MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

65
1 | Page MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD DETECTION 7.01 Learning Outcomes On successful Completion of this module, students should be able to: i. Discuss the meaning and nature of Forensic Accounting ii. Examine the concept of Fraud and Fraudulent Practices iii. Determine the various investigative methodologies available to Forensic Accountants and Forensic Auditors iv. Deconstruct Money Laundering Schemes and how to counter them v. Evaluate the role of the Forensic Accountant as an expert witness 7.02: Accounting Systems and Fraud Detection In accounting standards, management is responsible for the quality of financial statements and the internal control structure of the establishment. Management is also responsible for adopting good accounting policies and for establishing and maintaining internal control that will initiate, record, process, and report transactions consistent with management’s assertions embodied in the financial statements. There are several write ups on auditor’s role in detection of fraud. ANAN Standard on Auditing (ASA) 3 ‘The Responsibility of Auditor to suspect Fraud’ specifies that the auditor has a responsibility to plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement, whether caused by error or fraud. By this, it is expected that each audit shall follow procedures designed to provide reasonable assurance of detecting illegal acts that would have a direct and material effect on the determination of the financial statement amounts. Sarbanes-Oxley requires that auditors attest to management’s report regarding internal controls and procedure for financial reporting. Remember, fraud schemes could either be fraud by the corporation or fraud against the corporation. Fraud by corporation could be in the form of fraudulent financial reporting schemes: (the fraud could be inclusive, that is, false entries are made in the books or exclusive, that is entries

Transcript of MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

Page 1: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

1 | P a g e

MODULE 7

7.00 FORENSIC ACCOUNTING AND FRAUD DETECTION

7.01 Learning Outcomes

On successful Completion of this module, students should be able to:

i. Discuss the meaning and nature of Forensic Accounting

ii. Examine the concept of Fraud and Fraudulent Practices

iii. Determine the various investigative methodologies available to Forensic Accountants and

Forensic Auditors

iv. Deconstruct Money Laundering Schemes and how to counter them

v. Evaluate the role of the Forensic Accountant as an expert witness

7.02: Accounting Systems and Fraud Detection

In accounting standards, management is responsible for the quality of financial statements and

the internal control structure of the establishment. Management is also responsible for adopting

good accounting policies and for establishing and maintaining internal control that will initiate,

record, process, and report transactions consistent with management’s assertions embodied in

the financial statements.

There are several write ups on auditor’s role in detection of fraud. ANAN Standard on Auditing

(ASA) 3 ‘The Responsibility of Auditor to suspect Fraud’ specifies that the auditor has a

responsibility to plan and perform the audit to obtain reasonable assurance about whether the

financial statements are free of material misstatement, whether caused by error or fraud. By

this, it is expected that each audit shall follow procedures designed to provide reasonable

assurance of detecting illegal acts that would have a direct and material effect on the

determination of the financial statement amounts. Sarbanes-Oxley requires that auditors attest

to management’s report regarding internal controls and procedure for financial reporting.

Remember, fraud schemes could either be fraud by the corporation or fraud against the

corporation. Fraud by corporation could be in the form of fraudulent financial reporting schemes:

(the fraud could be inclusive, that is, false entries are made in the books or exclusive, that is entries

Page 2: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

2 | P a g e

required for a fair presentation of the financial statement are deliberately omitted) and frauds

against the corporation could be in form of misappropriation of assets which is by far the most

common fraud against corporations.

Fraud detection is not easy. Fraud is generally concealed and, in some cases, perpetrated through

collusion. Mostly, the documents pertaining to omitted transactions are removed from the

system. Forged documents are created or legitimate documents are altered to support fake

transactions. Fraud detection techniques may not detect all frauds, but it increases the chances

that misstatements or defalcations will be discovered on timely basis.

Knowing where to look is the first step to fraud detection. Understanding the motive of the

criminal and knowing the vulnerable & porous areas where fraud is most likely to exist based on

the risk assessment; helps direct the investigator on the areas of greatest scrutiny.

Again, knowing the types of transactions that require further review as well as other considered

red flag indicators might alert the investigator to areas that will require closer look. Using specific

detection techniques, observing and inspecting, making enquiry and conducting interviews and

a holistic approach with the mind set of professional skepticism armed with better knowledge of

fraudulent schemes, may make the difference between detecting and not detecting fraud.

The procedures to bear in mind while carrying out the assignment should include

• Having attitude of professional skepticism while performing the assignment

• Consider deceptions like falsification of documents while reviewing the document

• Be quick to recognize potential red flags which are possible indicators of irregularities,

and consider whether further analysis is required. Expand document verification.

Trust but verify.

To recognize early the sign that material misstatement might have occurred is a challenge. But

the following steps will assist the investigator in identifying, evaluating and responding to the

risk of material misstatement due to fraud.

• Holding discussions among the team concerning fraud risks

• Obtaining information relevant to the identification of fraud risks

Page 3: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

3 | P a g e

• Assessing the identified risks, considering the internal control in place to address those

risks

• Responding to the result of the assessment Evaluating audit evidence.

In the event that the investigator believes that misstatements may be result of fraud but that the

misstatement is not material to the financial statement, the investigator should evaluate the

implications, especially if those involved are in managerial position.

An investigators ability to detect fraud may be enhanced by his understanding of the business

and the environment in which it operates. With this knowledge, the auditor may be able to

identify anomalies or potential red flags easily. „It is important to understand the business, the

control procedures in place, the budgeting process, the accounting policies, the industry, and the

general economic climate affecting the company’ Potential Red Flags and Fraud Detection

Techniques. By Will Kenyon & Patricia D. Tilton.

Certain level of risk may exist in financial statement audit. Some examples are the managerial

competence of the top hierarchy, the accounting staff, the effectiveness of the internal control,

the ability of evidence, etc, these uncertainties or risks are inherent risks, control risks or

detection risks.

Assessing the degree of risk present and identifying the areas of highest risk are critical initial

steps in detecting financial statement fraud. The investigator specifically evaluates fraud risk

factors when assessing the degree of risks. He will approach the risks assessment with a high

level of professional skepticism, setting aside any prior belief about management’s integrity.

Knowing the circumstances that can increase the likelihood of fraud as well as other risk factors

should aid in this assessment.

Professional skepticism has several aspects; keeping an open mind, developing a heightened

awareness, making a critical assessment of evidence, and seeking corroboration. The American

Institute of Certified Public Accountants, Statement of Auditing Standards (SAS), 99 postulated

that ‘the auditor should conduct the engagement with a mind-set that recognizes the possibility

that a material misstatement due to fraud could be present, regardless of any past experience

with the entity and regardless of the auditor’s belief about management’s honesty and integrity’

Page 4: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

4 | P a g e

Remember that fraud risk can emerge at any stage of the audit. The inspector should continue

to physically and manually review documents, data and other relevant information including

assets. He should continue to vouch, trace and perform physical observations, as observation

and inspection are standard parts of any audit work program. When performing these checks,

evidential risk factors may be highlighted. SAS 99 paragraph 68 gave such examples among them:

✓ Discrepancies in the accounting records, which may include

• Transactions that are not recorded in a complete or timely manner or improperly

recorded as to amount, accounting period, classification, or entity policy

• Unsupported or unauthorized balances or transactions

• Last minute adjustments that significantly affect financial results.

• Evidence of employee access to systems and records inconsistent with the access

necessary to perform authorized duties.

• Significant un-reconciled differences between control accounts and subsidiary

records or between physical count and the related account balance- that were not

appropriately investigated and corrected on a timely basis.

• Tips or complaints to the auditor about alleged fraud. Especially a ring member that

has been cheated out

✓ Conflicting or missing evidential matter, including;

• Missing documents

• Unavailability of other than photocopied or electronically transmitted documents

when documents in original form are expected to exist

• Significant unexplained items on reconciliations

• Unusual documentary evidence such as hand writing alterations to

documentation or handwritten documentation that is ordinarily electronically

printed.

• Inconsistent, vague, or implausible responses from management or employees

arising from inquiries or analytical procedures.

• Unusual discrepancies between the entities records and confirmation replies

• Missing inventory or physical assets of significant magnitude

Page 5: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

5 | P a g e

• Unavailable or missing electronic evidence inconsistent with the entity’s record

retention practices or policies.

✓ Problematic or unusual events between the auditor and the client, including:

• Denial of access to records, facilities, certain employees, customers, vendors, or

others from who audit evidence might be sought.

• Undue time pressure imposed by management to resolve complex or

contentious issues,

• Complaints by management about the conduct of the audit or management

intimidation of audit team members, particularly in connection with auditor’s

critical assessment of audit evidence or in the resolution of potential

disagreements with management.

• Unusual delays by the entity in providing requested information.

• Unwillingness to facilitate auditor’s access to key electronic files for testing by

means of computer assisted audit techniques.

• Denial of access to key information technology operations staff and facility,

including security, operations and system development personnel.

• Unwillingness to add or revise disclosures in the financial statements to make

them completer and more transparent.

Just few points to mention here when looking at discrepancies in accounting records; the

investigator should ask, is this a fake or forged document; check for its characteristics though

depending on the sophistication of the perpetrator; viz,

Font sizes or types may be inconsistent to the invoice of the vendor or customers bears no

address o Post office address only disclosed in the invoice instead of street address o There are

no invoice numbers for identification of All the invoice numbers from the customer or vendor

are serial, 1,2,3,4,5,6,7 with none skipped; etc

The presence of the above may suggest for further analysis.

But as Will Kenyon and Patricia D. Tilton in their work Potential Red Flags and Fraud Detection

Techniques put it, „The planning, testing and evaluation of audit evidence for indicia of fraud are

likely are unlikely to be successful without professional skepticism, particularly because fraud is

Page 6: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

6 | P a g e

a crime of deceit and because the popularly labeled potential red flags, which may appear by

hindsight as bright-red flags, are more like mere threads in their true contemporaneous context.

Nevertheless, armed with attitude, analytic techniques, an appreciation of the interpretative

challenges presented by fraud risks factors, and the benefit of experience, auditors will

continually improve the detection of fraud that materially misstates financial statements’

7.03 Fraud Auditing and Forensic Accounting

The above terms may not be clearly differentiated easily as the functions seems to overlap, and

the experts are all knowledgeable in the inter-related fields; however, some basic rudiments,

extent of coverage and methods of approach to work could be highlighted to give essence to the

above expert’s definitions.

Fraud auditing involves a specialized approach and methodology to discover and explain fraud.

To discover and trace Evidence of fraud is its primary concern, clear knowledge of the client work

or industry should not be in doubt.

The forensic accountant/ investigative accountant often gets involved when the evidence has

been discovered, or when there is high suspicion of fraud, to further check the extent of

inappropriateness. He is skilled in interviewing process, experienced, trained and knowledgeable

in the different processes of fraud investigation. He prepares reports and provides expert

testimony in courts.

Role of the Forensic Accountant in investigation– In Business and

Financial Reporting, Accounting and Auditing;

To understand the Forensic accountant’s role in deterring, detecting and investigating fraud- as

distinct from the independent auditors’ role as a financial statement examiner- we need to first

recall the differences between what auditors do and what forensic accountants do and why. In

addition, their professional worlds have changed in recent years, in ways that bear close

examination.

Page 7: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

7 | P a g e

According to Steven L. Skalak, the auditors’ concern is that the financial statements of an entity

be stated fairly in all material respects. Accordingly, the auditor’s responsibility is to design and

implement audit procedures of sufficient scope and depth to detect material deficiencies in

financial statements- essentially, without regard to the source or origin of the deficiency.

Auditors are charged with;

i. Making appropriate, reasonable efforts to detect material misstatements in financial

statements, and

ii. Causing management to correct material misstatements or misrepresentations

before the financial statements are shared with the user community or, alternatively,

alerting investors not to place reliance on the statements through qualification of

their professional opinion issued as part of the company’s public filings.

Even this seemingly simple statement of the auditor’s mission brings into play a series of

interrelated and complex concepts, including:

• Reasonable assurance

• Material misstatement

• Detection, as distinct from deterrence and investigation

• Expectations about the efficacy of the auditing process

The Forensic accountant has largely separate set of concerns based on a different role that calls

for different tools, different thought processes, and different attitudes. The forensic accountant’s

concern is not with reaching a general opinion on financial statements taken as a whole, derived

from reasonable efforts within a reasonable materiality boundary. Instead, the forensic

accountant’s concern is, at a much more granular level, with the detailed development of factual

information- derived from both documentary evidence and testimonial evidence. - about the

who, what, when, where, how, and why of a suspect or known impropriety. Sampling and

material concepts are generally not used in determining the scope of forensic accounting

procedures. Instead all relevant evidence is sought and examined.

Based on the investigative findings, the forensic accountant assesses and measures losses or

other forms of damage to the organization and recommends and implements corrective actions,

often including changes in accounting processes and policies and/or personal actions. In

Page 8: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

8 | P a g e

addition, the forensic accounting investigator takes preventive actions to eliminate recurrence

of the problem. The forensic accountant’s findings and recommendations may form the basis of

testimony in litigation proceedings or criminal actions against the perpetrators. They may also

be used in testimony to Government agencies such as the Security and Exchange Commission in

the United States or the Serious Fraud Office in the United Kingdom. Accordingly, the scope of

the investigation and the evidence gathered and documented must be capable of withstanding

challenges that may be brought by adversely affected parties or skeptical regulators.

Similarities between auditing and forensic accounting

Both rely on

• Knowledge of the industry and the company, including its business practices and

processes

• Knowledge of the generally accepted accounting principles of the jurisdiction in question

• Interpretation of business documents and records

• Independent and objectivity- perhaps the most important similarity.

• Both must function effectively in the complex and ever-changing business environment.

