other attestation or review services in accordance with standards established by the AICPA. The investigative team should also - 31 - consider including disclaimers regarding the confidentiality of the report and the appropriate use that can be made by third parties. Executive Summary - An executive summary of the findings and recommendations often is a very useful, and, in a lengthy report, essential element of the report. List of Acronyms and Abbreviations - It is very useful to have a single list of acronyms and abbreviations at the front or back of the report as an easy reference guide for the reader. Chronology - A detailed chronology of the key events ordinarily should be included either in the body or appendix of the report. Methodology - A detailed summary of the investigative methodology ordinarily should be included either in the body or appendix of the report. Visual Link Analysis - Visual link analysis depicts connections between and among people, entities, bank accounts, etc… A visual link analysis is very useful in cases involving numerous parties or in funds tracing engagements. Virtually any computer graphics presentation software can be used. Statement of Facts - The statement of facts can be separate from or a part of the discussion section. It is useful, however, to have a separate section for the statement of facts in a complex report. The statement of facts is a neutral narrative of the key events uncovered by the investigation. The investigative report should include exhibits to support assertions in the statement of fact. For example, if an assertion in the statement of facts is supported by a document, the investigative report should include as an exhibit a copy of the relevant portion of the document. Similarly, the investigative report should include interview memoranda as exhibits where reliance is made upon the statements of interviewees. Alternatively, the reader should be referred to the working papers containing this information. Discussion - The discussion section usually is organized around the findings or themes. Unlike the statement of facts, the discussion section need not be neutral. Rather, this section can be more akin to a closing statement in a trial and explain why the investigative team has reached its findings and conclusions. Recommendation - The report should include the investigative team's recommendation for additional investigation and remedial changes. - 32 - 10. The Remedial Phase The remedial phase occurs either contemporaneous to or at the conclusion of the fact investigation. The accountant participates to one degree or another in: Quantifying damages Negotiating subject's resignation of employment or disciplinary action Negotiating financial recovery from the subject and other parties Negotiating financial recovery with third party victims Advising on business implications of investigative results Lobbying prosecutors and other law enforcement authorities to file criminal charges against the subject Providing litigation support to counsel in criminal, civil and regulatory proceedings Conducting fraud audits of other business units for vulnerability to similar misconduct Developing controls to deter recurrence Monitoring of future business activities Many of these subjects are discussed elsewhere in the text. 11. Conclusion Internal corporate internal investigation are rewarding and exciting. Accountants serve and will continue to serve major roles in these investigations. But they are not for the faint hearted or amateur sleuth. The accountant joins a multidisciplinary team upon which the client is relying to solve what is often the greatest crisis that a business must overcome. . * Jonny J. Frank and Michael Carey conduct corporate investigations at PricewaterhouseCoopers LLP. Mr. Frank served as the Executive Assistant United States Attorney in the Eastern District of New York and is a member of the law faculties of Brooklyn Law School and Fordham University School of Law, where Mr. Frank co-founded the Fordham University Law School International Criminal Law Center. Michael Carey was an audit partner at Ernst & Young and Assistant Director of the Serious Fraud Office of the United Kingdom. - 33 - 1 See generally, W. Schmidt and J. Frank, Uh-oh, Now What: Responding to Allegations of Corporate Misconduct, Directorship, April 1997. Common external fraud schemes include: (i)kickbacks and Illegal payments, (ii) bid rigging, (iii) defective pricing, (iv) fictitious, false and inflated invoices, (v) product substitution, (vi) mischarging. Common internal fraud schemes include (i) conflicts of interest, kickbacks and illegal payments, (iii) phantom vendors and purchases for personal use, and (iv) unjustified sole source awards. Common sales and marketing schemes include (i)travel expense fraud, (ii) kickbacks and other illegal payments, (iii) foreign corrupt practices act violations, and (iv) conflicts of interest schemes. 4 Common finance and accounting schemes include (i) misappropriation of cash, (ii) payroll fraud, (iii) accounts receivable schemes, (iv) accounts payable schemes, (v) revenue recognition schemes, and (vi) improper treatment of costs and expenses. 5 Common fraud schemes affecting operations include (i) management fraud, (ii) misappropriation of inventory, (iii) misappropriation of intellectual property, (iv) external thefts and frauds and (v) procurement fraud. 6 18 U.S.C. §2511(1)(a) 18 U.S.C. §2510(5)(a) 8 United States v. Murdock, 63 F.3d 1391 (6th Cir. 1995), cert. denied 116 S.Ct. 1672 (1996) 9 18 U.S.C. §2511(2)(d) 10 See, e.g., Cal.Pen.Code §§631, 632 11 O’Bryan v. KTIV Television, 868 F. Supp. 1146 (N.D. Iowa 1994), rev’d in part 64 F.3d 1188 (8th Cir. 1995). 12 Smyth v. Pillsbury Co., 914 F. Supp. 97 (E.D. Pa. 1996)(“We find no privacy interests in [e-mail] communications”); see also, United States v. Simons, 29 F. Supp 2d 324 (E.D. Va. 1998)(Court found that CIA employee had no reasonable expectation of privacy in Internet use nor in files downloaded to his computer hard drive.) 