Criminal Financial Investigations - The Use of Forensic Accounting Techniques and Indirect Methods of Proof, Second Edition (PDFDrive)
Criminal Financial Investigations - The Use of Forensic Accounting Techniques and Indirect Methods of Proof, Second Edition (PDFDrive)
Criminal
Financial
Investigations
The Use of Forensic
Accounting Techniques and
Indirect Methods of Proof
Gregory A. Pasco
Second Edition
Criminal
Financial
Investigations
The Use of Forensic
Accounting Techniques and
Indirect Methods of Proof
Second Edition
Criminal
Financial
Investigations
The Use of Forensic
Accounting Techniques and
Indirect Methods of Proof
Gregory A. Pasco
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Foreword xiii
Preface xv
About the Author xvii
1 Introduction 1
What Is Forensic Accounting? 1
Criminological Theories 2
Motive 2
Opportunity 4
Financial Crimes 5
Legal Requirements 6
4 Categories of Theft 29
Theft 30
Burglary 30
vii
viii Contents
Larceny 31
Robbery 31
Embezzlement 31
Swindle 31
Schemes 39
Probable Cause 94
Oath or Affirmation 94
Particular Description 94
Preparing an Affidavit for a Search Warrant 95
The Affidavit 96
The Affiant 96
Probable Cause 96
Oath or Affirmation 97
Particular Description 97
Executing the Warrant 98
Inherent in every society is an element that comprises that society, for whatever
reason, based upon your favorite criminological theory, elects to take advantage
of the resources and efforts of other individuals and corporations (for example,
Enron, WorldCom, Adelphia Communications). Due to this rather Machia
vellian tendency on the part of certain individuals, and in some cases, corporate
philosophy, society has responded through legislative enactment, administra-
tive regulations, and an array of other safeguards to regulate this behavior.
This book addresses those financial crimes that are for the most part per-
petrated by individuals who are part of the more affluent social and economic
sector of our culture. The text provides in-depth, clear explanations of the
concepts, and substantive issues that are associated with the financial aspect
of the investigation of white collar crime. The text offers a paradigm to develop
the necessary mind-set, as well as the investigative understanding in terms of
techniques, that may not necessarily be part of a more traditional criminal
investigation course directed more to the law enforcement community.
Investigating financial white collar crime dictates a uniquely different set
of investigative skills and mind-set. This book explores a historical overview
of the topic, the different forms of financial fraud and misappropriation of
assets, inclusive of money laundering and transnational financial transactions,
logically progressing to the courtroom, litigation, and evidence. It sets out a
methodology that provides the foundation to understanding what is neces-
sary to identify, investigatively pursue, and ultimately successfully prosecute
financial white collar crime.
The utility of the case study method employed in this text enhances the
understanding of the concepts related to such topics as investigative auditing
techniques, financial investigative mind-set, and the legal environment that
such investigations are ultimately resolved within. By employing the case
study method, the book provides the reader, whether a novice or someone
with knowledge of forensic investigations, guidance in understanding the
mind-set and skill set that is involved in the challenges that are faced in a
successful investigation of financial white collar crime.
David W. Schrank
Professor of Criminalistics
Chairman, Department of Criminal Justice
Colorado Technical University
Sioux Falls, South Dakota
xiii
Preface
xv
xvi Preface
organizations, so that the entire organization can be eliminated. The top play-
ers in criminal organizations are no longer insulated from prosecution, but
face the same jeopardy of conviction and incarceration as their underlings.
To effectively use these techniques, the investigator must be willing to
learn various aspects of several business and financial disciplines, and to
incorporate them into a solid investigative repertoire. The application of these
methods can range from simple verification and corroboration of criminal
acts to the prosecution of the most complicated corporate schemes. In today’s
world they also have an important place in the tracking, tracing, and inter-
ruption of the money flow going to terrorist organizations.
Financial crimes cost our country billions of dollars each year. The harm
caused by these crimes is not as dramatic as a single act of murder, rape, or
arson, but they can affect thousands of victims year after year until they are
stopped. We are all victims when the costs to recover from the fraud perpe-
trated against insurance companies, medical facilities and providers, social
programs, environmental agencies, the Securities & Exchange Commission,
banks, businesses, and taxing authorities are added to the prices we pay on
goods and services each day.
The purpose of this book is to give insight and incentive to civil and
criminal law enforcement agencies, and provide financial investigators in
business and industry an understanding on how to approach the investiga-
tion of financial crimes.
About the Author
xvii
Introduction 1
White collar and other financial crimes cost the U.S. economy billions of
dollars each year. Organized crime and drug cartels, often included in this
category, add substantially to the economic and social costs. In addition, the
development of terrorist activity within the nation’s borders employs the same
strategies to finance their operation. As these law enforcement problems grow
and develop, the role of law enforcement must continue to evolve, and it must
adapt to face these threats and ensure the safety and stability of our society.
During the last 50 years, criminal enterprises and corporate criminal
activities have become more sophisticated, better organized, and more com-
plex. They have also caused greater harm to the direct victims of the crimes
and society overall. Investigation of these criminal activities must constantly
adapt to deter, enforce, and prosecute them. Forensic accounting is the means
for investigation and prosecution of these crimes.
1
2 Criminal Financial Investigations
identify the who, what, where, when, and how of the financial crimes that have
occurred. Many crimes of violence and other types of crimes are committed
for the purpose of economic benefit. Forensic accounting disciplines are also
utilized to determine the profitability of criminal activities and the beneficia-
ries of the illegal gains. The methodology of general criminal forensics and
forensic accounting is the same.
Criminological Theories
Criminologists debate the theories on how, why, what, where, and when
crimes occur. They discuss the plausibility of causation, deterrence, and social
and political ramifications. In the case of white collar or financial crimes,
they struggle with isolating and defining them. Edwin Sutherland made the
first attempt to define white collar crime in 1939. He noted that the perpetra-
tors were at the higher end of the social and economic scales in society, and
they held positions or occupations that provided the opportunity to commit
such crimes. Since then, other criminologists have argued that such a defini-
tion is too narrow. It overlooks the individuals who functionwithin criminal
networks and organizations, and corporate entities that commit crimes
through board decisions and illegal business practices. It also omits the scam
artists who use fraud and deception as their means of theft and the individu-
als who steal through tax, bank, credit card, and Internet fraud, as well as
those who commit embezzlement.
For investigative purposes, all of the theories on criminal motivation,
crime causation, crime typology, and criminal deterrence can be condensed
into one motive for criminal behavior and two categories of criminal acts.
Motive
Most of the criminological debate on motivation is directed at determining
outside factors that motivate individuals to engage in criminal activities.
This debate is functional to the extent that it can develop the intricacies
and relationships between social factors and criminal behavior. However, it
often overlooks the basic or root causes for criminal actions. Before crim-
inology existed, these root causes were the topic of debate in social and
political philosophy.
Thomas Hobbes may have expressed it best, although quite pessimisti-
cally, in Leviathan, where he states that, without law, the nature and life of
the individual is “solitary, poor, nasty, brutish, and short.” * He draws this
* Thomas Hobbes, Leviathan, 1651; Great Books of the Western World, Encyclopedia
Britannica, Inc.
Introduction 3
Power
Control
Status Wealth
conclusion based on the premise that without law there is no peace, without
peace man is in a constant state of war with every other man, existing in a
society without social, economic, or scientific progress. A simple example
would be that of playing a game without any rules.
There are two opposing philosophical views on the nature of man. One
is that man is inherently good and getting better. The other is that man is
inherently bad and requires laws and rules, backed by punishment for viola-
tion, to maintain civility.
The fact that individuals in the higher social and economic status in our
society commit most of the white collar and major financial crimes contra-
dicts the first view of the nature of humans. In criminal investigations, it is
best to adopt the second view and hope to discover the “exceptions that prove
the rule.”
Figure 1.1 is a diagram of the simplified explanation for the motivation of
criminal behavior. In the diagram, power or control or both are the motiva-
tion for all crimes. This lust for power can be manifested in physical power
or control over another individual or group of individuals. The means to
achieve or fulfill this motivation can take the form of either of two types of
criminal behavior.
One means would be to increase one’s status over others through vio-
lence and intimidation. Such criminal dominance is exemplified in the
commission of crimes such as murder, rape, assault, battery, arson, and van-
dalism. The goal would be to increase one’s status over others by violence or
threat of violence, and thus gain illegitimate control over them. In politics,
it would equate to tyranny or control by use of force or fear. The use of force
to coerce the behaviors desired by those in power limits the freedoms of the
people in that society. When physical force is not possible or plausible, as in a
democracyor republic, the instillation of fear of ostracism or of an external
disaster is often employed to intimidate enough of the population to accept
restrictions of their freedoms by law or regulation.
The other means would be to gain wealth through illegitimate methods
so as to surpass the economic standings of others, thereby being in a position
to buy control over them through the use of excessive wealth. These finan-
cial crimes would include tax fraud, insurance fraud, welfare fraud, and any
other crimes of theft by fraud. It would also include corporate crimes such
4 Criminal Financial Investigations
Opportunity
One distinction that separates white collar financial crimes from other
financial crimes is the opportunity to commit the crime. This distinction is
the sticking point for many criminologists in trying to define white collar
crime. These crimes are often crimes of opportunity that can only occur if
the perpetrator has sufficient position, control, or power over the situation.
As an example, an individual must have a position of control within a bank
to embezzle funds from it. The more intricate the fraud scheme is within the
business, the greater is the need for influence and control of the record keep-
ing and financial activity of the business.
Intricate financial crimes require the perpetrator to have a detailed
understanding of the industry in which the business operates, the way in
which financial activities are recorded, and the areas in which manipula-
tion of record keeping could generate illicit or unreported income. These
requirements place an additional burden on the investigator. Research into
the general business operations for the type of business being used to com-
mit the fraud is often needed. In addition, the investigator needs to under-
stand the record-keeping procedures of the specific business in which the
fraud occurs.
Another path of opportunity is found in the victims of financial crimes.
In financial fraud schemes, the victims may also provide opportunity to the
perpetrator. Most financial fraud schemes involve convincing people to give
Introduction 5
Financial Crimes
Financial crimes have existed as long as men have had financial dealings
with each other. These crimes have been categorized separately from other
crimes and criminal activity due to the use of fraud (and often conspiracy)
to commit the crimes. The heavy thumb on the scales by merchants, the mis-
representation of the quality of livestock sold, the “salting” of mineral depos-
its in mining, and the street games of hucksters are all examples of man’s
willingness to take the earnings of others by fraud and deception to enhance
their own wealth. A large part of our codified system of law was written to
protect the unsuspecting and the unsophisticated from loss of property and
personal well-being.
As society and industry matured over the past century, and the economy
and standards of living expanded and developed, illegal financial schemes
became more innovative and complex. The study of criminology began to
address the differences and distinctions of financial crimes in comparison to
the standard studies in the past. From the initial identification by Sutherland,
criminologists have struggled to contain and clarify the definition of white
collar and financial crimes.
From the field investigation perspective, there is little need to go beyond
the single motive and dual access to the motive already put forth. The varia-
tions of the crimes are of importance, but the underlying social and psycho-
logical justifications are weighed for their value by judges and juries. The
investigator is responsible for presenting an accurate account of the finan-
cial activities that occurred, and sufficient evidence for establishing intent to
commit the crime and the elements of the crime alleged.
The white collar or financial criminal has the same motive for crime,
but through official position, status, sophistication, or professional acumen is
6 Criminal Financial Investigations
able to effect the crime without the use of violence. This has resulted in severe
sentencing discrepancies between the white collar criminal and the street
thug. A convenience store robbery that nets the thief $100 usually results in
a jail sentence that can range up to several years. The corporate executive
who bilks his company of millions of dollars usually receives a much lighter
sentence, if he goes to prison at all.
Our country’s history is replete with financial schemes, some legal, some
illegal, but all unfair to the victim in some degree. In a democratic republic,
as schemes and practices spread and gain notoriety, public outrage peaks,
and government intercedes to regulate or make the actions illegal by legisla-
tive, judicial, or executive response.
The industrial and scientific revolutions, beginning in the 1800s, sparked
dramatic changes in the U.S. economy. Major corporations were formed, and
the government raced to regulate and control their actions toward customers
and employees. This economic boon also inspired waves of immigration into
the United States as people sought to improve their economic opportunities.
Laws were written to limit the ways in which corporations could oper-
ate. Regulations against monopolies, unfair labor practices, price fixing,
and false or deceptive advertising were put in place. Consumer rights and
environmental protections were also instituted. As these bodies of law grew,
the government established enforcement and regulatory agencies to ensure
compliance. The judicial branch of government participated in adjudicating
unfair practices and actions, and clarifying the laws and regulations that
were adopted.
Legal Requirements
In this example, it is easy to imagine that the prosecutor would have a witness
or witnesses who could place the defendant at the scene, forensic evidence
(footprints, fingerprints, fibers, etc.), or other evidence (possession of prop-
erty from the store) to prove that the defendant took the property. The pros-
ecutor would also have the complainant’s testimony and documentation as to
ownership of the property to prove element 2. The difficulty lies in proving
element 3. The state of mind of the defendant at the time of the theft requires
circumstantial evidence. The evidence must be sufficient to convince the judge
or jury that the defendant had the intent to steal. If the defense had sufficient
evidence to refute elements 1 or 2, the case would not have gone forward for
prosecution. For example, if the defense provided a verifiable alibi for the
defendant at the time the offense occurred or proved that the defendant was a
co-owner of the property taken, the charges would have to be dropped.
Therefore, the defense must attempt to refute the state-of-mind conten-
tions presented by the prosecution. This is where the diligence and deductive
reasoning of the investigator becomes crucial to the success or failure of the
case. The investigator must have obtained proof beyond a reasonable doubt
that the defendant committed all of the acts required for a violation of the
statute. In the example, possession of goods from the store by the defendant,
prior criminal history of burglary, negation of alibis, possession of tools or
items used to enter the structure, and the defendant’s familiarity with the
store could all be used to establish and support the alleged state of mind of
the defendant. In a case such as this, forensic accounting techniques can also
be utilized if the profits from the theft have been realized (the stolen property
sold through a fence). Analysis of the suspect’s finances could show income
or gain for which there is no legal explanation or source.
8 Criminal Financial Investigations
In the area of personal finance, there are two ways to increase wealth. The first
is to make more money, and the second is to spend less of the money you make.
In business the same two principles apply. You can increase income or reduce
expenses. Businesses make money in different ways, depending on the sector
of business they are in. It is important to understand the general operations of
a business to be able to conduct a financial investigation of that business.
Businesses are no more than organized efforts to gain profit from pro-
viding goods, ideas, or services to others. Providing goods can be broken into
two categories: (1) manufacturing and wholesale, and (2) retail sales.
Providing Goods
9
10 Criminal Financial Investigations
cereal boxes. The other option would be to purchase an entirely different set of
machines to make the prizes themselves. This would be a costly and inefficient
way to operate and would reduce business profits. For a business to consider
the second option, a cost–profits efficiency analysis would be made to deter-
mine the costs that would be incurred versus the savings that would be made
in not paying the markup charged by the prize-manufacturing business.
The other category for providing goods is in retail sales. These are the sale
of manufactured products to the public. Examples of retail businesses would
include department, grocery, hardware, and convenience stores. These busi-
nesses purchase a small amount of products from a wide variety of manufactur-
ers, add a markup to the products, and offer the products for sale to consumers.
Retail sales businesses face the problem of maintaining sufficient inven-
tory to keep the shelves stocked and to ensure that they do not overbuy
perishable products or products whose popularity may quickly end. Retail
sale involves a lot more educated guessing as to what items will become
popular, what items will turn over rapidly, and what will be in demand for
each seasonal change. The differences between these two ways of providing
goods involve variations in accounting to track, analyze, and predict market
activity for their products.
Providing Services
Service industries earn their money by performing tasks that businesses and
individuals cannot or do not want to do for themselves. Professional service
providers such as doctors, lawyers, accountants, and scientists apply extensive
training and expertise in their fields that are not widely held by the general
public or private business. Other service providers fill the needs for transpor-
tation of people and goods, and for construction, repair, and maintenance.
Government employees provide services in the areas of infrastructure
management and oversight, safety and law enforcement, and in regulatory
and assistance programs. Still other service providers are involved in the
arts, sports, entertainment, convenience, education, and information fields.
These services can be provided by an operation of any size, from a single
individual, such as a dentist, to a major corporation such as AT&T.
Providing Ideas
Another area of endeavor that creates income is in the development and shar-
ing of ideas. Inventors develop new products or improve upon existing ones
for the betterment or convenience of industry and the public. Researchers
expand the knowledge in their fields to produce a greater or better
The Financial Disciplines 11
Record Retention
the records of other people and businesses are considered third-party record
keepers and cannot disclose information without the permission of the
account holder or without being required to make the records available by
court order.
Good interviewing techniques and a knowledge of what records exist
can facilitate obtaining the records needed. In situations where a subpoena
or court order is required, the investigator must explain the relevance of the
information sought to the investigation. In those cases where there is a high
probability that illegal income is unreported, the state, local, or federal taxing
authorities can be asked to enter into a joint investigation.
Basic Accounting
Basic accounting practices are used to compute and prepare the documents
used to record financial transactions. This provides a common standard
for the preparation of financial records. The financial investigator needs to
understand the vocabulary and the basic reasoning used in accounting. The
following is a short list of terms that are most commonly used in financial
records preparation.
There are two methods of accounting used in business: cost and accrual.
Each method takes into consideration all of the income and expenses but iden-
tifies situations when they occur differently. Cost basis accounting identifies
income when payment is received, and records expenses when they are paid.
Accrual accounting identifies income when payment for goods or services or
both is promised, and expenses when the promise for payment is made. A con-
tractor might find accrual better for the business if payments are received after
the job is completed. A retail store would most likely use cost accounting
because payment for goods is received when sales are made. For tax purposes,
individuals are considered on a cost basis unless they can show a compelling
reason to be on accrual basis. Once a method is chosen that method must con-
tinue to be used unless a formal change procedure is followed.
The books and records of businesses are constructed using a separate account
for each item of income or expense. All accounts have two columns to enter
financial data: debits and credits. Debits are entered in the first column, and
credits in the second. A widely used way to remember this construction
is, “debits on the left, credits on the right.” The individual accounts keep a
running total of financial activity for each item of asset or liability, income
or expense, for a set period of time (usually, the calendar or fiscal year is
selected for reporting purposes). Remember that the type of account deter-
mines whether the debit or credit entered is an increase or decrease to the
account (debit is a decrease to an income or liability account, or an increase
to an asset or expense account; credit is an increase to an income or liability
account, or a decrease to an asset or expense account).
As an example, a shoe store buys $5,000.00 worth of sandals from a
wholesaler. The store owner writes a check for this purchase. Both inventory
(the sandals) and cash (in checking) are asset accounts. The account entries
would be a debit (increase) of $5,000.00 to inventory and a credit (decrease)
to cash in checking.
Debit Credit
Inventory $5,000.00
Cash in checking $5,000.00
Every financial event in the business requires a debit and a credit entry to
the accounts affected. The same amount has to be entered in each category, or
the final summary (general ledger) will not balance. This is how the system
receives its name as a double entry system of accounting.
14 Criminal Financial Investigations
If the store sells all of the sandals for $10,000.00 and deposits the money
to the checking account, the following account entries would be made:
Debit Credit
Sales $10,000.00
Cash in checking $10,000.00
Inventory $5,000.00
Cost of goods sold $5,000.00
The accounts are then combined in a general ledger. The general ledger
becomes the summary of all the financial activities of the business. The gen-
eral ledger lists all of the business accounts by category of accounts (asset,
liability, etc.). The entries to the general ledger are the balances of the individ-
ual accounts as of a certain date. Annualized entries are used for tax purposes,
quarterly entries for employment tax purposes, and monthly entries for profit
and loss statements. The business needs and circumstances may require
other summaries to be prepared. Each account is kept on a separate sheet,
and the activities are computed to show increases or decreases in the account
for the set period of time. To close the books, each account sheet would be
balanced to determine the increase or decrease, and the balances will be taken
to the general ledger. The account sheets would look like this:
Inventory
Inventory Debit Credit
Beginning balance 0
Purchase $5,000.00
Cost of goods sold $5,000.00
Ending balance 0
Cash in Checking
Debit Credit
Beginning balance $5,000.00
Inventory purchase $5,000.00
Sales $10,000.00
Ending balance $10,000.00
If these transactions were the only financial activities for the shoe store,
the books would show gross income (sales) of $10,000.00, and cost of goods
sold (expense) (inventory) of $5,000.00, resulting in net income of $5,000.00.
The profit and loss statement would show the financial information in the
following manner:
Shoe Store P&L
Debit Credit
Sales $10,000.00
Cost of goods sold $5,000.00
Net income $5,000.00
Tax laws have become more and more complicated as innovative business-
men and individuals have discovered loopholes in the laws, and legislators
have scurried to close those loopholes and to be just as innovative in finding
new ways to tax the population. The tax laws and Internal Revenue Service
(IRS) regulations set the framework for accounting practices.
There are thousands of pages of tax law (the Internal Revenue Code) and
tax regulations. These rules define business practices and set the parameters
16 Criminal Financial Investigations
Regulatory Agencies
to protect the parties involved in the sale, and the lender and insurer of the
property. In addition, transfer of ownership, as well as mortgages, liens, and
easements, are officially recorded in the Registrar of Deeds office in the county
where the property is located. Any additional financial transactions, second
or third mortgages, building permits and contractor liens, and right-of-ways
that affect property valuation are also recorded.
Even the public at large is required to follow a variety of rules and regula-
tions if they want to exercise certain privileges that are allowed through gov-
ernment licensing requirements. Owning and operating an automobile, boat,
or other motorized vehicle requires a government-issued license, annual
registrations, and compliance with driving laws. Businesses are also required
to obtain licenses to operate. The requirements vary by type of business and
include health, safety, fire, and access inspections to maintain government
standards. Building contractors are also regulated through licensing regula-
tions and zoning laws that limit the type of construction for the location, and
the quality of the construction and materials used.
The reporting and verification for these rules and regulations serve a
dual purpose. The primary goals are to provide public safety and access, and
to facilitate government funding through taxation and fees, but they also
provide an extensive paper trail of the financial transactions of businesses
and individuals.
There are thousands of courts in the United States. These include munic-
ipal, city, county, state, and federal courts. There are also specialized courts
that handle tax, traffic, commerce, and international cases. Records of the
proceedings are maintained as an integral part of our legal system. Court
cases and judicial decisions from cases that have decided similar issues
are used as precedents for arguing current cases. They are also used in law
enforcement to prepare, maintain, and review criminal histories. These
records often hold a wealth of information about financial transactions and
the actions of both businesses and individuals.
Open court proceedings are considered public records unless sealed
by the court. The general public has the right to inspect and review these
records. Civil and criminal cases from small claims, divorce, and custody
hearings up to major financial fraud cases can provide evidence and leads in
forensic accounting investigations. As the information is taken from a legal
proceeding, the information is substantiated by the fact that it is provided
under oath.
With the mountains of records prepared, filed, and kept by businesses,
individuals, and agencies, all the investigator needs to do is sort through and
obtain all of the pertinent information to reconstruct the financial activities
of the entity under investigation.
Characteristics
of Financial
Crimes 3
Because financial crimes incorporate planning, business acumen, and decep-
tion, they often take place over a long period of time before the effects are
recognized. There are two main reasons why detection of financial fraud takes
a longer period of time. The first is that the plan for the fraud is designed to
be concealed from the victim. The second is that financial crooks will usually
start small and as time passes without detection they will be emboldened
to take more and more. When the amounts of the financial fraud become
greater, the victims will realize that something is wrong even if they do not
know what it is or the perpetrators’ gain will begin to appear way out of line
with their legitimate earnings.
Due to the time frame involved, the investigator works on two aspects
of the same crime: the effect of the crime in the past and the ongoing crime
as it is occurring. This can cause difficulty in the presentation of the case.
Just as business plans are modified to maximize profits, fraud schemes may
be modified to increase illegal gains. Also, the laws may change over time
and mitigate or accentuate the criminal activity. Therefore, the investigator
needs to be able to present the logic and reasoning behind any modifications,
and be alert to legal changes that may take place.
Forensic accounting is the methodology used to investigate financial
crimes that have taken place over time. Just as other forensic sciences analyze
the current evidence and work backward to determine what took place, the
forensic accountant begins with a current financial status and works back-
ward to determine how the status was obtained.
To investigate financial crimes or to discover the proceeds of illegal
activities, it is necessary to analyze the documents and testimony obtained
that reflect all of the financial transactions of the suspect entity and deter-
mine the extent of the income derived. To make this determination, total
income earned must be established, and then the income from legitimate
sources must be removed or subtracted. The balance will reflect the proceeds
concealed or gained from the illegal activity. As an example, a bartender
is believed to be selling narcotics. He earns $500.00 a week from his job.
The financial investigation shows that he spent $90,000.00 in the past year.
The gains from narcotics sales would be $64,000.00: the $90,000.00 less his
legitimate income of $26,000.00.
19
20 Criminal Financial Investigations
In the same way that crime scene investigations analyze the physical evi-
dence to find out what actually happened in a crime of violence, the financial
investigation must analyze the documentary evidence to find out what took place
to leave the subject of the investigation in his or her current financial position.
Most people want the reassurance of proof of ownership of the items they
buy. Businesses want accurate records to strengthen and expand their opera-
tions and to decide whether changes in their business practices are required.
Even people who are lying about their finances will usually keep hidden
records (often a second set of books) to know exactly how they are doing.
Some people do not keep good or even adequate records. In these cases, they
still remember facts surrounding major purchases or investments. In a situ-
ation where one party does not have records of a transaction, it is likely that
the other party or parties to the transaction will.
Such documents and testimony become the physical evidence that is
used to determine what financial activity occurred to result in the subject’s
current financial position. The paper trail replaces the footprints, fibers, and
other physical evidence used in investigating violent crimes. Because the
evidence in financial crimes is preserved and maintained for long periods
of time, and it is usually kept by each of the persons involved in the trans
action, it is less likely to deteriorate or be lost. It is, however, subject to being
destroyed or concealed in the same way that a perpetrator of a violent crime
may try to destroy evidence. In addition to potential destruction of evidence,
the investigator is faced with time limitations for maintaining documents.
Although records are kept for a long time, the crime may not be discovered
until after it has been ongoing for a long time. It also takes a lot of time to get
all of the evidence needed to completely reconstruct a financial history.
People are limited in what they can do with the money they receive.
Money can be spent or saved. If the money is spent, it will be reflected in the
possessions and lifestyle of the spender. How people spend or save offers a
wide variety of options.
Spending
A person can spend money on perishable goods such as groceries and enter-
tainment, on short-lived items such as clothing and housewares, on recur-
ring expenses such as utility bills and rent, or to continue personal lifestyle
choices such as drinking, smoking, and gambling. These expenditures are
the most difficult to ascertain in a financial investigation due to the lack of
or the short-lived nature of the record keeping. These types of transactions
are often done using cash and receipts that do not always identify the person
conducting the transaction.
Characteristics of Financial Crimes 21
Saving
People can save the money they receive by placing it in cash account liquid
assets such as bank and brokerage accounts, or other interest-bearing or
growth accounts. This type of saving is very well documented due to the
nature of the asset and all of the regulations concerning financial busi-
nesses. Those wishing to conceal savings may open accounts in states or
even countries outside where they reside or do business. Others may use a
money-laundering scheme to make the money appear to be coming from a
legitimate source. Some people have been shown to hide the money in loose
floorboards, attics, mattresses, or even bury it in glass jars. Hoarding is the
least traceable way to conceal accumulated money. It also is the way that is
the least secure; it is susceptible to theft, destruction, and decay. Although
financial crimes are committed to improve one’s standard of living and
provide the finer things of life, it is rare for a financial criminal to hoard the
ill-gotten gains for long.
The Structure
financial changes. These time frames are selected to best reflect the illegiti-
mate gains in shorter segments of the total duration of the financial crime.
As an example, a criminal tax case will present the unreported income for
each period of time that the individual filed a separate return. When a financial
crime occurs over several years, it is easier for the prosecution to present the
case and a jury to understand the case if it can be presented in sequential blocks
of time. The evidence in a financial case is presented using accounting tech-
niques. Summaries of financial transactions are used to show the total finan-
cial picture of the defendant’s financial status at specific points in time. These
financial “snapshots” are then compared to show the changes in the defen-
dant’s financial status. The time frames used in the investigation will coincide
with the business’ or individual’s reporting or record-keeping periods.
The beginning financial snapshot is referred to as the starting point of the
investigation. The subsequent financial pictures show the extent of the gains
from illegal or illicit activities over the duration of the crime.
Financial crimes and the concealment of illegal gains require extensive
preparation, planning, and deception by the perpetrator for the scheme to be
successful. It is often the case that more than one individual is involved in
the financial fraud scheme. Because the plan involves fooling the victims so
that the scheme can be used for a long period of time, the perpetrators also
need to make the scheme appear legitimate and beneficial to the victims.
Financial criminals often play on their target’s weaknesses, greed, and pride.
Two frequent characteristics that arise in financial or white collar crimes are
conspiracy and fraud.
Conspiracy
White collar financial crimes are unique in that they require planning, orga-
nization, and a form of deception. The planning, or premeditation, of the
crime can be simple or complex. The professional thief must plan the theft
and the getaway, and have a market for the stolen goods. The bank officer
who schemes to run fictitious loans through the bank has to devise a method
to create the loans, make them appear legitimate and created in the normal
course of business, divert the proceeds from the loans to his or her own
accounts, conceal the funds taken through bank write-offs, and make the
newfound wealth appear legitimately earned.
Organizing white collar financial crimes requires that the crimes be
effected, and the series of events and activities that will conceal the method
of trickery or deception employed be created. The thief must have a “fence”
or outlet for the stolen goods to remove the evidence of the crime, convert
the goods to cash, and to distance himself or herself from the theft. The
association between the thief and the fence is a conspiracy to accomplish
Characteristics of Financial Crimes 23
and facilitate the crime. The bank officer needs access to the forms for creat-
ing loans, the means or authority to approve loans, and be in a position to
conceal or write off the loans within the bank. He or she would also need
the information and the ability to dismiss the loans within the scope of the
bank’s internal operating procedures. The banker would need to establish
a conduit for the funds taken and a means to conceal his or her receipt of
the monies received. False identities would have to be established for the
nonexistent loan customers, and one or more false or sham business entities
through which the monies could be laundered. There might even be a need
to falsify financial statements and bankruptcy documentation. The banker
would then need to create a legitimate (appearing) source for the newfound
wealth and, finally, a way to disguise the illegal proceeds from detection by
government and regulatory review. In this example, the banker would need
a much larger conspiratorial group to effect and conceal the crime than the
professional thief. The following is a legal definition of conspiracy:
Conspiracy—18 U.S.C. 371 makes it a separate federal crime or offense for any-
one to conspire or agree with someone else to do something which, if actually
carried out, would amount to another federal crime or offense. So, under this law,
a “conspiracy” is an agreement or a kind of “partnership” in criminal purposes
in which each member becomes the agent or partner of every other member.