• Both are remarkable disciplines and are of immense service to the stakeholders in the

integrity of companies and to management.

However, they have differences namely;

• Financial auditors perform their examinations based on International Standards on

Auditing (ISA) or Generally Acceptable Auditing Standards (GAAS) but forensic accounting

investigators tackle fraudulent accounting reporting and assets misappropriation.

• Financial auditors perform audit procedures in line with assessed risk of material fraud,

forensic accountant usually are involved only when there is heightened concern that

specific irregularity exists.

• Forensic accountant checks for evidence that may assist determine the motive for the

irregularity while financial auditor check the sufficiency of evidence to enable him form

opinion on the financial records.

Page 9: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

9 | P a g e

• Financial auditors render opinion on the whole financial statements audited, but the

forensic auditor usually is not involved in the whole financial statement checks, but on

specific area of transaction or people, to determine whether there are perceived

problems that require further checks.

• The financial auditors’ works stand on its own and for the attention of the stakeholders,

shareholders, regulatory authorities; while the forensic investigation reports serve the

narrow or broad interests of those that engage them.

“Yet forensic accounting investigators are expected to be unbiased and objective about

the entity and the issues being investigated’. The work is used to confirm or exonerate a

suspect situation.

• Forensic accountant should check errors in execution or judgment and deliberate

misstatement, the motive for deviation from the organizations policy, while financial

auditor is focusing on the accuracy, completeness and validity of the financial records

they opine.

• Financial auditors conduct their work in the open and this is known to all personnel, but

some forensic investigations may quietly carry out the investigation and leave, others will

come and turn the system up-side-down, depending on the terms or reference.

• The financial auditors usually complete his work with the issuance of opinion on the

financial statements, but the forensic investigator is a part of larger project to evaluate

allegation. He participates in meetings and activities throughout the investigation and

after.

• The financial auditor sketch the scope of the audit based on risk factors determined after

consideration of certain factors. The forensic accountants have few predetermined

boundaries. The inquiry begins and findings start emerging, the investigation will shape

in line as things unfold.

• Staffing and executing financial audit are most often delegated to other staff. But forensic

investigator works actively throughout the investigation. Always on site to determine the

next action and flow of events. Delegating as few as possible, most senior players are

active; the haul mark being „there is no substitute to experience’.

Page 10: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

10 | P a g e

• Most forensic investigation works are performed in privileged environment, due to

likelihood of related litigation, but the financial auditor does not create work product with

an attorney or report findings to a lawyer.

• The auditors’ report may offer opinion as qualified, unqualified; he may issue a disclaimer

or he may resign if there are restrictions that are not acceptable to him. The forensic

investigator work with sets of scope from the client. He uses knowledge, education, skills,

experience and training in his work. Being a fact finder, he is rarely expected to issue an

opinion.

• When searching for information, the auditor request from clients or other documents

including records and other source documents. They mostly rely on information drawn

from the client’s books, their employees, third party confirmations, test of records

analysis and amount.

The forensic request on the other hands are more of discovery requests from the clients,

and even outside the office to public records, data base, e-mails, and interviews with

other people both within and outside the organization.

• Auditors interviews with personnel are straight forward and counsel often times are not

present. The forensic investigator may explain the purpose of the interview and that the

information is obtained in confidence and the extent of confidence reposed. The counsel

involved with the forensic investigator may be present, while also, the interviewee will

also have his counsel present.

• The auditor’s evidence is to support his opinion, while the forensic investigator, like the

law enforcement obtains and preserve evidence, to maintain a chain of custody, in case

of further process in litigation.

• The auditor usually pens down its opinion and may read orally when required. The

forensic investigator is usually called upon to present findings orally and they may also be

called upon to testify in the course of litigation.

Page 11: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

11 | P a g e

CASE: Belize (Adopted)

Belize (formerly British Honduras) is located next to southern Mexico and Guatemala by the

Caribbean Sea in Central America. English is the official language, but Spanish is also spoken.

Belize has a population of about 266,000. It has a tropical climate and is hot and humid. It is a

democracy that won its independence from England in September 1981. The legal system follows

English law. The Governor General and Prime Minister are appointed by the Queen of England.

The leader of the majority party is usually appointed Prime Minister. The Senate has 12 members

appointed by the Governor General. The House of Representatives is elected by the electorate.

There are 29 members in the House of Representatives who serve 5-years terms. Tourism is the

principal industry, followed by sugarcane, citrus, marine products, and bananas. There are good

communications, internal and external. Belize has automatic systems for direct dialing, faxes,

cellular communication, and e-mail, as well as two Internet service providers. It has both a

seaport and airport. The International Business Company Act provides for privacy. Directors and

shareholders of IBCs can remain anonymous and are not recorded other than companies’

registered offices, which may not be divulged to any authority.

Shares may be issued in bearer shares, and companies may have nominee directors. There are

no restrictions on trade. Bank secrecy is enforced by law, and bank records cannot be made

available to authorities in any jurisdiction. All normal banking services are available. A merchant

can have credit card receipts credited to IBC offshore accounts. In Belize, IBC assets cannot be

touched by any authority. Also, a -trust can be set up for nominal costs and minimal formalities

on short notice. The trust must be irrevocable to qualify as a true asset protection device. There

is no requirement for accounting reports to any agency. Claims, judgments, liens, or bankruptcy

proceedings from any country cannot be imposed upon earnings or assets of irrevocable

discretionary Belize trusts. Another vehicle is the Suisse-Belize International Investment Trust. It

operates in a manner very similar to that of a mutual fund, except with certain provisions. First,

it is private, not public. Second, instead of shares, it issues bearer unit certificates. Since secrecy

is paramount for this money, the certificates are not issued in name, but are the property of the

bearer. This allows for transferability. To safeguard against stolen bearer unit certificate, the

Page 12: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

12 | P a g e

account number and password are required to validate the cashing in of a certificate. The Suisse-

Belize Investment Trust operates under the Trust of Belize, 1992. There are no annual reporting

requirements on this type of offshore international investment trust. To protect the trust, a

standard form must be filled out and notarized declaring that the funds used to purchase the

bearer unit are not from criminal or illegal activities. (Source:

George Manning; FINANCIAL INVESTIGATION & FORENSIC ACCOUNTING; 2nd Edition; CRC Press

Taylor & Francis, Boca Raton, 2005)

The International Business Company Act and Suisse-Belize International Investment Trust

requirements as furniture and as vehicle in Belize appear weak, restrictive and impediment

to financial crime investigation. Discuss

7.04 Investigative methods in Forensic Accounting

There are various evidence-gathering methods in use by forensic experts during

investigations. In most cases, a combination of various evidence-gathering techniques is

required to support a report. Sometimes, the elements of inappropriateness are fraud rather

than oversight. The evidence-gathering techniques are designed to uncover these elements,

forensic experts should be careful to choose the most suitable procedure for the assignment.

The following is lifted from the „Handbook on Fraud Management & Forensic Accounting’

Publication of Association of National Accountants of Nigeria;

• Interviewing: Interviewing is an important evidence-gathering technique. It helps

obtain information, which establishes elements of a crime, provides additional

leads, get cooperation of witnesses and victims, and obtains the economic

motives behind a perpetrator.

• Vulnerability and internal control charts: Vulnerability and internal control charts

help auditor determine the best probabilities where inappropriateness is likely to

occur.

• Document examination: This technique uncovers concealment efforts of

perpetrators by manipulating source documents

Page 13: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

13 | P a g e

• Employee searches: This technique involves examining an employee’s desk,

locker, lunch box, etc. It is important not to violate a person’s constitutional rights

of illegal searches. Searches are legal if conducted in a proper manner and with

adequate notice. If obtained illegally, evidence can be inadmissible in court.

• Invigilation: This technique involves the close supervision of suspects during an

examination period. It can be effective in identifying who commits the fraud and

where the fraud is occurring. It is particularly useful in catching fraud that is

committed by independent suppliers, night watchmen, warehouse supervisors,

purchasing agents, and cashiers. Its drawbacks are high cost and it could cause

low employee morale.

• Observation: Observation is watching, looking, spying, or snooping to gather

evidence. These observations are sometimes recorded on various kinds of media.

This can show how the fraud is being committed.

• Undercover: Undercover operations require an agent or informant. This

technique should be used for major criminal acts, i.e., organized crime activities.

It is important that the operation remain secret. It is also very dangerous for the

undercover agent.

• Specific item: Specific item evidence is locating and identifying specific documents

and projects that show fraud has occurred. This can be with one or more

documents, i.e., altered contract, many cancelled cheques, annual allocation of

fund to never existing projects or white elephant projects.

Evidence gathering approach

There are various accounting and audit programs available for the use of the forensic

accountant, he must identify which to use and when to use them.

Remember the criminal elements will use whatever means including professionals, such as

teams of lawyers and accountants to legitimize their illegal income and to cover up their acts,

such use of professionals requires sophisticated accounting techniques to uncover their

schemes. This, is turn, requires more time, funding and personnel.

Page 14: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

14 | P a g e

Net-Worth Method

These methods are very powerful tools in both civil and criminal cases. They are most

appropriate when the subject’s lifestyle appears to be much higher than known or probable

sources of income. An example would be a person who owns and lives in a mansion in

Asokoro district of Abuja and drives an expensive Hummar jeep, but works at a fast food

restaurant making income close to minimum wage, or is not working at all.

Net worth method was first used in America by Internal Revenue Services in 1931. This

method is appropriate where a taxpayer accumulates vast amounts of assets. It is not useful

where the tax payer has little or no assets and spends his income on lavish living.

When Racketeer Influence Corrupt Organizations (RICO) act came in 1970 the use was

extended to it. This is not strictly an accounting method, but a proof by circumstantial or

indirect evidence. It is an attempt to establish an „opening net worth’ of the subject, which

is defined as assets less liabilities. It proves increases in net worth for each succeeding year

during the period under examination. In RICO, it is used to determine the amount of illegal

income.

Tax net worth theory

Year 1 Year 2 Assets

Assets

Less: Liabilities Less: Liabilities

Equals: Net worth Equals: Net worth

Less: Net worth year 1

Equals: Net worth Increase

Add: Nondeductible expenditure

Less: Nontaxable Income

Equals: Correct taxable Income

Less: Reported Taxable Income

Equals: Unreported Taxable Income

Page 15: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

15 | P a g e

RICO net worth theory

Year 1 Year 2 Assets

Assets

Less: Liabilities Less: Liabilities

Equals: Net worth Equals: Net worth

Less: Net worth year 1

Equals: Net worth Increase

Add: Personal expenses

Equals: Total Income

Less: Legal Income

Equals: Illegal Income

The American Congress, in addition to RICO Act, passed the Continuing Criminal Enterprise

(CCE) Act. This act was passed by Congress to combat drug trafficking. 21 USC 848 defines a

continuing criminal enterprise as “any person, in concert with five or more people, who

occupies a position of organizer and supervisor and who obtains substantial income or

resources”. The alternative is a defendant who derives profits or other proceeds from an

offense may be fined not more than twice the gross profits or other proceeds. The

prosecutors can therefore use the net worth method of proving illegal gains and identifying

assets for forfeiture.

This is therefore used when

i. Target acquires a large amount of assets

ii. Target spends beyond means

iii. Target is a high level drug trafficker where most, if not all, witnesses against him are

drug distributors for him

iv. Illegal income needs to be determined in order to determine the forfeiture amount.

Expenditure method is a derivation of the net worth method, and it has been in use since

1940s. Like the net worth method, the expenditure method is used to determine the amount

of unreported taxable income. This method is appropriate in cases where the tax payer does

Page 16: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

16 | P a g e

not accumulate assets, but spends all his income on lavish living. The expenditure method

was expanded to encompass organized crime figures. This is usually a method of proof by

circumstantial or indirect evidence. It is calculated by total expenditures, less total

nontaxable sources, to arrive at adjusted gross income. Exemptions and deductions are

subtracted to arrive at corrected taxable income. It is then compared with the reported

taxable income to arrive at any unreported taxable income.

Expenditure theory

Total Expenditure

Less: Total nontaxable sources

Equals: Adjusted gross income

Less: Standard deductions

Less: Exemptions

Equals: Correct taxable income

Less: Reported taxable income

Equals: Unreported taxable income

Just like in net worth method, expenditure method is used in RICO and other economic crime

cases. In RICO the basic objective is to determine the amount of illegal income.

The expenditure method is used in RICO when

i. Suspect does not seem to acquire assets

ii. Suspect spends beyond his means, lavish living

iii. Suspect is a high-level kingpin where most, if not all, witnesses against him are

convicted criminals.

iv. Illegal income needs to be determined in order to determine the fine or forfeiture

amount.

Detailed discussion on how to prepare and present the net worth and expenditure methods

in court, is complex and beyond the scope of this paper. Suffice it to say that the forensic

accountant should know when to use which tool.

Page 17: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

17 | P a g e

Tracing

Tracing is an accounting technique which involves the flow of funds. It shows the flow of

funds from bank to bank, entity to entity, person to person, or combination of each. This

technique can be used in organized crime cases or individuals. Its primary purpose is to

identify illegal funds and trace them to the beneficiary in criminal or civil cases.

It should be noted that the sources initially identified are greater than what the end

beneficiary receives. The courts have ruled that the exact amount is not necessary to

establish, but only that the end receiver received funds from an illegal source over an

established period. This technique is very useful in money laundering cases, regardless of the

illegal activity.

