You are on page 1of 4

FORENSIC ACCOUNTING

Forensic technology

Nowadays, no form of economic crime is conceivable without the


substantial use of Information Technology (IT). In our global economy, a
country’s borders are of little significance as information exchange and
international payments flow instantaneously from one country to another.
The perpetrators operate with greater ease, and preferably
internationally, secure in the knowledge that international circumstances
present authorities with major procedural problems, thus making
international investigations very challenging. Even though the judicial
process is currently based on purely physical evidence such as files and
documents, which in many places such as Switzerland is still the rule, it
is foreseeable that in the not too distant future electronic evidence will
become increasingly important for investigative and judicial authorities.
Modern methods of communication such as mobile telecommunications,
the Internet, e-mails or the Internet-based information platforms such as
Facebook, Twitter or Clouds are inevitable in today’s business world but,
significantly, leave digital tracks. In recent times, an investigator’s
research has moved from the securing of physical documents to
safeguarding electronic evidence data on notebooks, desktops, servers,
backup media and mobile communication devices. As a general rule,
time is no longer an issue because digital traces tend not to turn yellow
and data on network resources – i.e., servers and the Internet – never
forget anything. That is why databases, which have long been forgotten
or were considered to be (permanently) removed, can become the
centre of attention. All such data can also be a key source of information
and thus significantly contribute towards the success of an asset
tracing/asset recovery operation. The seizure and analysis of electronic
data from people involved must therefore – in addition to seizing
traditional non-electronic data – always be a top priority. The
visualisation of digital traces for use in court cases is, of course, also an
important factor. This process can only be performed by an experienced
Forensic Technology team.

Corporate intelligence

The most immediate problem in the context of asset recovery remains


the gathering of information. With cross-border transactions, the trail can
be lost all too easily due to the involvement of various international
jurisdictions and other limitations. The affected parties are faced with big
challenges, notably in the classic offshore havens and in countries which
have little legal stability. Thus, elementary questions about events,
payment flows, perpetrators, intermediaries, beneficiaries etc., generally
remain unanswered. In this context, globally active companies which
provide globally specialised forensic services can provide valuable
support through their worldwide network. The instrument for this global
information gathering is the so-called Corporate Intelligence Research
(CI).
Corporate Intelligence is based on four sources or methods of
information-gathering, namely, the ‘public domain’, the ‘closed’ and the
‘human’ sources as well as access to a wide global corporate network.
The ‘public domain’ sources include the official registers such as the
commercial register, tax register, land registry and local residents’
register, which, in principle, are open to everyone. On the other hand,
there are the ‘closed’ sources. These contain proprietary information,
which are regularly accessible only to public authorities or have to be
requested by an authorised person. Typically, criminal records are the
focus of interest in this instance. In Switzerland, any person can obtain
relevant information concerning him-/herself (e.g., as part of the hiring
process of a new employer.)
What is of further interest upon analysing contracts is the definition of the
contractual object. The less definite the contract details are with regard
to the services to be rendered, the higher the probability that these
contractual gaps are used in order to misappropriate funds. The same
applies to the terms of the contract, i.e., when the lifespan of the contract
is left open.
Contracts and other documents can also give the investigator an
indication of when incoming and outgoing payments are due to appear in
the accounting systems, i.e., at what date, and which amount is
supposed to be documented in the creditors and debtors balances. The
investigator can single out payments accordingly that are either made
based on a suspicious contract or that are made in the absence of any
underlying contractual relationship at all. The investigator is thus
required to look into the bank statements and corresponding accounting
documents in order to identify relevant transactions.

Analyse bank account statements and accounting documents


Analysis of banking and accounting records is a critical part of every
asset tracing investigation, especially when it is funds that are to be
tracked. Before looking into the bank account statements, the
investigator should ensure that all relevant bank accounts have been
identified and are taken into account in this part of the process. Thus,
the first task for the investigator is to request a complete list of all bank
accounts held with the relevant banks throughout the review period.
Upon receipt of the list, the investigator can identify the potentially
relevant bank accounts for the investigation, e.g., off-shore bank
accounts, bank accounts with large transaction amounts etc.
Based on this list, the investigator requests the bank statements and
corresponding transfer balances for the identified bank accounts in order
to gain an insight into the transactions made within the review period.
This, of course, depends on the authority needed or available to secure
these records which, in some instances would be derived from the
holder of the account and in others from law enforcement. Depending on
the particular jurisdiction, in which the asset is to be traced, legal means
such as freezing or disclosure orders may come into play as well. By
using the latter, a bank may even be compelled to disclose the account
data.
After receiving and reviewing the bank statements in respect of
potentially suspicious transactions, the actual tracing of funds involving
the different bank accounts commences. The difficult task for the
investigator at this point is to identify the commingled funds and
categorise them as either apparently appropriate transactions or
suspicious looking transactions. The basis for the identification of
suspicious transactions may include information derived from the
intelligence gathering process, the contract analysis, electronic file
reviews, interviews conducted with third parties and other information.
At this stage, the investigator may only have indicators in respect of
improper transactions that must now be proven by tracking the
suspicious looking transactions to the beneficiary. This is primarily done
through charting tools, such as in the intelligence gathering process, in
order to be able to follow the trails of the funds through the jungle of
numerous bank accounts. By establishing connections between the
different flows of funds, previously unknown bank accounts can be
identified that may provide new leads on the remainder of the funds.
In the case of large volumes of transaction data, the use of forensic
technology software is to be considered in order to minimise the
workload for the investigator.

You might also like