An overt act is any transaction or event, even one that may be entirely
innocent when considered alone, that is knowingly committed by a conspira-
tor in an effort to accomplish some object of the conspiracy.
A person may become a member of a conspiracy without knowing all of
the details of the unlawful scheme and without knowing who all of the other
members are. So, if a person has an understanding of the unlawful nature of
a plan and knowingly and willfully joins in that plan on one occasion that is
sufficient to convict him for conspiracy. Even though the ultimate criminal
object of the conspiracy may not be accomplished or carried out, the con-
spiracy is established.
Of course, mere presence at the scene of a transaction or event, or the
mere fact that certain persons may have associated with each other and may
have assembled together and discussed common aims and interests does not
necessarily establish proof of a conspiracy. Also, a person who has no knowl-
edge of a conspiracy but who happens to act in a way that advances some
purpose of one does not thereby become a conspirator.
Conspiracy is the combination or agreement of two or more persons
joining together to attempt to accomplish some unlawful purpose. It is a
kind of “partnership in criminal purposes” and willful participation in such
a scheme or agreement followed by the commission of an overt act by one
of the conspirators is sufficient to complete the offense of “conspiracy” itself
even though the ultimate criminal object of the conspiracy is not accom-
plished or carried out.
An agreement between two or more persons to do an unlawful act or
an act that may become by the combination injurious to others—formerly,
this offense was much more circumscribed in its meaning than it is now.
Lord Coke describes it as “a consultation or agreement between two or
more to appeal or indict an innocent person falsely and maliciously, whom
accordingly they cause to be indicted or appealed and afterwards the party is
acquittedby the verdict of twelve men.”
The crime of conspiracy, according to its modern interpretation, may be
of two kinds: (1) conspiracies against the public; or (2) such as endanger the
public health, violate public morals, insult public justice, destroy the public
peace, or affect public trade or business. To remedy these evils, the guilty
persons may be indicted in the name of the commonwealth. Conspiracies
against individuals are such as they have a tendency to injure them in their
persons, reputation, or property. The remedy in these cases is either by indict-
ment or by a civil action.*
In the legal context, conspiracy is involved in a major portion of extended
or ongoing white collar financial crimes. Therefore, the investigator must be
Fraud
and concealment of the crime. Trickery, deceit, and false representations are
all part of fraud. The following is a general definition of fraud:
29
30 Criminal Financial Investigations
Theft
Theft is the generic term for all crimes in which a person intentionally and
fraudulently takes personal property of another without permission or con-
sent and with the intent to convert it to the taker’s use (including potential
sale). In many states, if the value of the property taken is low (for example,
less than $500.00), the crime is “petty theft,” but it is “grand theft” for larger
amounts, designated misdemeanor or felony, respectively. Theft is synony-
mous with “larceny.” Although robbery (taking by force), burglary (taken
by entering unlawfully), and embezzlement (stealing from an employer)
are all commonly thought of as theft, they are distinguished by the means
and methods used, and are separately designated as those types of crimes in
criminal charges and statutory punishments.
Burglary
Burglary is the crime of breaking and entering into a structure for the pur-
pose of committing a crime. No great force is needed (pushing open a door
or slipping through an open window is sufficient) if the entry is unauthor-
ized. Contrary to common belief, a burglary is not necessarily for theft.
It can apply to any crime, such as assault or sexual harassment, whether
the intended criminal act is committed or not. Originally under English
common law, burglary was limited to entry in residences at night, but it
has been expanded to all criminal entries into any building or even into
a vehicle.
Categories of Theft 31
Larceny
Larceny is the crime of taking the goods of another person without permis-
sion (usually secretly) with the intent of keeping them. It is one form of theft.
Some states differentiate between grand larceny and petty larceny based on
the value of the stolen goods. Grand larceny is a felony with a state prison sen-
tence as a punishment, and petty larceny is usually limited to county jail time.
Robbery
Embezzlement
Swindle
* Reprinted with permission from the 2008 edition of Law.com. © 2008 ALM Properties, Inc.
32 Criminal Financial Investigations
usually between 15% and 30% of the principal the borrower was seeking,
in the original loan amount. The conspirators would file the required paper-
work with the government without disclosing the loan origination fee. When
the loan was completed, they would take their fee off the top of the loan pro-
ceeds. The borrower was required to pay interest on the total loan amount
and the fee paid. This scheme was in direct violation of banking laws and
lending regulations. A sample transaction would look like this:
This was not the end of the scheme devised by the conspirators. The
prominent businessman used losses in his legitimate business to offset the
personal taxes that would be owed on the illegal income. He reported all of
the kickbacks and used losses he was entitled to from prior years (loss carry
forwards) to avoid paying income taxes on the kickbacks. This also made the
kickback money appear to be generated from a legitimate business (money
laundering). The kickback amounts were split equally among the three con-
spirators. The bank owner and the bank president did not report any of this
income on their personal returns.
This appeared to be a perfect scheme with the kickbacks being received
when the loan proceeds were given to the borrowers. If the borrower did
default, the payments were insured through government programs. The bor-
rowers were not likely to complain about the “origination fee” because they
had no other means of getting financing. Finally, the illegal funds were being
laundered through an unrelated business, and no discrepancies needed to
be made to the loan company books. This was important because federally
insured financial businesses may undergo more frequent and rigorous audits
than other types of businesses.
A complaint was received from one of the borrowers. The complaint
related to the interest rate being charged on the loan. Ironically, the origina-
tion fee was not mentioned. The forensic accounting investigation disclosed:
A review of the financial records of the bank owner and the bank presi-
dent showed a substantial increase in wealth since the loan business started.
The bank records of the businessman showed some checks in the same
amount as the kickbacks being cashed on the same day or the day after they
were paid. On the same day that these checks were cashed, there were cash
deposits made to the accounts of the other two conspirators in one-third
portions of the amount.
A cursory review of the businessman’s records for his business showed
a sharp rise in income while the loan business was in operation. The busi-
nessman had loss carry forwards for prior years that were used to offset
the increased income reported. These prior year losses were large enough
to ensure that the extra income would not be subject to income taxes. This
served a dual purpose in making the kickbacks virtually tax free and in
laundering the money received to appear to be generated from legitimate
operations. A further review of his records showed that the income could
not be generated from his regular business operations. This was shown by
analyzing his prior year inventory and cost of goods sold (the result being
gross profit) and comparing them to the years the loan scheme was in opera-
tion. His markup on sales averaged 15% before the loan scam, and it jumped
to 65% while the loan company was operating. There were no significant
changes in the prices he paid for the goods he sold or in the prices he charged
his customers. Inventories did not increase, and in one year he would have
had to sell more than he had to justify the income reported.
During the three trials (the defense motion to sever the cases was
granted) the forensic accounting investigation results were presented to the
jury. The defense argued that the kickbacks were origination fees that were
agreed to by the borrowers, and that these were legitimate transactions.
The financial evidence showed that the origination fees were not reported
in the loan company books and records, that the kickbacks were diverted
and laundered through an unrelated business, and that the three conspira-
tors each received a third of the kickbacks. This was sufficient to convince
the jury that the conspirators intentionally committed loan fraud and were
in conspiracy together. Each defendant received a 10-year sentence and a
$10,000 fine. Civilly, they were required to repay the origination fees, and
they were assessed income taxes on the ill-gotten gains. Ironically, the busi-
nessman received a tax refund for a few hundred dollars for one tax year. This
was because he had overreported his income trying to launder the kickbacks.
He received the check while in federal prison.
The case provides several good examples of how forensic accounting
can enhance and fortify a criminal prosecution and some of the problems
encountered in presenting a circumstantial case. When one or a few indi-
viduals have total control of the business operation and record keeping, it is
easier to conceive and execute a criminal conspiracy. The three conspirators
36 Criminal Financial Investigations
had backgrounds in the areas of banking and business. These provided them
a special knowledge of how the loan business should look to people outside of
business. The three were prominent individuals in the community, and their
customers relied on them to accurately and honestly conduct the transactions.
The loan documents prepared and given to the customers were official
and legitimate in appearance. The loan fraud victims were not aware of the
fact that they were being victimized. Several customers were reluctant to pro-
vide information based on allegiance to the loan company, which was their
only hope.
Regulation of loan fees and charges are complicated enough to sway
a jury into believing that violations could occur unwittingly and could be
honest mistakes. The financial association between the three individuals
had to be established beyond a reasonable doubt. The dollar amounts of the
financial crime had to be substantial to show motive. The concealment of the
kickbacks and the ability to trace the funds through the unrelated business
were crucial to establish intent to commit the crimes. The laundered funds
had to be shown as not being generated through normal business activity.
Most important, it shows the benefits in “following the money.”
The preceding case is an example of financial criminals targeting victims
who are in desperate situations. Schemes are also developed that play on
the natural greed of their victims. One of the first schemes used to defraud
people of their money using the promise of high returns on an investment
was developed by Charles Ponzi. This scheme was so innovative at the time
that this type of scheme is still referred to as a Ponzi scheme.
New England. His persuasive sales pitch and the huge profits offered gave
him thousands of investors. By May he had several hundred thousand
dollars. He deposited a lot of his money in the Hanover Trust Bank in
hopes of becoming its president. He did manage to gain a controlling
interest in the bank.
By July, Ponzi had more than two million dollars. Most of his investors
were so confident, that they rolled over their investment with interest, as
the investments matured. Ponzi began a lifestyle of wealth. He purchased
a huge home, brought his mother to America from Italy on a first class
passage ocean liner, and became a local hero in the Italian community.
Although money continued to come in, his expenses and lifestyle
drained more than was being received. A lawsuit was filed for prior debts.
Although unsuccessful, the suit caused doubts and fears in the investors.
Soon there was a run on the Securities Exchange Company. Ponzi calmly
paid the investors that wanted out and the run ended. Business went back
on the upswing after good publicity and he was again bringing in thou-
sands of dollars a month.
Curiosity and possibly envy drove the newspaper to assign investigative
reporters, and the Commonwealth of Massachusetts began an investiga-
tion. He appeared to be cooperating with the investigation and was able to
delay their efforts. Ponzi had no real records of his financial transactions.
Near the end of July, the newspaper began a series of articles question-
ing Ponzi’s investment scheme, and was able to get Clarence Barron, a
financial analyst and publisher of Barron’s financial paper to look into
the scheme. Barron noted that, although Ponzi promised phenomenal
returns, he did not invest any of his own money into the scheme. It was
estimated that 160 million coupons would be needed for the scheme and
only about 30 thousand were in circulation.
These stories caused another panic for the investors, and another run
on the Securities Exchange occurred. He began paying off investors again
and tried to reassure them of their investments. Many believed him and
left their money in. The newspaper reported on Ponzi’s prior criminal
record, and in August he was arrested on 86 counts of mail fraud. Many
of the investors refused to believe his guilt, either from blind faith or the
inability to accept their own foolishness.
On November 30, 1920, Ponzi pleaded guilty to mail fraud and was
sentenced to five years in prison. He was released after three and a half
years to face the State charges that were pending. He was found guilty
and sentenced to nine more years. Ponzi was released on parole in 1934
and immediately deported to Italy.
Source: Zuckoff, Mitchell, Ponzi’s Scheme: The True Story of a Financial
Legend, Random House: New York, 2005.
Categories of Theft 39
Variations on this scheme have been used ever since. The key ingredients
are to offer a phenomenal return on an investment, find investors anxious
to make large profits with little or no effort on their part, make the scheme
appear to be on a new undiscovered investment opportunity, and an under-
standing on when to close up shop and take the profits. The following section
on schemes has examples of this type of crime and the forensic accounting
investigation used to prosecute it.
Schemes
They would rent a small extra barn from a rancher and buy a dozen
breed cows.
They set up an elaborate veterinarian work area in the barn.
They rented a very nice office in a nearby town and set up a business front.
They attended several cattle auctions and solicited customers from
the crowd.
The investment plan they proposed was that they would purchase egg
and sperm from several prize bulls and purchase one prize breed cow.
They would inject the breed cow with fertility serum so she could produce
12 to 15 eggs during ovulation. The eggs would be fertilized with the prize
bull sperm, and the fertilized eggs (genetically superior) would be placed
in the wombs of the other cows. When these cows calved, they would sell
the cows for $5,000.00 to $8,000.00 each, and the bull calves for $50,000.00
to $80,000.00 each. The investors could purchase shares in increments of
$10,000.00 (costs of egg fertilization and planting). The return on the invest-
ment was promoted at 60% to 120% per year (birthing period for cows). They
offered tours of the veterinarian laboratory setup to prospective investors.
40 Criminal Financial Investigations
They also showed cattle on other ranches nearby, claiming that these cows
were also part of their holdings. They financed the start-up expenses through
a bank loan for $220,000.00. The following are the events that took place:
1. They began with 16 investors. They deposited the money and wrote
phony checks for nonexistent business expenses. They reported a net
profit of about 8% of gross income (the $160,000.00).
2. After 2 months, they began paying the original investors $800.00
a month.
They continued soliciting customers and word spread on the suc-
cess from the first customers.
3. The business continued for 2 more years in which they took in
$2.2 million.
4. They paid out about $180,000.00 to investors; they convinced most of
them to keep reinvesting their profits.
The scheme came to light when one investor, greedy for even greater prof-
its, contacted the prize bull owner allegedly used in the business and found
out that he knew nothing about the business front or the two conspirators.
This investor contacted the police and an investigation began. During the
police investigation, the conspirators tried to convince the police that they
only needed the initial sperm from a prize bull so that they could use their
own genetic bull and cows for the production of the fertile eggs. They also
offered the investor his investment and profits (approximately $22,000.00).
The investor declined, believing their story. A forensic accounting investiga-
tion disclosed the following:
During the investigation, a search warrant was executed for the business
office. The falsified license and college degrees were part of the records taken.
The warrant also made the false business ledgers and records available, and
Categories of Theft 41
identified the out-of-state bank account. The conspirators pleaded guilty and
received 10-year sentences. The funds that remained were forfeited.
Another situation in which forensic accounting techniques can play an
extremely important part is in the investigation of criminal enterprises. The
following example demonstrates how effective the financial investigation can
be in purely criminal activities. Keep in mind that the criminal enterprise is
driven by the same motivation as legitimate and fraudulent enterprises—greed.
The difference lies in that the criminal enterprise does not set up an elaborate
front to conceal the criminal activity (except for money-laundering purposes)
but attempts to conceal the criminal activity entirely.
In this next case, the criminal activity was to import and distribute mari-
juana. The source of the marijuana was Central and South America. It would
be transported on a small barge across the Caribbean and up the eastern coast
of the United States. Smaller boats would sail out to the barge and unload the
shipment. The barge would carry between 1200 and 3600 pounds of mari-
juana on each trip. The marijuana would be put on trucks and taken to one
of five rural farmhouses in the Midwest (the farm location would change for
each load). At the farms, the marijuana would be packaged in 1-pound bricks
and plastic wrapped (they used grocery-type wrapping machines). Some of
the packages would be sold to distributors in nearby states, with the bulk of
the loads being hidden in vacation vehicles (recreational vehicles and motor
homes) and driven to a major distributor in the Southwest United States.
The two main couples involved in the narcotics case lived in a large city
about 100 to 150 miles away from the farms used for packaging the mari-
juana. The police department had received anonymous reports that the four
used and sold marijuana. Although their operation did almost all of its busi-
ness outside the city and state where they lived, surveillance and other police
investigation techniques did not uncover any illegal activity. A forensic
accounting investigation was initiated. The initial investigation revealed the
following information:
Going back to the beginning of this case, the investigators could have
settled for a misdemeanor arrest of the two couples for the possession of
marijuana at the rock concert. Using forensic accounting techniques and
spending almost a year on the investigation rewarded the investigators with
a very large narcotics case and the satisfaction of putting an end to a major
narcotics operation.
The three cases discussed in this chapter show the importance and effec-
tiveness of following the paper trail using accepted procedures and methods
of proof. Although the evidence is circumstantial, the preponderance of
evidence can effectively demonstrate criminal intent to commit a crime. The
cases discussed touch on what items can be part of the paper trail. The next
chapter will go into more detail on what makes up the paper trail and what
these items look like.
The
Paper Trail 5
What Is the “Paper Trail?”
The paper trail is exactly that—a trail of paper for each financial transaction.
Everyone wants the security of proof of ownership of the things they have.
For tax purposes, people also keep a wide variety of records to support the
claims on the returns they file. Businesses maintain still other records to
promote efficiency, identify their best customers, and evaluate their opera-
tions. Even financial schemers want to know how well they are doing and
who the best targets are. The documents can be as simple as a handwritten
IOU to volumes of corporate ledgers. These are the documents that make up
the paper trail.
In almost every financial transaction, there are multiple records pre-
pared for what has taken place. When you buy a car, a copy of the vehicle
documents goes to the lender (if it is financed), a copy goes to the purchaser
for registration and licensing purposes, a copy goes to the state in which the
car is registered, a copy may go to the manufacturer for warranty purposes,
and a copy may go to another lender if the equity in the vehicle is used for
collateral on another loan. Even something as small as buying a hamburger
gets documented. A receipt goes to the customer (which can be used if the
purchase is tax deductible), and a copy of the sale is recorded on the cash
register to document the sale by the restaurant.
As two or more parties almost always receive documentation for each
financial transaction, the paper trail can be obtained from various sources.
Third parties (those people unrelated to the investigation but who are doing
business with the subject of the investigation) are a valuable resource in
documenting an individual’s transactions. The difficulty lies in being able to
identify the third parties. Often, observation of the subject during interviews
or through surveillance can provide leads regarding the third parties that
have had financial dealings with the subject.
The best sources of information are usually the subjects themselves if
the investigator conducts a thorough interview. Because forensic accounting
investigations cover an extended period of time, it is important to know the
history of the subject. More details on interviewing techniques will be covered
45
46 Criminal Financial Investigations
in a later chapter. If the subjects are confident in their schemes, they will
often provide information and documents to persuade the investigator that
no wrongdoing has occurred. Often the records provided will be the falsified
ones in an attempt to conceal the financial crime. The records of the subject
may also be obtained through the execution of a search warrant. For this, the
investigator needs to provide a judge with proof that probable cause exists
to believe that the documents are relevant to the investigation of the alleged
crime and likely to be at the location for which the warrant is requested.
The following are some of the most common financial documents used in
forensic accounting investigation.
Check Registers
The most common form of personal and business accounting documentation
is the check register or checkbook. People log in the information about the
checks they write and the deposits they make to their checking accounts. It is
hoped that they will reconcile their bank accounts when they receive their
monthly account statements to ensure that they have recorded the transactions
accurately. The check register can provide a wealth of information depending
on how diligent account holders are in recording their transactions. There are
columns for the date written, payee, check number, and amount. Other col-
umns are included for coding automatic deposits and payments, automated
teller machine transactions, debit card transactions, and telephonic transfers.
For individuals, this is often the personal paper trail for the majority of their
financial transactions.
Although it may look different, the business check register contains similar
financial transaction information. Business registers will include date, check
number, payee, and amount. They may include a stub on which the business
account affected by the transaction is included. The check is attached to the
stub, and once the check is written, the check goes out and the stub remains
as part of the business’ internal record-keeping system. Many of today’s busi-
ness operations use electronic record-keeping and computerized accounting
systems. In any case, checks are still written and recorded in business opera-
tions. Such recording provides the information necessary to accurately record
business activities, verify and settle mistakes and claims, and let the business
owners know the current status of the business’ financial condition. These are
the bank account owner’s record of financial transactions.
In addition, the bank will maintain records for each account it handles.
It will record daily transactions made in an account and prepare statements
The Paper Trail 47
that summarize the account activity for each month. The bank keeps these
statements, and copies are sent to account holders. The bank also maintains
supporting documentation for the transactions shown in the statements,
as well as for other debits and credits to the account that are made for charges
against the accounts and interest paid.
In addition to keeping duplicate records of account-holder activities,
banks maintain a wide variety of other customer financial transaction docu-
mentation. These would include the records of cash in and out, and account
activity support for each teller’s daily transactions. They would also include
loan applications and their approvals and distributions; wire transfers
between accounts; certificate of deposit purchases and redemptions; invest-
ment retirement accounts; and the purchase or cashing of cashier checks,
money orders, and savings bonds. Banks are also required to maintain
records of cash or currency transactions in excess of $10,000 by identify-
ing the customer and completing a currency transaction report (CTR), a
copy of which is filed with the U.S. Treasury Department. These provisions
were implemented through the Bank Secrecy Act (31 CFR 103). For security
purposes, most banks separate the responsibility for various types of trans
actions in different departments.
The records that are maintained by the bank on behalf of its customers are
protected from public inspection. Records of the bank’s internal business trans-
actions have other legal protections that apply to personal and business records.
Copies of these forms will be posted to the customer account and sent to
the customer directly. Monthly statements (similar to bank statements) will
be prepared and maintained, and a copy will be sent to the customer. These
statements will show the date of the transactions, the payment of interest and
dividends, amounts paid out of the accounts, and the current valuation of the
securities held in the account.
Because the stockholders are the actual owners of the companies that
issued the stock, the companies will also keep records of ownership to notify
shareholders of matters for which they have a voting interest and will supply
them with annual reports.
Stockbrokers have expanded their inventory of investments for clients to
include commodities, mutual funds, over-the-counter (OTC) stocks, foreign
securities, and other investments. The Securities and Exchange Commission
(SEC) regulates the purchase, sale, issuance, and exchange of publicly held
securities. Whenever an executive regulatory agency is involved in oversight
of an industry, the paper trail increases dramatically. Oversight of the securi-
ties industry requires documentation to satisfy reporting regulations and for
the purposes of auditing and review to ensure compliance with federal laws
and regulations.
In addition to licensed and regulated investment opportunities, the indi-
vidual may also invest in nonregulated businesses and organizations. These
types of investments include part ownership in a business as a silent part-
ner and joint ventures in business, or land development, or various product
development. Private investments are not required to maintain the same type
or number of records, but you can be sure that when people turn over their
money to others they will require documents to show the investment and
their ownership. The business receiving the investment will also want docu-
mentation to identify their patrons and to limit repayment liability. The days
of doing business on your reputation and a handshake are a thing of the past.
Real Property
The term real property is used to differentiate tangible or physical assets that
have a long life expectancy from those that only have a useful life of a few
years. These assets would include items such as land, buildings, and heavy
equipment and machinery. Due to the high cost of these types of assets, a large
quantity of “paper” is generated for their purchase, sale, and transfer. These
records are created and maintained for long periods of time by the buyers and
sellers, and are also filed with several regulatory offices. Property assessors,
taxing authorities, companies holding collateral interests, and investors
require information on the acquisition and disposition of these types of assets.
Anyone who has ever purchased a home is aware of the volume of records
generated to complete the transaction.
The Paper Trail 49
The documents produced for the purchase of real property would begin
with a purchase offer from the individual interested in buying the property to
the seller listing the terms and conditions under which the buyer is willing to
purchase the property. The seller can accept or decline the offer, or propose dif-
ferent terms in the form of a counteroffer. This is the documented version of
price and terms negotiations. It is similar to the verbal negotiations that occur
between a car salesman and a customer. Similar negotiations would occur
between a customer and a building contractor in the form of a written contract
to begin and complete the construction project. The negotiations are then final-
ized, and the contract would specify each party’s responsibilities and obligation.
After the purchase/sale agreement is reached, other documents are pre-
pared to complete the transaction. In a major transaction of this kind there
are filing fees, tax allocations, financing costs, appraisal fees, and other costs
involved in completing the sale. A closing statement is prepared to identify
the related costs and to allocate these costs to the respective parties. When
financing is involved, the statement will identify the lender and include the
“points” paid for financing and the amount of funds borrowed. Once the
closing is complete, other related documents (usually prepared in advance)
are filed with the parties having an interest in the transaction and with the
respective regulatory agencies.
The lender providing financing will file the mortgage against the prop-
erty with the county registrar of deeds office to secure its interest in the
property. Any subsequent transfer of the mortgage or satisfaction of the
mortgage (acknowledging the amount being paid off) will also be filed in
the registrar’s office. The sale information will also be filed with the county
assessor’s office for valuation and tax assessment purposes. The purchasers
will file a deed of record to show that they are the new owners of the property.
The deed will give the legal description of the property (location determined
by a grid system) and any easements, right-of-ways, or restrictions on the
property use. Any outstanding liabilities for improvement to the property
will also be filed in the form of liens against the property. Unpaid property
tax liens are also filed in this manner.
Financial institutions involved in these transactions have other internal
and regulatory rules for preparation, maintenance, and filing of documents
to record all the financial aspects of the transaction. The mortgage or loan
application requesting financing will include the amount of the loan, terms
of repayment, interest rate, amount of down payment, and total amount of
repayment (including interest) over the term or life of the loan. The bank
will have the borrower complete a financial statement and will check the
applicant’s financial history before approving the loan. The financial state-
ment will identify the applicant’s net worth (assets and liabilities), sources
and amounts of income currently being earned, and any other sources of
funds to be used for the down payment or closing costs.
50 Criminal Financial Investigations
Vehicles
There are several documents prepared for the purchase and sale of vehicles.
These provide proof of ownership and the amount of the transaction for tax-
ing authorities, licensing and registration information, and a variety of other
uses. The vehicle title identifies the make, model, style, and year the vehicle
was manufactured; it also identifies the name and address of the buyer
and seller (at the time of the transaction), the lien holders (if financing is
involved), the vehicle identification number (VIN), the mileage (for cars and
trucks) or engine usage (for boats and aircraft), accident damages in excess of
a set amount, and the cost and taxes paid on the transfer of ownership.
Vehicles are unique in that the owner must be licensed to operate the
vehicle, and the vehicle itself must be registered for use with a governmental
authority. Licensing is usually required for a set period of time (one to several
years). Registration is an annual requirement if the vehicle is to be used. Both
licensing and registration generate another paper trail for the ownership of
the vehicle. Visible proof of current registration is posted on the vehicle in
the form of license plates (for cars, trucks, and motorized equipment) and
by watercraft or wing numbers on boats and aircraft. The investigator needs
to verify ownership through the paper trail. Access, use, and operation of a
vehicle do not establish ownership.
There are different paper trails for each aspect of documentation required
in the transfer of ownership of a vehicle. The buyer and seller receive copies
of the sales agreement, and the state receives a copy for purposes of taxation.
The purchaser and the state also receive copies of the title for the vehicle
(the original is held by the lender until the financing is settled). The county
in which the vehicle owner resides uses a copy of the title for registration of
the vehicle to record any liens against the vehicle. Local law enforcement
will also maintain records of the vehicle and owner if traffic or usage viola-
tions occur. The lending institution financing the vehicle will maintain the
standardloan documents involved in the financing.
The VIN or registration number is a unique identification for the vehi-
cle, similar to the social security numbers used to identify individuals. This
The Paper Trail 51
number is used by the manufacturer for warranty repair and recall informa-
tion, the dealership for recording inventory and identifying the customer’s
ownership, and law enforcement for recovering stolen vehicles and pursuing
forfeiture actions if the vehicle is used in the commission of a crime.
Other businesses may also maintain documentation on vehicles. Insur-
ance companies will keep records of the cost, mileage, use, and authorized
operators of the vehicle, as well as any damages to or claims made against the
vehicle. Repair shops will keep records of the services they perform on the
vehicle, and storage and parking facilities will also keep records. Businesses
that provide usage facilities for the vehicle, such as airports, hangars, and
marinas, will also keep records of the vehicles they service. In addition, these
secondary record keepers can often provide information on the dates, times,
and frequency of usage; the operator and number of passengers or guests;
repairs and modifications made to the vehicle; and insights into the owner’s
habits and lifestyle.
Other Assets
The “other assets” category covers all of the other major purchases an indi-
vidual can make. As this category is so broad, only a few types of asset acqui-
sitions will be discussed. The discussion should identify common traits in
the paper trails for a variety of other asset purchases. Taking time to identify
the parties of interest when a major purchase is made can be of help to the
investigator in finding the paper trails associated with each purchase.
Businesses will seek to satisfy the needs and wants of specific customer
bases. They will often research specific economic and demographic data, and
determine regional aspects for store locations and advertising. The customers
sought after may range from a wide base served by discount stores to a smaller
base served by department stores and specialty shops, up to the most expen-
sive and exclusive stores that cater to a small clientele. As the motivation for
financial crimes is to gain wealth quickly, the perpetrator will want to enjoy
the fruits of the crime. They will often spend the ill-gotten gains soon after
receiving them and indulge themselves with the finer things in life.
Just as most people will spend what they can afford on a house or car, suc-
cessful financial criminals will focus on purchasing more and more expensive
items to display their wealth and enhance their financial status. This does not
mean that affluence is an indicator of criminal behavior, but those who exhibit
sudden or unexplainable financial resources are often suspect. Financial inves-
tigations often begin with a report of these sudden or unexplainable increases
in wealth, sometimes out of social concern and often out of a degree of envy.
The paper trail for everyday purchases of food, clothing, and entertain-
ment or miscellaneous items usually consists of no more than a duplicate
52 Criminal Financial Investigations
receipt (one for the store and one for the customer). Unless the customer is well
known to the clerk as a regular customer, requests special services or items, or
uses a credit card, it is difficult to document these type of purchases. If the store
is more expensive or exotic in its merchandise, it will have fewer customers
who will be more recognizable to the sales staff. Exclusive stores will carry
items at expensive prices. To provide their customers with personal service, the
stores will seek to know as much as possible about them in hopes of additional
purchases and referrals. The following are a few of the most common luxury
items and the variations that may occur in the paper trail.
Jewelry
The jeweler will remember the customer who comes in to purchase a three-
carat diamond pendant or a handful of loose diamonds for several thousand
dollars. He will make conversation, know the customer’s name, and, most
important, make a store record of the customer for reference so that others
on the sales staff will be familiar with the customer. Expensive single stones
are often microscopically marked for identification, and custom settings are
often cataloged for identification and advertising purposes. The store will try
to obtain information including name and address to maintain future con-
tact with the customer, and often requests whether the customer would agree
to being a reference for its goods and work. The usual business paper trail
will be prepared. Other information, such as that already mentioned, will
also be prepared. If insurance is provided, or if the client wants a service and
cleaning contract, additional information will be prepared and maintained.