E.g. John Doe’s tracing schedule

Bahamas Cayman Barbados

Trans Ltd Trans ltd John Doe

Date item in out in out in out

1/6/02 Cash 2,000,000

30/6/02 Cash 1,000,000

1/7/02 Blue

Lagoon

Residence

110,000

1/10/02 Cash 5,000,000

1/3/03 Cash 10,000,000

31/3/03 TRF

Cayman

2,000,000 2,000,000

31/3/03 TRF

Barbados

2,000,000 2,000,000

Spain Switzerland

Trans Ltd Trans Ltd

Page 18: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

18 | P a g e

in out in out

31/3/03 TRF Spain 1,000,000 1,000,000

31/1/03 TRF

Switzerland

1,000,000 1,000,000

10/1/03 TRF

Switzerland

3,000,000 3,000,000

20/12/03 TRF

Switzerland

to Aruba

2,000,000

Aruba Jamaica

Doe NV John Doe

in Out in out

31/3/03 TRF Aruba 370,000 370,000

4/4/03 TRF

Jamaica

1,000,000 1,000,000

4/4/03 TRF Aruba 100,000 100,000

3/4/03 Boat

rep

air shop

100,000

10/4/03 Montego

Bay

Hotel

20,000

10/4/03 Gulf Oil 500

1/10/03 Cash 8,000,000

20/12/03 TRF

fro

m

2,000,000

Page 19: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

19 | P a g e

Switzerland

Panama

in out

31/3/03 TRF

Panama

500,000 500,000

1/12/03 TRF

Panama

3,500,000 3,500,000

TOTAL 26,000,000 14,480,000

It should be noted that the transfer from the Transshipment Ltd bank account in Switzerland

goes to the Doe NV bank in Aruba. This example shows the subject making another step in

transferring funds before they reach their final destination. Funds can go through many bank

accounts and entities before reaching their final destination.

Cheques spread

This is an accounting method that should be used when the subject uses cheques in account

operation. In forensic accounting situation, the use of cheques spreads is different from the

normal accounting practices. The forensic accountant must have the following information to

perform a cheques spread:

. Date; the date of the cheques must be recorded. The date the cheques cleared the bank in not

necessary. The main purpose is to determine the intent of the subject, which would be the date

the subject wrote the cheques.

. Payee; the name of the payee must be show. This identifies the person or entity that is supposed

to receive the funds.

. Cheque number; the cheque number identifies the instrument that is paying the payee. It is

useful in that it can identify the specific payment made. It shows in numerical order the payments

made to any individual or entity. It serves as a good reference to identify specific transactions.

Page 20: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

20 | P a g e

. Amount; this shows the amount of funds used or given to an individual or entity. This serves as

evidence in showing the cost of a purchase, whether as an asset, expense or reduction in a

liability.

. Bank from; the purpose of this is to show what bank account this expenditure was made from.

The subject could have more than one bank. This identifies which bank account number or a

code that identifies the bank account, which is listed elsewhere.

. Bank to; this should show the bank account where the cheque was deposited, in other words,

the ultimate payee’s bank account. This can show the specific bank account number. This field is

mostly used for payments made to other bank accounts and entities that are controlled by the

subject.

. First endorsement; the first person or entity that endorses the cheque should be shown. It is

possible and sometimes common that the person who the cheque is made payable to is not the

person or entity who receives the cheque. The cheque could be made payable to Timothy

Adamu, but the cheque goes into an account called Dantata Corporation with Timothy Adamu’s

signature. Also, someone who is not Timothy Adamu could cash the cheque. Therefore, the

person or entity that endorses the cheque can be very important.

. Second endorsement; the payee or first person receiving the cheque may give it to a second

person who will endorse the cheque. Attention should be focused upon the second

endorsement. This may be a kickback or diversion of funds. The ultimate receiver of the funds

should be fully identified regarding any relationships with the company or person providing the

funds.

Account; the purpose of this field is to group similar transactions. It can be used to group

transactions for a particular type of expenditure or for a particular purpose.

Note; this field is used to show any memos or notes on the cheque. It also can be used to record

any peculiar item on the cheque, such as different amounts between the figure amount and the

written amount.

First signatory; this field should show the person who is the primary signatory on the cheque.

This can be important in determining who has control over the bank account.

Page 21: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

21 | P a g e

Second signature; this field should show the second person who has cosignatory authority over

the checking account. This person has some degree of control over account.

The forensic accountant or investigator records this on a computer using a database, and then

various printouts can be produced. The above can sort the cheque spread. This will show patterns

of activities. Cheque spread also can offer more leads that will need to be further investigated.

Additionally, they provide data that will be used for the net worth or expenditure schedules.

Deposit spreads

This is an accounting method that should be used when the subject uses cheques in account

operation. The previous one deals with the disbursements from the checking account. This case

is the receipts into the checking account. The use of deposit spreads is different from other

normal accounting practices. The forensic accountant should have the following information in

a deposit spread.

Date; the date of the deposit is recorded here. The date shows the time when the funds are

received by the bank.

Source; the source shows from whom the funds were received. For cash deposits, the source

would not be known unless the subject kept other records to show who paid the funds to the

subject.

Amount; this shows the amount of funds received by the individual or entity. This amount should

show only the deposited item and not the total of all the deposited items in a deposit.

Bank; the purpose here is to show into which bank account the deposit was made. The subject

could have more than one bank account. This can be the specific bank account number or code

that identifies the bank account, which is listed elsewhere.

Account; the purpose of this field is to group similar transactions. It can be used to group

transactions for a particular type of deposit or for a specific purpose.

Reference; this field should list the number of items deposited, usually the cheque number or

draft being deposited.

Number of items; many times, deposits contain more than one deposited item. Each item in the

deposit should be recorded separately. In order to connect all items in the deposit, this field will

give the total items in the deposit. The date will be the same for each item in the deposit.

Page 22: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

22 | P a g e

Note; this field should be used as a memo. The memo can record what was noted on the

deposited item, or it can be used to record strange things about the item.

If the forensic accountant or investigator uses a computer, then various printouts can be

produced. The above field can sort the deposit spread. Sorting deposited items by any of the

above fields will disclose patterns and offer more leads that will need to be investigated. Deposit

spreads provide data that will be used in the net worth or expenditure schedules.

Credit card spreads

If the subject uses credit cards frequently, then credit cards spreads should be used.

Some criminals use stolen credit cards to make purchases, which are later fenced. Other criminals

use credit cards legally. In either case, credit card transactions should be analyzed. They are

critical to show the movement of the subject geographically. The forensic accountant should

prepare a credit card spread using the following fields;

Date; the date should be the date of transactions.

Vendor; the vendor is the company that sold the merchandise or provide the service to the credit

card holder. It may be a valuable witness in trial, especially if the transaction is large.

Credit card number; this field should show the credit card account number or a code that will

identify the specific credit account on a separate listing.

Amount; this field shows the amount of the charge.

Reference number; the reference number should be the charge slip number. This is found on

either the credit card statement or the charge slip

Signer; this should record the person who actually signed the charge slip. There are occasions

where more than one person can sign on a credit card. Sometimes there is no signature, but a

statement stating „on file’. For criminal cases, the on-file slip should be obtained from the vendor

to confirm that the subject signed for the purchase.

Account; the purpose of this field is to group similar transactions. It can be used to group

transactions by either type or purpose.

Note; this field is used to record any unusual characteristics of the transaction.

Access to a computer can be very helpful. The above fields can sort the credit card data. They

will show pattern in transactions and can offer leads that can be followed up. Credit cards

Page 23: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

23 | P a g e

transactions can be useful in showing the subject’s whereabouts overtime if he uses the credit

card a lot. The data on credit card transactions can be used on the net worth and expenditure

methods.

Gross Profit Analysis

An accounting method that is useful in cases of money laundering or skimming operations is

gross profit analysis. The subject will acquire a legitimate business. Normally, this business will

take in cash. In a skimming operation, the subject will withdraw money from the business. The

funds do not reach the business bank account, but are diverted for personal use. In a money

laundering operation, illegal funds are added to legitimate funds and put through the business

bank account.

The amount of funds that are either skimmed out or added in can be determined by finding out

the cost of the merchandise purchased and normal sales price or markup. The following steps

should be used to determine the amount of funds either skimmed out or laundered through the

business.

i. The normal markups or sales prices should be determined. If there is more than one

product with different markups, then each product markup will have to be determined.

ii. Determine the amount of merchandise purchased for each period under investigation.

Product lines should be separated according to the different markup rates.

iii. The markup rates for each product are applied to product costs. This will give the gross

proceeds that should be generated from the sales of the products.

iv. Once the gross sales have been determined for all products for the period, a comparison

is made to the funds deposited into the business bank accounts. If the sales figures are

higher than the bank deposits, then the difference indicates the amount of funds

skimmed out of the business. On the other hand, if the sales figures are lower than the

bank deposits, then this indicates the amount of funds laundered through the business.

Page 24: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

24 | P a g e

Bank Deposit Method

Another indirect method of determining income, whether tax or Racketeer Influenced and

Corrupt Organization (RICO), is the bank deposit method. In tax cases this is referred to as the

bank expenditure method, which more aptly applies.

The tax offices in US have used this method for many years. It is yet to be used in RICO cases,

primarily because it is not common to forensic accountants and fraud examiners. Also it requires

that the subject uses bank accounts to a great extent. This method is very useful for a subject

who operates only one business and the income seems to come from only one source. The

subject’s business is a cash type business where receipts are received in cash.

In this method the subject’s gross receipts are determined by adding total bank deposits,

business expenses paid by cash, capital items purchased in cash, personal expenses paid in cash,

and cash accumulations not deposited in any bank account. This is compared to the subject’s

gross earnings for tax purposes; and this is compared to identify income for RICO purposes. When

this method is employed, each item of income and expense must be examined as to the source

of fund and their subsequent use.

Telephone

The forensic accountant should be aware of telephone calls. Telephone calls will help identify

personal contacts and associates of the subject. Also, they identify one of the subject’s expenses.

If the subject is a heavy telephone user, then this could be a major expenditure. Law enforcement

agents will sometimes use a court-authorized wiretap or pen register. A pen register is a listing

of telephone numbers that are either received or made by the subject. A data base will be

established to identify telephone contacts.

The database should contain at least the following fields:

Date, this is the date the call is received or made.

Caller, this field should identify the person who is making the call. This could be the subject or

another person.

Receiver, this field should identify the person who receives the call. This could be the person or

another person.

Page 25: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

25 | P a g e

Sender number, this field should identify the telephone number of the person making the call.

This could be the subject of another person.

Receiver number, this field should identify the telephone number of the person receiving the

call. This could be the subject or another person.

Time, this field should show the time the call is either received or made.

Length, this field should show the length of the call-in minutes, as a minimum.

Telephone calls usually will not identify assets or expenses, but they can identify leads to assets

or expenses. In situations where database is well established for all telephone subscribers

including GSM, the telephone company can identify telephone subscribers. The subscribers can

later be interviewed regarding their relationships with the subject.

Flowcharts

here are many kinds of flowcharts the forensic accountant of fraud examiner can use. In many

cases, the investigator will probably use many kinds of flowcharts in the same case. The common

ones are;

BOSS CONSIGILIERI

UNDERBOSS

CAPO CAPO CAPO

SOLDIER SOLDIER SOLDIER

ASSOCIATES ASSOCIATES ASSOCIATES

Organization flowchart Source: Financial Investigation & Forensic Accounting . Manning

Page 26: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

26 | P a g e

a. Organizational, this flowchart identifies the chain of command or lines of

authority. In criminal organizations, this is important tool to be used during

the investigation and in court as evidence.

b. Chronological, this is a chronology of events that shows people,

transactions and dates can be very useful. Its primary purpose is to identify a

pattern. Once a pattern is established, the forensic accountant can project

future events. The best tool in this case is to use a calendar showing the

particular events.

c. Matrix, a matrix is a grid that shows relationships between a numbers of

entities. This is most commonly used with telephone numbers and physical

contacts; i.e., meetings.

1 2 3 4 5

6 7 8 9 1

2 8 9 1 2

- - - - - 6 7 8 9 5

4 3 2 1 5

6 7 8 9 1

2 3 4 5 6 TOTAL

162-6462 X 1 3 3 8 15

278-7373 3 X 1 5 8 17

389-8284 5 3 X 2 2 12

491-9195 8 2 6 X 1 17

512-5516 1 8 2 10 X 21

TOTAL 17 14 12 20 19 82

Operational, this flowchart shows the flow of operations. This kind of flow charting is used by

external auditors and various governmental auditors to examine internal control. Its purpose is

to illustrate the flow of documents through various departments within an organization. Internal

Source: Financial investigation and Forensic Accounting. Manning

Page 27: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

27 | P a g e

controls are compromised when an individual or department has too much involvement in the

processing of a receipt of income or payment of an expense.

SALES SHIPPING ACCOUNTS CASH

RECEIPTS RECEIVABLE

The forensic accountant should use as many of these accounting techniques as possible,

regardless of whether they are used in a trial. The cheque and deposits spreads are the basic

tools of any forensic accountant. They are the starting points of an examination and the building

blocks to reach the final summary. The credit card spread is another building block in those cases

where the subject uses them. These accounting techniques also provide leads to other financial

information and establish connections with other people and entities. The subject’s connections

are a key to any fraud case. They are the building blocks for indirect methods, e.g. net worth and

expenditure methods.

Also, remember that the forensic accounting investigator will be concerned with where the

subject gets the money, how much money did he get, what did he do with the money.

CASE STUDY: (TREASON) ALDRICH HAZEN AMES (Adapted from CIA file)

This is a celebrated Forensic Accounting Investigation work on an agent and Russian Spy (KGB).

As you read, you will notice that he left two tracks uncovered through which he was caught. (i)

he called attention to himself by his unexplained wealth and (ii) he left a wide paper trail for the

investigators to follow.

It wasn’t as if Ames was a really good spy. Everyone agreed that he was spectacularly bad, in fact.

He was lazy, drunk, careless, and indiscreet. You would think these character traits would have

caused his undoing long before they did, but these little foibles were evidently not sufficiently

outstanding at the Central Intelligent Agency, where Ames was employed, to arouse any

suspicion.