13 See e.g. O’Connor v. Ortega, 480 U.S. 709 (1987)(doctor evidenced privacy interest in office desk and file cabinets by clearly barring others from these areas) 14 29 USC §§2001-2009 15 29 U.S.C. §2006(d)(1) - (d)(4) 16 29 U.S.C. §2007(a) 17 See, e.g. N.J.S.A. 2C;40A-1 18 29 U.S.C. §2005 19 NLRB v. Weingarten, Inc., 420 U.S. 251 (1975) 20 See e.g., Cal.Lab.Code § 2856 (West 1989) 21 The Securities and Exchange Act of 1934 requires the disclosure of “material” facts in certain filings and reports. Counsel should be consulted to determine whether facts discovered during the investigation are material within the meaning of the statute. States and stock exchanges may also impose similar disclosure requirements. 22 United States v. Baez, 732 F.2d 780 (10th Cir. 1984) 23 18 U.S.C. §4; United States v. Hodges, 566 F.2d 674 (9th Cir. 1977) 24 Id. 25 United States Sentencing Guidelines Manual 8C2.5(g) 26 Nexis, the news database of Lexis-Nexis, provides a massive collection of news sources, with extensive archives of national newspapers and business and industry news sources. Nexis has the largest archive of the New York Times, and a growing number of local newspapers. It also offers access to the Bloomberg Newswire, a highly respected and fast growing provider of business news. Its strong content, combined with software that make both searching and reviewing documents quick and simple, makes this a good first source in any investigation. 7 27 In terms of news content, Dialog rivals Nexis in scope. It has various full-text local newspapers not available on Nexis (for example, the Philadelphia Inquirer and the Detroit Free Press) and an extensive collection of industry-specific newsletters (IAC Newsletter database, file 636), unique to - 34 - Dialog. In addition, Dialog, in conjunction with Dow Jones and Financial Times Information, recently added a vast collection of international news sources (World Reporter Database, file 20). 28 International news sources, primarily from Europe, represent Datastar’s greatest strength. Although recently merged with Dialog, many of these European news sources have not yet been included in the Dialog database. These include unique newspapers, newswires and business magazines from Switzerland, Germany, Italy and the Baltic States, among others. Datastar’s search language can be a challenge to use, and requires much practice to master. 29 Dow Jones is the only database, which provides full-text access to the Wall Street Journal, the Dow Jones Newswire and Barrons, essential sources for any business investigation. It also boasts an extensive collection of local newspapers, industry publications, and international news sources. 30 Lexis-Nexis provides bankruptcy filings, state and federal civil lawsuits, tax liens, judgments, UCC filings, corporate records, and property records in most jurisdictions. Lexis-Nexis’ greatest strength in searching public records is its “full text” search feature. For example, if you have a post office box number used by a subject, the number could be searched in Secretary of State records to identify other companies or Dab's associated with the subject that may not turn up through a search of the subject’s name. This type of search cannot be conducted through other database service providers, which limit searches to specific information fields within the database record, such as the name of the company. The Lexis database also contains reported legal decisions at the federal and state levels. Even though most often used by law firms for general legal research, a search in Lexis can also be used to find court cases relevant to an investigation. These opinions often have extensive factual information that may not have been reported in the media. Another feature of the Lexis-Nexis public records library is the "Finder" file, which can be used to locate/identify individuals from over 300 million credit header and telephone records nationwide. Other noteworthy files include the military locator file which allows one to investigate an individual's reported military service; driver license information for 24 states; and the Social Security Death Master File, which can quickly tell you whether your subject is using a social security number that has already been retired. Disciplinary actions and sanctions from various federal and state agencies including the NASD, the SEC, HUD, state real estate regulators and other agencies are covered in the Sanctions file in Lexis-Nexis. Additionally, the FEDSEC library in Lexis-Nexis contains civil lawsuits and administrative proceedings initiated by the SEC. Real property ownership and sale records can be reviewed in a global search that covers the District of Columbia and the majority of counties in every state except Maine. These records, which can be searched by name or address, are often very useful when quickly attempting to identify assets in relation to a bankruptcy or other fraudulent transfers. 31 This database provides bankruptcy filings, civil lawsuits, limited criminal case information, liens, judgments, property records, UCC filings, professional licenses, corporate records, voter registration information and aircraft and vessel ownership records. CDB Infotek includes records from most states in the country, and is particularly strong in California, with its inclusion of criminal cases and municipal court civil cases. The database also has unique regional public record search features, which allow the user to search all available records in specific groups of states. CDB Infotek also has a feature that allows you to locate individuals nationwide; and it has the ability to trace social security numbers. - 35 - 32 This service provides the most extensive coverage of state-level civil lawsuits, covering selected counties in all 50 states, the District of Columbia, Puerto Rico and the US Virgin Islands. The vendor also provides county level records, liens, corporate records, bankruptcy filings, UCC filings, liens, judgments and real property, some of which are not available through any other online sources. It also provides very powerful global search features, which allow the researcher to cover virtually all the public records on the database, nationwide. 