Collectibles
This category is very broad and will include any item or set of items that
an individual believes will increase in value over time or that holds special
intrinsic value to the owner. The thought behind collectibles is that over time
the number available to collectors will shrink due to breakage and wear and
The Paper Trail 53
tear from usage. Any type of item may be collected, including autographs,
bottle caps, rocks, or others with little or no initial cost, or items such as
sports and celebrity memorabilia, coins, antiques, and artwork, which may
have very high initial costs in acquisition. The following are a few of the more
common and expensive items sought by collectors.
Antiques
This category can include a wide variety of items crafted or produced by
prior generations. If the item is in good condition and rare in number, the
value and costs can be enormous. These collectibles may originate from
any period in history. Early Chinese, Asian, European, Greek, Roman, and
Egyptian artifacts are some of the earliest collectibles. Other collectors may
focus on a single culture and era in history, such as the colonial, Civil War,
or World War periods in the United States. Still others may concentrate on a
commoncategory throughout history, such as military, political, books, toys,
or movie posters.
Most collectors want to display their treasures as an accomplishment or
an inspiration to others. Individuals who have acquired their wealth recently
quickly pay the current or top price in starting their collections. It is also
a way in which affluence and a large amount of disposable income can be
shown off to others. The most valuable collectibles are usually well identi-
fied and categorized to ensure authenticity, and prevent fraud and deception.
Many are sold through brokers or auction houses. Again, the investigator
must identify all of the parties involved in the transaction and determine the
extent of the paper trail required for one’s own protection and peace of mind.
Philately
Philately, or stamp collecting, is a fairly common endeavor among collectors.
It is estimated that there are more than 20 million stamp collectors in the
United States alone. Extremely rare stamps are cataloged, and serious collec-
tors know the number in existence. Although the average financial criminal
may have no interest in stamps, their small size, the fact that these stamps
are only identifiable to those who study them, and their known and constant
value make this an easy way to transfer wealth in and out of the country. The
paper trail on major purchases of stamps would include appraisals, authenti-
cations, sales and purchase records, and auction files if sold in that manner.
Numismatics
Numismatics, or the collecting of coins, is also a common category for collec-
tors. Some collectors will focus on ancient coins minted during early periods
54 Criminal Financial Investigations
of world history, and others may specialize in coins from a single country
and even a specific type of coin (cent, nickel, dime, quarter, half, or dollar in
U.S. denominations). Again, the rarity and condition of the coins will be the
determining factor in the value of each piece. Rare coins have also been used
to circumvent customs regulations. One hundred rare silver dollars can be
worth several thousand dollars and easily converted to currency in a foreign
country, but cannot exceed the $3000.00 reporting requirement if viewed as
only $100.00.
In addition to collectible coins, there are also bullion coins, which are
bought and sold at the current price of the precious metal from which they
are minted. These coins may be minted by private companies or by countries
around the world. They are produced using the troy system of weights and
measures. The South African Krugerrand, the Canadian Maple Leaf, and the
U.S. American Eagle are the better known examples of gold bullion coins,
and are purchased and sold at the spot market price of gold with an additional
fee per coin for the costs of handling. The coins or tokens (metals minted by
private companies) may be made of any precious metal, the most common
being silver, gold, and platinum. With the price of gold at about $750.00 per
troy ounce, 100 coins would be worth $75,000.00. American coins minted as
legal tender in the earlier years of the nation would hold as a minimum the
bullion value, and if in collectible condition, far more in value.
The dealers selling the coins and bullion will often keep information on
clients for the same purposes as those selling furs and jewelry. They may also
want a record of major purchasers if they have the opportunity to transact
additional purchases or make sales on their behalf.
Artwork
Art collections may include paintings, watercolors, lithographs, sculpture,
and handcrafted items. Expensive art items are also cataloged, identified by
artist, date created, title, and the medium used in the creation. Art dealers
often try to keep track of ownership of items to facilitate sales and purchases
between their clients. Authentication and appraisals are a standard in the
industry to maintain reputations and dealer credibility.
Due to the value, and often the delicate nature of collectibles, owners
will also seek assistance in the maintenance, storage, and security of these
items. Dealers will keep records to protect themselves against liability and
guarantee the customers’ safety when the latter deal with their businesses.
If the items are insured, the insurance company will keep a meticulous
inventory of the items, including appraisals, photographs, and often a copy
of the purchase agreement.
Although many financial criminals are clever enough to attempt to
conceal the means of illegal gains by use of cash and nominees for their
The Paper Trail 55
transactions, they cannot control the third parties they deal with in spending
and enjoying their ill-gotten gains.
Liabilities
57
58 Criminal Financial Investigations
Interviewing
• You meet the witness for the interview, and his or her first question
to you is whether he or she is the target of your investigation. Even
if the witness is currently the most likely suspect, the interviewer
should state that he or she is interviewing everyone who may have
information to determine who is actually responsible for the finan-
cial discrepancies. Once all of the information is obtained and ana-
lyzed, a determination will be made as to whether the discrepancies
occurred due to a systemic problem, by mistake, or were intentional.
information. Was there a part-time clerk at the store? Was it the store manager
or owner at the store? Who handled the transaction? The investigator may
need to conduct more than one interview relating to a specific transaction
if a part-time clerk made the sale, the store manager approved financing the
sale, and the owner made several prior sales to the subject.
The investigator needs to know the business relationship between the wit-
ness and the subject. Is the witness in a subordinate position to the subject?
If this is the case, how much influence will the subject have over the degree
of cooperation from the witness? If they are partners or close associates, the
discovery that a financial fraud was perpetrated could have an adverse effect
on the business and reputation of the witness. Disclosure of a financial fraud
can also be devastating to the business that suffers the fraud, especially if the
business relies on customer confidence to make a profit. Examples include a
bank in which an employee embezzles funds or a construction company that
has a foreman who uses inferior materials for kickbacks.
The investigator also needs to know what the personal relationship, if
any, is between the witness and the subject. If the witness is a relative of
the subject, he or she often will be hesitant to provide any information.
Demonstrating objectivity in this circumstance may open the witness to pro-
viding information that would tend to exonerate the subject from culpability.
Relatives and associates may also have strained relationships with the subject
and may provide biased information to implicate the subject. The investigator
has to sort out the emotions involved and concentrate on the factual infor-
mation needed. Remember that in a financial investigation the case hinges
on the facts about the financial dealings of the subject and not whether the
witness sees the subject as a good or bad person. A former spouse, a party in a
lawsuit versus the subject, or a customer or client who believes the subject has
cheated him or her is naturally going to voice complaints during the inter-
view. To remain objective, the investigator must take care not to take sides in
the dispute or be overly sympathetic to the witness:
• The witness is the ex-wife of the subject, and you discover that she
and their child are dependent on the subject for support. The investi-
gator can begin with very general questions to take the witness’ focus
away from her dependency or begin with questions about the divorce
to remind her of former adversarial conditions between them.
that the fraud appears to cover only a certain time period and that its
discovery without his or her assistance may turn out to be worse for
him or her than helping to remedy the situation.
The investigator should fully develop the lead information that made the
interview necessary and ponder over what other information the witness may
have. This gives the investigator an opportunity to consider what areas may
require follow-up questions and how to prepare for those questions. Such
preparation will greatly reduce interruption in the flow of the interview and
the need for additional interviews with the witness to clarify information.
In a financial investigation, the investigator has to weigh and assess the
information currently being obtained in the context of all the prior informa-
tion gathered. The investigator also needs to be aware that witnesses and the
subject will have difficulty in remembering the specifics of everyday financial
activities. As such, having pertinent records ready to refresh their memory
is very beneficial.
It is often helpful to limit the initial interview with the subject of an inves-
tigation to the history, background, and general financial or business prac-
tices until the investigator has had time to review and analyze the records
and documents provided. In involved cases, it is not unusual to interview
the subject several times to clarify issues that develop, that is, if the subject is
willing to provide the investigator with the information. Individuals involved
in complex schemes and conspiracies will often feign innocence and try to
convince investigators that nothing illegal has occurred. Those involved in
fraud conspiracies will often deny knowing the existence of or extent of the
fraud scheme, or try to convince the investigator that they were told what to
do without any explanation as to why. Another explanation often given is
that they only made a mistake. All of these reasons are common defenses in
conspiracy cases:
• During your interview with Mrs. Doe, she states that some pieces
of the purchased jewelry were picked up by and fitted for a blonde
lady in her late 20s. You met the subject’s wife earlier, and she is a
Collecting and Preserving Evidence 61
brunette and 47 years old. At your request, Mrs. Doe searches the
records and finds the name and address of the blonde. This provides
the investigator with a new lead on potential expenditures.
• The witness is a loan officer who has approved several loans that have
defaulted. The loan files are complete and do not appear to be falsified.
The defaulted loans are unique in that the proceeds for each were dis-
tributed in cash. The witness states that mistakes may have been made
in approving the loans but he did nothing outside of the bank’s regu-
lations. All the loans defaulted were processed by the same collections
officer. Analysis of the two employees’ records show cash deposits of
50% of the loan proceeds to each of their accounts on the day the pro-
ceeds were disbursed. Confronting the witness with these facts will
often lead to an admission and implication of the other conspirator,
or the witness will fabricate a reason for the deposits. Fabrications are
made off the cuff and are usually easy to disprove.
Documentation
63
64 Criminal Financial Investigations
Although each state may have its own version of rules for these proceed-
ings, all will incorporate or adopt the Federal Rules of Evidence as their for-
mat. For our purposes, we will discuss the Federal Rules of Evidence keeping
in mind that some jurisdictions may have variations in these rules. Under
these rules, there are three general requirements that must be met for an item,
document, or testimony to be accepted in the matter being heard: relevance,
materiality, and competency.
Relevance
The following are Article IV, Rules 401 and 402 of the Federal Rules of
Evidence:
“Relevant evidence” means evidence having any tendency to make the exis-
tence of any fact that is of consequence to the determination of the action
more probable or less probable than it would be without that evidence.
years would not be relevant unless the stock was sold during the years under
investigation, and generated a legitimate explanation for part of the defen-
dant’s increase in wealth. Using the same reasoning, a $100.00 purchase of
a painting during the years included in the investigation would be relevant.
Oftentimes, financial investigations involve hundreds or even thousands of
small transactions that reveal a substantial financial crime. If the financial
investigation has to show the total amount of wealth gained by the defendant
to establish how much was derived by fraud or theft, then all of the financial
activity involving the defendant becomes relevant.
Materiality
Competency
Hearsay is defined in Rule 801 as a statement, other than one made by the
declarant while testifying at the trial or hearing, offered in evidence to prove
the truth of the matter asserted. An example would be Witness A telling
what another person reported about the matter. If the information is needed
by either side in the dispute, then the other person should be called upon to
testify in person. Rule 803 delineates the exceptions to the hearsay rule in
23 specific situations. Many of the exceptions are used in the presentation of
documentary evidence.
The following are not excluded by the hearsay rule, even though the declarant
is available as a witness:
(1) Present sense impression. A statement describing or explaining an
event or condition made while the declarant was perceiving the event
or condition, or immediately thereafter.
(2) Excited utterance. A statement relating to a startling event or con-
dition made while the declarant was under the stress of excitement
caused by the event or condition.
(3) Then existing mental, emotional, or physical condition. A statement
of the declarant’s then existing state of mind, emotion, sensation, or
physical condition (such as intent, plan, motive, design, mental feel-
ing, pain, and bodily health), but not including a statement of memory
or belief to prove the fact remembered or believed unless it relates to
the execution, revocation, identification, or terms of declarant’s will.
(4) Statements for purposes of medical diagnosis or treatment. Statements
made for purposes of medical diagnosis or treatment and describing
medical history, or past or present symptoms, pain, or sensations,
or the inception or general character of the cause or external source
thereof insofar as reasonably pertinent to diagnosis or treatment.
(5) Recorded recollection. A memorandum or record concerning a
matter about which a witness once had knowledge but now has insuf-
ficient recollection to enable the witness to testify fully and accu-
rately, shown to have been made or adopted by the witness when the
matter was fresh in the witness’ memory and to reflect that knowl-
edge correctly. If admitted, the memorandum or record may be read
into evidence but may not itself be received as an exhibit unless
offered by an adverse party.
Gathering Documentary Evidence 69
Subsection (5) allows for the jury to hear information from a witness who
is no longer able to provide that information through testimony. Contracts,
agreements, logs, and other written information can be presented if it was
prepared or adopted by the witness at the time.
(6) Records of regularly conducted activity. A memorandum, report,
record, or data compilation, in any form, of acts, events, conditions,
opinions, or diagnoses, made at or near the time by, or from informa-
tion transmitted by, a person with knowledge, if kept in the course of
a regularly conducted business activity, and if it was the regular prac-
tice of that business activity to make the memorandum, report, record,
or data compilation, all as shown by the testimony of the custodian
or other qualified witness, or by certification that complies with Rule
902(11), Rule 902(12), or a statute permitting certification, unless the
source of information or the method or circumstances of preparation
indicate lack of trustworthiness. The term “business” as used in this
paragraph includes business, institution, association, profession, occu-
pation, and calling of every kind, whether or not conducted for profit.
Subsection (6) is often referred to as the “federal shop book rule.”
Records prepared and kept in the normal course of business for every type
of business-conducting entity may be introduced by a qualified representa-
tive of that entity. This exception to the hearsay rule is used in almost all
financial investigations. Representatives from banks, financial institutions,
businesses, and other entities may send a representative from their business
to introduce all of the financial records relating to the subject’s transactions
with their business. This eliminates the need to have each employee of a busi-
ness having dealings with the subject testify in court.
(7) Absence of entry in records kept in accordance with the provisions
of paragraph (6). Evidence that a matter is not included in the memo-
randa reports, records, or data compilations, in any form, kept in
accordance with the provisions of paragraph (6), to prove the non
occurrence or nonexistence of the matter, if the matter was of a kind
of which a memorandum, report, record, or data compilation was
regularly made and preserved, unless the sources of information or
other circumstances indicate lack of trustworthiness.
Subsection (7) allows for the use of negative proof to refute a claim of a
transaction if records kept in the normal course of business do not reflect
the transaction.
(8) Public records and reports. Records, reports, statements, or data
compilations, in any form, of public offices or agencies, setting forth
(A) the activities of the office or agency, or (B) matters observed pur-
suant to duty imposed by law as to which matters there was a duty
to report, excluding, however, in criminal cases matters observed by
70 Criminal Financial Investigations
Subsection (11) allows the custodian of records to provide those records into
evidence with a written declaration as to their custodial function. It also requires
that the documents and custodial authorization be provided to the defense
(adverse party) prior to offering the documents to the court. This ties into the
trial preparation aspect of discovery and the provision of Jencks materials.
(12) Certified foreign records of regularly conducted activity. In a civil
case, the original or a duplicate of a foreign record of regularly con-
ducted activity that would be admissible under Rule 803(6) if accom-
panied by a written declaration by its custodian or other qualified
person certifying that the record
(A) was made at or near the time of the occurrence of the matters
set forth by, or from information transmitted by, a person with
knowledge of those matters;
(B) was kept in the course of the regularly conducted activity; and
(C) was made by the regularly conducted activity as a regular practice.
The declaration must be signed in a manner that, if falsely made, would sub-
ject the maker to criminal penalty under the laws of the country where the
declaration is signed. A party intending to offer a record into evidence under
this paragraph must provide written notice of that intention to all adverse
parties, and must make the record and the declaration available for inspection
sufficiently in advance of their offer into evidence to provide an adverse party
with a fair opportunity to challenge them.
Subsection (12) provides the same type of exception to the hearsay rule for
foreign documents used in the normal course of business that subsection (11)
provides for domestic documents.
78 Criminal Financial Investigations
Rule 1002 states that the original of any document, recording, or photo-
graph is required for that item to be entered into evidence. The exceptions to
this requirement are contained in the following six rules.
Rule 1003 allows the same treatment of a duplicate copy as the original
unless there are unique aspects relative to its authenticity (the copy or the
original). An example of the need for the original would be for forensic test-
ing (fingerprints, paper and ink analysis, or handwriting and typewriting
analysis). Also, if claims are made to alterations in the duplicate that would
change the intent or meaning of the original.
Gathering Documentary Evidence 79
The original is not required, and other evidence of the contents of a writing,
recording, or photograph is admissible if
(1) Originals lost, or destroyed. All originals are lost or have been
destroyed, unless the proponent lost or destroyed them in bad faith; or
(2) Original not obtainable. No original can be obtained by any available
judicial process or procedure; or
(3) Original in possession of opponent. At a time when an original was
under the control of the party against whom offered, that party was
put on notice, by the pleadings or otherwise, that the contents would
be a subject of proof at the hearing, and that party does not produce
the original at the hearing; or
(4) Collateral matters. The writing, recording, or photograph is not
closely related to a controlling issue.
Rule 1004 allows for the use of a copy to be used in court if there is no
legal means of obtaining the original, or if the document does not play a
major role in the determination of the issue being litigated.
Rule 1005 allows for the use of duplicates of public records. The
requirement for the witness to have compared the copy with the original
and to testify it as a correct copy affects the acquisition of documents dur-
ing the course of the financial investigation. Because the investigation is to
determine the potential for civil or criminal litigation, potential witnesses
will usually retain their original records and provide the investigator with
duplicates. The investigator should take the time to have the witness com-
pare the copies with the originals and declare in their statements that the
copies are true and accurate. As financial investigations often take a long
time to complete, there is potential for the loss or destruction of original
documents, and copies verified in this manner can be used under the Rules
of Evidence.
80 Criminal Financial Investigations
Rule 1007 allows for the use of duplicates to support admissions from
witnesses in cases where the documentation is against their interests.
Rule 1008 applies the same judicial procedures for duplicates of records
as for any other evidence presented to the jury. The weight given to that evi-
dence is a matter for the jury to assign.
With all the attention given to the procedures and requirements for the
admissibility of documents in litigation contained in the Rules of Evidence,
it is easy to see why the investigator in a financial case needs to keep the
regulations in mind while gathering the evidence. Many of the rules apply
to unique situations; however, many address requirements that are applied
again and again in gathering documentary evidence. When verifying finan-
cial transactions, make sure you have the right individual. Courts require
that documents be introduced as evidence by competent witnesses. Records
kept in the normal course of business may be introduced by a representa-
tive of the company. It is not necessary to have the specific individual who
prepared each document be called to court to introduce the documents.
Records prepared, signed, or authenticated by an individual usually
require that individual for introduction in court. Also, there are times that
more than one individual could be used to introduce a document. An exam-
ple would be the purchase of an automobile. The salesman could introduce
the sales agreement, or a representative of the dealership could introduce the
sales documents. The state could introduce the registration and title infor-
mation. The subject could volunteer the purchase documents and stipulate to
their authenticity. The investigator should select the witness he or she thinks
can best explain the transaction and is most likely to adhere to the original
information provided.
Courts have recognized that the best witness to a transaction may not
be available for trial and allow crucial evidence to be introduced by other
means. The investigator must keep in mind that he is constitutionally pro-
hibited from compelling records or testimony from the individual charged
with the crime.
The investigator needs to be familiar with the legal restrictions placed
on certain businesses that limit access to financial records. Financial institu-
tions are prohibited from voluntarily providing account information on their
customers. Banks will require that a subpoena or court order be obtained
before allowing access to customer account information. Often, in the case of
a good customer or a prominent individual, businesses may ask for the same
type of requirement to produce records to avoid losing a customer or facing
a civil damages suit.
There are special circumstances that also need to be considered. If an
individual prepares records on behalf of the subject, those records may be
considered records of the subject and protected under the Fourth and Fifth
Amendment rights of the Constitution of the United States. An example
would be the return prepared for the subject. The returns and supporting
records are considered the subject’s personal records.
82 Criminal Financial Investigations
Observation
83
84 Criminal Financial Investigations
interview did not reveal that the subject had any higher education. During
the interview, the subject acknowledged the certificate but did not expand
on it beyond its acquisition. Later in the investigation it was shown that the
subject was involved in an investment fraud scheme that would bilk clients
out of their money. The university that supposedly issued the degree found
no record of the subject’s enrollment, and it was determined that the fake
degree was used to help build confidence in the subject on the part of the
fraud victims. Although the observation did not disclose additional financial
expenditures, it went a long way with the jury in establishing the subject’s
intent to defraud and deceive the victims of the fraud scheme.
In another investigation, the subject had several pictures of himself with
friends, apparently on skiing outings. One of the photos was taken in front of
a well-known ski resort in Colorado. Further investigation revealed that the
subject often purchased season passes at the resort and owned a chalet in the
nearby town. The purchase of the chalet, equipment, and the passes uncov-
ered several thousands of dollars in purchases and expenditures from funds
that were obtained from illegal activities.
Formal methods of investigative observation include surveillance,
undercover operations, and the execution of search warrants. In addition,
the investigator may receive the observations of witnesses during interviews.
In these cases, the investigator needs to focus the witness on specific infor-
mation. Relative terms such as early, late, strange, and others are of little use.
The investigator needs to obtain information that is as specific as possible.
Colors, approximate times of day, shapes, and sizes are of much greater use
to the investigation.
Surveillance
emergency, or for advice if the subject acts in a manner that was completely
unanticipated. The “lead” is the officer in closest proximity to the subject.
To avoid suspicion on the part of the subject, officers will frequently rotate
the lead position. “Cover” is a term used to identify obstructions of the view
that the subject has of the surveillance vehicle or officer.
In situations where the subject is likely to monitor radio traffic or use
countersurveillance measures, a code system may be prepared in advance for
radio communications. Officers, vehicles, directions and anticipated stops,
or destinations for the subject and their associates will all receive codes or
nicknames.
With the constant breakthroughs in technology, law enforcement has
been able to reduce the expense of conducting surveillance by the use of elec-
tronic equipment. Some examples are the use of time-lapse photography on
stationary locations, electronic tracking and audio transmitters and receivers,
telephone interceptors, and body wires. As the major criminal enterprise is
extremely well funded and aware of modern technological advances, the
investigator must also consider the potential for countersurveillance.
Physical surveillance can be as varied as the activities of any individual.
Although it is difficult to anticipate the potential value of information to
be gained through surveillance, preparation and planning become impor-
tant steps in selecting the most appropriate times and places to observe the
subject. Surveillance is time and resource intensive, and the potential gains
need to be weighed against the resources needed. The more information the
investigator has developed on the probable scheme involved in the financial
crime and the probable activities and destinations of the subject, the more
likely that the surveillance will be fruitful. Factors involved in preparing to
conduct a surveillance include:
Example 1
Two of the main figures in a narcotics trafficking organization were to attend
a music concert in a park on the Fourth of July. The investigation was trying to
determine the identity of others involved in the drug conspiracy. It was antici-
pated that 15,000 to 20,000 people would be in attendance. The concert would
run from 2 p.m. until 8 p.m. A stationary surveillance post was used to direct
the surveillance (an unmarked van). Four agents were used to mix in the crowd
and try to locate the subjects. The temperature was in the low 90s, and there
was a clear sky. The agents in the crowd needed radio communication with the
base and each other. They also needed to carry their weapons, cameras, and
identification. These items needed to be concealed so as not to draw attention to
the agents or identify them as law enforcement. Some of the planning included
the use of backpacks and fanny packs and beach bags to conceal equipment.
All radio communications would be relayed through the base. A single beep
on the radio would alert the agent to go to a concealed location and contact the
base for information. Each agent used a separate radio frequency, and all com-
munications between the agents would be relayed through the base. The agents
dressed to fit in with the crowd (shorts, T-shirts, jeans, sandals, etc.). When the
subjects were located, photos were taken of those individuals they came in con-
tact with and when the concert ended they were followed to their vehicle and
arrest warrants were executed.
Example 2
The subject was a loner involved in a mail fraud scheme. He lived in an isolated
rural area. It was necessary to drive on 2 miles of dirt road to get to his house.
He drove a four-wheel-drive pickup truck. The investigation needed to deter-
mine where he was cashing the money orders he received from the scheme.
Although there was no location where a parked vehicle would go unnoticed, the
eyeball (direct observation point) was set up on a bluff approximately 5 miles
from the suspect’s home. A telescope was used to watch for his movement.
Three radio-equipped vehicles were placed on the paved roads that he could use
Gathering Evidence through Observation 87
in leaving his home. The eyeball would alert the other vehicles to the subject’s
movement and to his direction of travel so that a moving surveillance could
pick him up once he was removed from the rural setting.
Example 3
The subject in this case was selling cocaine. The investigation wanted to identify
his source and potential customers. The subject lived in a condominium in a
suburban area. His background indicated that he rarely became active prior to
noon and was often out late. A 3-day surveillance was planned for a weekend.
Three vehicles and five agents were used. The weather was cold, with mixed rain
and snow. Because the eyeball vehicle could not be kept running (a running
vehicle parked for an extended period of time would look suspicious to the sub-
ject as well as the entire neighborhood), hand warmers, warm clothing, and
a rotation system was used to maintain the observation point. The surveil-
lance began at 8 p.m. The subject drove to a restaurant in a strip mall at about
9:30 p.m. and had dinner and a few drinks. Two agents entered the restaurant
and observed the subject from another table. While in the restaurant, the sub-
ject made four phone calls at about 15-minute intervals. The last call he made
was the only one in which he spent time talking on the phone. The surveillance
continued as he left the restaurant and returned to his condominium at about
10:20 p.m. At 3 a.m. the subject left his residence, returned to the strip mall, and
met another man in a second vehicle. Items were transferred from the trunks
of both vehicles. Two surveillance vehicles followed and identified the second
individual. The other surveillance vehicle followed the subject back to his con-
dominium and was able to identify six other vehicles that arrived between
4:30 a.m. and 6 a.m. The surveillance team had prepared with changes of cloth-
ing for a variety of potential places where the subject could have met with his
contact. The information gained during the surveillance helped the team obtain
search warrants that uncovered illegal narcotics trafficking, the main supplier,
and 18 customers.
Moving Surveillance
There are several methods used to conduct vehicular surveillance, and often
adjustments must be made immediately based on the actions of the subject.
Two common approaches are the use of a lead car that is rotated periodically,
whereas the other vehicles take alternate routes to checkpoints that the sub-
ject has recently passed. In cases where the subject appears to be staying on a
specific road or highway, vehicles may advance beyond the subject vehicle to
be available to relieve the lead vehicle. In urban or suburban areas, the lead
car will still maintain direct observation, but the rotation of the lead position
will be more frequent. In these situations, the backup vehicles may use par-
allel routes to the subject vehicle to avoid becoming familiar to the subject.
Having a red car behind you for a while, then a white one, and then a blue
one may not draw your attention; but the same red, white, and blue vehicles
going where you are going will.
88 Criminal Financial Investigations
Telephonic Intercepts
There are several types of telephonic intercepts. Each is geared to gather spe-
cific information from an individual’s use of a telephone, and each requires
a degree of probable cause to justify and obtain a court order for application.
Prior to the advent of cellular telephone communications, telephone inter-
cepts were made through individual telephone lines (landlines) connected
to phones at specific locations. A trained officer or agent would tie into the
line to be intercepted and divert information to a covert monitoring location
through a dedicated phone line to that location. The line into the monitor-
ing location would then be wired to the specific piece of equipment autho-
rized in the court order. The types of equipment used include a “pen register,”
“trap and trace,” and “wiretap.” The pen register would identify the telephone
numbers called from the specific telephone line in the court order. The trap
and trace would identify the telephone numbers of incoming calls to the spe-
cific telephone line. The wiretap would record the actual conversations taking
place on the subject telephone line. Each of these evidence-gathering actions
invade the subject’s right to privacy at differing levels, and the requirements
needed for issuance of a court order to use these methods increase with the
severity of that invasion. Time limits are set in the court order as well as the
security and level of onsite supervision required. As an example, a pen regis-
ter may need to be physically checked and have the evidence secured hourly,
daily, or weekly, depending on the amount of telephonic usage. At the other
end of the spectrum, a wiretap requires that an officer be present and listen
to all conversations being recorded 24 hours a day for the term of the court
order. A court order for using of a wiretap is needed when neither party to
the conversation consents or is aware of the recording being made. In cases
90 Criminal Financial Investigations
where an informant is willing to make a call to the subject and agrees to have
the call recorded, administrative approval for the recording is usually all that
is required.
With the development of wireless communications, technological
advances are continuing to provide the same type of capabilities for the inter-
ception of wireless communications.
Example
An investigation of a businessman who was involved in money laundering
funds through his business utilized an undercover operation. A meeting was
arranged between the subject and the undercover agent. The subject would
pick up the agent at his hotel, and they would go to dinner and discuss a deal.
A body recorder was concealed on the agent. The recorder had a 90-minute
tape capacity. It was anticipated that the meeting would exceed the 90 minutes,
so arrangements were made for the agent to excuse himself to take a phone
call. The technical agent timed the taping and called the undercover agent
10 minutes before the tape ran out. The tape was changed in a storeroom.
The undercover agent returned to his table, completed the meeting, and the
Gathering Evidence through Observation 91
recording was ended. With the tape being used, a surveillance team observed
the meeting from across the street and from another table inside the restaurant.
This maintained security for the undercover agent. The tape recording blocked
most of the general noise in the restaurant, and the voices were clearly audible
without enhancement.
Example
Using an undercover agent in the investigation of a bar owner or drug dealer
provides a good example of the benefits in using a transmitter-type body wire.
The subject owned a bar in a town located about 120 miles from the airport.
The undercover agent was introduced to the subject by an advertisement the sub-
ject listed for the sale of his bar. The subject wanted to show the undercover agent
his “second set of books” that showed the bar’s actual income and the potential
for laundering drug money. The subject was to pick up the agent, drive to the bar,
review the records, and return to the agent’s hotel near the airport. The trans-
mitter had a 2-mile range on open road, allowing the surveillance team to stay
far enough away to avoid suspicion. A mobile receiver and two recorders were
used in one vehicle to record any conversations that took place during the ride.
The entire contact with the subject lasted approximately 11 hours, and the entire
time of the contact was recorded. Dual recorders were used to avoid a gap in
the recording. Each recorder had a 6-hour capacity. If the meeting would have
gone over 12 hours, the first recorder was prepared to rotate back in and main-
tain the taping continuity. The power supply for the transmitter was good for
24 hours. Although it would have been impossible to change tapes or batteries on
the undercover agent, the transmitter made the recording possible.
The laws and regulations regarding searches and seizures are constantly
changing to adapt to new case law covering unique application of the rules.