Page 28: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

28 | P a g e

Over an eight-year period, from 1985 to 1993, Ames received about $2.7 million in cash from the

intelligence service of the Soviet Union KGB. Ames provided information that led to the

unmasking of at least 12 Soviet citizens who were spying for the United States. Most of these

men were executed as a result. Fig. Title

It was this money that should have been Ames downfall. He was incredibly obvious in his

spending of the cash he received from the KGB. He did everything to call attention to himself, he

only omitted to wear; “Hi I am Rick, KGB mole” Ames began spying for KGB in 1985. Although

Ames held positions in CIA with tremendous access to classified material; at one point he headed

the counterintelligence operations against the KGB- and he saw his career approaching a dead

end. He married a Colombian girl, Rosario Casas Dupuy, she had expensive taste, but not much

money. Ames, a civil servant on GS14, had little enough himself and he wanted more.

Ames contacted the Russians and offered secrets they could not obtain anywhere else. The KGB

knew a good thing when they saw it and gladly met Ames demands for money. The Russians paid

their new spy over $3 million in cash. Even though Ames demanded for the money up front the

KGB refused so he was forced to accept large cash payments which he laundered himself.

Page 29: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

29 | P a g e

Ames knew he had to come with some explanations for the tens of thousands of dollars he was

earning and spending and he actually developed several cover-up stories mostly revolving around

his wife’s wealthy background in Colombia. Some of Ames colleagues in CIA in fact knew that

Rosario’s parents are not wealthy, but nobody cared. Ames used this story to explain his purchase

of an upscale home in Arlington, Virginia, for $540,000 in cash. He made similar allusions to

explain the 1992 Jaguar he drove to work every day, again he paid $50,000 in cash for it.

Everything Ames did with his dirty money practically screamed for attention. During an oversea

posting to Rome, he and his wife ran up phone bills of $5,000 per month, mostly for Rosario’s

calls to her family in Colombia. Together Ameses had credit card purchases as high as $30,000

monthly, and they employed a maid at their Arlington home.

Ames made $1.5 million in cash deposits to his bank account, some of which were reported on

Currency Transaction Report (CTR). Other deposits were structured to avoid the reporting

requirement. He had two accounts at Credit Suisse in Zurich, into which he deposited $25,000

per month as much as $950,000 during his tour in Rome. Wire transfers from this account

replenish his account in Virginia.

During an interview in 1993 when he was arrested, Ames acknowledged that he had not handled

the cash very well. It is rather chilling thought, but it is possible that if Ames had implemented a

money laundering plan, he might have continued his double career until retirement. But as it

was, he faced placement problem of converting large amounts of US currency. Although he made

several cash deposits over $10,000 causing CTR to be generated, many of his transactions were

conducted in amounts under reporting threshold. On August 1, 1989, Ames exchanged 28 million

Italian lire to $22,107 which he deposited into his bank account in Virginia. He made previous

deposits of $15,660 and $13,500 into the same account in February 18, 1986 and October 18,

1985 respectively.

FBI agents investigating Ames learned that he had received $150,000 in cash at a meeting with

his KGB handlers in October, 1992 and he had subsequently deposited $86,700 into his bank

account in a series of transactions under $10,000.

Page 30: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

30 | P a g e

As for layering Ames opened two bank accounts at Credit Suisse, a Swiss bank in Zurich. During

his station in Rome, Ames deposited $950,000 in cash. He informed the bank that the funds were

from the liquidation of property his wife’s family owned in Colombia. One of the accounts was

held by Ames as a trustee for his mother-in-law, Cecilia Dupuy de Casas.

There was layering what-so-ever between the KGB money and the purchase of the house in

Arlington, Virginia. Ames paid $540,000 cash and used $99,000 cash for renovation. He created

some documents to say that it was the mother in law that had given Ames the cash he used for

the transaction, on another occasion, he said it was the wife’s uncle in Colombia that bought the

house for Ames as a present for their son, Paul’s birthday.

Integration of the laundered funds was solely based on the „wealthy family’ cover story, which

did not hold up to casual scrutiny by the FBI, although CIA bought it for years. Ames originally

planned to create a dummy corporation in Colombia and place it in her mother-in-laws name,

which could have been used as an explanation for where she had gotten the money she was

supposedly giving him. That would have created an alibi for both the layering and integration

prospective, but Ames was either too lazy or too careless to carry it out.

During investigation of Ames, CIA assigned an untrained investigator to do the background check

on Ames alibi for the money, but the FBI, recognizing the importance of financial evidence,

assigned an accountant to the team that did the investigation. The accountant pinned down that

Ames had opened numerous bank accounts in Virginia and in Switzerland and he made deposits

shortly after each meeting with his Russian handlers, leaving a paper trail a mile wide.

The FBI agents proved the underlying activity; they showed the money was coming from form a

foreign power, namely, Russia. They also showed the activity was the reason for Ames profligate

spending and substantial net worth.

Ultimately Ames was sentences to life in prison for conspiracy, espionage and tax evasion. The

wife got 63 months for conspiracy and tax evasion.

Use the above case to discuss the merits of the financial approach on investigation. What were

the methods used by the investigators? Hence discover: (a) where did he get the money (b) how

Page 31: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

31 | P a g e

much money did he get (c) where is the money going (d) how was the money moving (e) was he

keeping the money or was he a conduit to someone else?

These are all questions a financial approach is intended to answer, and the answer provide

context for the investigation of the underlying criminal activity.

7.05 Theft, Embezzlement, And Money Laundering

Theft, Stealing or Larceny: wrongful taking or carrying away of another person’s property

without his consent and with intension to deprive the owner thereof the property permanently,

(animus furandi). If the intent is to return the item later, there is no larceny. In order to constitute

robbery, either force or fear must be used by the thief.

Skimming /Embezzlement: Diverting business receipts to personal use is skimming. Diverting

funds or receipts of the business by an employee is embezzlement. Cash businesses such as bars,

restaurants, filling stations, etc are susceptible to this crime.

Money laundering: This is the use of money derived from illegal activity by concealing the

identity of the individuals who obtained the money and converting it to assets that appear to

have come from legitimate source. Money laundering is a process to make dirty money appear

clean.

They all fall in the category of white-collar crime as described by Edwin H. Sutherland. The root

cause is greed and a lust for financial gain.

The first two are commonly noticed on virtually every home, office or base activities, and

perpetrators often act with less or no caution. But money laundering activities are mostly quite

technical and could magnify to a complex syndicate.

The main stages typical of money laundering are:

• Placement: this is usually the first phase: Most visible, most vulnerable. The aim is:

• To introduce proceeds into the system without attracting attention -

Disposal of proceeds

The procedures are usually depositing of proceeds in Financial Instruments,

Structuring/smurfing, buying in through travel Agencies, Insurance Policies and Property

Purchase

Page 32: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

32 | P a g e

• Layering: This usually second phase in money laundering and the aim is:

• Separate source from ownership

• Break Audit Trail

The procedures are usually to convert and move funds from small to large notes, Cash

exports, Cash Deposits in Foreign Banks, Complex Wire Transfers, Barter exchanges or

purchase of Antiques, Multiple Deposits, Use of Scattered Accounts, Mutual Funds, resale of

Property

• Integration: this is usually the final stage, (The Victory Stage). The aim is to enjoy the

proceeds of the crime. This is achieved through:

• Set up legitimate business through;

• Investment in other Assets

• Funding of luxurious lifestyle

• Reinvestment in Predicate Crimes

• Loans

• Gifts

• Purchase of luxurious Assets, Real Estate, etc

• Investment in Business Ventures

• Investments in Safe countries

The Main Stages of Money Laundering

Page 33: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

33 | P a g e

Source: United Nations office on Drugs and Crime (2017)

CASE: ORGANIZED CRIME (Adopted)

Japanese Organized Crime (YAKUZA)

It has a membership of over 110,000 in as many as 2,500 associated gangs, the Japanese Yakuza

may be the largest organized criminal group in the world. The Yakuza originated in 16th-17th

century Japan, where feudal lords-maintained stables of Samuria warriors. Stronger national

governments in Japan subsequently made many regional warriors superfluous, and they allied

themselves both with the ruling Shogunate and the dissident villages. Eventually, the vagabond

warriors became known as Yakuza, a gambling term for numbers that are worthless or losers, 8

9 3. The name evolved into an expression for „outlaws’, with a connotation of respect based on

fear. Through the next three centuries, the status of the Yakuza fluctuated, depending on the

strength of the national government.

Immediately after WWII, immense social and economic changes in Japan meant opportunity for

organized crime, particularly in black markets.

The Yakuza prospered adding pornography, narcotics, and systemic racketeering to their illicit

enterprises, while expanding into entertainment, sports, labor unions, and corporate affairs.

Page 34: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

34 | P a g e

Their enforcement tactics become brutal; police and media in Japan referred to Yakuza as

Boryokudan, or violet gang. Many street gangs associated with the Yakuza began to mimic

American outlaw motorcycle gangs The Hippies. Others imitate the dress and style of prohibition-

era gangsters. As interpreted by US moviemakers.

Japanese police designated seven major groups of Yakuza. The largest is Yamaguchi Gumi, with

an estimated membership of 10,000 which has a hierarchical structure resembling that of the

LCN in US. There is a single Kaicho (Chairman) who has advisors without command authority.

Wakato control several deputies, and beneath them are several lieutenants who manage many

numerous soldiers or wakai shu.

The other six major groups, with more elaborate structures, are confederations of smaller gangs

that have combined to increase their power. These alliances controlled criminal activities in

assigned territories. The most powerful and the most important rival of Yamaguchi Gumi is the

alliance known as Sumiyoshi Rengo, with an estimated strength of 8,000 to 15,000 members.

Whatever the internal arrangements of the organization, a Yakuza member’s status is determined

by his efficiency as an earner who passes profits to his higher-ups. The more elevated his position,

the more money he receives from below, although his obligations remain to those still above

him. It is a highly competitive system calculated to maintain pressures for production; Yakuza

members, particularly those in the lower echelons, are encouraged to find new enterprise with

which to satisfy the constant demand from above. Loyalty to superiors is considered paramount.

A Yakuza member who has angered his supervisor may apologize by amputating a finger or finger

joint from his own hand, then presenting it to the offended party as a gesture of sincerity.

The Yakuza groups are active in drug trafficking, primary smuggling amphetamines, from the US

into Japan. They also supply a lucrative Japanese market for firearms, which are strictly regulated

in that nation. A handgun that sells for $100 to $200 here may be worth $1,000 in Japan, and a

single round of ammunition might sell for $12 to $15.

Yakuza enforcers are sometimes used by the boards of large corporations in Japan to keep order

at open stockholders meeting, a practice known as sokaiya. Strong-arm gang members

discourage potentially embarrassing questions by stockholders. Also, the reverse occurs when a

Page 35: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

35 | P a g e

minority faction, perhaps affiliated with Yakuza interests, wishes to intimidate the board or

majority. Physical violence is not uncommon.

In the US, Yakuza has been mainly involved in obtaining contraband for shipment to Japan.

However, recent intelligence has shown that they are involved with factions of the LCN in East

Coast gambling operations catering to wealthy Japanese businessmen. On the West Coast, they

are involved in illegal gambling and prostitution. For at least 20 years, the Yakuza members have

invested illegally earned profits in US businesses. Recently, Yakuza interests have increased in

legitimate businesses, massage parlors, and pornography. Three Yakuza groups the Yamaguchi

Gumi, Sumiyoshi Rengo and Toa Taui Jigyo Kumiai, are currently active in southern California. In

recent years, the Yakuza has bought shares of major corporations and has started the function of

sokaiya, corporation intimidation. Also, the Yakuza has infiltrated legitimate businesses. In so

doing, it has employed business practices that American companies cannot because of fear of

being prosecuted for antitrust violations or illegal business practices. However, the Yakuza have

been getting away with this because prosecutors have not developed their cases to the extent

necessary to obtain a conviction. (Source: George Manning; FINANCIAL INVESTIGATION &

FORENSIC ACCOUNTING; 2nd Edition; CRC Press Taylor & Fraincis Boca Raton, 2005)

Discuss the structure of Yakuza and the methods it uses to launder money.

7.06 FRAUD, BUSINESS AND CORPORATE CRIME

Recently there have been high profile complex frauds involving billions of dollars globally. Since

then the question has always been; where were the auditors? Two major issues have been

highlighted in these recent cases as the major failure to discover fraud, they are; (a) complex

financial transactions and instruments, the stand of senior management, and (b) limitations and

challenges on the information that are provided for internal auditors.

After the collapse of WorldCom in the monumental accounting misdeeds, the bankruptcy

proceedings led to the development of a document known as „Thornburgh report’.

In it are highlighted several potential pitfalls that internal auditors may confront in the course of

their work. Special Investigation Committee of the board of directors of WorldCom also issued a

report on the disaster.

Page 36: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

36 | P a g e

Important conclusions drawn from Thornburgh Report:

• Maintain increased skepticism: this may contribute to discovering potential red flags of

fraud in earlier periods

• Be wary of certain limitations that may hinder internal auditor’s abilities, such as

management direction to focus on operational issues rather than financial matters.

• Real support from senior management, the board and the audit committee is crucial to

being effective

• Evaluate the actual financial statement fraud risk, especially in organizations that may

have an increased risk, due to the complexity and dispersed nature of the company’s

organization and financial operations.

• Strive for adequate annual internal audit planning, if the annual plan is not followed, and

determine whether this is the appropriate course of action.

• Strive for actual and active contact with audit committee rather than relying on others.