33 AutoTrack is one of the best online resources for locating individuals anywhere in the U.S. The national report feature provides the social security number, and month and year of birth for the subject. It also lists all of the business and residential addresses associated to the subject within the last 8-10 years. The report will also include a list of all individuals associated with the addresses listed for the subject, as well as telephone numbers. AutoTrack is particularly strong in Florida and the Eastern region of the U.S. This online service provides critical identifying information on a subject, which then allows the investigator to focus subsequent searches in the appropriate jurisdictions. For example, if the subject is known to reside in New York, but AutoTrack also lists addresses in Colorado and Florida, the investigator will know to look for property, litigation, criminal records, businesses, and other public records in those additional jurisdictions. For both individuals and businesses AutoTrack can quickly identify property ownership information, boat and aircraft registration, DEA controlled substance licenses, firearms and explosives licenses, professional licensing information, motor vehicle records, business affiliations, bankruptcies, liens, judgments, driving records, phone listings, secretary of state filings, and other useful records. AutoTrack, as well as CDB Infotek, maintains a service whereby they will manually retrieve relevant public records if the information is not readily available online. The information is then reported back to the user online, typically within a day or two. 34 Pacer provides access to the U.S. District (criminal and civil) and Bankruptcy courts in 49 states, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands. Unlike federal court records that might be found in other databases, which are limited to case citations, PACER usually provides a complete docket sheet. While PACER recently introduced a nationwide search capability, the search is limited to identifying the court where a case is located. Each court must then be dialed into separately to retrieve relevant court docket sheets. The ability to search the majority of federal court indices across the country in a just a few minutes is an extremely powerful search tool. Remember, however, that each court has a different archiving policy so careful attention should be paid to coverage dates in each district. 35 This service also provides access to U.S. District Court and Bankruptcy cases and, like PACER, provides full docket sheets. Courtlink’s advantage lies in its proprietary software, which allows the researcher to more easily navigate the PACER system. For example, Courtlink allows the user to search combinations of disparate courts simultaneously, a feature not available on PACER. In addition to federal court records, Courtlink provides the most comprehensive access to criminal cases and civil lawsuits in Washington and Oregon, dating back in some instances to the 1970s, as well as limited coverage of civil suits in Texas. 36 This system provides the most comprehensive source of civil litigation, judgments, tax liens, and foreclosures for the Mid-Atlantic region, including New York, New Jersey, Pennsylvania, Maryland, Washington, D.C. and Delaware. Because the database gathers its information from primary sources, it has a high degree of reliability. Superior also offers a very powerful search engine, which returns names that are similar to the user’s search terms that may be relevant. - 36 - The search engine also picks up name synonyms when searching individual names (for example Tom/Thomas; Maggie/Meg). Further, the database includes bankruptcies, UCC filings and corporate records. 37 The SEC's website (www.sec.gov) provides instant access to quarterly, annual, and other reports filed by public companies, as well as the adjudication of any disciplinary matters relating to individuals or public entities. The NASD website (www.nasdr.com) allows one to research the licensing status of any individual or firm broker/dealer, including any potential disciplinary history. The Better Business Bureau website (www.bbb.org) provides access to business and consumer alerts. The Federal Trade Commission website (www.ftc.com) maintains a compilation of news briefs and warnings relating to illegal business practices. Perusing these sites can make the investigator's job much easier as it eliminates having to spend hours on the phone with governmental regulatory agencies. 38 For example, Information America, one of the pioneers in providing public records data, has a website (www.knowx.com) that allows Internet users without a commercial account to search these records and bill the costs to a credit card. The Web product, however, does not offer certain powerful search capabilities available on the proprietary dial-in system, such as a global search across all available public records. 39 The information available includes the names of officers and directors, the date and place of incorporation, type of business, annual sales, and in some cases, limited public records information such as bankruptcies, judgments, liens and UCC filings. There is often biographical information on the officers and directors. Ownership information may also be provided. One important item worth noting, however, is that the basic company information and biographical information is self reported by the company and is not necessarily verified through independent investigation. 40 Finding a witness or a former employee of an adversary in litigation can be critical. Databases such as Autotrak, CDB Infotek, Lexis-Nexis and Metronet are powerful in this area, primarily because of their inclusion of information provided by the credit bureaus, which is not restricted by the federal Fair Credit Reporting Act. Autotrak and CDB Infotek provide access to personal information such as address histories, telephone listings, neighbor listings, social security numbers and dates of birth. Even though access to this information is limited to “qualified” customers, this includes investigators and attorneys. Metronet provides a comprehensive collection of telephone listings, addresses and neighbor information in the United States. A researcher again may be tempted to use the various people locator databases available on the Internet. In our experience, however, these fall considerably short when compared to the commercial offerings. - 37 -