The onset of regulating searches and seizures began with the drafting and
adoption of the Fourth and Fifth Amendments to the Constitution of the
United States. The initial restrictions have been expanded, modified, and
defined through the courts by judicial review and discretion. Although the
courts may alter the interpretation based on changes in society, the most
obvious judicial involvement comes from improper use by investigating
authorities and enforcement personnel.
Amendment IV
The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated,
and no Warrants shall issue, but upon probable cause, supported by Oath
or affirmation, and particularly describing the place to be searched, and
the persons or things to be seized.
Amendment V
No person shall be held to answer for a capital, or otherwise infamous
crime, unless on a presentment or indictment of a Grand Jury, except in
cases arising in the land or naval forces, or in the Militia, when in actual
service in time of War or in public danger; nor shall any person be subject
for the same offence to be twice put in jeopardy of life or limb; nor shall
be compelled in any Criminal Case to be a witness against himself, nor
be deprived of life, liberty, or property, without due process of law; nor
shall private property be taken for public use, without just compensation.
Reasonable or Unreasonable
Probable Cause
Oath or Affirmation
The oath or affirmation is the swearing in of the officer submitting the affi-
davit to the judge. The officer preparing the affidavit is the one who reviewed
the evidence obtained thus far in the investigation, has made personal
observations, has personal experience in the type of investigation being
done, and believes that there is probability that additional evidence will
be uncovered during the search of the location described in the affidavit.
The judge will read the affidavit, question the officer requesting the war-
rant by affidavit, and administer the oath or affirmation. The formality and
sometimes solemnity of this procedure should make it clear to the officer
that this is not the time for unrealistic speculation or embellishment of the
facts and circumstances involved. In almost every case in which a warrant
is used to gather evidence, the defense will do everything it can to discredit
the officer’s affidavit in an attempt to have the evidence obtained declared
inadmissible in court. If successful, it will also eliminate the leads obtained
from the execution of the warrant.
Particular Description
Before making the decision to seek a search warrant, the officer or agent
needs to look objectively at the situation and be prepared to answer ques-
tions as to why the warrant is necessary. In a financial investigation, this
becomes more important because there are often several paper trails that
can be followed to document and prove the facts and circumstances of an
individual’s financial dealings. Can records other than those in the posses-
sion of the subject be obtained through third-party contacts? If so, is there
a problem in specifically obtaining records of illegal or concealed financial
activities? Can all of the transactions be developed through evidence outside
the possession of the subject? Are a substantial number of the transactions
with recalcitrant or hostile witnesses such as family, friends, close associates,
or others involved in the financial crime? Is there a strong likelihood that the
evidence of criminal activity will be destroyed if normal gathering methods
96 Criminal Financial Investigations
are used? Each case will be unique in its nature and the aspects involved,
but each should be scrutinized when considering the use of warrants for the
purpose of gathering evidence.
The Affidavit
To avoid the “unreasonable” prohibition cited in the Fourth Amendment,
there are several areas within the affidavit for a search warrant that have
to be addressed and shown to be reasonable. These areas are similar to the
legal requirements applied to evidence. The reasonableness would be applied
to the competency of the affiant and to the relevancy of the potential in the
search being productive in the investigation.
The Affiant
The judge needs assurance that the officer or agent applying for the warrant
is a reasonable person, has sufficient experience in the matters contained in
the affidavit, has demonstrated specialized and applicable knowledge of the
criminal processes involved, and is most familiar with the specifics involved
in the particular investigation. The affidavit should include the full identifi-
cation of the agent or officer, the time in service, and number of similar cases
the officer has investigated. The officer must also show knowledge of the loca-
tion to be searched and the items to be seized. The officer must also be able
to articulate the special or exigent circumstances that led to the request for
the search warrant.
Probable Cause
Probable cause is just that, a reasonable probability that something is true or
factual. This is the key to submitting a successful request for a search warrant.
The officer must convince the judge that the subject has probably committed
the crime identified in the affidavit. It must also be shown that specific, and
sometimes general, evidence of the crime will probably be found in the loca-
tion specified in the affidavit. To do this, the officer must put forth indica-
tions that all of these are probable and provide just cause for the warrant
to be issued. Indications of guilt on the part of the subject that led to the
initiation of the investigation should be provided to show that the subject is
the right person to be investigated. Information should also be provided that
shows the likelihood that some, if not all, of the evidence sought exists and
will be located in the area to be searched. In addition, it should be shown why
the officer believes that the evidence would not be available through other
means of gathering.
Gathering Evidence through Observation 97
Oath or Affirmation
The oath or affirmation aspect of the affidavit stretches or implies the aspect
of probability on the part of the affiant. The affiant is sworn in and attests to
the truth and accuracy of the contents of the affidavit. The oath or affirma-
tion is not limited to the direct knowledge of the affiant but includes any
other information obtained in the investigation that is included. Information
obtained from witnesses, informants, experts, and inferences based on expe-
rience and service are all contained in the affidavit and, therefore, attested to
by the affiant. This is a serious business in which carelessness or complacency
can have a long-lasting detrimental effect on the officer’s career. It may also
lead to civil liability if it can be shown that the affiant altered or embellished
the facts and circumstances attested to in the affidavit.
Particular Description
The last area of probability lies in the description of the location to be searched
and the items to be seized. On the surface, the location would seem to be
rather easy to determine and identify, but circumstances can make it diffi-
cult. In one case, an arrest warrant was issued for a vehicle used in the com-
mission of a crime. The vehicle was identified in the affidavit by year, make,
model, color, style (four-door sedan), and vehicle identification number
(VIN). When the officers arrived at the subject’s place of business to execute
the seizure, they were confronted with 12 identical vehicles that the subject
had purchased for his business under a fleet purchase agreement. The fact
that the VIN number was included in the warrant made it possible for the
officers to seize the correct vehicle and avoid embarrassment. Similar com-
plications can be encountered in urban and suburban areas in locating the
correct address. A physical description of the location helps ensure accuracy:
Apartment 201, 123 Elm St., City, State; the apartment on the second floor,
first door on the left after going up the staircase on the south entrance to the
apartment building, consisting of two bedrooms, a kitchen–dining room, a
living room, and one bath. This type of description makes clear which apart-
ment is to be searched.
In the same manner, the items to be seized should be identified as accu-
rately as possible. In financial investigations, the motive is to gain wealth
through illegal means. Therefore, it is necessary to include any and all records
relating to financial transactions of any kind (the officer may include a list of
typical items but needs to preface the list with a phrase like “to include but
not be limited to”). If the income is generated from other criminal activity,
the officer should include the description of any evidence common to the
commission of that type of criminal activity. As an example, the subject
derives income from the sale of stolen identities. The affidavit may include
98 Criminal Financial Investigations
birth certificates, driver’s licenses, social security cards, credit cards, and
other forms of identification. The officer would also want to find leads to the
subject’s customers. In this case, the affidavit would include address books,
telephone directories, and e-mail directories in paper, digital, electronic,
or other formats. Common items found in warrants involving financial
crimes include currency, bank records, ownership documents, account state-
ments, receipts, and any other documents that relate to the specific crime.
101
102 Criminal Financial Investigations
bank statements, credit card receipts, phone bills, loan statements, and any
document that would show the receipt or use of illegally obtained funds.
The value of this information is not apparent on the surface and requires
analysis. The officer or investigator needs to follow a few simple steps to deter-
mine whether the information obtained warrants a more extensive investiga-
tion into Jim’s activities. The officer must find out as much as possible about
Jim. This information can often be obtained during the interview after the
arrest. Any public information available on Jim should also be obtained and
reviewed, for example, traffic records, neighborhood complaints, Division of
Motor Vehicle (DMV) records, National Crime Information Center (NCIC)
records, and Register of Deeds. Much of the background information needed
will already have been accumulated in the initial investigation of the crimi-
nal act, but any gaps in the information should be filled.
Why should the officers care about records that are months or even years
old? In cases that are presented in court, the evidence put forth must be rel-
evant to the case in chief. How can a check register from the prior year be
relevant? In our case, let us say that the records we obtained show:
For the past two years, Jim has spent $25,000 to $30,000 a year on liv-
ing expenses, rent, groceries, clothing, utilities, and so forth. Cash
deposits to his checking account were made to cover these expenses.
Purchase of a car, $38,000 (cash), vehicle title.
Credit card purchases for 3 months at bars and restaurants; for 2 weeks
the charges were out of state.
Telephone calls to 18 numbers, two to four times a week.
Long-distance telephone calls to one number twice a month.
DMV records show three moving violations in the past 6 months (same
area).
Jim’s personal history tells us that he was born and lived in town all
his life.
He attended college for 1 year.
He worked part-time as a bartender for 2 years.
He has been unemployed for the past 2 years.
What might additional investigation reveal? What would you look into?
What are potential additional sources of information you would use?
Other sources of information could include interviews with people he
has been associated with: teachers, classmates, friends, relatives, the employ-
ees where he banks, the salesman that sold him his car, and his former boss
and coworkers at the bar. Keep in mind that any of the people you talk to
may provide leads to others who could be beneficial to the investigation. In
addition, telephone subscriber information would identify the repeat calls
Jim made locally and out of state. You would be wise to gather as much
104 Criminal Financial Investigations
For our example, we will say that Jim had no bank account or balance
prior to the first year. The next schedule prepared would identify the items
106 Criminal Financial Investigations
that Jim owed to other people or financial institutions. In our case, Jim has
no debts prior to or during our two time frames. A schedule is not required
for liabilities if there are none, but they will be included with zero balances
on the summary schedule to let those people seeing or reviewing the case
know that they were considered and investigated.
The next schedule prepared would identify each of the expenditures
Jim made during the 2 years under investigation. If any category of expense
(clothing, utilities, food, entertainment, travel, etc.) contains a large number
of transactions, a subschedule for that category can be made, and the balance
carriedover to the expenditure schedule. For our purposes, we will assume that
the subschedules were made and show the totals in the expenditures schedule.
The schedules and report for a criminal prosecution will contain only
that financial information that can be proven beyond a reasonable doubt and
as attributable to the subject of the investigation. For this reason, all evidence
used to obtain an information or an indictment must adhere to the rules of
evidence. The scope of evidence used for civil litigation is required to meet
lesser standards, and that used for internal audit and control even lesser ones.
What Is a Financial Investigation? 107
3. The personal expenditures schedule would list the tax and licensing
fees for 2011.
4. Bank accounts would be checked to identify the source of the down
payment.
a. If cash was withdrawn from an existing account, the reduction
should be included in the year-end bank account reconciliation.
b. If a cash hoard was claimed by the suspect and cash outside of
bank accounts was used, a reduction in cash on hand should be
further investigated.
5. ABC Bank should be checked to verify the suspect’s purchase of the
cashier’s check.
a. If ABC Bank is not used regularly by the suspect, it should be
checked for any other financial activities of the suspect.
b. Additional checks should be performed for any other sources of
the funds used such as safe deposit boxes, personal loans, gifts,
and inheritances.
c. If the cashier’s check was purchased by a nominee, an interview
and cursory examination of the nominee’s finances is necessary.
Hypothetically, if this was the only transaction that the suspect made
during the periods under investigation, we could deduce that without the
claim of cash on hand or the removal of cash from an existing bank account,
the suspect had to have amassed $88,832.43 in 2011.
Note that the net worth method credits the suspect with a nondeduct-
ible loss (for tax purposes) on the 2009 Lincoln. This aspect of the method
can be pointed out to judge or jury as to how the method shows the least
amount of income the suspect had to have received during the periods under
investigation.
The scientific method is applied to all indirect methods of proof. In using
the scientific method for an investigation using the bank deposits and cash
expenditures, our above example would be handled like this:
1. The asset acquisition (new car) and the asset disposition (trade-in)
are not pertinent to the bank deposit and cash expenditure method.
(This method completes the investigation by focusing on current
deposited funds and the use of cash to make current expenditures.)
2. The $42,000.00 down payment would be included in the cash expen-
ditures for 2011. This method of proof would take into account any
110 Criminal Financial Investigations
Under the bank deposits method, using the same scenario as in the afore-
mentioned net worth example, we should show the same amount of income.
Since the analysis of cash in and out of bank accounts would be shown in
a separate schedule in the investigative report, the scientific method appli-
cation to this item of information would reflect that the suspect amassed
$98,832.43 in 2011. Using the same accumulation of evidence, the computa-
tions should show the same results. This is also a means for verification of the
accuracy of whichever indirect method is used and to ensure that all of the
relationships of each transaction have been taken into consideration.
A further look would reveal that in the net worth method, the depreci-
ated value of the trade-in (cost of $38,000.00, trade-in value of $28,000.00)
would have been reflected in the 2009 period based on the actual cost when
it was acquired. This does not reflect an inconsistency in the two computa-
tions. Each method is designed to show income allocations correctly for each
relevant time period.
The $10,000.00 difference is strictly based on what is being analyzed. To
determine actual money flow to the individual, the bank deposits method
gives the complete picture. In a determination of income from a taxing
perspective, the $10,000.00 difference is adjusted back in the net worth
method as a civil assessment disallowing the nondeductible loss. The bank
deposits method shows the current cash and banking activity, and therefore
already accounts for the nondeductible loss. Other civil adjustments would be
made in the bank deposits method, and both methods would reflect the least
amount of income gained by the suspect for criminal prosecution purposes.
Since the methods will balance out, either method can be used to
cross-check any other method being used in the investigation. The only
rationale needed is to ensure that each financial event is considered in its
entirety on how it is handled or applied in the corresponding methods.
The logic and reasoning used by the courts to accept the indirect methods
of proof are based on the fact that these methods employ the same level of
scrutiny in presenting a financial conclusion as other sciences are used in the
formulation of circumstantial evidence in other crime scene investigations.
What Is a Financial Investigation? 111
The only difference between the two is the perspective on what is being
s cientifically analyzed and presented. The crime scene investigation recreates
the specific time, place, and method in committing a crime. The indirect foren-
sic financial investigation recreates the financial activities of an individual over
sequential periods of time. Therefore, the accuracy and the truths uncovered
from applying the scientific methods of investigation to the financial analysis
carry the same weight and level of veracity in the eyes of the court.
In the early 1900s, many of the cases involving indirect methods of proof
were being contested in appellate courts. The decisions varied as to guilt or
acquittal. These led to the United States Supreme Court hearing and decision
in Holland v. United States in 1954 (348 U.S. 121). In its decision, the Court set
the parameters for the use, application, methodology, and reasoning behind
the indirect methods and the application of forensic accounting techniques.
Requirements for
Indirect Methods
of Proof 10
What are the legally accepted standard methods of proof in forensic account-
ing investigations? There are three methods of proof that have been accepted
to prove forensic accounting investigations in criminal cases. These are the
specific item, the bank deposits and cash expenditures, and the net worth
and expenditures methods of proof. Each method relies on a thorough inves-
tigation of the facts, deductive and inductive reasoning in the analysis of
circumstantial evidence, and establishing “proof beyond a reasonable doubt”
through negative proof of potential defenses.
The requirements for the use of indirect methods of proof have been estab-
lished by court decisions beginning in the 1900s and continuing through to
the present. Each time an innovation in indirect methodology is applied in
a criminal investigation, the courts are faced with determining whether the
innovation meets or violates the rules of evidence, and the requirements to
prove the violation beyond a reasonable doubt. As criminal courts continue
to refine the indirect methodology, civil courts and independent auditors
adjust their efforts to the refinements made by the courts.
The three basic methods of proof all apply these requirements and incor-
porate the judicial modifications to ensure accuracy and a high level of suc-
cess in their presentations. The case of Holland v. United States is considered a
landmark decision in the use of indirect methods of proof. Although the deci-
sion specifically addresses the use of the net worth and expenditures method,
the Supreme Court’s explanation of its decision outlines several specific needs
that have to be met for the use of forensic accounting applications to be used
and deemed valid in litigation.
113
114 Criminal Financial Investigations
1. While it cannot be said that the dangers for the innocent inher-
ent in the worth method of proof (which are summarized in the
opinion) foreclose its use, they do require the exercise of great
care and restraint. Pp. 125–129.
2. Trial courts should approach such cases in the full realization
that the taxpayer may be ensnared in a system which, though dif-
ficult for the prosecution to utilize, is equally hard for the defen-
dant to refute. P. 129.
3. Charges to the jury should be especially clear and should include,
in addition to the formal instructions, a summary of the nature
of the net worth method, the assumptions on which it rests, and
the inferences available both for and against the accused. P. 129.
[348 U.S. 121, 122]
4. In reviewing such cases, appellate courts should bear constantly
in mind the difficulties that arise when circumstantial evidence
as to guilt is the chief weapon of a method that is itself only an
approximation. P. 129.
5. Section 41 of the Internal Revenue Code, expressly limiting
the authority of the Government to deviate from the taxpayer’s
method of accounting, does not confine the net worth method of
proof to situations where the taxpayer has no books or where his
books are inadequate. Pp. 130–132.
6. The net worth technique used in this case was not a method of
accounting different from the one employed by petitioners, and its
use did not violate 41 of the Internal Revenue Code. Pp. 131–132.
Requirements for Indirect Methods of Proof 115
net value of the taxpayer’s assets at the beginning of a given year. It then
proves increases in the taxpayer’s net worth for each succeeding year dur-
ing the period under examination and calculates the difference between
the adjusted net values of the taxpayer’s assets at the beginning and end
of each of the years involved. The taxpayer’s nondeductible expenditures,
including living expenses, are added to these increases, and if the result-
ing figure for any year is substantially greater than the taxable income
reported by the taxpayer for that year, the Government claims the excess
represents unreported taxable income. In addition, it asks the jury to
infer willfulness from this understatement, when taken in connection
with direct evidence of “conduct, the likely effect of which would be to
mislead or to conceal.” Spies v. United States, 317 U.S. 492, 499.
Before proceeding with a discussion of these cases, we believe it impor-
tant to outline the general problems implicit in this type of litigation.
In this consideration we assume, as we must in view of its widespread use,
that the Government deems the net worth method useful in the enforce-
ment of the criminal sanctions of our income tax laws. Nevertheless,
careful study indicates that it is so fraught with danger for the innocent
that the courts must closely scrutinize its use. [348 U.S. 121, 126]
One basic assumption in establishing guilt by this method is that most
assets derive from a taxable source, and that when this is not true the
taxpayer is in a position to explain the discrepancy. The application of
such an assumption raises serious legal problems in the administration
of the criminal law. Unlike civil actions for the recovery of deficiencies,
where the determinations of the Commissioner have prima facie validity,
the prosecution must always prove the criminal charge beyond a reason-
able doubt. This has led many of our courts to be disturbed by the use of
the net worth method, particularly in its scope and the latitude which
it allows prosecutors. E.g., Demetree v. United States, 207 F.2d 892, 894
(1953); United States v. Caserta, 199 F.2d 905, 907 (1952); United States v.
Fenwick, 177 F.2d 488.
But the net worth method has not grown up overnight. It was first uti-
lized in such cases as Capone v. United States, 51 F.2d 609 (1931) and Guzik
v. United States, 54 F.2d 618 (1931), to corroborate direct proof of specific
unreported income. In United States v. Johnson, supra, this Court approved
of its use to support the inference that the taxpayer, owner of a vast and
elaborately concealed network of gambling houses upon which he declared
no income, had indeed received unreported income in a “substantial
amount.” It was a potent weapon in establishing taxable income from
undisclosed sources when all other efforts failed. Since the Johnson case,
however, its horizons have been widened until now it is used in run-of-the-
mine cases, regardless of the amount of tax deficiency involved. In each of
the four cases decided today the allegedly unreported income comes from
118 Criminal Financial Investigations
1. Among the defenses often asserted is the taxpayer’s claim that the
net worth increase shown by the Government’s statement is in reality
not an increase at all because of the existence of substantial cash on
hand at the starting point. This favorite defense asserts that the cache
is made up of many years’ savings which for various reasons were
hidden and not expended until the prosecution period. Obviously,
the Government has great difficulty in refuting such a contention.
However, taxpayers too encounter many obstacles in convincing the
jury of the existence of such hoards. This is particularly so when the
emergence of the hidden savings also uncovers a fraud on the tax-
payer’s creditors.
In this connection, the taxpayer frequently gives “leads” to the
Government agents indicating the specific sources from which his
cash on hand has come, such as prior earnings, stock transactions,
real estate profits, inheritances, gifts, etc. Sometimes these leads
point back to old transactions far removed from the prosecution
period. Were the Government required to run down all such leads,
it would face grave investigative difficulties; still, its failure to do so
might jeopardize the position of the taxpayer.
2. As we have said, the method requires assumptions, among which is
the equation of unexplained increases in net worth with unreported
taxable income. Obviously such an assumption has many weak-
nesses. It may be that gifts, inheritances, loans, and the like account
for the newly acquired wealth. There is great danger that the jury
may assume that once the Government has established the figures
in its worth computations, [348 U.S. 121, 128] the crime of tax eva-
sion automatically follows. The possibility of this increases where the
jury, without guarding instructions, is allowed to take into the jury
room the various charts summarizing the computations; bare figures
have a way of acquiring an existence of their own, independent of the
evidence which gave rise to them.
Requirements for Indirect Methods of Proof 119
3. Although it may sound fair to say that the taxpayer can explain the
“bulge” in his net worth, he may be entirely honest and yet unable
to recount his financial history. In addition, such a rule would
tend to shift the burden of proof. Were the taxpayer compelled to
come forward with evidence, he might risk lending support to the
Government’s case by showing loose business methods or losing the
jury through his apparent evasiveness. Of course, in other criminal
prosecutions, juries may disbelieve and convict the innocent. But the
courts must minimize this danger.
4. When there are no books and records, willfulness may be inferred by
the jury from that fact coupled with proof of an understatement of
income. But when the Government uses the net worth method, and
the books and records of the taxpayer appear correct on their face,
an inference of willfulness from net worth increases alone might
be unjustified, especially where the circumstances surrounding the
deficiency are as consistent with innocent mistake as with willful
violation. On the other hand, the very failure of the books to disclose
a proved deficiency might indicate deliberate falsification.
5. In many cases of this type, the prosecution relies on the taxpayer’s
statements, made to revenue agents in the course of their investiga-
tion, to establish vital links in the Government’s proof. But when a
revenue agent confronts the taxpayer with an apparent deficiency,
the latter may be more concerned with a quick settlement than an
honest search for the truth. Moreover, the prosecution may pick and
choose from the taxpayer’s statement, [348 U.S. 121, 129] relying on
the favorable portion and throwing aside that which does not bolster
its position. The problem of corroboration, dealt with in the com-
panion cases of Smith v. United States, post, p. 147, and United States
v. Calderon, post, p. 160, therefore becomes crucial.
6. The statute defines the offense here involved by individual years.
While the Government may be able to prove with reasonable accu-
racy an increase in net worth over a period of years, it often has great
difficulty in relating that income sufficiently to any specific prosecu-
tion year. While a steadily increasing net worth may justify an infer-
ence of additional earnings, unless that increase can be reasonably
allocated to the appropriate tax year, the taxpayer may be convicted
on counts of which he is innocent.
While we cannot say that these pitfalls inherent in the net worth method
foreclose its use, they do require the exercise of great care and restraint.
The complexity of the problem is such that it cannot be met merely by the
application of general rules. Cf. Universal Camera Corp. v. Labor Board, 340
U.S. 474, 489. Trial courts should approach these cases in the full realization
120 Criminal Financial Investigations
that the taxpayer may be ensnared in a system which, though difficult for the
prosecution to utilize, is equally hard for the defendant to refute. Charges
should be especially clear, including, in addition to the formal instructions, a
summary of the nature of the net worth method, the assumptions on which it
rests, and the inferences available both for and against the accused. Appellate
courts should review the cases, bearing constantly in mind the difficulties
that arise when circumstantial evidence as to guilt is the chief weapon of a
method that is itself only an approximation.
With these considerations as a guide, we turn to the facts. [348 U.S. 121, 130]
The indictment returned against the Hollands embraced three counts. The
first two charged Marion L. Holland, the husband, with attempted evasion of
his income tax for the years 1946 and 1947. He was found not guilty by the jury
on both of these counts. The third count charged Holland and his wife with
attempted evasion in 1948 of the tax on $19,736.74 not reported by them in their
joint return. The jury found both of them guilty. Mrs. Holland was fined $5,000,
while her husband was sentenced to two years’ imprisonment and fined $10,000.
The Government’s opening net worth computation shows defendants with
a net worth of $19,152.59 at the beginning of the indictment period. Shortly
thereafter, defendants purchased a hotel, bar, and restaurant, and began oper-
ating them as the Holland House. Within three years, during which they
reported $31,265.92 in taxable income, their apparent net worth increased
by $113,185.32. The Government’s evidence indicated that, during 1948, the
year for which defendants were convicted, their net worth increased by some
$32,000, while the amount of taxable income reported by them totaled less
than one-third that sum.
437–438; Remmer v. United States, 205 F.2d 277, 286, judgment vacated on
other grounds, 347 U.S. 227), we conclude that this argument must fail. The
provision that the “net income shall be computed … in accordance with the
method of accounting regularly employed in keeping the books of such tax-
payer,” refers to methods such as the cash receipts or the accrual method,
which allocate income and expenses between years. United States v. American
Can Co., 280 U.S. 412, 419. The net worth technique as used in this case is not
a method of accounting different from the one employed by defendants. It is
not a method of accounting at all, except insofar as it calls upon taxpayers
to account for their unexplained income. Petitioners’ accounting system was
appropriate [348 U.S. 121, 132] for their business purposes; and, admittedly,
the Government did not detect any specific false entries therein. Nevertheless,
if we believe the Government’s evidence, as the jury did, we must conclude
that the defendants’ books were more consistent than truthful, and that many
items of income had disappeared before they had even reached the recording
stage. Certainly, Congress never intended to make 41 a set of blinders which
prevents the Government from looking beyond the self-serving declarations
in a taxpayer’s books. “The United States has relied for the collection of its
income tax largely upon the taxpayer’s own disclosures …. This system can
function successfully only if those within and near taxable income keep and
render true accounts.” Spies v. United States, 317 U.S., at 495. To protect the
revenue from those who do not “render true accounts,” the Government must
be free to use all legal evidence available to it in determining whether the story
told by the taxpayer’s books accurately reflects his financial history.
found in the form of a home, a ranch, a hotel, and other properties. This was
the main issue presented to the jury. The Government did not introduce any
direct evidence to dispute this claim. Rather it relied on the inference that
anyone who had had $104,000 in cash would not have undergone the hard-
ship and privation endured by the Hollands all during the late 1920s and
throughout the 1930s. During this period they lost their cafe business; accu-
mulated $35,000 in debts which were never paid; lost their household fur-
niture because of an unpaid balance of $92.20; suffered a default judgment
for $506.66; and were forced to separate for some eight years because it was
to their “economical advantage.” During the latter part of this period, Mrs.
Holland was obliged to support herself and their son by working at a motion
picture house in Denver while her husband was in Wyoming. The evidence
further indicated that improvements to the hotel, and other assets acquired
during the prosecution years, were bought in installments and with bills of
small denominations, as if out of earnings rather than from an accumulation
of $100 bills. The Government also negatived the possibility of petitioners’
accumulating such a sum by checking Mr. Holland’s income tax returns as
far back as 1913, showing that the income declared in previous years was
insufficient to enable defendants to save any appreciable [348 U.S. 121, 134]
amount of money. The jury resolved this question of the existence of a cache
of cash against the Hollands, and we believe the verdict was fully supported.
As to the stock, Mr. Holland began dabbling in the stock market in a
small way in 1937 and 1938. His purchases appear to have been negligible
and on borrowed money. His only reported income from stocks was in his
tax returns for 1944 and 1945 when he disclosed dividends of $1,600 and
$1,850, respectively. While the record is unclear on this point, it appears that,
during the period from 1942 to 1945, he pledged considerable stock as col-
lateral for loans. There is no evidence, however, showing what portions of
this stock Mr. Holland actually owned at any one time, since he was trad-
ing in shares from day to day. And, even if we assume that he owned all the
stock, some 4,550 shares, there is evidence that Mr. Holland’s stock transac-
tions were usually in “stock selling for only a few dollars per share.” In this
light, the Government’s figure of approximately $30,000 is not out of line.
In 1946, Holland reported the sale of about $50,000 in stock, but no receipt
of dividends; nor were dividends reported in subsequent years. It is reason-
able to assume that he sold all of his stock in 1946. In fact, Holland stated to
the revenue agents that he had not “fooled with the stock market” since the
beginning of 1946; that he had not owned any stocks for two or three years
prior to 1949; that he had saved about $50,000 from 1933 to 1946, and that, in
1946, he had $9,000 in cash with the balance of his savings in stocks.*
* From http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=348&invol=121-f6#f6
Requirements for Indirect Methods of Proof 123
that he had turned in gold in 1933 and still it could reasonably have con-
cluded that the Hollands lacked the claimed cache of currency in 1946, the
crucial year. Even if these leads were assumed to be true, the Government’s
evidence was sufficient to convict. The distant incidents relied on by petition-
ers were so remote in time and in their connection with subsequent events
proved by the Government that, whatever petitioners’ net worth in 1933,
it appears by convincing evidence that, on January 1, 1946, they had only
such assets as the Government credited to them in its opening net worth
statement. [348 U.S. 121, 137]
is some support for this type of instruction in the lower court decisions, Garst
v. United States, 180 F. 339, 343; Anderson v. United States, 30 F.2d 485–487;
Stutz v. United States, 47 F.2d 1029, 1030; Hanson v. United States, 208 F.2d
914, 916, but the better rule is that, where the jury is properly instructed on
the standards for reasonable doubt, such an additional instruction [348 U.S.
121, 140] on circumstantial evidence is confusing and incorrect, United States
v. Austin-Bagley Corp., 31 F.2d 229, 234, cert. denied, 279 U.S. 863; United
States v. Becker, 62 F.2d 1007, 1010; 1 Wigmore, Evidence (3rd ed.), 25–26.
Circumstantial evidence in this respect is intrinsically no different from
testimonial evidence. Admittedly, circumstantial evidence may in some
cases point to a wholly incorrect result. Yet this is equally true of testimo-
nial evidence. In both instances, a jury is asked to weigh the chances that
the evidence correctly points to guilt against the possibility of inaccuracy or
ambiguous inference. In both, the jury must use its experience with people
and events in weighing the probabilities. If the jury is convinced beyond a
reasonable doubt, we can require no more.