The Special Investigation Committee report gave further potential lessons these are:

a. Strive for open communication between employees and the internal audit personnel

b. Focus on substantive interaction between the internal audit personnel and external

auditor.

Mostly, courage is required in certain organizations to continue to probe some „no go areas’.

Sometimes in environment that is not transparent or when there is stiff opposition from the

management, courage may fail.

With proper training, knowledge and experience, the internal audit can have a central role in

directing the compass for fraud detection. Professional skepticism and personal courage may be

needed to establish the truth.

7.07 The Role Of Computers In Forensic Accounting

The roles of computers in forensics are inevitable due to the mass data that are often times

involved. The power of these tool kits lies in the ability to check data efficiently in large scale and

complete it 100%. There is seldom room for random sample tests in forensic as virtually all data

need to be verified. Ordinarily, it would be daunting to check mass data of say, documentary

Page 37: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

37 | P a g e

evidence of over 1,000,000 pages scattered all over and pin them to make forensic findings

report possible, without slips, omissions and errors.

There are many computers assisted audit techniques (CAAT) and forensic tool kits (FTK) in use

available in the market.

These computer aided kits are beneficial in several ways, among them are:

i. They are designed to use commands and procedures that are familiar with manual tests

and verifications. This will enable the user to be used to them with little training.

ii. They document works and results of procedure to enable users create appropriate

working papers of tests and results.

iii. Many of them are compatibles and convertibles into other results needed for further or

other works.

iv. Many of the results are read only generated. This enables the original evidence to be

preserved in its state, thus maintaining integrity.

v. They can work 100% data faster.

vi. The automation of the forensic work makes it faster and quicker to accomplish with great

and enhanced efficiency.

vii. Storage space is reduced on the palms. Example, 60 gigabytes hard drive can hold

equivalent of over 27 million pages

viii. Many of them will give results that are 99.99% guaranteed as correct; example, Signature

and finger/thumb prints analyzers (FTK) imaging 99%. Charred and shred paper FTK, 90%

recovery work guarantee;

These tools could either be customized or generalized tool kits and techniques. They are

generalized when they are purchased off-selves to be used by the organizations; or designed

when they are specifically modeled to suit the client’s peculiar requirements.

The methods of use and the development engineering is beyond this paper, however, suffice to

mentioned that it is only computer that an expert will used to be able to detect computer related

fraud and the critical steps to follow are;

• Outline the objectives of the assignment

• Meet client (data owner) and a programmer

Page 38: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

38 | P a g e

• Obtain data

• Create the input file definition of the software to the toll kit

• Check integrity of imported data

• Fully gain understanding of the data, then

• Analyze the data

7.08 The Forensic Accountant as Expert Witness

Forensic Report and Expert Testimony

a. Forensic Report

Reports are always prepared once the investigation is over. Although the attorney is responsible

for requesting a formal written report, the forensic accountant should ask beforehand whether

a written report will be required and when it’s due. Also, the forensic accountant should be

thinking about how to formulate such report. Using an organized note taking system or tape

recorder into which observations were recorded, during the investigation of the evidence can go

a long way in helping to prepare a report. A typical system in the note recording system may

involve using asterisks or other types of notations to highlight important information to be used

in the written report and opinions.

Before writing the report, the expert should compile all the data gathered during investigation

and review it to determine how the report should be organized.

The forensic accountant should clearly state his opinions regarding information uncovered during

the investigation. The attorney should indicate to the expert the facts required to develop the

burden of proof. The attorney must know and understand what the expert witness will say during

the trial, and the expert must understand how the attorney will use that testimony. It is a good

idea to communicate to the attorney anticipated rebuttals by other experts as well. The forensic

accountants report should be concise and must be based on testimony and research data from

the investigation.

The report should be clear on the following issues;

• State upfront whether the report is preliminary or final

Page 39: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

39 | P a g e

• Identify the formal, educational and practical experiences as well as the information

discovered in data collection that helped form the basis for the opinion

• Refer to specific testimony, documents and objects as reviewed to provide concrete

evidence for the opinions and conclusions expressed in the report. Do not rely on the

work delegated to junior partners, lest the expert be trapped on hearsay rule.

• Always reach a conclusion.

• Always date the report and state the cut-over of information and documents examined.

• State at the end of the report that the forensic accountant is willing to review future

issues and that these would be included in any additional reports requested.

• The reports which should be in the forensic expert’s letter headed paper should include

the expert’s signature and appropriate title. Title can include earned degrees,

professional rank, certifications or business job titles. An attorney may suggest alternative

ways for the forensic accountant to express a conclusion or opinion, but such suggestions

should be limited to elements of style and should not affect the content of the report.

• Detailed all schedules and documents supporting the opinion and conclusion.

Remember, credibility, good name and professional disciplines are all tools of the forensic

accountants practice. Always protect them.

According to Singleton (et al) provides further reading on making other assumptions not

considered by the expert during his investigations or allusions during cross-examination, that

was not earlier considered by the expert, making sure that all notes intended for the trial are

available, the usefulness of knowing other witnesses connected on the trial so that the expert

will not be surprised about other experts testifying or the existence of other reports.

Other pre-testimony activities encompass ensuring that any required graphic displays are ready

and available, that all important discussions with the lawyer have been held as part of the pre-

testimony meetings, and that the expert completely understands the report and all other

relevant issues in the trial, whether accounting related or not.

At pre-testimony meetings, it is often appropriate to discuss the witness’s qualifications again to

assure that they are current, to discuss the strengths and weaknesses of the case, and to discuss

and agree on which part of the expert’s reports, if not all, are to be entered into court as exhibits.

Page 40: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

40 | P a g e

c. Forensic accountant as an expert witness

According to Singleton (et al); „When accountants are called by the prosecution, they generally

testify about their investigative findings. When they were called by defense, they may testify

about the quality of the findings or the opinions expressed by the prosecution’s accounting

expert, in order to create doubt in the minds of jury members about the credibility or weight to

give to the prosecution’s expert’.

Qualifications

Qualifying accountants as technical experts generally is not a difficult task. Questions are posed

to them concerning their professional credentials-education, work experience, licensing or

certification, technical training courses taken, technical books and journal articles written, offices

held in professional associations, and awards and commendations received.

Defense lawyers are not prone to challenge the expertise of accountants, assuming they meet at

least minimum standards of professional competence. The question of whether being a Certified

or Chartered Accountant is sufficient to qualify one as an expert often arises. Generally, persons

may be experts in their particular field of expertise if they have sufficient experience and are

members of their associations or institutes. This situation does not mean that Certified/

Chartered accountants are automatically experts. To be considered an expert, it is helpful to have

prior experience with litigation or criminal matters. This qualification is primarily a result of the

knowledge and skills that are gained during testifying experience.

Further, it is often beneficial to have been accepted as an expert in other matters, thereby easing

current acceptance.

Often, the counsel introducing the witness will read the experts qualifications or ask specific

questions of the witness to establish his credentials. On occasion, the qualifications of the expert

witness are read directly into the court record.

Although the expert’s qualifications are not often contested, it is a distinct possibility. Over and

above being accepted by both parties, it is most important that the expert witness be accepted

by the court.

Page 41: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

41 | P a g e

Being a Credible Witness

To be a good witness, there are things that you should do or observe:

i. Speak up so that the judge, stenographer, opposing counsel, and all other parties

in the case can hear you,

ii. Define technical terms and put them in simple language so that the jury, judge,

and counsel can understand them. Express yourself well, using simple technical

language that the jury, judge, and attorneys can understand.

iii. In testifying, refer to the exhibit number or some other identification. When

indicating or pointing to an object in the exhibit, you should describe what you are

referring to so that the court stenographer can make an accurate and complete record

of your testimony.

iv. Take enough time in answering questions to gather your thoughts and give an

accurate and brief answer. If you are asked to give an opinion and feel that you do

not have enough facts of enough time to form an intelligent expert opinion, so inform

the court. The court is impressed with such frankness on the part of the witness.

v. Always have adequate notes available so that you can testify regarding all of the

details.

vi. Walk to the witness stand with even steps.

vii. When taking the oath, hold your right hand high with fingers straight and look at

the officer administering the oath. You repeat after him so that all the courtroom can

hear. Do not act timid.

viii. Think before you speak.

ix. When one of the counsels’ calls „objection’ or the court interrupts, stop your

answer immediately and wait until the court gives its ruling.

x. Be fair and frank

xi. If you make a mistake, or slight contradiction, admit it and correct it. Do not tie

yourself up in knots trying to cover up some slip of speech or memory.

xii. Keep your temper, be firm, but flexible.

xiii. If you cannot answer „yes’ or „no’, say so.

Page 42: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

42 | P a g e

xiv. If you do not know or cannot remember, say so.

xv. Avoid mannerism of speech.

xvi. “Do you want this court to understand……?” Listen closely to this question. If you

do not want the court to understand it that way, make clear what you want the court

to understand.

xvii. Never try to be a „smart’ witness.

xviii. Be brief, just answer the question and stop.

xix. During the recess, do not carry on any conversation with other witnesses or

parties to the controversy. You should stand aloof from everyone except the

attorney who retains you to testify.

xx. Wait until the entire question is asked before answering.

xxi. On cross-examination, do not look at your attorney.

xxii. Keep your hands away from your mouth or face.

xxiii. Be serious and business-like during recesses and on the witness stand.

xxiv. Stay away from opposing counsel, the defendant or plaintiff, and his or her

witnesses.

xxv. Be available and answer promptly when called to testify.

xxvi. Do not stare off into the space or at the floor or ceiling.

xxvii. Be friendly to all sides.

xxviii. Do not raise your voice in anger if the opponent’s lawyer tries to bait you.

xxix. Be honest. Do not invent. Do not inflate. Do not evade.

xxx. Dress conservatively.

xxxi. Have neatly combed hair and newly shined shoes.

xxxii. Use graphs, charts, and other visual aids if they will help to clarify a point.

xxxiii. Do not read from notes if it can be avoided. (if the expert does read from notes, the

opposition lawyer will probably demand to see them, and the expert will appear to

have rehearsed his testimony.)

xxxiv. If you have documents to introduce, have them organized so that they can be

retrieved quickly when asked to do so by the counsel for whose side you are testifying.

Page 43: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

43 | P a g e

Forensic/ expert witness should not do the following,

i. Don’t discuss the case in the corridors.

ii. Don’t chew gum on witness stand.

iii. Don’t memorize any of your testimony.

iv. Don’t nod or shake your head to indicate „yes’ or „no’.

v. Don’t make any public display of elation or disappointment over the outcome of the case

after the verdict has been rendered.

vi. Don’t volunteer any information.

vii. Don’t show any emotion about proceedings, such as disbelief or astonishment.

viii. Don’t allow yourself to get cut in the trap of the opposing counsel asking you to answer

a question by his „yes’ or „no’; some questions cannot be answered this way, and you

should state so to the court and ask for permission to explain your answer.

ix. Don’t get caught by snares such as “Did you ever discuss this with anyone?” Of course,

you did, and if asked, name the people, the lawyers, and the parties to the suit.

x. Avoid horseplay in corridors, don’t be noisy.

Cross-examination will be your most difficult time on the witness stand. Opposing counsel

will attempt to confuse you, discredit you, and destroy the value of your testimony.

Singleton (et al) give the following guide to experts during direct examination and cross-

examination; Judges often base their assessment of expert witnesses at least in part on how the

witnesses look. Therefore, it is important that witnesses be well groomed and neatly dressed. In

the case of an accountant, a dark suit is the expected image. This appearance may enhance the

image to psychological advantage. In the witness box, the witness should maintain a poised, alert

appearance, stand still, and be ready to take the oath. It is important to control the hands, avoid

fidgeting and maintain eye contact with the questioner.

As the judge will be taking notes, the witness should speak slowly enough to ensure that the

judge does not fall behind. The voice should be strong and directed to the questioner. The

witness should enunciate clearly.

Page 44: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

44 | P a g e

Several things should be avoided in giving evidence. These range from drinking alcohol

immediately before testifying or chewing bubble gum while giving evidence, to small physical

mannerism, that may affect one’s appearance.

These physical mannerisms, which might be as simple as rubbing the hands together continually,

looking down at one’s hands, continually moving in the stand, or jingling coins in a pocket, could

quickly become irritating to the judge.

Qualification and admissibility of accounting evidence

Singleton (et al) suggested that documentary accounting evidence may be presented in a court

of law in two forms: (a) primary, including original, individual accounting documents obtained

from the parties concerned or other sources, and (b) secondary, including summaries and

schedules based on the original documents. An accountant produces these secondary

documents based on an examination of the primary evidence.

Direct Examination

The purpose of direct examination is to enable counsel for the side the expert represents to draw

out the financial evidence to prove the case. Most likely, this examination will be only a

reiteration of what has been discussed previously with counsel outside the courtroom. It is still

very important, however, for the expert to refresh his memory by reference to anything he may

have read, written, or given in evidence on the case beforehand.

Direct examination is the most organized aspect of the trial; it is the stage in which the expert’s

credibility must be established with the judge. According to the concept of the primary memory

feature, people remember best what they hear first and last. This fact is often a useful idea to

employ in giving or structuring evidence.

It is necessary to be honest in answering questions. Less obvious, however, is the need to avoid

bias and prejudice when answering. The answers to all questions should be clear and concise,

and when complex terms are used, they should be clarified. Use of notes should be limited as

much as possible in order to maintain eye contact with both the judge and the rest of the court.

Accounting schedules should be described accurately and succinctly in layperson’s terms.

Schedules are by their nature concise documents and should be described in that manner. If

Page 45: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

45 | P a g e

opinions are given, they should be given with conviction once the appropriate ground work has

been laid.

Cross-Examination

Cross-examination is truly the highlight of the adversarial court system; it is geared to allow

counsel either to clarify or to make points at the witness’s expense.

The goals of the opposing counsel during cross-examination are three-fold. The first is to diminish

the importance of the expert testimony just presented. The second might be to have the expert

testify in support of the opposing position by providing a series of assumptions. The third is to

attack the opinion itself or to show the inadequacies of the expert work in arriving at his opinion,

thereby discrediting the opinion, the report and the witness in the eyes of the court.

The basic rules for the forensic accountant are to truthfully testify in court. His or her demeanor

should reflect professionalism. Fostering cooperation with the attorney can be greatly beneficial.

Communication between the attorney and other experts can enlighten you, as well as those

around you, on the case. The expert should expect to work long hours during the trial. Most of

the work is done outside the courtroom not in it. The expert may not go on trial on the case for

many months or years after they have worked the case. In those instances, the expert must

familiarize themselves with the case once it comes up.

CASE: CHARLES (CARLOS) PONZI

He arrived by boat in the United States in 1903. He sailed with a few hundred dollars to his name.

He gambled during the voyage and had two dollars and fifty cents left when he arrived. At first

he did not speak English, but quickly picked it up while working a variety of menial jobs. He

worked as a dishwasher for a while and was promoted to waiter. He was later fired for cheating

customers and gambling.

In 1907, Ponzi moved to Montreal, Canada, and worked as an assistant teller in the Banco Zarossi.

This bank was started by Luigi Zarossi to accommodate the growing number of Italian immigrant

arriving Montreal. At the time, banks were paying two to three percent interest on deposits.

Zarossi began paying six percent and his bank was growing rapidly.

Page 46: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

46 | P a g e

The high interest rate and a series of bad real estate loans put the bank in serious financial

trouble. Ponzi was finding a way to go back to the United States. He found out about the banks

problems and forged a customer’s check for $423.58. His large expenditures after the forgery

drew the attention of the authorities. When confronted by the police, he held out his hands in

the gesture of being ready to be handcuffed and said “I’m guilty”.

Ponzi spent three years in a Quebec prison for his crime. He was released in 1911 and returned

to the United States. He became involved in an immigrant smuggling scheme, was caught, and

spent another two years in prison in Atlanta, Georgia. When released, he eventually returned to

Boston, Massachusetts. He met an Italian girl, Rose Gnecco. She was captured by his charming

ways, and they were married in 1918. He continued to work at a variety of jobs. After several

months, he came up with the idea of compiling a trader’s guild directory of companies. He was

unable to make the venture work, and his first attempt at business failed.

A few weeks passed when Ponzi received a letter from a company in Spain inquiring about the

directory. Contained in the directory was a postal reply coupon. Ponzi had never seen one before

and researched the coupon. The postal reply coupon was a form of including a return envelope

with postage paid, for foreign mailings. As an example, a person in the United States could

purchase the coupon and include in a letter mailed to Europe. The coupon could then be

redeemed in Europe for their stamps to cover postage for the reply.

The rates for the coupons were originally set during the international postal union agreement in

1907. This established a set rate of exchange on postage for international mailings. The cost of

the coupons was equivalent between the currencies of the different countries. You are able to

buy the coupon at the original 1907 rate and exchange it for stamps at that rate.

After WW1, several foreign currencies were highly devalued, but the exchange rate has not

changed. Ponzi noticed that he could purchase the coupon for about a penny (US) in Europe and

cash it in the United States for about 6 cents. His first step was to exchange American currency

for a foreign currency at a good rate.

His agents in the foreign would purchase the coupons where the currencies were devalued and

send it back to Ponzi, who would then cash in the coupons. Ponzi claimed to be making an

investment return, after cost and expenses, of more than 400%.

Page 47: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

47 | P a g e

Ponzi began recruiting friends and associates to invest in his new venture. He offered a 50%

return in 90 days. Quickly he reduced the time for the return to 45 days. He explained that the

coupon redemption plan made these profits easy. He began the Security Exchange Company as

his business. Ponzi was a good salesman. He obtained his first investors and paid them off as

promised. As the word spread, his business grew and grew. He hired employees and paid them

commissions on the investments they brought in. By February of 1920, Ponzi had deposited

$5,290.00 in profits.

The following month he had increased the profit to about $30,000.00, and people were lined up

to invest. He sent agents out to other parts of New England. His persuasive sales pitch and the

huge profits offered gave him thousands of investors. By May, he had several hundred thousand

dollars. He deposited a lot of the money in the Hanover Trust Bank in hopes of becoming its

president. He did manage to gain a controlling interest in the bank.

By July, Ponzi had more than two million dollars. Most of his investors were so confident that

they rolled over their investment with interest, as the investments matured. Ponzi began a life

style of wealth. He purchased a huge home, brought his mother to America from Italy on a first

class passenger ocean liner, and became a local hero in the Italian community.

Although money continued to come in, his expense and lifestyle drained more than was being

received. A law suit was filed for prior debts. Although unsuccessful, the suit caused doubts and

fears in the investors. Soon there was run on the Security Exchange Company. Ponzi calmly paid

the investors that wanted out and the run ended. Business went back on the upswing after good

publicity and he was again bringing in thousands of dollars a month.

Curiosity and possibly envy drove the newspaper to assign an investigative reporter, and the

Commonwealth of Massachusetts began an investigation. He appeared to be cooperating with

the investigation and was able to delay their efforts. Ponzi had no real records of his financial

transactions.

Near the end of July, the newspaper began a series of articles questioning Ponzi’s investment

scheme, and was able to get Clarence Barron, a financial analyst and publisher of Barron’s

financial paper to look into the scheme. Barron noted that, although Ponzi promised phenomenal

Page 48: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

48 | P a g e

returns, he did not invest any of his money into the scheme. It was estimated that 160 million

coupons would be needed for the scheme and only about 30 thousand were in circulation.

The stories caused another panic for the investors, another run on the Security Exchange

occurred. He began paying off investors again and tried to reassure them of their investments.

Many believed him and left their money in. The newspaper reported on Ponzi’s prior criminal

record, and in August he was arrested on 86 counts of mail fraud. Many of the investors refused

to believe his guilt, either from blind faith or the inability to accept their own foolishness.

On November 30, 1920, Ponzi pleaded guilty to mail fraud and was sentenced to five years in

prison. He was released after three and a half years to face the States charges that were pending.

He was found guilty and sentenced to nine more years. Ponzi was released on parole in 1934 and

immediately deported to Italy.

(Source: George Pasco; Criminal Financial Investigations, the Use of Forensic Accounting

Techniques and Indirect

Methods of Proof; as adopted from Zuckoff, Mitchell; Ponzi’s scheme: The true story of a financial

legend, Random House:

New York, 2005)

Advance-fee-fraud (419) classical example: (Adopted)

The trial of suspected fraudster, Fred Ajudua in a Lagos court is a child’s play compared to the

mind boggling revelations in a London court about how a group of Nigerian fraudsters, in

collaboration with some Asians, looted a Brazilian bank of $242 million, into liquidation.

Here is the full story of how the biggest 419 deal in the world was clinically executed, with funds

moving across five continents. Chief Emmanuel Nwude-Odinigwe cuts no figure of a con man.

Creation mounts on his proportionately sculpted frame a cherubic face that would ease his path

into the office of a bishop, if he so desires. But Nwude has no such desire. Underlining that

innocent visage is a manipulative mind that directs Nwude’s energy into thoughts most

unchristian.

In 1994, the mind set to work on a bank heist that would put his name on the front seat of the

Advance Fee Fraud practice, popularly known as 419. By 1998 when he, together with his

Page 49: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

49 | P a g e

coconspirators, was done with Banco Noreste SA of Brazil, the victim bank had been swindled of

$242 million (about N33 billion). As advance fee frauds go, this took the cake and it put, as it

seemed, Nwude and his fellow fraudsters on easy street for life.

But not quite! At home, there has been no respite for Nwude since.

The NEWS, in its 8 October 2001 edition, exclusively broke the story of the scam. The story

detailed how Nwude and Ikechukwu Anajemba, now late, sold a dummy of a contract to Nelson

Sakaguchi, a top official of Banco Noroeste in charge of all its international areas. Sakaguchi was

made to believe he would benefit from a $187 million Ministry of Aviation contract which had an

overriding interest of $13.4 million. To benefit from the contract, he was told, he would need to

facilitate its execution by contributing financially.

Sakaguchi swallowed the bait and began pumping in Noroestes money, without approval from

his superior officers, into accounts designated by the conmen.

Through tales that the contract money was ready for payment and supported by fake letters

purported to have emanated from the office of the then governor of the Central Bank of Nigeria,

CBN, Chief Paul Ogwuma, Nwude and his fellow collaborators urged Sakaguchi on for more funds

and, in the process, fleeced Banco Noroeste extensively.

The huge sum involved in the Banco Noroeste saga, countless reports of similar frauds and the

dirty image they gave Nigeria, eventually spurred the President Olusegun Obasanjo

administration into taking decisive action to cage the conmen. There has also been pressure from

the American government on the president to stamp out the advance fee fraud syndrome.

Consequent upon all these, Obasanjo established an elite body, the Economic and Financial

Crimes Commission (EFCC), then headed by an assistant commissioner of police, Mr. Nuhu

Ribadu, to arrest the fraudsters for prosecution. The Commission immediately arrested

suspected fraudsters like Nwude, Adedeji Alumile a.k.a. Ade Bendel and Fred Ajudua. Amaka

Anajemba, wife of the late Ikechukwu Anajemba and sole beneficiary of the vast proceeds of his

419 loot was initially at large, far from the dragnet of the EFCC operatives.

Overseas, there was no respite for Nwude and Amaka. The American and British governments

seized some of their real properties in those countries believed to have been purchased from the

Page 50: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

50 | P a g e

proceeds of the Bank Noreste fraud. In London, they were being hunted by a High Court for

prosecution. Nwude, Amaka and 40 other defendants were in March, 1999 dragged to the court

by Luiz Vicente Mattos Junior, a major shareholder in Banco Noroeste, as well as by some other

majority shareholders who have been saddled with the responsibility of recovering the

outstanding $190 million that Nwude and his co-travelers in the mind-boggling scam allegedly

hauled from the bank. The remaining $50 million has been impounded from the gang in terms of

cash and assets.

The particulars of claim No HCO100699, exclusively in possession of TheNEWS, and filed by the

claimant’s lawyer, Peters & Peters of 2 Harewood Place, Hanover Square, London, have further

thrown up details of how the fraud was perpetrated, who got what and who played which role.

The fraud in the bank was uncovered in early 1998 when Mattos Junior and other majority

shareholders who held 95 per cent of Banco Noroestes shares agreed to sell off their

shareholding to Banco Santander Brazil SA, a subsidiary of Banco Santander of Spain, for over

$500 million. Prior to the conclusion of a formal agreement on the sale, the president-designate

of the proposed Santander Noroeste Group, Mr. Antonio Horta, discovered some discrepancies

in the balance sheets for offshore deposits of foreign currency. The operations of the office were

directly under Sakaguchis control. On the discrepancy, Horta demanded an explanation from one

of the banks two managers of operation and control, Mr. Jayme Margues de Souza.

The manager, in turn, requested the banks accounting manager, Mr. Pedro de Carvallo, to

investigate the discrepancies. The investigation, conducted while Sakaguchi was on vacation,

revealed how he facilitated the fraudulent misappropriation of a sum of $242 million. When he

was questioned by Margues on 11 February 1998 on this discovery, Sakaguchi merely admitted

he lost between $9 million and $12 million of the banks money by acting as a "trader." This

development led to a full-scale audit of the transaction done by Sakaguchi.

The audit was carried out by the banks audit department and its external auditors,

PricewaterhouseCoopers. But before the audit report was submitted, Mattos, Margues and other

executive officers from its internal audit and legal departments held a meeting with Sakaguchi

on 11 February 1998. At the meeting, the troubled banker admitted that he had "invested" Banco

Noroestes money in the construction of an airport in Nigeria although he refused to state the

Page 51: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

51 | P a g e

exact amount. But he argued before his interviewers that the investment was profitable and

would certainly deliver huge returns for the bank. He also admitted he made payments to a mee

de santo, which means a voodoo priestess, apparently for spiritual assistance on the deal he

entered into with Nwude and his collaborators.

On 12 February 1998, the preliminary report of the audit revealed the bank had been duped by

the fraudsters to the tune of $242.53 million. Sakaguchi failed to explain how the huge loss was

incurred. Under pressure, he only tendered photocopies of a number of documents, many of

which were written or signed by him. But the documents were not convincing, as they did not

explain how the money was used, the purpose of the payments and the beneficiaries.

The banks investigators have, however, been able to unravel how the fraud was perpetrated and

who its direct and secondary beneficiaries were. The funds were transferred principally through

the SWIFT electronic system.

Under this system, between early 1995 and January 1998, a total of about $242 million belonging

to Banco Noroeste was remitted from the dollar accounts in its Cayman branch in British West

Indies to persons and entities who had no proper relationship or no relationship at all with the

bank.

These persons and entities included Nwude, Anajemba, Amaka, some Indians and a string of

companies they registered mainly for the laundering of the ill-gotten money.

The script had well been rehearsed by the principal characters in the scam before Sakaguchi

visited Nigeria on a business trip in 1994. On that visit, he was introduced to a group of Nigerians

by another Nigerian, Dr. Hakim Ukeh, whom he believed was a reliable friend. Ukeh introduced

Sakaguchi to the "Deputy Governor” of the CBN in charge of foreign operations, Alhaji Mahey

Rasheed", and the "CBN Governor”, “Chief Paul Ogwuma."

But those the Brazilian met were not the real CBN officials. Anajemba posed as Rasheed while

Nwude posed as the CBN governor. Sakaguchi was also made to meet with another impostor,

Amaka, wife of Ikechukwu Anajemba, who presented herself as another CBN bigwig, a fictitious

Mrs. Agbakoba.