Even more insistent is the petitioners’ attack, not made below, on the
charge of the trial judge as to reasonable doubt. He defined it as “the kind of
doubt … which you folks in the more serious and important affairs of your
own lives might be willing to act upon.” We think this section of the charge
should have been in terms of the kind of doubt that would make a person hesi-
tate to act, see Bishop v. United States, 71 App. D.C. 132, 137–138, 107 F.2d 297,
303, rather than the kind on which he would be willing to act. But we believe
that the instruction as given was not of the type that could mislead the jury
into finding no reasonable doubt when in fact there was some. A definition of
a doubt as something the jury would act upon would seem to create confu-
sion rather than misapprehension. “Attempts to explain the term ‘reasonable
doubt’ do not usually result in making it any clearer to the minds of the jury,”
Miles v. United States, 103 U.S. 304, 312, and we feel that, taken as a whole, the
instructions correctly conveyed the concept of reasonable doubt to the jury
[348 U.S. 121, 141].
Petitioners also assign as error the refusal of the trial judge to give instruc-
tions on the wording of the criminal statute under which they were indicted,
even though the judge fully and correctly instructed the jury on every element
of the crime. The impossibility of pointing to any way in which defendants’
rights were prejudiced by this, assuming it was error, is enough to indicate
that the trial judge was correct, see United States v. Center Veal & Beef Co.,
162 F.2d 766, 771. There is here no question of the jury’s duty to apply the
law to the facts. That operation implies the application of a general standard
to the specific physical facts as found by the jury. The meanings of standards
such as willfulness were properly explained by the trial judge in no greater
particularity than necessary, and thus the jury’s function was not invaded.
In the light of these considerations the judgment is Affirmed (5).
Requirements for Indirect Methods of Proof 127
Items 11 and 12 state that the indirect method of proof used must show
that the alleged income be proven to have been gained during the time frames
in the computation in which they appear. They also require that the investi-
gating agency (in following all leads) negate all possible nontaxable sources
of income (legal sources in other financial cases). This is a logical approach
for the investigator to ensure that the amounts charged are, in fact, from the
sources alleged.
Negative proof may sound like a contradiction in terms, but it represents
a substantial part of financial crimes investigations. In the same way that a
suspect may be cleared of a crime by having a verifiable alibi for when the
crime occurred, the investigator must prove “beyond a reasonable doubt”
that legitimate sources of income were not available. As stated by Sir Arthur
Conan Doyle in his Sherlock Holmes stories, “If all things are proven impos-
sible, then whatever is left, no matter how improbable, must be true.”
In white collar criminal investigation, all legitimate sources of income
must be eliminated or credited back to the subject in the financial compu-
tation. The subject may have participated in activities that were improper,
immoral, and/or unscrupulous; but this does not prove him or her culpable
of a criminal act. He or she is not guilty until the investigator can prove that
these actions cannot account for the financial gains received.
Items 13 and 14 require the investigator to establish a likely source for
the income revealed in the indirect method computation. Without a likely
source for the understatements shown in the computation, the defense has
a ready-made argument for the evidence not meeting the standards of proof
beyond a reasonable doubt. Item 14 also reminds the investigator of the legal
necessity to prove all of the statutory provisions of the laws that the sub-
ject is charged with, in addition to ensuring the mathematical accuracy of
the computations. To expand the subject’s illegal activities by use of indirect
methods, the corresponding illegal activity must be proven and shown to be
a likely source for the unreported or concealed income.
Items 15 and 16 stress the need for the investigator to also show that the
alleged unreported or concealed income was the result of an intentional act,
rather than mere oversight or honest mistake. Showing a large amount of
income through computation does not, in and of itself, show the subject’s
intention to conceal the income. The nature of the subject’s record-keeping
practices in this case is deemed sufficient to infer willfulness. Other items
that can infer willfulness would include the acquisition and ownership of
assets using a false name or in the names of nominees, destruction of personal
records when made aware of the investigation, predominant or exclusive use
of cash in financial transactions to reduce the paper trail, and traveling out-
side one’s usual area to acquire assets or make expenditures (e.g., living in the
Midwest and traveling to New York to buy jewelry or furs).
Requirements for Indirect Methods of Proof 129
In the next several paragraphs, the Court cites other decisions regarding
the use of indirect methods of proof and explains the thought process it went
through in deciding to affirm the conviction. Each of the prior cases cited has
modified and explained variations in the presentation of indirect methods of
proof. In addition, the Court takes time to reiterate the concerns with indi-
rect methodology. The voluminous use of circumstantial evidence, the need
for a solid starting point, and the need to establish intent are all restated.
The Court then addresses the specific defenses presented in the case, and
how it viewed the potential viability of the defenses. It also discusses the
prosecution’s means for overcoming the proposed defenses and why it felt
the prosecution case sufficiently covered the defenses. We will review some
of the specific concerns in greater detail.
The first defense presented in the Holland case was the existence of a
cash hoard prior to the time frames in the computation. As the Court noted,
this defense is common in financial investigations using indirect methods
of proof. The cash hoard is then said to be used during the time frames of
the investigation and therefore explains the increases in wealth. Often, the
subject using this defense has to admit to a prior fraud to have acquired the
wealth. That is usually enough to cause judge or jury to ignore the cash hoard
defense. Circumstantial evidence can be obtained during the investigation to
help in refuting this type of defense. The fact that loans or credit purchases
were made in prior time periods would indicate that the subject did not have
sufficient means to make those purchases. Net worth information presented
to banks for loan applications that do not show the cash hoard as an asset
would be another indication. Each case will present unique evidence in help-
ing to refute the existence of a cash hoard on behalf of the subject.
The second defense is the implication that the computation may not
consider the existence of possible nontaxable sources (legitimate sources
for other financial investigations) that could explain the increase in wealth
shown in the indirect method computation. As stated earlier, the investi-
gation must show an attempt to verify any proposed defense, and in cases
where the subject decides to apply his constitutional rights, any potential
defense in regard to the taxability or legitimacy of the increases allocated by
the investigative computation. Remember that, in criminal cases, the subject
has the right to refuse to talk to the investigator without the fear of having
the silence held against him or her. This is also expressed in the third section
of defense addressed by the Court.
The fourth defense is that of an “honest mistake” being made to appear as
a willful criminal act. The Court restates that the investigation must address
willfulness distinctly in the evidence presented by the prosecution. The fact
that inadequate or no records exist on the part of the subject does not by itself
infer willful culpability.
130 Criminal Financial Investigations
The specific item method of proof is the simplest way to conduct a forensic
accounting investigation and the easiest to present to a prosecutor and a jury.
The investigation focuses on specific illegal or unreported transactions and
shows the financial gain received by the perpetrator from the alleged illegal
activity. The specific item method is used primarily in cases where the finan-
cial crime involves a single type of fraud or when the evidence of financial
gains from the crime is sufficiently complete for presentation to a jury.
The following is an example in which a single fraud is repeated over a
period of time.
Example 1
A medical transportation company provides transportation to and from the
hospital for patients who require regular treatments or therapy. The company
is paid in part by insurance companies, Medicare, or Medicaid. The company
bills the providers for services on a mileage basis. The company continues regu-
lar round-trip billings even if the patient is only riding one way or makes other
arrangements for transportation. The company also bills the insurance provid-
ers for an additional weekly trip for patients who were traveling several times a
week, but have improved and do not require as many visits.
A comparative analysis of the patient appointment records and the trans-
portation company’s billing records would show the inconsistencies and iden-
tify the patients who were being used by the company. The investigator would
be able to follow the leads obtained and receive the necessary testimony from
the patients to show that the company was overbilling the insurance providers.
The providers would gladly cooperate in providing investigators their records
of payment to the transportation company. The scheme would be reasonably
simple to present to a jury because the same falsification was made over and
over again by the company.
Specific items are just that, specific documentary evidence that proves
financial gain from a pattern of illegal acts. When a thief is found selling
a stolen item, the transaction corroborates his commission of the crime.
Similarly, when a white collar criminal builds a criminal enterprise to gain
131
132 Criminal Financial Investigations
financially from a series of illegal acts, the profits he receives can be attrib-
uted to the specific illegal acts committed.
The specific item method shows the profit from each fraudulent trans-
action in the financial criminal activity. In most cases, the perpetrator will
attempt to conceal the ill-gotten gains. This may take the form of using false
names or corporate shells to disassociate the criminal proceeds from the
individual committing the fraud or funneling the proceeds to a different
location that would be undisclosed in normal financial activities. Offshore
or out-of-state bank accounts or investments are often used in the attempt
to conceal the proceeds. The perpetrators may construct a scheme to falsify
the illegality of the funds received by altering the books and records of their
business, or fail to record the proceeds altogether.
In the example of the medical transportation company, the investiga-
tor would compare the payment records of the insurance providers with the
medical facilities’ patient logs and identify those patients who were used for
the purpose of filing false claims. If the transportation company records
are made available (by waiver of the company, by subpoena, or through the
execution of a search warrant), they could be used in the same manner of
comparison to identify the false claims.
Once the patients (used in the scheme) are identified, they would be
interviewed to corroborate the information gained through the records com-
parison. Patients who are unable to remember the specifics of their trans-
portation use or medical treatment schedule, or are no longer available for
interview (deceased) should be separated for other attempts to obtain cor-
roboration. Financial investigations rely on circumstantial evidence and,
therefore, the more the evidence obtained to establish the motive and means
of the crime, the more certain is the success of the investigation. Employees
of the transportation company would also be interviewed. It is unlikely that
all of them would be included in a conspiracy because it would dilute the
criminal gains from the scheme. The investigator would obtain as much
information as possible as to the work schedules, driving logs, mileage
records for the transporting vehicles, and patients served by the drivers. Just
as deceased patients can no longer receive treatments, a vehicle cannot make
30 round-trips if the mileage on that vehicle can only support 15. If treat-
ments are only provided on Mondays through Saturdays, any charges for
Sunday transportation would need to be specifically addressed. In the same
manner, any trips that are shown in the records that could not be possible
(five vehicles available, and seven trips logged at the same time and on the
same day) also require further scrutiny.
Always be aware that a circumstantial case often relies heavily on the
investigator’s use of negative proof as well as multiple means of corrobora-
tion. The characteristics involved in financial crime investigations require
The Standard Methods of Proof 133
that all potential evidence be explored, and that different avenues of logic be
used to refute the possible defenses of “innocent error” or “shoddy record
keeping.” In cases where an indirect method of proof is used, the investiga-
tion must present sufficient evidence to overcome any anticipated or poten-
tial defenses and to establish the intent to defraud to the jury.
The second phase in the investigation will be to follow the money trail.
Once the evidence obtained shows the fraudulent activity, the investigator
must focus on identifying all of the people involved in the scheme, the illegal
benefits that each received, and the location or use that was made of the illegal
proceeds. Two possible scenarios were presented that the company could use
to conceal the funds derived from the scheme. One was to conceal the false
charges within the books and records of the business. The other would be to
fail to record the fictitious claim payments altogether and to divert the illegal
proceeds. In either case, the investigator can trace the funds from their source:
the insurance providers paying the claims. Once the false claims have been
identified, the investigator can follow the flow of the payment for these claims
to the transportation company. The checks issued for the claims will provide
a lot of information. The canceled checks will show the identification of the
bank where the check was cashed or deposited. If the check was transferred to
a third party, it will show the signatures of both the transportation company
officer issuing the check and the individual to whom the check was given. In
this day of electronic transfers, the same information can still be obtained by
the bank authorizing the transfer and the receiving financial institution.
If the funds go through the company records as legitimate receipts, the
investigator must determine whether the false claims (recorded as legitimate
income) are offset by false expenses so that the illegal funds can be directed
to and used by the perpetrator. If the money generated by the false claims is
diverted prior to being received by the business (before entry into the books
and records), the paper trail should help identify the recipient of the funds.
Never presume the guilt or innocence of a suspect before obtaining and
analyzing all the records available. Any individual who has the ability to file
claims on behalf of the transportation company could make the false claims.
The perpetrator may be the president of the company, the head of billing,
an account manager, a receivable and payable officer at the medical facility,
someone in the mail department, patients or families of patients in collu-
sion with any of these other individuals, or anyone who could gain access to
and use the business practices and policies of the company to perpetrate the
fraud. Following the money to its final destination provides the circumstan-
tial evidence necessary to identify all of the people involved and convince a
jury of their culpability in the crime. The money trail also provides evidence
toward motive, knowledge, and intent, which are inclusive in the elements of
criminal financial investigations.
134 Criminal Financial Investigations
Example 2
We have Jane, of Jane’s Auto Sales. Other used car dealers have made complaints
that she “must be doing something illegal” to sell her cars so cheap. At this point,
the officer receiving the complaints has to apply his or her enforcement discre-
tion; let the complaints be shelved as “too vague” or look into the matter. For our
example, we will make a cursory review of the records most readily available.
Department of Motor Vehicle (DMV) records show that Jane sold 50 to
60 cars a year for the past 2 years. The car sales are of medium to high-end
vehicles, and she consistently sells them for $3,000.00 to $5,000.00 below
National Automobile Dealer’s Association (NADA) wholesale prices. The vehi-
cles are all 1 to 2 years old. County records show that Jane moved into town
and opened the business 2 years ago. She moved here from out of state and pur-
chased a home in a nice neighborhood. She is 34 years old, divorced, and has no
children. What conclusions do you draw? What are your next steps?
Is she a better salesperson than the other dealers in town? Is she falsifying
information to DMV? What information and why? Is she receiving cash pay-
ments that are unreported? Is she misrepresenting the vehicles to customers?
Further investigation shows that Jane sold her prior house for $150,000.00
and purchased her new home for $285,000, with a down payment of $85,000.00.
Jane’s mortgage application states that she earns $150,000.00 per year. She pur-
chases all of her vehicles from S & F brokers, a business located three states
away. Her cousin is a one-third partner in S & F. Law enforcement records show
that S & F is under investigation for dealing in stolen and chopped vehicles.
Customer interviews and vehicle inspections reveal altered or missing vehicle
identification numbers and block tags. Three of the initial vehicles inspected
match national stolen vehicle reports.
It appears that Jane is selling stolen vehicles. What evidence do you need to
support prosecution? How can you get it? If Jane agrees to an interview, what
questions will you ask?
The theory behind the bank deposits and cash expenditures method of proof
is to identify other income through an analysis of the individual’s bank-
ing activity. It is geared toward the individual who has both legitimate and
illegal income commingled in one or more bank accounts. This method
requires that the investigator identify and obtain the records for all of the
bank accounts that the suspect has signatory authority over. It is usually
applied when the suspect makes regular and routine deposits to his or her
accounts. The legal assumption is that the individual deposits funds as they
are received. The investigative analysis accounts for the regular deposits,
transfers between banks, and the cash expenditures made by the individual.
This method identifies and calculates income by determining the changes
in bank account activity during specific time frames. As in other indirect
methods of proof, the time frames run consecutively. The total deposits
The Standard Methods of Proof 135
reflect the current income of the individual. Adjustments are made to cor-
rect the computation for consideration of nonincome items, cash, and funds
that do not enter into the bank accounts. The method uses the legal assump-
tion that regular deposits to accounts reflect current income. The method
also considers the potential defenses of cash hoard and undocumented per-
sonal loans. Although it sounds simple in theory, the bank deposits method
requires that all financial activities be analyzed and considered in finalizing
the computation to ensure accuracy and provide the necessary proof beyond
a reasonable doubt.
The investigator must be able to prove that all of the deposits made and
the checks written on each account in the computation were made during
the alleged time period. This requires that each account be reconciled to
consider any checks outstanding and any deposits in transit. Banks post the
time frame for recording personal transactions. We have all seen the signs
that state, “Transactions made after 4:00 p.m. will be posted on the following
day.” In addition to personal transactions, there may be delays in postings for
telephonic, mailed, or other bank transaction methods, as well as delays for
unexpected events (weather, disaster) and holidays.
The process for reconciling a bank account is simple. It is the same pro-
cedure that is recommended for balancing a personal checking account,
which is usually included in the monthly statement. The reconciliations
reduce the account activity to the actual transaction dates for the desired
time period. The starting point is the balance shown on the bank state-
ment. Checks written but not clearing the bank account are subtracted from
the account balance. Deposits made but not as yet recorded are added to
the balance. Interest received on the account is added to the check register
balance. If all of the items are considered and the mathematical computa-
tions are done correctly, the statement and checkbook balances will be the
same, and the account is reconciled.
If the bank statement time period does not coincide with the time peri-
ods used in the investigation, the account reconciliations must be adjusted
to conform to the investigative periods. As an example, the bank issues its
statements for the time periods from the 15th of the month through the 14th
of the subsequent month. If the investigation uses the end of the month for
presenting the evidence, the investigator needs to complete the reconciliation
in mid-month. The bank balance for the end of the month would be used
instead of the closing balance of the statement period (most bank statements
provide daily balance information on the statement). Outstanding checks
and deposits in transit would be used to complete the reconciliation for the
time period needed.
Although the deposits are a crucial part of the circumstantial evidence
presented in this method, each deposit for the time frames in the investigation
136 Criminal Financial Investigations
The analysis of the bank accounts must ensure that the funds deposited
are not counted twice. What steps would you need to take to ensure that this
did not happen?
The accuracy of the computation determines whether a successful prosecu-
tion is possible. If the defense can find any mistake in the identification of the
deposits or in the calculations made by the investigator, they will use it to plant
doubt in the minds of the jury. This can cause the rest of the computation to lose
credibility and lead to a dismissal of the charges. The investigator must ensure
that the numerical transpositions from the evidence to the summary schedules
are correct and that all of the mathematical computations are accurate. In addi-
tion, the investigator must show that the computation is complete (all leads were
followed) and accurate in presenting all of the financial activities of the sub-
ject of the investigation. To ensure accuracy, the bank deposits method of proof
requires that all adjustments are made to the computation to reflect real and
potential benefits to the subject. The investigation is to show the least amount
of unreported or illegal income that the subject had to have received during
the investigative time frames. If financial transactions cannot be firmly estab-
lished, they must not be included in the amounts charged against the subject.
If items cannot be proven, and they could have a potential benefit to the sub-
ject, the computation must allow for the potential benefit to the subject.
Common adjustments to the bank deposits method of proof computa-
tion are
it is necessary to credit the subject with any cash that is taken from
the bank accounts. This allows for the possibility that the cash taken
from the account could be used for the cash expenditure.
3. Following the same logic, deposits made to an account from non-
income sources are also subtracted from the criminal computation.
Items such as proceeds from the sale of an asset, refunds, rebates,
gifts, and loan proceeds are examples of nonincome-type items that
may be deposited.
4. If any deposited items are found that thorough investigation cannot
identify as to the source, they must be shown in the computation.
These items can be included in the computation if they establish the
pattern of depositing illegal or unreported proceeds. Establishing
this relationship is a key factor in presenting the means and opera-
tion of the scheme used to defraud or generate the illegal income.
If not, they must be credited to the subject of the investigation.
time frames in the investigation are set on calendar years, the following
argument can be made to a jury.
The investigator also has to show that all potential bank accounts are consid-
ered. How could a person hide a bank account?
If the investigator fails to follow all leads as to accounts under the control
of the subject of the investigation, and an additional account (or accounts)
is presented at trial, the entire bank deposits presentation becomes useless
even if further analysis of the account could reveal even more income than
originally charged. In the term “all accounts,” the investigator must include
nontraditional accounts that can be used in the same way that a standard
checking or savings account can be used. Individual retirement accounts,
certificates of deposit, lines of credit, brokerage accounts, and credit cards are
examples of nontraditional banking tools that can be used by the subject of
the investigation. To ensure a complete computation of income, each individ-
ual bank record must be analyzed for lead information into other accounts,
expenditures, or nonincome sources of funds available to the subject of the
investigation. The following are a few examples of how investigative leads can
be found in the records obtained. They are provided from actual cases.
The next step would be to add the cash expenditures (the purchases made
with funds that were never deposited to the bank accounts). If the individual
operates a business, the business records will show total expenditures, the
bank statements and business check registers will show the portion of the
total expenditures paid by check, and the difference will be the portion that
had to be paid by cash. An example:
Next, we would add any personal expenditures made using cash. For our
example, we will say that the documented cash expenditures for 2005 total
$10,000.00. The result of our computation would show that this individual
had to have earned at least $100,000 in 2005. A total of $80,000.00 depos-
ited to his bank accounts, $10,000.00 in business expenses paid by cash, and
$10,000.00 in personal expenses paid by cash provide the $100,000.00 total.
If his or her business records show that he or she earned $50,000.00 from
normal and legitimate business dealings, the remaining $50,000.00 had to
have come from another source, or he or she is lying about how much was
140 Criminal Financial Investigations
Example
A vehicle dealer reinvested the majority of his income each year to improve and
expand his business operations. He had a personal checking account, a per-
sonal savings account, and two business checking accounts. He deposited the
proceeds from his new vehicle sales into the business accounts and transferred
money from those accounts to his personal accounts as his personal income
from running the business. The growth of his business enterprise did not cor-
respond to the number of new vehicles he was selling. Vehicle registrations were
obtained from the Department of Motor Vehicles, indicating the title transfer to
the dealer’s customers. The new vehicle sales matched the reported income for
the dealership. The company books and records showed a substantial increase
in inventory from year to year. This increase was attributed to used vehicles
taken in as trades on new vehicles. The dealer failed to record most of the used
(trade-in vehicle) sales. Analysis of his banking records showed one transfer to
an account in another state. Further investigation showed that the dealer had
accounts in the states and was depositing the used vehicle sales proceeds into
those accounts. The investigation resulted in a plea of guilty to four counts of
tax evasion, and the dealer faced a prison term of 5 to 20 years, criminal fines,
and civil liability for the corrected tax due, penalties, and interest.
H. A. Always
S. O. Never
___________________
Endorse Above Line
Last Bank
of
Other Town
GG
Signature:
The net worth and personal expenditures method of proof is the most com-
prehensive and, therefore, the most difficult to present for the prosecution
and to prove to a judge or jury. This method began early in the criminal pros-
ecutions of federal tax violations. One of the landmark U.S. Supreme Court
decisions to weigh the accuracy and use of the net worth method was Holland
v. United States, which was discussed in detail in Chapter 10. In its decision,
the Supreme Court found that the method was acceptable for criminal pros-
ecution if the prosecution was able to negate all other possible sources of
income. This decision opened the door to indirect methods of proof and for
a wider scope of investigative innovation in dealing with a broad variety of
criminal activities. The trial and prosecution of gangster Al Capone for tax
evasion led law enforcement to pursue any and all avenues of criminal pros-
ecution to break up and disburse organized criminal activities.
Today, aspects of financial investigative techniques are used to main-
tain internal security and control, corroborate other criminal activities, and
verify statements and assertions made in civil litigation. Comprehensive
financial investigations provide a much more thorough investigation into
organized criminal enterprises. They are often used to complete the extent of
the criminal enterprise and to identify all of the individuals involved in the
criminal operation. Investigations into ethnic organized crime groups, drug
rings and cartels, major corporate fraud schemes, and regulatory criminal
activities employ financial investigative techniques to prosecute the violators
and to help ensure that the criminal problems are eliminated.
The net worth and personal expenditures method documents, analyzes,
and interprets all of the financial activity of an individual, group of indi-
viduals, organization, or corporation for a set period of time. It computes
the total amount of wealth in the possession of the subject at a specific time
(the end of the time periods used in the investigation). These amounts are
sequentially compared to determine the financial gain or loss incurred by
the subject from one period to the next. In simpler terms, it is comparable to
completing a financial statement for a loan application. If you completed one
at the beginning of the month and another at the end of the month, the dif-
ference would show how much money you earned for that month.
To make the financial analysis complete, certain adjustments must be
made to ensure the accuracy of the computation. Personal expenditures made
The Standard Methods of Proof 143
during the respective time periods are added to the net worth increases or
decreases computed in the net worth summary schedule. Based on the com-
plexities or variations in the subject’s financial activity, other adjustments
may be necessary. If the subject owns and operates a business, and depre-
ciation is taken on equipment, then an adjustment is made for the income
offset by the depreciation deduction. Each case is different and requires the
application of logic and intuitiveness on the part of the investigator. As the
method title indicates, the bulk of the analysis is contained in the net worth
and personal expenditures.
The net worth is a complete listing of assets less liabilities, or what you
own less what you owe. Because it tries to determine monies earned, all assets
are listed at cost (value appreciation cannot be included) and all liabilities
at net received (loan fees and costs, and interest expenses are treated in the
expenditures analysis). These items are included at the full amount regard-
less of when during the time period (usually the calendar year) they were
acquired. They remain in the computation until they are sold or disposed of
by the subject. The liabilities are handled in a similar fashion. This accounts
for financial activity regarding tangible assets and liabilities. Next is the
documentation of personal expenditures. There is a cost to every item an
individual buys. To complete the computation, these expenditures must be
added to the net worth increases to accurately reflect earnings. Because some
expenditures are impossible to document historically, the net worth and
expenditures method reflects the least amount of income the entity acquired
during the specified time period. Indirect methods of proof can be viewed as
an analytical comparison of “financial snapshots” of the subject’s financial
condition. The following is a simple example of a net worth and personal
expenditures summary schedule:
Liabilities
Mortgage $80,000.00 $70,000.00 $10,000.00
Car loan $10,000.00 $6,000.00 $4,000.00
Total liabilities $90,000.00 $76,000.00 $14,000.00
There are several safeguards that must be followed to ensure the accuracy
of the computation. Expenditures that represent assets or a reduction in lia-
bilities cannot be included in the computation of personal expenses. In this
case, the starting point is 12/31/2005. The starting point must be accurate
and fully documented. This is clearly required in the Holland v. United States
decision. Without a solid starting point, the entire case becomes useless and
unfit for prosecutorial purposes.
Exercise 1
Consider the nature of assets and liabilities, then list as many other assets
and liabilities (at least five of each) that could be found in a net worth com-
putation. What items would be included as personal expenditures? What
potential defenses can you anticipate to this type of computation?
If you were given the opportunity to interview the subject, what questions
would you ask? If not given an opportunity to interview the subject, what
steps would you take regarding the potential defenses you identified?
The net worth and expenditures method is most often used when the
investigator is faced with an uncooperative subject. The subject asserts his
constitutional right to deny an interview and to provide any documents
during the investigation. In these situations, the investigator must rely on
third-party witnesses to construct the financial history of the entity under
investigation. The following is an example of a case that utilized the net
worth and personal expenditures method. The case was completed and pros-
ecuted in the Lower Peninsula of Michigan.
Example
The subject of the investigation was self-employed as a real estate salesman in
a rural area approximately 70 miles outside Detroit. He reported little or no
income for several years. He decided not to speak to the investigator but did
provide his real estate business records. He conducted his financial transactions
predominately with cash and lived in a modest home that he inherited. He was
married and had one child. During the investigation, one of the customers inter-
viewed provided information that he had made two purchases through the sub-
ject’s business. The business records showed only one transaction. The witness
explained that he purchased his home with the subject as the broker and another
directly from the subject on a land contract. In Michigan, land contracts were
not required to be filed with the county of records until the contract was fulfilled
and the deed was to be transferred. Further investigation showed that the subject
had made several purchases and sales of property using land contracts person-
ally and for clients. None of these sales was reported in his business records. The
subject also placed properties in the name of a very elderly relative (this relative
was incapable of making decisions, and the subject had a power of attorney to
handle all of her affairs). Again, these transactions were not reported as income
The Standard Methods of Proof 145
or recorded in the books and records of the business. The results of the net worth
and personal expenditures investigation showed that the subject had earned
more than $40,000 a year for the past 4 years. He was convicted in a jury trial,
fined, and sentenced in federal district court.
Interesting aspects of the case included the subject’s claim of a cash hoard
(refuted in establishing the starting point of the case), the attempted coercion
of clients not to talk to the investigator, the identification and interview of the
notary publics that witnessed the land contracts, and the subject’s purchase of
several expensive items (new vehicles for himself and his wife, a fishing boat,
and jewelry). All of these would contribute to establishing the fraud and the
subject’s intent to commit the fraud.
Hybrid Methods
Hybrid methods of proof are used in unique situations.* They are a com-
bination of the indirect methods discussed. Combining the methods poses
several problems in presenting the case for prosecution. An example in which
a hybrid method could be employed is if the subject of investigation owns a
bar, runs an illegal bookmaking operation, skims cash receipts to reduce his
sales taxes, and finances a narcotics trafficking operation in another nearby
town. Each operation may afford a different method of proof to establish the
income generated. Combining indirect methods requires the investigator
to prove the independence of each method so that no funds are considered
twice in the overall computations.
We will not go into examples of this type of investigation or exercises due
to complexities involved and their rare occurrence. It is sufficient to know
that the forensic accounting investigator can adjust and be as innovative as
necessary to complete the investigation.
There are also methods that are used to provide initial indications of
the existence of fraud or other illegal activity. These are cursory financial
investigative techniques that can be used to help determine if further finan-
cial investigation is warranted. They are usually applied when records and
information are provided, and do not require the in-depth documentation
and corroboration needed in the formal indirect methods of proof.
Percentage Markup
What would you look for if the bar owner reports earning $15,200.00?
What would you look for if the bar owner reports earning $150,000.00?
If a major discrepancy is found, the auditor should try to identify rea-
sons that could affect the particular bar’s operation.
What legitimate reasons could affect the earnings being lower?
What legitimate reasons could affect the earnings being higher?
The Cash-T
ACCOUNT NAME
Debit Credit_________
The Cash-T name is derived from the appearance of the schedule and its
predominant use in analyzing the cash account. This type of analysis would
identify all of the transactions that impact on the cash account. If the account
is accurate (at least from the standpoint of the books and records), both sides
of the “T” will equal each other or “balance.”
What Processes
Are Common to All
Indirect Methods
of Proof?
12
Certain factors are common to all indirect methods of proof. The logic behind
each of the methods we discussed is to determine what must have occurred
during our time frames to cause the change in financial condition and then
compare the changes sequentially to the following time frames. To do this,
the investigator has to comply with the rules set by the courts for the use and
admissibility of evidence in an indirect method of proof.
Indirect methods of proof get their name from the fact that each puts
forward, almost exclusively, circumstantial evidence to prove a criminal vio-
lation of law. The judiciary was quite skeptical of these methods when they
were first put forward in the 1920s and 1930s. In 1954, the U.S. Supreme
Court finally addressed the use of the net worth method of proof in Holland
v. United States. The Court delineated the pitfalls in using this method
(the same pitfalls that would be found in any indirect method) and identified
the precautions necessary for a prosecution under these methods to stand.
The rules of evidence are the regulations under which law enforcement
and the criminal justice system must operate in their duty to serve and pro-
tect the public. A loose comparison would be found in the game of Monopoly.
If the investigator breaks the rules, the subject gets a “get out of jail free”
card. If the rules are severely broken and the investigator found willful in the
breakage, the investigator may get the “go directly to jail” card.