Page 52: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

52 | P a g e

Since Sakaguchi got sucked into the vortex of the illegal scheme, he became inextricably involved.

From the first payment he facilitated out of the Cayman branch in 1995, Sakaguchi intensified

the SWIFT transfers through the SWIFT system. None of the payments (transfers) reflected any

proper or actual transaction, was not authorized by the relevant officers of the bank nor was

made with the authority or knowledge of the officers of the bank, other than Sakaguchi. All of

the SWIFT transfers were disguised by false accounting entries and not entered in the banks

accounting.

In the particulars of claims before the London High Court, the claimants allege that the

defendants and Chief Anajemba, "conspired, with intent to injure the Bank, to use unlawful

means to defraud the Bank and to launder or conceal the monies fraudulently misappropriated

from the Bank".

The conspiracy defendants and Chief Anajemba were alleged to have colluded with Nelson

Sakaguchi, Naresh Anani, Shamdas Nathumal Asnani, Ishwari Asnani (wife of Shamdas), Sherina

(Hong Kong) Limited, Christian Nwude (younger brother of Emmanuel Nwude), Rosemary

Iloenyosi (younger sister of Emmanuel Nwude), Chief Festus Okonkwo, Mamelec Trading Pte Ltd

of Singapore, Doulatram and Sons (Hong Kong) Limited. The conspiracy, according to the

claimants, "consisted of an agreement, combination, arrangement, understanding or concert, or

one or more connected agreements..." to use "fraudulent representations and or other

fraudulent means to obtain payments of monies from and belonging to the Bank, to which none

of the parties to the conspiracy was entitled" and to "launder and conceal the monies

fraudulently misappropriated from the Bank." The claimants say they have been able to trace the

transfers to the defendants. They also listed some Nigerian banks involved in the interchange of

the funds, and the account numbers of the transactions.

The first defendant on the list, Macdaniels, was incorporated in England on 2 December 1994.

Chief Ezeugo Nwandu, the second defendant, signed the company’s accounts for the years ended

31 December 1997 and 1998 as its director. He is also a broker and the chief executive officer of

the General Securities & Financial Company Limited, Nigeria. Macdaniels has a US dollar account

(number 66814466) and a pound’s sterling account (number 909044440) at Barclays Bank plc,

Page 53: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

53 | P a g e

London. The claimants allege that a total of $8,050,000 in misappropriated funds was transferred

directly from Banco Noroeste to Macdaniels US dollar account.

The fifth defendant, Dax Petroleum Nigeria Limited, Dax PN, is a company registered in Nigeria

under company number 295887, of which the late Anajemba and his wife, the third defendant,

were directors throughout the period of the misappropriation of funds from Banco Noroeste.

Anajemba died on 5 October 1998, after which his wife became the Chief Executive Officer of

Dax PN and sole signatory of its bank accounts. Dax PN received N386, 456,248 (converted at the

rate of exchange then to approximately $4,628,218) from the money remitted from Banco

Noroeste to Macdaniels by means of a series of bankers’ drafts written to Dax PN on the Nigerian

bank accounts of the first defendant or its associated Nigerian companies, Macdaniels Limited

and General Securities.

Thus, the claimants "claim against Dax PN and/or the estate of Anajemba and/or against the third

defendant personally, in her capacity as director at the material times of Dax PN, as recipients of

$4,628,218 of misappropriated funds, by way of secondary or third level transfers.

The sixth defendant, Primole Communications Limited, is a company registered in Nigeria under

company number 296171, of which Anajemba and his wife, Amaka, were directors throughout

the period of the alleged misappropriation of funds from Banco Noroeste. Primole was said to

have received secondary transfers from the Brazilian bank to the tune of $24,005,309.

Furthermore, it received N84, 790,000 (converted at the rate of exchange then to approximately

$1,015,449 of the misappropriated funds) in secondary or third-level transfers from the money

remitted by Banco Noroeste to Macdaniels on the Nigerian bank accounts of the first defendant

or its associated Nigerian companies, Macdaniels Limited and General Securities.

Thus, the claimants "claim against Primole and/or the estate of Chief Anajemba and/or against

the third defendant personally, in her capacity as director at the material times of Primole, as

recipients of $25,020,757 of misappropriated funds.

Fynbaz Nigeria Limited, the seventh defendant, is registered in Nigeria, with Anajemba and his

wife as its directors throughout the period of the misappropriation of funds from Banco

Noroeste. After the death of Anajemba, Amaka became its chief executive officer and sole

signatory of its bank accounts. The SWIFT transfer instructions to the account of Fynbaz at

Page 54: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

54 | P a g e

Hillcrest Merchant Bank Ltd in Geneva (no. PO1501871) indicate that Fynbaz received $4.35

million primary transfers of misappropriated funds into its Swiss bank account. Other SWIFT

transfer instructions also indicate that Fynbaz received $3.025 million primary transfers of

misappropriated funds into various English bank accounts. Other SWIFT transfer instructions

indicate that Fynbaz sent $5.7 million primary transfers of misappropriated funds into various

Nigerian bank accounts.

On 19 January 1996, Union Trust Building Society is mentioned in the court document to have

paid $1 million to an account at HSBC by order of Fynbaz.

The claimants are accordingly claiming against Fynbaz, the estate of the late Chief Anajemba or

Amaka personally, in her capacity as director of Fynbaz, the sum of $14,103,742 in

misappropriated funds from Banco Noroeste.

Chief Anajemba was said to have maintained an account number 605600010 at Laroche & Co.

Banquiers in Switzerland. Between 11 December 1997 and 26 February 1998, he was said to have

received into this account sums totalling $4 million by way of secondary transfers from the Swiss

accounts.

Accordingly, the claimants want Amaka to pay them a total of $4,082, 975 being funds

misappropriated from the bank by her late husband but which she has now directly inherited.

Amaka herself owns an entity in Liechtenstein named Vanua Foundation. The Foundation

maintains an account number 60630027 at Laroche & Co. Banquiers.

Between 11 December 1997 and 25 February 1998, Amaka received into this account sums

totaling $3,997,500 by way of third level transfers from the account of her husband and Laroche

& Co. Banquiers account number 605600010.

Nwude was listed as having received payments of monies fraudulently misappropriated from

Banco Noroeste totaling at least $33,183,698.

On 10 July 1995 and 10 August 1995, Nwude received primary transfers of $1.27 million and $1.2

million respectively into an account in the name of Crystal Bank of Africa held at ANZ Bank,

London, (account number 664359).

Between 10 July and 16 August 1995, Nwude received further primary transfers totalling $3.39

million. Of these sums, $550,000 was paid on 16 August 1995 into an account in the name of

Page 55: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

55 | P a g e

Triumph Merchant Bank Limited at ANZ Bank in London for the benefit of African Shelter (account

number 654004-01) and the remainder ($2.84 million) was paid into an account in the name of

Crown Merchant Bank Limited at ANZ Bank in London (account number 27776413) for the benefit

of African Shelter Bureau Limited.

Between 22 April 1996 and 24 February 1998, he also received eight secondary transfers totalling

$8.46 million from the Landmark/ Evershine, Pentagon and Excel accounts in Switzerland into his

personal account at Banquet Leumi Le Israel number 10490.

Furthermore, on 1 February 1996, he received a secondary transfer of $400,000 from the

Landmark account into an account in the name of Globe International Holding Plc. Between 1st

October 1997 and 8 March 2000, Nwude also received payments totalling $5,518,352 from Globe

into an account in the name of Rodieem Foundation at Banque Leumi Le Israel number 222836.

Globe itself received secondary transfers totalling $4.62 million. Out of this sum, the following

payments were made to his personal account at Banquet Leumi Le Israel (number 10490): a.

$1.37 million on 1 June 1999, the day after $1,363,352 was received by Rodieem Foundation from

Globe; and b. $3.48 million on 3 April 2000, approximately three weeks after $3.47 million was

received by Rodieem Foundation from Globe.

Between 18 August 1997 and 19 November 1997, Nwude received secondary transfers totaling

$7 million from the Excel and Pentagon accounts and a third-level transfer of $3 million (derived

from the Pentagon account) from Kunzli & Seehozer account number 8585032, in total $10

million, into the account of the Ritanga Foundation at Laroche &Co. Banquiers, Basle, number

8585113.

Between 11 September 1995 and 21 February 1997, he further received third-level transfers

totalling $3,843,698 from Mr. Christian Kachi Nwude, his brother, who himself received a primary

transfer of $500,000 on 31 August 1995 and secondary transfers totalling $6,142,211, including

transfers into the account of Union Trust Building Society at London Trust Bank totalling

$2,675,000, into an account at HSBC Hong Kong account number 018 - 5 - 603511.

Page 56: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

56 | P a g e

Florence, Nwudes wife who is the 19th defendant, received a total of $42,426- and 8000-pounds

sterling from Nwudes account number 10490 at Bank Leumi Le Israel, Zurich ("BLLIZ) which was

one of the accounts which were recipients of the stolen funds.

Between 26 June 1995 and 10 July 1995, sums of money belonging to the Banco Noroeste totaling

$5.75 million were transferred directly to an account in the name of Payal Asnani, an Indian who

is the 36th defendant, at UCO Bank in Hong Kong, number 45039. This account at UCO Bank was

beneficially owned by Payal and her mother-in-law, Ishwari Asnani. Asnani also owns an account

in the name of Payal held at India Overseas Bank, Hong Kong, number 1034 CD.

This account, together with the aforesaid UCO Bank account, received between 7 September

1995 and 11 March 1997 sums totaling $16,488,261 in secondary transfers from the

Landmark/Evershine account. The claimants therefore want Asnani to pay them a total of

$22,238,261.

Minsk Investment Co. Ltd, the 38th defendant, was incorporated in Grand Cayman on 7

September 1976. Its corporate address is Cayman International Trust Co. Ltd, P.O. Box 30500,

George Town, Grand Cayman, British West Indies. The company holds an account number

174718 with Lloyds Bank in Zurich, which was opened on 5 October 1997. The beneficial owner

of the funds deposited in the Minsk account is Mr. Nariandas Parmanand Kirpalani, the 37th

defendant, who is an Indian national who lives at 43/45 York Terrace West, London NWI

(Registered in the name of the 38th defendant) and in Nigeria. Kirpalani, together with his wife,

Gopi, and Primeway S.A (a director of Minsk Investment Co. Ltd) are all signatories to the Minsk

account. In total, $1.35 million was paid by way of secondary transfers from the

Landmark/Evershine account to the Minsk account for the benefit of Minsk and /or Mr. Kirpalani.

Montana Trading Company Ltd, the 39th defendant, was incorporated in Grand Cayman on 24

October 1980. On 26 February 1985, an account number 175749 was opened in the name of the

Montana Trading by the 37th defendant, Kirpalani. Although the account opening forms do not

identify the beneficial owner of the assets deposited with the bank, since it was Kirpalani who

opened the account and is a signatory on the account, it is being inferred that he is the beneficial

owner of the said account.

Page 57: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

57 | P a g e

Between 1995 and 1997, secondary transfers totaling $300,000 were made from the

Landmark/Evershine account to the Montana account.

Furthermore, on 13 May 1997, $35,000 was the subject of a third-level transfer from a Nigerian

bank account at Bankers Trust Company in London, for Primole Communications Ltd, the sixth

defendant, to "Montana Investments".

The claimants infer that "Montana Investments" is actually Montana Trading Company Ltd, and

that Kirpalani is in fact the beneficial owner of the funds deposited in the Montana account. The

claimants are relying on the fact that Kirpalani recommended Naresh Asnani to Mr. Rolf Wasmer

of Lloyds Bank, Geneva, and provided a reference for the opening of the Landmark/Evershine

account to show that he knew of the reason why the account needed to be opened, that is to

say, the laundering of the proceeds of the fraud.

Accordingly, the claimants claim as against Naraindas Kirpalani $1.685 million by way of

secondary and third level transfers; as against Minsk Investment Co Limited, $1.35 million by way

of secondary transfers; as against Montana Trading Company Ltd, $335,000 by way of secondary

and third-level transfers.

The 42nd defendant, Sunil Sunderdas Vaswani, another Indian, was said to have on or about 11

July 1996, opened a personal account number 342692 at Citibank, Geneva, under the codename

"Sarina". On the application form, he gave his nationality as British and his address as 270A, Ajose

Adeogun Street, Victoria Island, Lagos, Nigeria. He declared himself to be the beneficial owner of

the funds in that account. His wife, Rita Vaswani, (also British but resident at the Lagos address),

was granted a general power of attorney over the account and was also a signatory thereto. In

total, $6,500,045 was paid by way of secondary transfers from the Landmark and Excel accounts

to the Sarina account for the benefit of Vaswani.

The claimants believe that Vaswani had the benefit of two further secondary transfers from the

Landmark/ Evershine account because two payments out of that account on 9 May 1995 were

made "by order of Stallion", which were likely to be on behalf of one of the Stallion Group of

Companies of which Vaswani is a principal shareholder and managing director. The first transfer

was for $244,483 in favour of General Suciere; and the second for $256,043 in favour of

Hamstang Limited. On 15 May 1997, a third-level transfer was made from CNA Internationals

Page 58: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

58 | P a g e

account number 34751 at UCO Bank (HK) in the sum of $99,580 to credit Vaswanis account

number 2125552 at American Express Bank, London.

CNA International was a trading partnership of Shamdas Asnani and Anita Lo, which received

secondary transfers from the Landmark/Evershine account.