This is where the investigating officer must establish due diligence in his
or her compilation and analysis of the evidence and circumstances of the
case. The evidence must put forth the inference of guilt when presented logi-
cally to the judge or jury. The preponderance of the circumstantial evidence
and the elimination of all potential defenses must convince the jury that the
explanation of events presented is the only logical one for the results found
in the computation.
The investigator must apply both deductive and inductive reasoning to
the facts he or she has uncovered. To prove this beyond a reasonable doubt,
the investigator has to prove a valid starting point, a likely source for the
unreported or hidden income, identify the participants in the criminal enter-
prise, show that all leads in the investigation were followed and addressed,
that the computation is mathematically accurate, and that all potential
defenses identified in the investigation have been considered and addressed.
149
150 Criminal Financial Investigations
These requirements apply to each of the indirect methods of proof and have
to be explained in the final report prepared by the investigator recommend-
ing prosecution.
Starting Point
The term starting point refers to the base time period used to start the indirect
method comparisons. It is the initial snapshot of the subject’s financial condi-
tion. It is the foundation or cornerstone upon which all of the investigator’s
assertions are based. Just as the Bible states that “the wise man builds his house
on the rock,” the wise investigator builds his case on a solid starting point.
The ideal situation for establishing the starting point in an indirect
method of proof case is the period just prior to the first period under inves-
tigation. In a tax case, where fiscal or calendar years are used as the time
frames, the ideal starting point is the year before the first year in which fraud
occurs. Keep in mind that each type of crime carries a specific statute of limi-
tations that restricts the investigation to prosecutable periods. If the fraud has
been perpetrated for a long time, only the periods in which the statute is still
open can be prosecuted. The investigator must review the statutes recom-
mended for prosecution to know what periods to investigate. The evidence
used in the financial investigation will be more current and easier to obtain
if the starting point is closer to the first period under investigation. Records
are usually still in existence and in better condition the more recent they are.
Also, it is more likely that the custodian of the records (witness) will still
be available for testimony and an explanation of the records. Recent finan-
cial transactions are also more easily recollected by the witnesses needed to
introduce and explain the transactions. Although this is the optimum situ-
ation, the starting point in financial investigations has been established by
tracking the financial activity of the subject as far back in time as the first
year that the individual had a job. One net worth investigation in Michigan
went back more than 30 years to the subject’s first year after graduating from
high school to build the financial starting point for the case. The ability to
create a solid and complete starting point will always take precedence over a
close proximity to the periods under investigation.
Various factors need to be considered in selecting the proper starting
point for an investigation. If the subject recently relocated to your jurisdiction,
you may want to consider the time period just prior to his or her move. If it is
discovered that the fraud or financial crime was taking place in the prior juris-
diction, you may want to consider the feasibility of a joint investigation with
the authorities in the other jurisdiction or the possibility of gaining the venue
for the criminal activities outside your jurisdiction. If the subject made a sub-
stantial purchase, such as a house or business, that required filing financial
What Processes Are Common to All Indirect Methods of Proof? 151
information with a bank or other lending institution, you may choose that
time period to utilize the subject’s admissions as to the financial condition
on loan or mortgage applications. If the subject has been divorced or filed for
bankruptcy in the past, you may want to use the civil court filings on property
and support settlements, or the final disposition from bankruptcy. Any major
event in the subject’s past may be a key in determining what time period is
used for the starting point. In any case, the investigator will have to bring the
comparative computations made up to the period prior to the periods under
investigation. Let us look at a potential scenario:
Exercise 1
An individual moved to your town 5 years ago. He was employed at a fast-food
restaurant for the first 2 years and has been unemployed for the last 3 years.
He has been identified, through surveillance on another case, as associating
with a group of suspected drug addicts and street distributors 3 years ago.
He was arrested for theft and received a sentence of probation, again, 3 years
ago. He purchased a 2-year-old Mercedes and moved into an exclusive apart-
ment complex last year. You have suspicion that he has worked his way into
an organized drug ring.
What time periods could be used as the starting point? Which would you
use and why?
To attribute the financial gains to a specific illegal activity (or in tax cases,
legal income that is unreported), the investigator must provide the evidence
as to the illegal activity being the likely source of the receipts. Courts have
accepted reasonable suspicion as the benchmark of proof necessary. If there
are multiple sources of income, the investigator needs to eliminate those
sources that are not derived from the alleged criminal activity.
Based on this requirement, the income determined by the indirect
method of proof will most likely be a lesser amount than that actually
gained by the subject from the criminal activity. This is due to the fact that
the investigation will not be able to find every dollar of illegal income or be
able to obtain adequate proof for all of the income generated through the
criminal activity. Even in specific items cases, the investigator is likely to find
only the majority of the illegal or secreted income. In a criminal prosecu-
tion, it is not necessary to prove all the income by using an indirect method
of proof, but it is necessary to prove all of the income charged in the case.
Substantiality must be considered to show the prosecutor, judge, and jury
that the amount of the financial crime warrants criminal prosecution. This
152 Criminal Financial Investigations
the $350,000.00 cash hoard. The subject stated that he kept a cigar box in the
wall behind his medicine cabinet in the bathroom. Each evening he would
take a bill out of his pocket and slide it through the slot inside the medicine
cabinet and into the cigar box. It would usually be a $5, $10, or $20 bill. He
stated, positively, that it was never a bill larger than a $20. He never needed
the money until the 4 years under investigation and that was the first time he
removed money from the cigar box. Because he used up all of the savings, he
threw away the cigar box and has since remodeled the bathroom. After the
interview, the investigator obtained an identical cigar box to the one described
by the subject. He took the cigar box to a local bank and asked them to fill
the box with as many $20 bills as possible. The bank used new bills wrapped
in $1,000 bundles. The box held less than $20,000.00 when full. In the bank
deposits computation, the investigator gave the subject credit for $20,000 cash
on hand in the opening year of the 4-year case. The credit reduced the first
year understatement of income, but it still left the subject liable for more than
$100,000.00 in unreported income for that year. Although the subject’s story
would be difficult for a judge or jury to believe, accepting the story to its maxi-
mum ($20,000.00) left no doubt in the mind of the subject’s attorney that the
investigator followed all leads, was not padding the amounts in the computa-
tion and, most important, had established credibility in the computation. The
defense attorney realized that a jury could not possibly have reasonable doubt
about the case or the amounts charged. Counsel advised and convinced his
client to plead guilty to all four felony charges, and accept the fines and penal-
ties that would be assessed by the court.
Although the courts only require a likely source of income, seemingly
unrelated circumstantial evidence may be used to provide the necessary
proof to meet this requirement.
In a case of overcharging the county government for legal services as a
public defender, an attorney was found to be charging 1-hour increments
for any contact with clients assigned by the court. He would regularly tele-
phone his clients and bill the county for 1 hour on each case. Most of the
calls would last less than 5 minutes each. This scheme would add an addi-
tional 4 to 6 hours a day being charged to the county. The payment records of
the county were destroyed in a flood of the basement storage area. Only the
records prepared and maintained after the flooding were available (the last
6 months). These records were not a part of the time period being investi-
gated, but an analysis of these records was made. The analysis showed days
for which the attorney charged the county for 10 to 14 hours of legal services.
The attorney’s bank records for this time period were also reviewed, and
other payments (from other clients) were identified. Interviews of the other
clients disclosed the time spent by the attorney on their cases.
A compilation and comparison of all of the information showed days on
which the attorney claimed more than 24 hours being billed to clients and
154 Criminal Financial Investigations
the county. The county bank records were analyzed, and the amounts paid
to the attorney during the periods under investigation showed the same pat-
tern. Further investigation revealed billings for days when the attorney was
out of the country on vacations, weekend and holiday time being charged,
and even charges for days he was in the hospital. The indirect method of
proof investigation showed substantial amounts of unreported income, and
the overcharging scheme was used and accepted by the court as the likely
source of income.
Another scenario would be a situation in which the subject was found to
have a substantial income through the use of an indirect method of proof.
The subject is a single female who has been receiving welfare and food stamp
assistance during the period under investigation. A background check shows
two convictions for minor narcotics violations: one prior to the period under
investigation and one during the period. The likely source of the income she
received could be attributed to trafficking in narcotics.
Most of the financial crimes investigated are complex and involve more than
one individual. Caution must be taken in an indirect method of proof case
not to focus solely on the main subject behind the scheme but to include
analyses of any and all of the coconspirators who may be involved. This
includes those individuals who may play only a small part in the scheme and
those who may have only participated during a portion of the time that the
scheme was in operation.
This is not a court-defined requirement for indirect methods of proof but
rather a precautionary requirement developed through investigative experi-
ence. If the conspirators are close enough to be sharing in the proceeds of a
criminal fraud, they are most likely willing to provide false defenses for one
another in the court. At the least, they will probably attempt to continue
the concealment and deception in the fraud scheme. This may be the result
of self-preservation instincts in hopes of keeping the coconspirators from
divulging their part in the scheme, or an attempt to overcome prosecution
and conviction of any of the coconspirators that would also shelter the con-
spirators from prosecution.
Examples of ways in which failing to identify one or more of the cocon-
spirators can destroy an investigation follow: The subject has been shown to
have received more than $100,000.00 per year over the last 3 years, which
cannot be accounted for from legitimate sources. The likely source of income
is from his involvement in an insurance fraud scheme. He insured paintings
worth more than a million dollars over this period of time. He filed claims of
What Processes Are Common to All Indirect Methods of Proof? 155
$700,000.00 the first year and $350,000.00 the third year. The first claim was
from the theft of the paintings, and the second from a fire.
The case goes to trial, and the indirect method of proof establishes the
monetary gains beyond a reasonable doubt. Because all of the funds were not
traced, it is likely that others were involved in the fraud scheme. The defense
calls a witness that states he gave the defendant the $300,000 over the 3 years
in a protracted attempt to purchase Chinese art pieces. The money was, in
essence, a surety put up to show that the buyer was sincere in the negotiations.
The witness provides three cashier’s checks issued by him to the defendant.
There is no time for a further investigation into the veracity of the
w itness’ statements once the trial has begun. It is unlikely that the court
would grant a continuance sufficient in length to allow the investigator to
check out the story. The jury will have to consider the witness testimony as
reasonable doubt, and all the effort that went into the case will disappear
with an acquittal. The witness may have been involved with the defendant in
the scheme, and the payments represent the defendant’s share of the illegally
obtained proceeds.
Leads are the information that points the investigator to relevant evidence
needed to complete the financial investigation and to ensure that the indi-
rect method computation is as comprehensive as possible. Leads are found in
every aspect of the investigative endeavor. They are found in the development
of the subject’s history and background. They surface during interviews of
the subject, friends, relatives, and associates. They are also uncovered in the
analysis of documentary evidence. Throughout the course of the investiga-
tion, leads will come to light, and the investigator is obligated to follow those
leads through to fruition. It is only after all of the leads have been examined,
evaluated, and explained that the investigator can be assured that the case is
ready to be recommended for prosecution.
Following all of the leads is an investigative requirement imposed by the
courts, within the scope of feasibility. It ensures that all evidence, in favor of
and against the subject, has been considered and addressed in the criminal
prosecution case. Because financial investigations rely on the use of circum-
stantial evidence, this requirement supports the fact that the logic applied to
the facts is, in fact, the total picture of the subject’s financial activities, and
ensures that the rights and protections afforded the accused have not been
violated. When the investigator has demonstrated to the judge or jury that
all leads, no matter how great an effect they have on the case, have been fol-
lowed, it is extremely difficult for the defense to challenge the quality of the
investigation or infer bias on the part of the investigator. Evidence obtained
156 Criminal Financial Investigations
investigation revealed that the subjects used the garage to store marijuana
until it could be shipped to Ohio. Interviews of the rental staff and an analysis
of the rental records identified other coconspirators who visited the garage at
different times. The results of following the lead were the identification of five
other individuals involved in the conspiracy, identification of the code names
assigned to each of the coconspirators, identification of a home purchased in
Hawaii for $1.2 million and personal expenditures exceeding $100,000.00 in
the area of the rented garage.
Following the leads can provide the evidence needed to make a case a
great case; failure to follow the leads can kill a case that has the potential to
be a great case. The fact that courts require this in indirect methods cases
to protect individual rights ensures that the investigator completes the best
investigation possible.
Mathematical Accuracy
to the jury and blot out numbers from the charts and graphs. The jury will
remember the theatrics that the defense will be allowed to use and lose sight
of the meaning of the computation. Even if the errors are minimal, it takes a
great effort on the part of the prosecution to save credibility on behalf of the
investigator and the computation if it can be saved or restored at all.
The cash hoard defense alleges that the unreported or illegal income charged
in the indirect method of computation was really derived from cash the sub-
ject had accumulated in time periods prior to the periods in the computation
and was used during the time periods of the investigative computation. The
purported result of this argument is that the entire computation is erroneous
and the case should be dismissed. If the money was available to the subject
from this source (the cash hoard), then it was not earned, as alleged in the
investigation, during the periods charged. To use this defense, the subject
must provide the judge and jury with a convincing story as to how the money
was accumulated; where and how it was kept; and when, why, and how it
was used during the time periods of the investigation. If the defense is pre-
sented early in the investigation, the investigator is required to determine
What Processes Are Common to All Indirect Methods of Proof? 159
the plausibility of the story and be able to refute the defense by following the
leads given by the subject or close the investigation. Addressing a cash hoard
defense in indirect methods cases is necessary even if it is not presented dur-
ing the investigation. Because it stems solely from the subject, it can be pre-
sented at any time, and the investigator, and especially the prosecutor, does
not want to be surprised by its assertion in court.
Many variations on the cash hoard defense can be found in court records
of financial cases. Those that have worked are still adapted in financial cases,
and those that have failed consistently have been abandoned. An admission
to gaining illegal or unreported income in earlier time periods and using it
during the periods of the investigation as a defense has been tried but has not
been successful. Courts have not accepted the credibility of an admitted vio-
lator to be truthful about when they were crooks. The standard story given to
support a cash hoard is the accumulation of savings over a lifetime, kept in
cash, and maintained in a hiding place that is kept secret. The stories range
from hiding the cash in wall panels or floorboards to filling glass jars with
cash and burying them in the yard. This defense had greater believability
in the 1930s and 1940s following the bank failures of the Great Depression.
Deposit insurance and banking regulation have made the argument of lack
of trust in banks fade away after time. However, the defense is still used with
an unlimited supply of reasons being presented by defendants.
Following all of the procedures needed in preparing an indirect method
of proof case provides many avenues for the investigator to take to refute a
cash hoard defense. Establishing the starting point by conducting a complete
analysis of financial transactions prior to the periods under investigation can
show that little or no cash from legitimate sources could be available for sav-
ings prior to the periods under investigation. Analysis of the financial records
can show financial activities that are inconsistent with having a substantial
amount of cash prior to this period. Taking out loans, making minimum pay-
ments on time or credit purchases, selling of personal items or assets to make
purchases, and late or missed payments would all indicate that the subject did
not have a mattress full of money at home. Testimony of witnesses who were
with the subject when purchases or expenditures were made would indicate
the subject’s financial status and use of cash. Loan applications and financing
statements would provide the subject’s statements as to the amount of cash he
had available at the time the documents were prepared. Another form of inves-
tigative analysis more commonly used in bank deposit and cash expenditures
cases is to analyze the flow of cash in the subject’s transactions. This can show
that the alleged amounts were not conducted using cash. In this case, the cash
hoard may be listed in each time period in the investigation as the asset, cash
on hand. Any or all of these items can be used as circumstantial evidence as to
whether the subject had or could have had a cash hoard available.
160 Criminal Financial Investigations
Personal Loans
The denial of being the true owner of assets held in one’s name is another
defense presented in indirect methods cases. The subject will state that the
assets were purchased by him or her, but the money used to purchase the
asset came from another person. This defense requires the cooperation of
the individual named as the true owner. The exclusive use of the asset, the
listing of the asset on financial statements filed by the subject, and the subse-
quent sale of the asset and retaining the proceeds are all means by which the
What Processes Are Common to All Indirect Methods of Proof? 161
investigator can refute this type of defense. If time is available, the financial
condition of the alleged true owner may be analyzed to show whether he or
she had the resources to provide the necessary funds.
This defense can also be presented in reverse when the subject uses ficti-
tious names or entities to register assets or make expenditures. If the subject
has sufficient influence over others, he or she may use them to purchase
assets and make expenditures as nominees. In one case, the head of an orga-
nized crime family used underlings to make stock purchases, purchase real
property, and buy cashier checks from various banks to make purchases on
his behalf.
If this difficulty is encountered in the investigation, the investigator must
go through the painstaking process of analyzing each and every financial
transaction with extreme scrutiny.
The next three chapters will provide simple examples of how the sched-
ules appear in each of the three indirect methods of proof computations that
have been discussed. These examples are suggested as ways to organize and
present the investigative findings. Each case will lend itself to presentation in
a variety of ways, and each investigator will develop a method that works best
for him or her in preparing the final presentation.
The
Specific
Items Case 13
The format for a specific items presentation can be approached in several
ways. Following is an example of a generic computation. Notice that common
items are separated into schedules that are referenced on the main schedule,
often referred to as an appendix (in this example, Appendix A).
The large column on the left side of the schedule contains a description
of the items that are used in the computation. The first smaller column to the
right will reference the witness number and the specific exhibits that prove
the amount of the item. After this column, the others are used chronolog-
ically to display the amounts being used in the computation. In a formal
computation, a wide column on the far right is used to fully describe the
documentary evidence exhibited.
The last page of the sample computation is referred to as the list of wit-
nesses and gives the relevant witness information with a description of each
item of evidence they will introduce. The rules of evidence dictates which
witness is competent to introduce which items into evidence. The list of
witnesses will include any witness referred to in the narrative prosecution
report, in addition to the criminal computation. The witnesses are usually
numbered in the order they appear in the report to simplify the case presen-
tation. An example of the list of witnesses is contained in Chapter 15 in the
net worth and expenditures computation.
The investigative report follows the investigative steps taken in the case.
Draft or cursory schedules are prepared to identify the evidence found, the
witness providing the evidence, and the financial effect the evidence has on
the case. Separate schedules for each category should be made to identify and
correlate similar financial transactions, and to separate the evidence, as it is
obtained, to facilitate preparation of the final report.
The following example will provide a summary of the case, the evidence
found during the investigation, and samples of how the evidence would be
reduced to schedules. In addition, the discretionary decisions made in the
case will be discussed. This example is based on the investigator’s decision to
use the specific items method of proof.
163
164 Criminal Financial Investigations
Case Summary
John Doe is a loan officer at the City Bank. He began working at the bank
after getting an associate degree in finance in 2001. The position at the bank
was his first full-time job. In 2005, he was promoted to the position of loan
officer. As loan officer, he was responsible for issuing loans and determining
when they were no longer collectible. An anonymous call is received that
John Doe’s spending and lifestyle have increased dramatically in the past
3 years, and he is still at the same job.
Evidence Developed
1. Doe is single and has worked for the bank since January 10, 2001.
He was promoted on February 1, 2005, to loan officer. He has
earned the following amounts from his salary at the bank: 2001,
$17,000.00; 2002, $18,000.00; 2003, $18,700.00; 2004, $19,200.00;
2005, $32,500.00; 2006, $35,700.00; and 2007, $39,200.00.
2. As the bank’s loan officer, Doe is responsible for all of the loans
made and the determination of which loans should be written off as
uncollectible.
3. The number of loans written off increased between 2004 and 2005,
but has remained constant from 2005 through 2007.
4. The bank wrote off an average of 10 loans per year from 2005 through
2007.
5. The dollar amount of loans written off during these years increased
in each of the last 3 years.
1. Borrowers for the defaulted loans from 2005 through 2007 were
identified.
2. The first loan that Doe wrote off in 2005 was a loan his brother-in-law
made with the bank 2 years earlier. The loan balance was $27,000.00
in his brother-in-law’s business.
3. Several of the written-off loans were made to recently started businesses.
Other Information
The investigator decided to contact the borrowers who had loans written off
between 2005 and the end of 2007. All but nine of the loans were to busi-
nesses that had operated in a six-county area. The businesses had since
closed. Interviews of the former business owners revealed that they obtained
business loans for various legitimate reasons, but their plans did not work
out, and they defaulted on the loans and subsequently went out of business.
Doe’s brother-in-law was also interviewed. He stated that he obtained a
loan from the bank to open a small diner. The diner broke even or lost a little
each month for the first year it was open. In 2005, the bank wrote off the loan.
There were no assets owned by the business (location and equipment were
leased). The business had a few hundred dollars that was applied to the loan,
and a balance of $27,000.00 was written off. He stated that he did not know that
his brother-in-law was responsible for the write-off. He also stated that he has
never loaned or gifted any money to Doe. He states that the check for $5,000.00
that he gave to Doe was the repayment of money Doe loaned him when he
was starting the diner. He paid Doe rather than give it back to the bank.
166 Criminal Financial Investigations
The remaining nine loans that were written off (two in 2005, three in
2006, and four in 2007) went to recently registered businesses that could not
be located in telephone books or business directories. A search of the state
business registration office provided the names and addresses of the owners
and registered agents. None of the individuals named could be located, and
several of the addresses listed did not exist or were those of people who had
never heard of the business.
The investigator went back to the loan records obtained from the bank
and followed the loan proceeds on the nine suspect loans. The loan proceeds
were wire transferred to nine different business accounts at nine different
banks in bordering states.
The nine out-of-state accounts were opened under the nine business
names used for the defaulted loans. Each account was opened between
September 2005 and February 2006, with an initial deposit of $200.00. The
accounts were all opened by the same individual, a John Poe, residing in
the city where the loans were issued. The only transactions in each of the
accounts were a single wire deposit from City Bank and periodic cash with-
drawals ($8,000.00 to $9,000.00 each) until the balance was zeroed out and
the accounts were closed. An enlargement of the driver license photograph of
John Doe was shown to the out-of-state bankers, and seven of the nine iden-
tified the photo as that of John Poe. The identification for opening each of the
accounts was checked, and the information was shown to be false, including
name, address, date of birth, and Social Security number.
The bank records for the nine accounts were obtained and taken as evi-
dence, as well as statements from the bankers identifying the records and the
contacts with the individual claiming to be John Poe. A schedule was pre-
pared chronologically following the financial activity in the nine accounts.
Another schedule was prepared showing the chronology of the defaulted
loans from City Bank records. The two schedules were compared, and they
revealed that the dates when the proceeds were wired from City Bank as loan
proceeds on the defaulted loans coincided with the wire deposits received
in the nine accounts. The schedule of cash expenditures made by John Doe
(including the condominium and SUV purchases) occurred within a few
days of sufficient funds being withdrawn from the nine accounts.
Several factors were considered by the investigator in making the deci-
sion to use the specific items method of proof for presenting this case. The
investigator felt that the loan fraud scheme was the only fraud being perpe-
trated by John Doe. The illegal gains from the fraud scheme could be traced
directly to each of the nine fraudulent loans. The proceeds from the scheme
could be shown to be going to John Doe exclusively. The use of false identi-
fication and out-of-state banks to conceal the proceeds was strong circum-
stantial evidence relating to Doe’s knowledge of wrongdoing and intent to
defraud the bank.
The Specific Items Case 167
City Bank
Write-Off Summary
Loan Write-Off
Date Number Amount Date Amount W/E#
12/12/03 1214 $28,000.00 01/06/05 $27,000.00 W1-1
12/28/03 1242 $25,000.00 01/10/05 $22,000.00 W1-2
01/06/04 1255 $20,000.00 02/10/05 $19,000.00 W1-3
05/15/04 1501 $30,000.00 02/16/05 $29,000.00 W1-4
06/08/04 1633 $18,000.00 03/12/05 $17,500.00 W1-5
09/06/04 1776 $32,000.00 04/04/05 $31,100.00 W1-6
11/21/04 1850 $30,000.00 05/01/05 $30,000.00 W1-7
01/04/05 1929 $35,000.00 06/15/05 $35,000.00 W1-8
02/20/05 2004 $35,000.00 07/15/05 $35,000.00 W1-9
03/03/05 2062 $17,000.00 12/10/05 $15,500.00 W1-10
Total 2005 $270,000.00 $261,100.00
that the individual had full intention to repay the loans, the income would be
charged when the note was written off as uncollectible (forgiveness of indebt-
edness constitutes the waiver of the liability by the lender, and the amounts
become income to the forgiven borrower). For the sake of simplicity, our case
has both the issuance of the loans and the write off of the loans occurring in
the same year.
Other schedules and computations would also be prepared. An analysis
of Doe’s checking account activity would be made for all of the years he had
been employed. This analysis serves a twofold purpose: It reviews prior financial
activities to identify if other irregularities are present, and it is used to support
the starting point for the indirect method of proof. In our example, all of the
money that Doe defrauded from the bank is accounted for, and the starting
point becomes a useful tool in painting a picture of Doe’s financial activities
and potential financial events, which may indicate motive, means, and intent
(all are needed for a criminal conviction). As we are not concerned with expen-
ditures, the checks drawn on his account do not require in-depth analysis.
The deposits to the account should be given in a separate schedule to show
that none of the fraudulent loan proceeds were placed in his regular account
(all deposits from employment at bank) and that the major cash purchases did
not come from his checking account. This, again, becomes a piece of circum-
stantial evidence pointing to Doe’s attempt to conceal the fraudulent gains.
Although expenditures do not figure in the specific items method of
computation of income, unusual or “luxury”-type expenditures are fully
documented and used to prove other elements of the crime. The use of cash
for major purchases, such as the condominium and the SUV, can be used to
infer the attempt to conceal receipt of the fraudulent funds and to show the
direct benefit of the criminal activity to the subject. The same would be true
on the additional asset acquired (the savings account), and these show earn-
ings far in excess of his legitimate income.
If we add the cash expenditures and the cash asset acquisition discov-
ered during the investigation thus far, we would only account for $58,000.00
of the $355,000.00 fraudulent loan proceeds. The investigation requires that
further steps be taken to find out where the rest of the money went. We would
want to determine if Doe had coconspirators in the scheme who also shared
in the illegal proceeds. The bank would want to know where to go to try to
recoup the monies it lost through the fraud scheme. The investigator wants
to make sure that all violations that Doe may have committed are uncovered
and documented for prosecution.
Following all of the leads would direct the investigation to the out-of-state
banks to determine where the rest of the fraudulent proceeds went. The same
general investigative procedures would be applied to the new locations. For
our case example, three of the out-of-state banks are located in the Myrtle
Beach area, and these accounts were opened and closed out after the vacation
170 Criminal Financial Investigations
that Doe talked so much about to his coworkers. Property records, vehicle reg-
istrations, and other public record searches would reveal whether the fraudu-
lent income was used for major purchases in the vicinity of the banks. For the
purpose of our example, the searches reveal the following information:
Interviews of the real estate agent and the boat broker revealed that Doe
made both purchases with cashier checks drawn on the three banks he used
for wire transferring the false loan proceeds. Each of the cashier checks was
in the amount of $9,000.00; 21 checks were used for the house, and 8 checks
for the boat. He purchased cashier checks from different branches of the
banks on consecutive days, acquiring the total amount needed in about a
week for the house purchase, and in 2 days for the boat purchase. This evi-
dence would act as proof for additional charges of money laundering against
Doe for trying to avoid the currency transaction reporting requirements
(statue requires a currency transaction report be filed for cash transactions in
excess of $10,000.00) by making multiple cash transactions below the dollar
requirement when the intent is to exceed the amount (smurfing).
The false identity used by Doe to open the out-of-state accounts is another
action that has potential for additional criminal charges. The use of a false
Social Security number is a felony under federal law. The investigator should
provide the evidence and allow the prosecution to decide what additional
charges to include.
With the follow-up completed in our example, we can now account for
Doe’s personal use of an additional $266,000 of the $355,000 defrauded from
City Bank. Combined with the $58,000 we documented in his hometown,
we have accounted for $324,000 of the illegal income. As the use of the funds
is circumstantial evidence used to negate the potential defense of others
being involved in the scheme, it is not necessary to trace the small amount
remaining. It is likely that Doe used the funds on his new lifestyle expendi-
tures. The specific items case will still be the primary source of evidence to
charge the total amount taken by fraud from the bank.
If the investigator believes that the $5000 that Doe received from his
brother-in-law was, in fact, a kickback to get his loan written off, a case may be
developed against the brother-in-law. Completion of that investigation would
not be necessary to move forward to prosecution of Doe for the bank fraud
and/or the money laundering or false Social Security Number, because there
is no indication that the brother-in-law was involved in those activities as a
coconspirator. Again, the investigator needs to make sense of the new evi-
dence acquired for presentation to the prosecutor and eventual use in court
The Specific Items Case 171
The deposits schedule illustrated only reflects the 3 years under investi-
gation. In reality, all the 7 years of the account activity would be scheduled
out for the case report. In addition, bank account reconciliations would be
made to reflect accurate year-end balances, and the expenditures from the
account (checks written) would also be analyzed. The purpose for the exten-
sive bank analyses is to establish a firm and accurate starting point, and to
provide circumstantial evidence relating to the subject’s state of mind lead-
ing up to the commission of the fraud, and the financial patterns and condi-
tions that existed prior to the periods under investigation.
The other schedules used in our example are the summaries of the actual
fraudulent loans and the cash expenditures that Doe made with the fraudu-
lent loan proceeds. The use of schedules in a financial investigation is an easy
and important means for gathering similar financial activities in groups so
that the type of activity can be seen in a total picture. Changes, inconsisten-
cies, and irregularities can provide the plausible reasons the subject had that
led to the commission of the crime. In our case, it is easy to imagine that Doe
began spending heavier than his promotion could afford. The write-off of his
brother-in-law’s loan (made in 2003) could easily have given Doe the idea for
the fraud scheme. The use of schedules and the development of a complete
financial history of the subject allows the people evaluating the case report
for prosecution the potential to see the aggregate amounts of financial activ-
ity in all areas and gain an understanding of the subject’s state of mind in
The Specific Items Case 173
To eliminate any doubt that Doe was the recipient of the fraudulent loan
proceeds, a schedule of his use of these funds would also be included. This
would be a schedule of his cash expenditures over the 3-year period.
John Doe Cash Expenditures
2005 through 2007
Date Item 2005 2006 2007 W/E#
01/07/06 Down payment, Condo 0 $8,000.00 0 W16-1,2
01/18/07 Savings account 0 0 $18,000.00 W1-5
01/30/07 Beach house 0 0 $192,000.00 W17-1,2
05/17/07 Boat 0 0 $74,000.00 W18-1,2
09/28/07 SUV 0 0 $32,000.00 W15-1,2
Totals 0 $8,000.00 $316,000.00
Expenditures
By check $13,102.00 $22,488.00 $25,008.00 $26,990.00 Sch 3
By cash 0 0 $8,000.00 $316,000.00 Sch 4
Totals $13,102.00 $22,488.00 $33,008.00 $342,990.00
Income $13,440.00 $92,512.00 $130,032.00 $206,880.00
Less expenditures $13,102.00 $22,488.00 $33,008.00 $342,990.00
Totals $338.00 $70,024.00 $97,024.00 ($136,110.00)
As you can see from the given appendix, the evidence in the case is not
complicated enough to require the appendix for purposes of clarity and
understanding. The appendix can be included as a ready reference and guide
to the supporting schedules, and it does identify the amount of fraudulent
income that was not specifically identified with a specific purchase during
the investigation. The narrative portion of the report will walk the prosecu-
tion through the financial history of the subject and refer the reader to the
appropriate schedules that delineate the common financial transactions.
The specific items method of proof is the easiest form of forensic account-
ing to employ in a financial investigation. The fraudulent items can stand
alone, but when placed in a historical perspective, they can clearly show a
judge or jury the overall plans of the violator and the total harm or injury
caused to the victims.
The purpose in providing examples of schedules that show how similar
transactions can be consolidated within respective time periods is to give the
investigator a means of combining transactions so that the prosecution and
The Specific Items Case 175
Exercises
177
178 Criminal Financial Investigations
by check schedules, one for each checking account, are schedules 5 through 7.
The adjustments to the gross deposits are contained in schedule 8 and the
additional cash expenditures are included in Appendix A.
Case Summary
Joe Buck owns and operates a small tattoo parlor in the downtown area of
Mayberry. The shop and a small apartment over the shop are rented by Buck
and his girlfriend Jane Doe. Buck is 40 years old, and Doe is 26 years old; they
have no children. Joe has operated the tattoo parlor for the last 2 years and
pays rent of $550.00 per month for both the shop and the apartment. Buck
drives a Harley motorcycle that he keeps in a shed behind the shop.
Complaint calls have been received against the parlor and the clientele,
and the noise from motorcycle and car traffic, occurring mostly on Friday
and Saturday nights. Other complaints have been made about loud and vul-
gar language and public drunkenness at the location during the 2 years he
has been in business. Notice of the complaints was made to Buck, and the
drinking and loud language stops for a while. He states that many of his
customers drive motorcycles or older (and louder) cars. They also schedule
tattoo sessions in the evening hours. He says he cannot turn away business
unless he wants to close the shop and collect welfare. There are no statutory
or regulatory provisions being violated by Joe that would allow action on the
complaints. The residential area from which the complaints are coming is
behind the shop, one block from the business area downtown.
An anonymous complaint comes in from an angry woman who says she
thinks her son (16 years old) got marijuana from the tattoo parlor. A back-
ground check is run on Joe Buck and Jane Doe, and a surveillance is run on
the tattoo parlor for four consecutive weekends to see if there is any suspi-
cious activity taking place. The backgrounds show:
The surveillance runs from sundown (about 7 p.m.) until 2 a.m. The
results of the surveillance indicate the following information on the activi-
ties at the tattoo parlor:
1. Analysis of the business records showed that Buck had a gross income
of $38,000.00 in 2006 and $40,000.00 in 2007. Business expenses
were $14,000.00 in 2006 and $16,000.00 in 2007, resulting in a net
income of $24,000 for each year. He paid himself $2,000.00 a month
from the business.
2. These records also showed that he paid $10,000.00 and $9,000.00,
respectively, of his business expenses by check from the business
account. His calendar of clients and appointments showed him doing
tattoos on Mondays through Saturdays between 10 a.m. and 6 p.m.
180 Criminal Financial Investigations
3. Analysis of the utility bills and statements showed that he was timely
in his payments. Vendor receipts showed that he purchased his inks
and needles from a single supplier in California.
4. The bank records showed that Buck made weekly deposits to his busi-
ness checking account in amounts between $700.00 and $1,000.00.
At the end of each month he would transfer $2,000.00 from the busi-
ness checking account to his personal checking account. He would
also deposit $250.00 to $500.00 into his personal savings account
monthly, during each of the years.
5. The bank records did not show any other regular payments for loans
or credit cards. There were no payments to credit card companies,
and no credit card statements were found during the search. The
business checking account was opened with a deposit of $1,200.00.
6. One receipt was found for the purchase of a $580.00 dress from an
exclusive shop in town. The check number listed on the receipt did
not correspond with the check registers or checking account state-
ments for either of Buck’s accounts.
7. A marriage certificate from a Las Vegas marriage parlor shows
that Buck and Doe were married 2 weeks before moving to town.
Apparently, Doe is still using her maiden name for her bank account
and as identification on the rent application.
Because the subject made regular and periodic deposits of his reported
income to his bank accounts and the records of his bank transactions were
available, the investigator chose the bank deposits and cash expenditures
method of proof to investigate Buck’s financial activities. In following all of
the leads available through the information obtained, the following addi-
tional information was obtained:
1. Doe’s background check showed that she was never employed after
graduating from high school. She had one arrest for being drunk and
disorderly (the charges were dropped), and she had one conviction
for shoplifting.
2. The rent application for the shop and apartment showed that Buck
was self-employed, and he listed his earnings as approximately
$45,000.00 per year. The two checking accounts with State Bank
were listed, as well as his 1998 motorcycle and $2,000.00 in cash.
There were no liabilities listed on his application. Doe was also a
tenant on the application. The only item listed for her was a checking
account at a bank in an adjoining state (her hometown and former
residence location). It showed a balance of $212.00.
The Bank Deposits and Cash Expenditures Case 181
3. Interviews at the dress shop where the dress was purchased by Doe
using the out of sequence check revealed the account number for her
out-of-state checking account and several cash purchases at the shop
during the past 2 years.
4. Contacts with the vendors that Buck dealt with verified the expenses
that were recorded in his business records. The vendor information
corroborated the records for the amounts paid by check and the
amounts paid by cash.
5. The bank records showed only one deposit that was made by a transfer
of funds from Doe’s account to Buck’s business account. The transfer
was for $2,200.00 on April 12, 2006. Buck issued a check on April
14, 2006, for $2,800.00 to pay his taxes. The records obtained by the
warrant would include the opening documents for the accounts, the
signature cards, monthly statements, deposit slips, canceled checks,
and any other debits or credits made to the accounts.
6. The motorcycle shop was contacted and the owner stated that Buck
purchased the Harley for $32,000.00 with the Honda as a trade-in.
He said that Buck paid the $32,000.00 in cash.
The next step in the financial investigation is to prepare the schedules of the
like items for the analysis to determine whether an additional source of income
exists. In the bank deposits and cash expenditures method, the like items will
be the deposits to the bank accounts and the expenditures made in cash.
Because Buck has three accounts and Doe has one account, four separate
analyses will be prepared for the deposits into each account and four others
for the expenditures and withdrawals made out of each account. The sum-
mary schedule, or appendix, will be used to tie the supporting schedules
together and to make the necessary adjustments to ensure the accuracy of
the computation.
For our examples, we will simplify the financial activities of Buck and
Doe. This will provide an accurate example of the schedules used for the
bank deposits and cash expenditures method but in a much more abbrevi-
ated form than usually encountered in this type of investigation.
In cases where the subject is self-employed, it is often a good idea to begin
the account analyses with the business accounts because there are often
adjustments that need to be made that will be identified through the analysis.
The investigator should make notes on the potential adjustment items
(and any new leads that are discovered) as the schedule is being preparedand
the analysis is being performed.
Remember the earlier suggestion to initially prepare folders for the sepa-
rate items of interest in the investigation and add folders for additional items
as they are uncovered during the investigation.
182 Criminal Financial Investigations
The following are the example schedules that will show the categories of
like items that require analysis and presentation when using the bank depos-
its and cash expenditures method of proof. The first four schedules are used
to analyze the deposits made to each of the bank accounts for which Buck
and Doe have signatory authority. The next three schedules are used to iden-
tify and analyze the checks drawn on the three checking accounts. Because
there were no withdrawals made from the savings account, there is no need
to prepare a schedule to analyze and trace withdrawals from the account.
Schedule 8 is used to identify the categories and amounts of adjustments
needed to make the bank deposits and cash expenditures method of proof
an accurate reflection of the actual income received by Buck and Doe for the
time periods of the investigation. The last schedule is the summary schedule
(appendix) that ties all of the financial information together to show how much
income Buck and Doe had to have received during the periods under investi-
gation (2006 and 2007) to have conducted the financial activities that they did
during these 2 years. An explanation of the items contained on the schedules
and their importance in determining income will follow the schedules.
Checks to Cash
Buck Pers. Acct. 2147 2006 $5,000.00 $5,000.00 W1-25,26,31
2152 2006 $3,500.00 $3,500.00 W1-25,26,34
2158 2007 $6,000.00 $6,000.00 W1-25,26,39
2168 2007 $6,000.00 $6,000.00 W1-25,26,49
The bank deposits and cash expenditure method of proof requires that
certain items be considered to ensure that all income is accounted for and
that no item making up the income is counted more than once in the com-
putation. In our example case, we have several of the items that need to be
adjusted for in any bank deposits and cash expenditures computation.
Cash on hand is the first item considered in our adjustments schedule. In a
more complicated case, the starting point would have to be established and a
determination made as to the cash available at the beginning of the periods
under investigation. Cash available to the subject of the investigation prior to
the periods could be deposited during the periods in the computation. Cash
could also be used later for a purchase, and cash expenditures are added to our
income figures in the computation. For these potential reasons, the subject is
given credit against income to ensure that the cash was accounted for correctly.
The second category includes transfers of funds from one account to another
and cash withdrawals that could be redeposited or used to make cash purchases
that are included in the computation. Transfers are funds already deposited
once to get into an account, and then transferred to a different account where
they are counted again. Removing the transfers and cash withdrawals elimi-
nates the possibility of counting amounts as income more than once.
The last category in the adjustments schedule is the total of checks
written to cash. The same logic is employed in viewing these items as being
the potential source of cash expenditures that are added to the net deposits
computed. If the checks to cash exceed the total of cash expenditures and
cash deposits documented during any of the periods in the computation,
the amount credited to the subject can be limited, up to the amount of cash
expenditures and cash deposits.
As you can see, even in a simple example like this, the supporting
schedules play an important role in organizing and combining similar
transactions to simplify the presentation to a judge or jury for purposes of
litigation. The last schedule in our bank deposits and cash expenditures case
is the summary schedule or appendix, which ties together all of the financial
information obtained during the investigation.
Joe Buck and Jane Doe Bank Deposits and Cash Expenditures Appendix A
2006 through 2007 Computation
Item 2006 2007 2006 2007 Reference
Deposits
Buck business account $41,400.00 $40,000.00 Schedule 1
Buck personal account $24,000.00 $24,000.00 Schedule 2
Buck savings account $8,200.00 $7,000.00 Schedule 3
Doe checking account $90,200.00 $147,800.00 Schedule 4
Gross deposits $163,800.00 $218,800.00
continued
194 Criminal Financial Investigations
and do not stay long enough to get a tattoo would be interviewed. The poten-
tial for obtaining direct testimony on purchases of narcotics from Buck or
Doe expands as the number of customers identified increases. Follow-up
investigation would also be justified in tracing the movements of Buck and
Doe when they travel. The lack of banking activity indicates that they close
for several weeks in the summer and again around the Thanksgiving and
Christmas holidays. There is also a follow-up potential on the airline expense,
by identifying the destination and the duration of their trip. Additional assets
may have been acquired in previously unknown locations, and additional
cash expenditures may also be found.
The extent of the indirect method of proof investigation is only limited
by the time and resources of the investigator or the investigation team. The
initial investigation may lead to the development of cases in other geographic
locations and on a variety of other potential targets.
Once the investigator is comfortable that sufficient evidence has been
obtained to support a conviction on the charges, the case is then taken to
the report writing phase. This aspect of the investigation will be discussed
in Chapter 18.
The Net Worth
and Personal
Expenditures Case 15
The net worth and personal expenditures method of proof is most often used
when personal records for the subject are not available, or they are inaccu-
rate or incomplete. This method began in criminal investigations of federal
tax violations. Cases in which an individual’s illegal activities are not readily
apparent, or in cases where the individual is well insulated or removed from
direct involvement in the illegal activity, are often investigated using the net
worth and personal expenditures method of proof.
A person who gains financially from an illegal activity by providing
financing or services to those persons actually carrying out the crimes may
never have direct involvement in the criminal acts, and may derive substan-
tial financial benefits from his or her participation. The financier for a drug
distribution ring, the jeweler who modifies the appearance of stolen gems,
the money launderer disguising the nature of illegal proceeds, and the fence
who sells the stolen goods are all indirectly involved in criminal activity. The
risks involved in their participation are usually minimal, but the rewards are
substantial. It is often the discovery of these facilitators of crime that leads to
the identification and conviction of those involved in the criminal enterprise.
Indirect methods of proof used in investigating financial dealings can also
be a benefit in situations in which the criminal activity generating the money
is taking place in a different jurisdiction. The individual may have ties to a
criminal activity in California and be enjoying the proceeds in West Virginia.
The financial investigation can trace the money back to the source and estab-
lish the culpability of the individual for participation in the criminal acts.
In one case in New Mexico, the subject conducted his illegal activities over-
seas in various locations along the Pacific Rim. He was using the illegal gains
to establish a private estate in New Mexico. The financial investigation showed
that he had invested millions of dollars in the development of his estate over
a 3-year period. The alleged illegal activities in several foreign countries were
used as the likely source of income for the indirect methods case.
The net worth and personal expenditures method gained favor in investi
gations of organized crime cases, and was reviewed by the U.S. Supreme
Court in Holland v. United States. The Holland case sets out the parameters
for this indirect method of proof. Again, all of the concerns expressed by
the Court in using an indirect method of proof must be addressed by the
financial investigation.
197
198 Criminal Financial Investigations
The net worth and personal expenditures method of proof looks at how
money can be used in a different perspective than that covered in Chapter 14.
It relies on the logical position that monies received by an entity (individual,
corporation, or organization) can only be used in limited ways. Money can
be invested in assets, used to pay off debts, or spent to purchase items. In
other words, the entity can acquire assets, reduce liabilities, or spend the
money on perishable items.
The summary schedule for this method, in Appendix A, tracks the finan-
cial activity conducted over a period of time through the assets an entity
acquires and disposes of, the liabilities the entity increases or decreases, and
the personal expenditures the entity makes. In the bank deposits method
(Chapter 14), we focused our attention on cash expenditures made during
the periods under investigation. In net worth method, the focus is on the per-
sonal expenses made by the subject whether in cash or by check. The method
presumes that any business expenses will offset the profits available to the
subject for personal use.
Because the method is based on the aforementioned areas of financial
activity, the amounts reflected can include only the actual cost of items and
expenses. The appreciable value of investments cannot be attributed to the
entity as income. For example, if an individual buys a collectible coin for
$50.00, and the coin increases in value over 2 years to $100.00, the asset is
listed at the cost of $50.00 in each year of computation that the individual
keeps the coin. Only purchases and sales affect the overall computation of
income in the net worth and personal expenditures method of proof. Assets
are included in the computation for the period when they were acquired, and
removed from the computation when they are sold or traded in.
The following section is a case scenario we will use in the preparation of
the schedules needed for a net worth and personal expenditures case.
Case Summary
John Fawn owns and operates a donut shop in town. He purchased the busi-
ness in 2004 and has operated the shop for the past 3 years. An anonymous
informant called in to state that Fawn is living a lifestyle “way above” his
means. He is spending a lot of money on expensive items and nightlife, which
he could never afford by running a donut shop.
The cursory investigation shows:
Further investigation into the background of Fawn and his wife discov-
ered that he had worked in bakeries from his senior year in high school up
till the present. His first wife, Clare, is a nurse and works in the local hospital.
His current wife, Gayle, has never been employed. Neither Fawn nor Gayle
has any criminal record.
The divorce settlement records provide the following information:
Assets
House: 100 Maple St. $180,000.00
2001 Chevrolet Impala $10,000.00
2002 Ford Taurus $7,000.00
Stocks and bonds $24,000.00
Cash in banks $12,000.00
Home furnishings $8,000.00
Total assets $241,000.00
Liabilities
Mortgage (as of 4/1/04) $2,583.00
Car loan (Ford Taurus) $3,500.00
Credit card balance $217.00
Total liabilities $6,570.00
The cash in banks is to be used to pay off all liabilities; the remainder
to be divided equally between Clare and John ($2,715.00 each). The house,
100 Maple Street, and the home furnishings will be quitclaimed by John to
Clare. The Chevrolet Impala goes to Clare, and the Ford Taurus to John. The
stocks and bonds are to be sold and the proceeds divided equally ($12,000.00
each). Each of the respondents is to keep his or her personal effects. The court
ordered no alimony or child support payments.
200 Criminal Financial Investigations
1. Fawn has worked as a baker for many years. His salary over the
past 3 years has been $34,000.00 in 2001, $35,500.00 in 2002, and
$37,000.00 in 2003.
2. Fawn had gross sales from his donut shop of $60,000.00 in 2004
and $80,000.00 for each of the years 2005 and 2006. His net income
from the business was $35,000.00 in 2004 and $45,000.00 for 2005
and for 2006.
3. He purchased both new vehicles from local car dealers. Both pur-
chases were made by paying cash in full. He made the $20,000.00
down payment on the donut shop with a cashier’s check issued from
First Bank of Windsor. The down payment on the new home purchase
was done in the same manner.
4. The First Bank of Windsor provided copies of the cashier’s checks.
They were issued from an account in the name of Easy Street Ltd.
The checks were authorized by J. Faun, an authorized representative
of the company. The balance in the account was $1,300.00 and had
not changed since the second cashier check was issued. The account
was opened in January 2004. A photograph of John Fawn was iden-
tified as being a photo of the John Faun who opened the account.
Employees at the bank remembered Fawn as a regular customer
who made cash deposits to several business accounts at least two
and sometimes four times a month. The deposits were in cash and
usually between $6,000.00 and $9,000.00 each. The business names
for the accounts were obtained.
5. Canadian corporate records identified the owners of the 10 accounts
at First Bank of Windsor. Background checks on these individuals
disclosed that they were members of an organized crime family.
Letters rogatory were sent, and the records of the 10 accounts and
Fawn’s account were obtained for the years 2004 through 2006.
6. Analysis of the bank records showed cash deposits, beginning in
January 2004, of several thousand dollars each. The deposits made
to Fawn’s account were exactly 5% of the amounts deposited into
the other 10 accounts. The deposits to the 10 accounts continued
through 2006. Deposits were only made to Fawn’s account until suf-
ficient funds were available to issue the two cashier’s checks.
7. Both Fawn and Gayle declined to participate in interviews or to
provide any information.
The Net Worth and Personal Expenditures Case 201
We made the analogy that indirect methods of proof are similar to com-
paring photographs of the subject’s financial condition over periods of time.
To understand the difference between the bank deposits method and the net
worth method, think of the bank deposits method as a group photograph of
the debits and credits to bank accounts, and the net worth method as a single
photograph of the subject’s financial picture at the end of each of the periods
being investigated.
The financial value of assets, liabilities, and expenditures are included
in the net worth and personal expenditures computation at their cash value
at the close of each period under investigation. If an asset is sold during the
period, its value changes to zero. Similarly, if a liability is paid off, its value
becomes zero. Personal expenditures are included in the period in which
they were acquired.
The following is an example of the schedules that would be used in the
net worth and personal expenditures analysis for our case example:
John and Gayle Fawn Assets Schedule 1
2004 through 2006 Net Worth and Expenditures
Item Description 12/31/04 12/31/05 12/31/06 Reference
Cash on hand $14,715.00 $0.00 $0.00 W1-1
Cash in banks $4,300.00 $26,300.00 $1,300.00 W2-1
100 Maple St. $0.00 $0.00 $0.00 W1-1, W3-1
New house $0.00 $0.00 $275,000.00 W3-2
continued
202 Criminal Financial Investigations
Our computation begins with including assets and liabilities for the
starting point or base year, 2004. As the base year is not one of the periods
charged against the subject, expenditures for that period are not included.
In our example, we can assume that the information contained in the divorce
settlement is an accurate representation of Fawn’s assets and liabilities at the
time of the divorce. The proceedings would be an admission of the subject
under oath for the court proceedings. All that would be needed to establish
12/31/04 as the starting point for the computation would be to add any assets
acquired and liabilities incurred from the date the divorce was final through
the end of the year.
Cash on Hand
The divorce settlement showed that John Fawn was to receive 50% of the sales
proceeds from the sale of stocks and from the cash in banks after paying
off all liabilities. The stock sale would net Fawn $12,000.00, and his share of
the cash in banks would be $2,715.00, that is, a total of $14,715.00. Because
no evidence was obtained to indicate any cash on hand for the following
periods, this $14,715.00 is included in the starting point period and shown as
zero balances for the years under investigation.
This results in a reduction of the total assets between 12/31/04 and
12/31/05. The effect on the computation is to give Fawn credit for the cash
being available to purchase assets, pay off liabilities, or make expenditures in
the subsequent periods. If the amount of cash on hand exceeded all payments
made by Fawn in 2005, the difference would be carried forward to 12/31/05
and credited against the income shown in the computation for 2006.
Cash in Banks
The amounts listed for the year-end balances of cash in banks would be derived
from the records obtained on Faun’s (Fawn’s) account with the First Bank
of Windsor. Bank account balances, in an indirect methods computation,
The Net Worth and Personal Expenditures Case 203
must be reconciled to the end of the period (in this case, year-end) to ensure
that the amounts are accurate. Any checks outstanding or deposits in tran-
sit need to be accounted for before the balances are put into the schedules.
For our example, we will assume that the reconciliation showed the balances
included in the schedule of assets.
New House
The investigation shows that Fawn and Gayle purchased their new house for
$275,000.00 in 2006. The purchase price is used to record the asset in the
computation. This amount is the actual price of the property. Any encum-
brances against the property will be shown and accounted for in the schedule
of liabilities. If permanent improvements were made on the property and fully
documented the value could be increased according to the actual costs of the
improvements. Appreciation of the property or increases in assessed valua-
tion is not considered because the purpose of the computation is to show the
application of funds received during the time periods under investigation.
Donut Shop
Fawn purchased the donut shop in 2004 for $200,000.00. Again, this is the
actual price paid by Fawn. The same handling of permanent improvements,
as in the new house, would apply here. Because Fawn acquired the prop-
erty in 2004 and has held ownership throughout the year 2006, the amount
shown for each year remains constant at $200,000.00. For tax investigations
there would be adjustments made to income to allow for depreciation and
other offsets to the income generated by business property.
would have provided the lead that uncovered this new account. The amounts
shown in the schedule are the actual funds invested in the account. He would
have invested $12,000.00 in 2004, $16,000.00 in 2005, and $7,000.00 in 2006.
There were no withdrawals, so the balance shown in the computation reflects
an increase in the asset from year to year. Again, the asset is listed by its
actual cost to Fawn. Gains and losses in value have no effect on the computa-
tion unless stocks are purchased or sold.
Ford Taurus
The Ford Taurus was purchased by Fawn prior to the years considered in the
computation and was held by him until he gave it to his daughter in 2006.
The cost of the vehicle when it was initially purchased would be the amount
used in the computation. This amount would be obtained from the dealer
who transferred the title to Fawn on the date the vehicle was acquired.
Jeep Cherokee/Lincoln
Both these vehicles would be included in the year they were purchased at
their total cost to Fawn. Because he kept possession of both vehicles through-
out the years under investigation, they remain in the computation through
the end of 2006.
Colorado Condominium
This asset was discovered from the follow-up on leads obtained from third
parties who disclosed the Fawns’ extensive travel to Colorado. The asset pur-
chase would be documented through public property records and an inter-
view of the seller of the property.
The total amount of assets for each of the periods in the computation will
be carried to the summary schedule, just as the summaries were reflected
in the appendix in our example of the bank deposits and cash expenditures
computation in Chapter 14.
The next schedule needed in the computation will identify all of the
liabilities of John and Gayle Fawn, and any changes in the amounts owed
from year to year. Just as assets are listed at actual cost, liability amounts
are shown initially at the actual proceeds amount and carried forward at the
payoff amounts for consecutive periods.
John and Gayle Fawn Liabilities Schedule 2
2004 through 2006 Net Worth and Expenditures
Item Description 12/31/04 12/31/05 12/31/06 Reference
Mortgage, donut shop $175,000.00 $163,000.00 $149,000.00 W9-1,2
The Net Worth and Personal Expenditures Case 205
The mortgage amounts shown in the liabilities schedule reflect the prin-
cipal balance due on the last date in the respective time period. Payment of
interest and taxes, normally included in a mortgage payment, are added as
expenses for the period in which they were paid. Those items do not decrease
the debt established by the mortgage agreement.
The mortgage balance on the donut shop would decrease each year as
a part of the monthly payments were applied to the principal. The schedule
reflects that no principal was applied to the mortgage on the new house. The
schedule also shows that the mortgage obtained to purchase the Colorado
condominium was paid in full during 2006.
The credit card bills for Fawn and Gayle were paid in full each month. The
amounts shown in the schedule represent the outstanding balance, which had
not as yet been billed as of year-end. A reconciliation of the credit card account
would be prepared in the same manner as the bank account reconciliations.
The third schedule in our example is the recording of documented expen-
ditures for each of the periods under investigation. Because such expendi-
tures hold no value after the initial purchase, they are included as cost for the
period in which they occurred.
The expenditures included in the schedule have to be fully documented
as to amount and to ensure that they were actually made by the subject.
The expenditures included are limited to personal expenditures. Business
expenses (being deductible) are not included in the net worth and per-
sonal expenditures method unless part of the scheme to conceal the income
includes manipulation of business records. In those cases, a separate compu-
tation for the business is made.
John and Gayle Fawn Personal Expenditures Schedule 3
2005 and 2006 Net Worth and Expenditures
Item Description 2005 2006 W/E# Reference
Utilities, CO $1,500.00 $1,600.00 Schedule 3A
Property tax $3,000.00 $3,200.00 W16-1
Interest $3,800.00 $7,800.00 W17-1
Symphony $500.00 $500.00 W18-1
Concerts $750.00 $1,250.00 W19-1
continued
206 Criminal Financial Investigations
from one period to the next. Personal expenditures will then be added to
each period net worth increase or decrease. The result is the least amount of
income the subject had to have received during the respective time period.
Legitimate or reported income for the respective period is then sub-
tracted to determine the amount of illegal or unreported income. If sufficient
amounts are determined by the computation, the investigator may move on to
preparing the case for court. If any of the periods that the investigator hopes
to charge against the subject are minimal in amount, he or she may want
to continue canvassing for additional personal expenditures. Investigators
do not need millions of dollars, but they have to establish sufficient harm to
charge a subject. A $10.00-a-month embezzlement is not going to tie up the
court’s time.
John and Gayle Fawn Net Worth and Appendix A
2005 and 2006 Personal Expenditures Summary
Item 2004 2005 2006 Reference
Assets $247,015.00 $490,300.00 $795,300.00 Schedule 1
Less: liabilities $175,000.00 $283,125.00 $399,275.00 Schedule 2
Net worth $72,015.00 $207,175.00 $396,025.00
Less: prior net worth $72,015.00 $207,175.00
Increase/decrease $135,160.00 $188,850.00
Add: expenditures $31,255.00 $58,820.00 Schedule 3
Corrected income $166,415.00 $247,670.00
Less: reported income $45,000.00 $45,000.00 W34-1
Additional income $121,415.00 $202,670.00
The preceding schedules organize the evidence for the investigator and
allow for deductions to be drawn from the analysis. In our example, the cor-
relation between the cash deposits made by Fawn to his own account and
the total deposits to the other accounts at First Bank of Windsor is a strong
indication that Fawn was laundering money for the other account holders.
Such information becomes a valuable tool in interviewing the subject. An
individual involved on the fringes of a larger criminal enterprise may be will-
ing to talk when faced with additional criminal charges of conspiracy.
The last schedule provided is the list of witnesses and exhibits used in
the report recommending the prosecution of the subject. In conducting an
indirect method of proof investigation, voluminous records are analyzed and
reviewed. There can be scores, if not hundreds, of witnesses required to intro-
duce the documents into evidence and explain their importance in court.
Organizing the witnesses and evidence is just as important as assem-
bling the financial computations. The list of witnesses is used to identify the
competent witness to introduce the documents, identify those that a witness
will introduce, provide the location of the evidence in the files, and provide
208 Criminal Financial Investigations
the crime to be committed. Witnesses who will provide evidence and infor-
mation as to the various segments of the subject’s financial activities should
also be grouped together to ensure a logical flow to the financial presentation.
The investigator must not get lost in the volume of financial activity being
documented and presented. All the aspects of criminal culpability must be
established for the case to be successful. At the same time, it is necessary
to ensure that the investigation and the report recommending prosecution
show how the investigator met all the judicial requirements for use of the
indirect method of proof.
The investigator becomes the artist who paints the canvas of the crime to
show to the jury. There are several ways in which to make a logical presenta-
tion of evidence that will clearly show the criminal activity of a subject. It is
up to the investigator to decide how to present that evidence.
Chapter 18 will discuss the preparation of the case report. This report is
used to review and verify the legal requirements for purposes of prosecution;
it is also used as a guide for the prosecutor to understand the case, become
comfortable in its merits, and suggest how to proceed.
Indirect Methods
in Tax
Investigations 16
The origins of indirect methods of proof in financial investigations are rooted
in tax investigations. The development of forensic accounting practices using
an acceptable scientific method of inquiry became a necessity as tax policies
and procedures became more and more complicated.
Since every government requires financial support to exist, each taxing
authority attempts to collect all of the taxes due on income, sales, or other
basis for taxation. To retain a level of public confidence in the taxing system,
it is necessary for them to ensure that everyone subject to the tax accurately
report their bases (income, sales, etc.) and pay their tax liability.
On the other hand, everyone that is required to pay taxes wants to ensure
that they are paying the least amount required by law. Here is where the
temptation to evade and defeat the tax laws comes into play. In the United
States with its uncertain and fluctuating tax rates, ever-changing taxable and
nontaxable items, varying categories of deductible and nondeductible items,
and a myriad of loopholes to be discovered and utilized, forensic accounting
techniques have become a necessity to decipher the complexities of financial
manipulations designed to defeat the tax system.
Forensic accounting techniques began being applied in the United States
in the early 20th century when the government required additional revenues
to pay for World War I debts. The government continued to expand with
the transition to bureaucratic government, and the financial crises of the
1920s and early 1930s helped to make the federal income tax a permanent
revenue generator. As the tax code and regulations expanded, a whole new
service industry developed in the areas of accounting, investment advising,
and finance. As the complexity of tax reporting and payment increased, the
temptation to avoid and defeat the system increased.