Vaswani, in his defense, has admitted in an affidavit sworn to on 28 February 2003 that he

obtained all the money pleaded in the contentious transactions from Naresh Asnani, an account

holder of the Landmark and the Excel accounts, but declared that he gave naira in exchange for

them to Asnani or to third parties at Asnanis direction (in the event, to entities associated with

the 18th defendant, Nwude); to entities associated with the late Anajemba, and to the fifth and

sixth defendants.

Brecher Abram, solicitors to the Vaswanis, however, have risen in defense of their client.

The lawyers argued that their client was not categorised as a conspiracy defendant because he

was not accused of participating in any conspiracy to defraud the bank or that he laundered or

concealed money fraudulently misappropriated from the bank.

On the sum of $6.5 million involved, Mr. Vaswani, as his lawyers explained, "Gave full

consideration as a bonafide purchaser without notice of the fraudulent misappropriation of that

money from that bank together with interest and cost.

Mr. Vaswanis lawyers based their logic on the catgorisation of defendants by his accusers. That

is substantive defendants are those against whom restitution for knowing receipt is sought and

a claim for dishonest assistance in breach of trust is made. The latter group is otherwise known

as "Dishonesty claim Defendants."

The particulars of claim further state how primary transfers were made to or for the benefit of

Naresh Asnani, Shamdas Asnani, Payal Asnani, Ishwari Asnani, Chief Nwude Odinigwe, Rik

Chemicals plc ("Rik"), Mr. Kachi, Chief Festus Okonkwo, Macdaniels Limited, Chief Ezeugo Dan

Nwandu and Fynbaz Nigeria Limited. The Swiss Bank accounts were used to make secondary

transfers to, amongst others, Payal and Ishwari Asnani, Sherina, Chief Nwude Odinigwe, Globe

International Holdings SA ("Globe"), Mr Kachi, Chief Okonkwo, the sixth defendant, Mamelec

Trading Pte Limited, Doulatram HK, and to Feesok International Limited ("Feesok"), some or all

Page 59: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

59 | P a g e

of whom made payments to other conspiracy defendants or co-conspirators. These include some

Nigerian banks.

Of the sum transferred to England, the sum of $14.25 million was transferred to accounts in the

name of Union Trust Building Society, a Nigerian building society, held at American Express Bank

Limited and London Trust bank in London.

In respect of the Swiss Bank accounts, the Landmark/Evershine account was maintained in the

name of Naresh and Shamdas Asnani. The signatories to the Pentagon account were Naresh,

Shamdas and Payal Asnani. The signatory to the Excel account was Naresh Asnani while Shamdas

and Payal Asnani held general power of attorney in respect of that account.

The claimants were sure that almost without exception, the sum of money paid into the Swiss

bank accounts (which were closed after the fraud had ceased to operate) were monies

fraudulently misappropriated from Banco Noroeste. The amounts of the banks monies received

into the Swiss Bank accounts, and accordingly by each of Naresh Asnani, Shamdas Asnani and

Payal Asnani respectively totaled $121,987,500.

Iloenyosi purchased two properties on about 5 June 1997 on behalf of Nwude.

The properties were at 223 S Lasky Drive and 9920 Robbins Drive, Beverly Hill, California, where

the Hollywood stars also have their homes.

On about 16 May 1997, she purchased the property at 1913 Speyer Lane Redondo Beach,

California and on 29 September 1997, she purchased another at 2756 Gremercy Avenue,

Torrance, California.

Each property was purchased as nominee of Chief Anajemba. Mrs. Iloenyosi also purchased the

1913 Speye Lane property utilizing a sum of $470,000 remitted to her account at Wells Fargo,

number 0607737533 on 8 May 1997 by Campbell Tobacco Rehandling Co. Inc, a Kentucky

company from funds held on behalf of Anajemba in a dedicated bank account at Fifth Third Bank

in Louisville, Kentucky. She also purchased the 2756 Gremercy Avenue property utilizing

$447,500 remitted to the account of Warranty Escrow Co Palos Verdes Estate (a California

company) at City National Bank account number 013-018847 on 22 September 1997, and

$10,000 remitted to her account at Well Fargo Campbell Tobacco.

Page 60: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

60 | P a g e

On 11 September 1997 the property at 1913 Speye Lane was transferred by Mrs. Iloenyosi to

Anajemba by way of gift, and on 6 April 1998, the property at 2756 Gremercy Avenue was also

transferred by her to Anajemba, also by way of gift. After Anajemba died, the properties were

sold and the proceeds were remitted to a trust in favour of Mrs. Amaka Anajemba. The trust was

known as the Amaka Anajemba Qualified Domestic Trust. On 29 April 1998, Iloenyosi purchased

the property at 15223 South Normandie Avenue, Garden, California.

Mrs. Anajemba claims that this property was owned by Chief Anajemba at the date of his death.

Iloenyosi, because of her involvement in these transactions, is alleged by the claimants to be a

party to the scam as a conspirator.

Between 20 May 1995 and 26 January 1996, Chief Okonkwo, according to the claims, received

sums totaling $1,440,000 out of the monies fraudulently misappropriated from Banco Noroeste

on 17 July 1995, the sum of $250,000 was paid by way of primary transfers into Okonkwos

account at Halifax plc.

Staines, number 2/38266468-7 and a further primary transfer of $250,000 was paid into his

account at the London branch of a Nigerian bank. On September 1995, a further primary transfer

of $250,000 was made to Okonkwo by Feesok, a Nigerian company of which he was a director.

The payment was made by a cheque signed by him. Feesok itself received the sum of $250,000

from the Landmark/Evershine account on 24 October 1995 into its account with yet another

London branch of a Nigerian bank.

On April 1996 Feesok made a payment to Rik of $7,000 by way of cheque (number 427) in favour

of Rik and signed by Chief Okonkwo. He received further sums derived from the Swiss Bank

accounts from the sixth defendant.

Chief Okonkwo was a director of Feesok, which made payments to him and to Rik, which itself

received primary transfers.

Doulatram HK was incorporated in Hong Kong on 26 March 1958. Its directors are Anil and

Vashimal Gobindram Melvani, and it has four branches or related companies: Doulatram (Nig.)

Ltd (Nigeria), G. Doulatram & Sons (HK) Ltd (Taiwan Br), GDM Textiles Manufacturing (Nigeria)

and G Doulatram and Sons (UK) Ltd (United Kingdom).

Page 61: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

61 | P a g e

The company has bank accounts at the Bank of India, Hong Kong, and BNP Paribas, Port Villa,

Vanuatu, into which it received secondary transfers from the Landmark/Evershine account in the

sum of $3,545,580 in 1995 and 1996.

Further, in May 1997, third-level transfers totalling $55,000 were made to G Doulatram from the

account of a Nigerian bank in Bankers Trust London into which secondary transfers were made

from the Swiss Bank accounts. It is not clear to which branch of the company this money was

paid, but in the circumstances, the claimants, say it may be inferred that the recipient was a

branch of or an associated company to Doulatram HK. The company is therefore regarded as a

co-conspirator.

The role of some of the banks in the transfers was, surprisingly, not clearly stated. Although some

banks in Nigeria like African International Bank and Ecobank were mentioned in cross transfers,

they were not listed in the schedule on defendants. On City Express Bank which was listed as one

of the 42 defendants, the particulars of claims provided no details of its role.

Undoubtedly Amaka Anajemba was the self-confessed "Queen" of the largest Advance Fee Fraud

(419) in the world having conspired with others to commit a scam to the tune of over

$242 million in faraway Brazil. By her confession before Justice Olubunmi Oyewole of the Lagos

High Court, Ikeja, Mrs. Amaka Martina Anejemba, mother of four, was the undisputed Queen of

the scam that continues to wreak havoc to Nigeria international image and integrity.

Mrs. Amaka Anajemba (also known in the 419 world as Mrs. Rasheed Gomwalk, Rossy Ford, Olisa

Agbakoba) only bagged two-and-a-half-year prison term, she forfeited to the Federal

Government property worth N3, 185 Billion in Nigeria, Switzerland, United Kingdom and the

United States. According to the court, the value of the property forfeited is in the region of

$48,500,000. In terms of liquid cash, her two company accounts, Goodax Ventures Nigeria

Limited, Natwest England holding about $2,422,507.06 and Amaka Anajemba (Martigay),

Switzerland having a balance of about CHF 87,000 were blocked. She pleaded guilty to counts 88,

89, 90 and 91 on money laundering and refusal to make full disclosure of her assets and liabilities.

She was thus convicted on charges of "knowingly conducting a financial transaction to wit:

depositing $2.5 million with Banque La Rosche, Basle, Switzerland, with proceeds of funds

Page 62: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

62 | P a g e

obtained by false pretense; laundering of funds obtained through unlawful activity; failure to

make full disclosure of assets and liabilities".

7.09 Interviewing Skills for Forensic Investigations

Forensic accountants frequently are asked to help attorneys, boards of directors, management,

regulators, law enforcement and others to determine the facts surrounding complex financial

matters. In a forensic investigation, interviews are critical when determining the who, what,

when, where, how and why. A successful interview is essential when gathering facts and steering

an investigation in the right direction. This white paper will focus on the interview skills necessary

to carry out a forensic investigation.

To be successful, an interview should be thorough. It requires strategic planning, relevant

questions and an objective interviewer. Many interviews fail to gather enough information to

address the issues raised in a forensic matter because of inadequate preparation, or because

insufficient time is allowed to complete the interview. If an interview is scheduled in advance, as

many are, there is a natural tendency to schedule a set time for the initiation and completion. If

possible, sufficient time should be allowed to conduct the interview with the time of completion

left open. If a set time is established, the person interviewed may be overly focused on the ending

time, thereby inhibiting a flow of information.

Phases of Interviews and Interrogation in Forensic Accounting

1. Introductory phase: Many forensic investigations involve fraud allegations. By way of

background information, it may be helpful for the reader to understand the basic

elements of a scheme to defraud. Fraud includes misrepresentations of material fact,

knowledge of the falsity of the misrepresentation or ignorance of the truth, intent, a

victim acting on the misrepresentation and damage to the victim. It also should be

remembered that attempts to defraud can be a basis of criminal charges as well. In other

words, schemes do not have to be successful to be charged criminally. Forensic

accountants also should be familiar with some of the common motives exhibited by

persons engaging in fraudulent activities. These motives, which sometimes become

Page 63: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

63 | P a g e

evident during interviews, often relate to pride, envy, gluttony, lust, anger, greed or sloth,

sometimes known as the seven original sins. It also is helpful to understand the term of

art known as the "fraud triangle," which refers to the three elements that generally need

to be present for someone to be able to commit fraud, i.e. opportunity, pressure and

rationalization. To be able to commit fraud, all three of these elements of the fraud

triangle should be considered when planning for an interview.

2. Preparing for the interview: The primary purpose of most interviews is to gather evidence

through facts and other information supplied by witnesses. Interviewing is performed

throughout an investigation. With each successive interview, the interviewers should

obtain background information about the witnesses, the subject matter of the

investigation, and the potential suspects. Efforts should be made during the interviews to

identify new records and additional witnesses. A variety of interview methods will be

discussed; however, regardless of the methods used, interviews generally should strive

to answer basic questions: who, what, where, when, how and why. Depending on the

situation, there are many factors that need to be considered before undertaking an

investigation. Coordination with someone from Human Resources, Security and the

Information Technology departments typically is undertaken before the interview

process.

3. Conducting the Interview: Thought should be given to who should be present at the

interview. Depending on the type of witness or where in the investigative process, an

attorney representing the company may want to be present. Regardless, the ideal

situation would be to have two interviewers who conduct the interviews, one person at

a time. In some circumstances, only one interviewer will be present, or the person being

interviewed will be represented by an attorney or other company representative.

Effective interviews still can be conducted when there are more than two interviewers,

although this procedure may lead to confusing results and the loss of control in the

interview.

Page 64: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

64 | P a g e

4. Detecting Description: During the initial part of the interview, interviewers likely will ask

open and general questions to encourage an open dialogue with the witness in order to

assess a baseline of behaviour. During this process, interviewers should not stare at the

person being interviewed or call attention to a person's behaviour. Interviewers should

be observing the timing and consistency of behaviour and should note clusters of

behaviour. Caution should be exercised to avoid misinterpretations of behaviour because

of nervousness or stress that would be present in a normal interview type situation.

Interviewers should also be aware of cultural differences that may lead to a

misinterpretation of verbal and nonverbal reactions. In looking for signs of deception,

interviewers should be measuring and assessing a person against themselves. If a baseline

of verbal and nonverbal behaviour can be obtained, decisions can be made as to whether

physical reactions are signs of deception.

5. Documenting the interview: Written records of an interview should be prepared as soon

as possible following the conclusion of the interview. It should be determined if original

notes should be retained. Law-enforcement officers generally are required to retain

original notes. The notes may be requested by opposing counsel pursuant to discovery

requirements. It is recommended that narrative reports be written in third person.

A third-person account is where the interviewer is stating his or her recollection of the

events of the interview. The report should contain the date, time, location and persons

present during the interview. An interview log is a good way of recording the times of

significant events during the interview.

As an example, the interview log may record when the interview commences, times of

significant events during the interview such as breaks, telephone calls, and refreshments,

and the conclusion of the interview. Written reports should be thoroughly reviewed and

compared to the original notes.

Page 65: MODULE 7 7.00 FORENSIC ACCOUNTING AND FRAUD …

65 | P a g e

7.10 Review Questions

1. Accounting systems can be used to cover up fraud and other financial crimes

while at the same time, such systems can be used to facilitate fraud investigation.

Required, explain how accounting systems can aid as well as assist in addressing

financial crimes. (18 Marks)

2. Explain how fraud investigation can be conducted using Expenditure and Net

worth methods. (10 Marks)

3. Forensic Reports are expected to carry certain vital components if they are to be

effective. Required, State and analyze the basic components of forensic reports.

(15 Marks)