These changes also expanded the criminal field of financial violations.
Here was a relatively safe way for individuals and business entities (criminal
or legitimate organizations) to increase their wealth and status through
fraudulent financial manipulations. No violence or intimidation was neces-
sary to steal from others or to cheat them out of their money; all it took was
a sharp pencil and a sharper mind.
Since tax crimes are often referred to as victimless crimes through the
eyes of legal systems, the courts have seen fit to adjust the penalties in sentenc-
ing by reducing the potential time of incarceration and focusing on financial
211
212 Criminal Financial Investigations
penalties. However, the taxing authorities and those who try to comply
honestly with the tax laws are, in fact, the actual victims in these types of
violations. In most states, the penalty for robbing a convenience store of a few
hundred dollars by threat of harm could carry a sentence of 3 to 10 years in
prison. If you evade the payment of $70,000.00 to $100,000.00 in taxes, you
might receive a sentence of 3 months to a year (the maximum penalty for a
federal tax felony is 5 years, but it is rarely handed down by the courts).
Since the decision whether to commit a crime is usually based on a
risk–benefit analysis, it is easy to see that if the perpetrator has the option of
a crime of violence or a financial crime involving fraud and deception he or
she will choose the latter. Therefore those that are in a position to commit a
white collar crime and have the mental propensity toward criminal behavior
will follow the path of least resistance and minimal risk.
There are two main categories of criminal tax violations: (1) evasion of the
payment of tax and (2) failure to file the required tax forms and informa-
tion. In the United States, the statutory requirements for income taxes are
contained in Title 26 of the United States Code. Title 26 USC Section 7201
defines the statutory provisions for the attempt to evade and defeat federal
income taxes. Title 26 USC Section 7203 provides the same information for
failing to file tax returns and return information. The elements for each vio-
lation are given, along with the respective maximum penalties. Both catego-
ries require that the suspect of the crime have knowledge of the requirements
and the willfulness or criminal intent to commit the violation. These require-
ments are a key factor in successful prosecution. These requirements are also
the main focus for the presentation of a defense in criminal tax cases.
Although there are relatively few criminal tax statutes, the methods
used to circumvent and defeat these statutes are endless. Just as the crime
scene investigation shows how the end result (the crime) took place, foren-
sic accounting shows how the perpetrator ended up with the financial gains
from the financial fraud that took place. Indirect methods of proof go to the
result of the criminal violation without having to explain all of the com-
plex regulatory tax provisions and simplify the results or fruits of the crime
for presentation to a judge or jury. For criminal prosecution, the indirect
methods give the perpetrator the benefit of all legitimate deductions, credits,
and allowances for nontaxable receipts. This allows the prosecution to show
the judge or jury that the government (taxing authority) is minimizing the
dollar amount of the criminal tax violation. In the same sense, all technical
adjustments that would be detrimental and increase the tax liability of the
Indirect Methods in Tax Investigations 213
perpetrator are removed from the criminal computation and left for auditors
to include into the civil assessment of the tax due and owing.
As stated earlier, there are only two ways for businesses or individuals
to underreport their earnings: understate the actual income or overstate the
expenses that offset the income. These are the most common ways to evade
and defeat the payment of tax liabilities. They are also the most common
means for reducing the reported income so as to not be required to file tax
returns at all. Oftentimes the criminal tax violation is based on the reporting
of a portion of the actual income in an attempt to defeat a portion (usually
a large portion) of the true tax liability. In other cases, an entire source of
income, legal or illegal, is omitted from the tax return. In these cases the
investigator must identify the likely source of the alleged understatements to
be able to successfully prosecute the criminal violation.
Understating Income
For the subject of the investigation that generates income from the sale of
goods and services, customer payments come in various forms such as by
check, debit or credit card, or cash. Since businesses are required to keep
track of sales and accurately record and report gross receipts, there are usu-
ally multiple copies of the information pertaining to each transaction. If sales
are recorded at multiple locations (i.e., two or more sales registers), sales from
one or more registers may be omitted from gross daily receipts in the books
and records of the business operation.
If the subject operates a business with substantial cash receipts (bars,
bookstores, convenience stores, restaurants, coffee shops, etc.), cash sales
may go unreported in part, or in illegal businesses in total.
If the business has several different categories of goods and services
that combine to generate the business income, one or more of the categories
may be omitted from the business books and records to conceal unreported
income. As an example, a boat marina can have boat sales and rentals, tours
and fishing junkets, equipment sales and rental, and a snack bar and bait
shop; the income from any of these could go unreported.
Concealment of receipts can also be accomplished from the other perspec-
tive by failing to include those receipts that are generated by a specific customer
base. In businesses that supply services (advertising, consulting, cleaning,
maintenance, repairs, etc.), certain customers or accounts may be omitted and
the income generated from those accounts omitted from gross receipts.
If the business is of an illegal nature (narcotics, stolen property, kickbacks,
usury, extortion, etc.), all of these receipts will be unreported or laundered to
appear as legitimate receipts to avoid the admission of participating in the
illegal activity.
214 Criminal Financial Investigations
Overstating Expenses
In businesses that use a variety of products and supplies, and maintain a wide
range of accounts in their reporting practices (convenience stores, grocers, elec-
tronics outlets, office supply stores, etc.), expenses may be padded to deduct more
than the business actually paid for the goods and services. Another method of
overstating expenses by these businesses would be to create one or more fictitious
vendor accounts and write off the amounts they want to divert to personal use.
In businesses that provide services (maintenance services, consulting
and advisory services, repair services, etc.) a wide range of miscellaneous
expenses may be overstated. The larger the clientele of this type of busi-
ness, the smaller the padding of expenses per client is required to facilitate
the underreporting of taxable income. The adage of theft by fraud is often
applied; steal a lot from a few or steal a little from a lot. This can also apply to
the overstatement of expenses. Either application of the fraud can result in a
substantial understatement of income.
Most businesses use a standard system of accounting to record their
business activities, and tax laws require that all aspects of the business be
documented to support the information used to prepare and file income tax
returns. Not all business income and expenses involve the exchange of cash.
Items such as inventory and depreciation have a direct effect on the computa-
tion and reporting of taxable income. The year-end inventory evaluation of
a business is compared to the opening inventory to account for the amount
of products that were sold during the year. It is also used to determine the
cost of the goods sold in manufacturing and retail sales. Since most business
audits do not go into the actual business location at the end of each reporting
Indirect Methods in Tax Investigations 215
In the same manner but on a much grander scale, luxury taxes can be
manipulated to avoid paying the add-on portion of the tax. This type of fraud
again involves collusion between the buyer and seller with either a falsification
of the actual price or having the amount needed to go below the dollar criteria
for the tax being paid separately in cash or as a kickback. In these instances
the investigator has to determine the culpability of both parties and allocate
the tax to the correct person having the actual liability. Let’s take an example
in which a person wants to buy a yacht. If a luxury tax of an additional 10% is
assessed on purchases over $500,000.00 and the yacht costs $750,000.00 the
seller would be required to pay an additional $25,000.00 on the purchase. If the
seller agrees to write up two sales at $499,000.00 and $251,000.00, no luxury
tax would be applied to the purchase. The seller might require a kickback of
part of the $25,000.00 or assist in the fraud to make the sale. Either way, both
the seller and the buyer have committed violations. The investigator also has to
ensure that the $251,000.00 “sham” sale was reported as income by the seller.
Governments use taxation and regulation for several other purposes outside
of generating revenue. Higher tax rates, surcharges, and fees may be placed
on certain businesses and industries to discourage the growth of those busi-
nesses. Tax credits, reduced tax rates, and tax deferments may be placed on
other businesses to encourage growth and expansion of those businesses.
Individuals may be given tax credits for low income, energy efficiency, fur-
thering education, or by making certain purchases. Other industries receive
preferential treatment for capital improvement or for size or expansion.
Each of these aspects of taxation and regulatory policy is also subject to
fraud when people try to take unqualified benefits or avoid required penal-
ties. There are also those crimes that take advantage of the large number of
returns and transactions that any taxing authority has to handle. Keep in
mind that the taxing authority needs to maintain public confidence that the
system is administered fairly and that the greater number of people who are
required to file returns, the lower the tax rates that are necessary to fund
public programs. Following are some examples of tax crimes that do not fall
under the common categories of evasion or failure to file tax returns.
Tax-Related Crimes
Criminals will often try to take advantage of areas in which they feel there
is little or no scrutiny. Through technological advances, taxing authorities
are able to check the mathematical and formulative accuracy of tax returns
Indirect Methods in Tax Investigations 217
False Returns
Not all tax return preparers are honest and trustworthy. Schemes have
been identified in which the preparers will falsify deductions to generate
larger tax refunds for their clientele. The preparer will usually benefit from
word-of-mouth advertising (one client tells friends and relatives about get-
ting a larger refund by using the preparer, and the publicity spreads). The
preparer will usually charge the clients a percentage of the anticipated refund
for the tax preparation service. The difficulty in this type of investigation is
that the clients are unaware that falsification has occurred on their returns
based on the certification of the preparer. It is also difficult to explain that
the client is responsible for the corrected tax due and owing on the identi-
fied false returns. Skill and tact is required to gain their cooperation to be
218 Criminal Financial Investigations
These are just a few examples of the types of financial crimes that are
committed relating to taxation. The investigator should always be aware that
whenever a scheme is uncovered and a successful prosecution follows, others
wanting to commit a similar fraud will be deterred. Also, if one avenue for
fraud is closed off, those determined to commit this type of fraud will find
or invent new schemes. Tax-related crimes also require multijurisdictional
cooperation and investigation.
Unique Aspects
of Criminal Tax
Investigations 17
The use of indirect methods of proof began in the United States in the inves-
tigation of criminal tax violations. As early as the turn of the 20th century,
taxing authorities were seeing more instances of tax fraud and the use of
more complex schemes to facilitate the fraud.
As covered earlier, the U.S. Supreme Court decision in Holland v. United
States established the acceptability and the parameters for the use of the net
worth and expenditures method of proof for criminal prosecution. The Court
allowed the prosecution and conviction for criminal tax violations based
solely on circumstantial evidence as long as the scientific method of inquiry
could be clearly demonstrated to the judge and jury. Indirect methods of proof
have expanded in scope to cover the investigation of illegal activities and have
proven invaluable in linking the criminal to the fruits of his or her crimes.
Since the use of indirect methods of proof is relatively new in the area
of jurisprudence, it is only natural that they have evolved through a series of
appeals and reviews. In establishing the requirements for their use, courts
have refined the use of indirect methods by placing unique circumstances
and restrictions on the government (taxing authority) when they are applied
to criminal tax cases. These unique aspects follow the fact that tax crimes are
a unique form of financial fraud. There are three general areas in which tax
crimes differ from the financial crimes perpetrated by con men and thieves.
First, tax fraud is committed directly against the government taxing
authority. The state becomes the primary victim. However, the result of tax
fraud is indirectly transferred to the taxpaying public since the tax revenues
are used to finance programs and governmental functions set in place for the
benefit of the general public. It is similar to the situation where three people
share the cost of rent on an apartment and one fails to contribute their share,
the other two must make up the difference.
Second, the computation of tax due and owing is prepared and submitted
by the individual or entity subject to the tax as opposed to a standard flat rate
fee or assessment by the government. Due to this circumstance, there is little
corroboration for the accuracy of the computation unless an official audit of the
subject is authorized and conducted. If you have ever put yourself on a diet or
exercise program you fully understand the difficulty in personal self-regulation.
Third, and probably most important, tax computations involve a wide
variety of special circumstances and adjustments that are not applicable in the
221
222 Criminal Financial Investigations
the same offender will usually be completely unrelated to the prior crime.
Therefore, establishing a pattern of criminal tax fraud over a series of consec-
utive tax reporting periods can serve to replace prior criminal conduct and
strengthen the presentation of criminal intent. A judge or jury will find the
defense of innocent or unintentional error difficult to accept if the defendant
is shown to have repeated the same fraudulent acts over and over again. This
is accentuated by the fact that in most tax fraud cases the perpetrator will
increase the amount of the fraud in each subsequent period (not being caught
the first, second, or third period in a row emboldens the offender), believing
that their scheme is foolproof and that they will never get caught. It is also
common that as the fraud proceeds increase, the expenditures that are made
with the proceeds will become more extravagant and luxurious. Most jurors
and judges have a set lifestyle based on their regular income, and are quick
to notice and remember leaps in the spending habits of the defendant. These
factors are a key part of the criminal tax case and need to be fully developed
and highlighted in the report by the financial criminal investigator.
The second major difference between tax and other general crimes is that the
subject under investigation provides the foundation for the tax case. A large por-
tion of the evidence that will be used in the criminal tax case comes directly from
the subject’s admissions on the filed return. Unless the suspect in a general crime
investigation confesses to the crime, the investigator must develop all of the evi-
dence independent of the subject. Tax returns, on the other hand, are prepared
and filed based on the information that the taxpayer submitted voluntarily to the
taxing authority. The presumption of legal interpretation is that an individual
will not willfully provide false information that is detrimental to his own cause.
Many people are confused by the use of the term “voluntary tax system.”
To paraphrase one district court judge in the United States, he explained the
terminology to a jury like this:
A voluntary tax system is like a traffic stop sign. The sign does not force you
to stop, but rather make the decision as to whether or not to stop voluntarily.
However, if you don’t stop, you have committed a violation of the law.
that business during the respective tax period. Other types of businesses and
industry, such as farming and rental income, will make the same type of
computations although the terminology of the income and adjustment cat-
egories may vary. If the business is a taxable entity (subject to return filing,
tax determination, and payment) there still may be portions of the income
that flow through to the individuals owning or operating the business. In
other cases, the income from the business may be computed on a separate
schedule that is attached to the individual’s tax return. The amounts from
these schedules are usually identified line items that are added into the gross
income for the individual’s return.
In many cases, the unreported income uncovered through the use of the
indirect methods of proof are concealed or omitted from the legitimate busi-
ness dealings of the subject of the investigation. For this reason, it is necessary
for the investigator to be familiar with all of the aspects of the subject returns
to be able to specify the method used to understate the income. Remember
that the indirect method of proof requires that a “likely” source of income or
unreporting of income be identified. In most cases where there is the receipt
of illegal income, the subject will fail to report all of the illegal proceeds or
add a small portion of the illegal proceeds to the return as “other income.”
After all of the return information is verified or corrected, the actual
computation of tax is prepared. The indirect method of proof will provide the
comparisons necessary for the determination of the unreported income for
each of the returns. Before tax can be computed, the investigator must apply
all of the adjustments to the adjusted gross income needed to bring the indi-
rect computation down to a corrected taxable income amount for each year.
These adjustments include removing any nontaxable sources of income such
as tax-free interest and dividends, the dissipation of a cash hoard, additional
loans (third-party loans not disclosed during the investigation and personal
undocumented loans), inheritances, and so forth.
After the corrected taxable income (what should have been originally
reported) has been established, the last step in the process is to compute
the tax. At this point the investigator becomes the accountant and needs to
review the tax preparation for each relative time period or year covered by the
investigation. Since tax rates and return preparation guidelines change over
time, it is imperative that the investigator applies the rules for each period
individually. This will also help to ensure that the correct tax is determined
based on the increases to income. A new tax rate, the elimination or addition
of tax credits, and limitations on deductible items are some of the consider-
ations that have to be taken into account.
The corrected tax due and owing then becomes the baseline for comput-
ing the actual understatement of tax. The reported tax due for each period
is subtracted from the corrected tax for that period, and any applicable
penalties on the alleged understatements may be shown for informational
Unique Aspects of Criminal Tax Investigations 227
purposes. Penalties and interest can be shown for internal agency review and
to apprise the prosecutor of the total impact of the investigation. They are
applied until the case has been successfully prosecuted.
Keeping in mind the understanding that indirect methods of proof in
financial investigations show the least amount of income or receipts that the
individual or entity had to have received, tax cases require that the computa-
tion be reduced to show only the taxable portions of that income. The addi-
tional steps needed to prepare and present a criminal tax case are shown in
the following example.
Less
Itemized deductions $8,550.00 $10,200.00
Exemptions $5,000.00 $5,000.00
Corrected taxable income $224,450.00 $282,800.00
Corrected tax due $56,112.00 $61,200.00
Reported tax $4,800.00 $5,700.00
Additional tax due and owing $51,312.00 $55,500.00
In this example, the additional tax due and owing would represent the
amounts of tax evaded by the subject of the investigation. The tax deter-
mined to be due and owing would be the amount used in the indictment.
The amounts of unreported income would be referenced in the presentation
of intent to show the scope and size of the nontaxed benefit to the subject,
and establish the method used by the subject to commit the tax violation.
The Case
Report 18
We have compared the use of indirect methods of proof to a picture of the
financial dealings of the individual under investigation. As the old adage
goes, a picture is worth a thousand words. As we have seen in the previous
chapters, the schedules organize the financial transactions and can consoli-
date a thousand transactions into a single schedule. The case report for indi-
rect methods of proof provides the narrative explanation of the schedules.
As indirect methods of proof are built out of circumstantial evidence, the
investigator must be able to show how the evidence proves the allegations of the
crime. The report shows the reviewer and the prosecutor how the investigation
was conducted and how the circumstantial evidence provides proof beyond a
reasonable doubt that the subject committed the crime. The report becomes
the roadmap to convince the prosecutor, the grand jury (for felony charges),
and eventually the judge and jury as to the relationship of the evidence to the
crime in a logical and sequential way.
The case report is prepared in a similar fashion to a research paper. The
presentation needs an introduction, the body of the report, and a conclusion.
In a research paper, the introduction tells the reader what is to be covered in a
brief overview. The body of the paper lays out the details in depth to convince
the reader of the premise. The conclusion presents what the reader should
learn from the presentation and the logical conclusions that must be drawn
from the evidence in the report. We will discuss the three sections and what
is needed in each to assemble a complete presentation of the facts.
Introduction
The report needs to introduce the reader to the subject material that will
be presented. The investigator should include the pertinent information that
will identify the subject, the type and time frame of the investigation, the
type of charges that are recommended, and the method of proof being used
in the investigation. Many offices will have a set standard for this informa-
tion, such as a template or guide to the presentation. If this is not available,
it is a simple matter to construct one and use it as a cover page to the report.
Information used to identify the case would include the subject’s name, the
case or investigation number, the address, social security or other identifying
229
230 Criminal Financial Investigations
Recommended Charges
The next section of the report would provide definitions of the relevant
aspects to the case, and the identification of the subjects and pertinent infor-
mation as to their history. For our example, it would look like this.
John Fawn; Two (2) counts of tax evasion, One (1) count of conspir-
acy to launder money, Ninety (90) counts of filing false Custom
declarations, One (1) count of money laundering
Gayle Fawn; Two (2) counts of tax evasion, One (1) count of con-
spiracy to launder money
In addition to the number of counts and the statute description, the numerical
statue references would be included for each respective violation. Example:
Title 18 USC Section 371, for conspiracy.
History of Subjects
Names: FAWN, John and Gayle
DOBs: 01/01/63, 02/02/81
SSNs: 123-45-6789, 987-65-4321
Address: New House, Mytown, 2006
Prior addresses: 1201 Elm, Apt. 4, Mytown
Children: None; John—adult daughter from first marriage
The Case Report 231
The history section can be presented in outline form, but any explanation
for an item should be included. This section should provide any and all rel-
evant information about the subjects. It can include any other information
that would help to give the reader a familiarity of the subject’s history and
background. It should include the positive items (a prosecutor wants to know
if he or she is going to face difficulty in trial on character witnesses) as well
as negative items (the prosecutor would also want to know if the subject had
prior convictions for similar crimes). The prosecution must be advised as to
any potential obstacles it may have to overcome in advance. The fact that the
subject received the Medal of Honor and two Purple Hearts should not be
first discovered when the defense begins its case.
Positions in community organizations, fraternal organizations, benevo-
lent societies, and public service should be documented and introduced in
this section of the report. Any evidence used in providing information in
the report should be noted in footnote form after the item is presented. This
is important for all aspects of the report from the introduction to the case
narrative. If the information on dates of birth is derived from driver’s license
information, the witness for the licenses and copies of the licenses should be
referenced. Example: (W33-1,2). This allows readers to go to the evidence and
review the accuracy of any of the statements made in the report, or to clarify
any item to their satisfaction.
Business History
As we are presenting a financial case, it is necessary to include a section on the
business history of the subjects. In this section, all of the pertinent informa-
tion on the legitimate financial activities of the subject should be described in
sufficient detail for the reader to understand. Any illegitimate or unreported
income will be addressed in the body of the report and the conclusions. As an
example, the Fawn report would include a section like this.
John Fawn currently owns and operates the Donut Shop. He worked in
bakeries from his senior year in high school and until he purchased the
Donut Shop in 2004. Gayle Fawn has never been employed. She is now
the co-owner of the Donut Shop with her husband John. John made a
new financial start after his divorce from Clare in 2004.
232 Criminal Financial Investigations
Theory
The next step in the introduction would be to present the theory of the
case. In this section, the investigator has the latitude to present how he or
she views the evidence collected during the investigation and how he or
she interprets that evidence. This section of the report expands on how
the investigator interpreted the evidence, and the logic behind the conclu-
sions the investigator has made as to who, what, where, when, and how the
criminal acts occurred.
The theory section should address each element of the criminal charges
recommended, and should identify the harm done to the victims. In the
case of money laundering, the harm done is in the failure to comply with
regulatory provisions and the potential for concealing illegal gains on behalf
of others. Tax charges would identify the taxes evaded. In both situations,
a substantial harm will most likely be required to convince the prosecutor to
go forward.
The theory section for our example case on John and Gayle Fawn could
be prepared as follows.
John Fawn was divorced in February 2004. He left the marriage with
approximately $14,000.00 and a paid off 2002 Ford Taurus. By the end
of the year he was a business owner who had amassed a net worth of
$72,000.00. He remarried shortly after his divorce, to Gayle. She had
no assets of her own to add to the marriage union. She has never been
employed and was living in an apartment her parents had rented for
her. Their only reported legitimate income came from the operation
of the Donut Shop and totaled $45,000.00 per year. Over the course of
the following two years, the Fawns increased their net worth to almost
$400,000.00 and made purchases of more than $90,000.00.
The income they used to improve their holdings and lifestyle was
derived from a 5% commission that John Fawn received on laundering
funds for a local organized crime family. He would take U.S. currency
into Canada and deposit the funds into 10 accounts controlled by the
organized crime family. He also deposited some of his 5% cut into an
account that he opened under a variation of his own name.
Fawn would receive the money to be laundered on Thursday evening
while dining out with his wife. He would transport the currency by car
through Customs. When asked if he had anything to declare, he would
respond no, and if asked to complete a Customs declaration, he would
write in an amount between $100 and $200 for currency taken across
the border. He deposited $51,300.00 into his Canadian account and with-
drew the funds in the form of two cashier’s checks, each for $25,000.00.
He used these funds to purchase property. During the years 2005 and
The Case Report 233
The theory section shows how the investigator pieces together actions
and events to present a plausible explanation as to the method used to com-
mit the crime, and ties the related crimes into the story. This provides the
reader with an understanding of what to look for as the evidence is pre-
sented and to evaluate the evidence in relationship to the criminal charges
that are proposed.
Venue
The next item addressed is that of venue for prosecution of the criminal
acts. Financial investigations often contain overt acts that could be used to
establish venue in multiple jurisdictions. It is necessary that the investigator
present all of the factors that could establish venue in all the jurisdictions
involved. The investigator should then present the factors that support the
reasoning behind the selection of venue. Venue will usually be instituted in
the most logical location for facilitating a trial. The place of residence of the
subjects, the location where there is a substantial number of the witnesses,
and the location in which any of the parts of the crime occurred are all con-
sidered in establishing venue. Using the Fawn case, the venue section could
be presented like this:
Venue may lie in the judicial district of Mytown, where the subjects
reside, own, and operate a business, maintain their bank accounts, and
from which their tax returns were filed (could be state, federal, or local
assessments). Venue may also lie in the judicial district of Skiington
where the subjects purchased a condominium and made substantial use
of the illegal proceeds. It is recommended that venue be instituted in the
judicial district of Mytown.
234 Criminal Financial Investigations
Starting Point
After providing the introductory information needed in the report, the
narrative turns to an explanation of the evidence presented. In using an
indirect method of proof, it is useful to address the restrictions placed by
the courts on using the method. The starting point is one requirement
that the courts stressed independently of the financial computations and
should be addressed in its own section of the report. All of the evidence
used in establishing the starting point for the investigation should be
presented, and all of the judicial concerns should be addressed directly.
The Supreme Court decision in the Holland case states the judicial con-
cerns about using the net worth method and is a good reference for this
section of the report.
The following is an example of how the starting point could be presented
in the John and Gayle Fawn scenario.
December 31, 2004, is used for the starting point in the net worth and
personal expenditures computation. This date allows the computation to
show only the income of John Fawn. His first wife was employed in 2004
prior to and after the divorce. The divorce settlement provides an accurate
reflection of Fawn’s net worth as of February 2004, and the investigation was
able to bring that net worth forward to year-end. Beginning the criminal
computation with the year 2005 allows for presentation of the majority of the
acts of money laundering and a much simpler presentation of the tax evasion
charges. Fawn began his business ownership in 2004, and his first two full
years of operation were 2005 and 2006. This choice of starting point allows
the subject full credit for cash on hand from the divorce settlement to begin
the computation.
The Case Report 235
Evidence of Intent
An integral part of any criminal case is to establish the intent of the subjects
to commit the crime or crimes being charged. This aspect of the investigation
should also receive specific attention in the final investigative report. Because
intent is a determination of the state of mind of the subject, the investigator
should include all the actions of the subject that would infer an intent to
commit the crime. This would include both the actions taken and the failure
to take the proper actions. Often, the investigator will have to present a series
of circumstantially proven events in proper sequence to convey the inference
of intent. Using our example, it could be presented in this manner:
Gayle Fawn knew the income was illegal, and both attempted to keep the
source hidden from detection, especially by the government. The Fawns
made more than $400,000.00 during the 2½ years, hardly an amount that
could be forgotten about or overlooked.
Any other topics that the investigator believes should be addressed can
be included in the introductory portion of the report. Any topic in history or
background that could impact the investigation can be given its own section
for narrative explanation.
Evidence
Assets
Cash on Hand
John Fawn was given credit for $14,715.00 in cash on hand for the base year
2004. This amount was the total he received from his divorce settlement.
None of his expenditures in 2004 was considered to offset this amount.
Cash in Banks
John Fawn opened an account with First Bank of Windsor in March
2004. He used the name J. Faun but was identified by bank personnel
as the same individual. Handwriting analysis of the account signature
card and Fawn’s handwriting exemplars confirm that he signed to open
the account. This account had reconciled year-end balances of $4,300.00,
$26,000.00, and $1,300.00 for the years 2004 through 2006, respectively.
Ford Taurus
John Fawn purchased a Ford Taurus for $16,000.00 in 2002. He received
the car in the divorce settlement. There were no liens against the vehicle.
In 2006 he transferred title to the car to his daughter. It is carried at cost
in the computation for the years 2004 and 2005. The vehicle is removed
from the schedule for 2006.
Liabilities
Mortgage: Condominium
Fawn purchased a condominium in Colorado with his wife in 2005. They
purchased the property for $275,000.00. They obtained a mortgage on the
property for $175,000.00. The balance of principal owed on the mortgage as
of 12/31/05 was $120,000.00. The mortgage was paid off in November 2006.
Expenditures
Watches
In 2006, John and Gayle Fawn purchased matching gold watches for a
total cost of $22,000.00. Both subjects were wearing the watches when
asked for interviews in 2007.
Spa Visits
John and Gayle visited the Eden Spa during 2005 and 2006. The spa visits
cost $400.00 each. They visited the spa every 3 months, with a total of
three visits in 2005 and four visits in 2006.
As you can see from the examples given, the narrative explanations
and descriptions of the evidence follows the construction and sequence of
the schedules prepared for the case. Every item contained in the schedules
should be commented on, even if only to say that no further explanation
is necessary. Within the explanations of the evidence, the relevant witness
and exhibit references should be included so that the reader can verify the
investigator’s figures and follow the logic behind the handling of the items.
Be sure to include all the references to evidence that apply to each item in
238 Criminal Financial Investigations
your schedules. Also, provide the reader with line references to each of the
schedules for the amounts being discussed in your evidence section. In the
case of a purchase of property, you may need to include all of the witnesses
and exhibits that verify the amounts you have shown in the schedule, and all
of the witnesses that will testify to the transaction during litigation. In the
Fawn scenario, assets would be addressed, then liabilities, and then expendi-
tures. The summary schedule, or appendix, will be explained in the conclu-
sions and recommendations section at the end of the report.
Defense of Subject
After all of the evidence shown in the schedules and used to support the
investigator’s allegations is addressed, the next step is to provide the reader
(usually the prosecutor assigned the case) with any potential problems or dif-
ficulties that occurred during the investigation, and how these obstacles were
overcome to reach the recommendations in the report. A separate section to
address any concerns is beneficial in showing that all leads were followed and
that the investigator is being completely honest in his evaluation of the evi-
dence to be sufficient to gain a conviction. In a financial investigation, the
defenses are much more subtle than in a crime of violence. All of the financial
activities of the subject are presented in sequence. It is difficult for the subject
to say he or she was not at the scene of the crime or that he or she has an airtight
alibi. Any defenses presented during an interview with the subject or uncov-
ered during the investigation that have potential to fit the charges against the
subject must be addressed. The defenses may be as intricate as the indirect
method of proof and use similar circumstantial evidence. The best defense is
to present something that the investigator has not considered or would have
difficulty in refuting under the time pressure of a trial. The familiarity that the
investigator gains with the subject’s actions, movements, habits, and financial
dealings provide the best tools needed to discredit a defense. By the time the
investigation is complete and ready to go to trial, the investigator will know
more about the subject’s finances than the subject can remember.
The section of the report that addresses the potential problems is often
referred to as the defense of subject section. The investigator must include
any defenses presented by the subject or other witnesses. The investigator
should also include any potential defenses that would likely be brought up at
trial. The prosecutor needs to have the same confidence in the factual quality
of the report as the investigator. The prosecutor must also be able to gain at
least the basics in understanding the logic and reasoning used in the investi-
gative report. The common defenses of a cash hoard and a lack of intent are
already discussed in the earlier sections for cash on hand and intent. There
is no need to repeat those arguments unless they have been made by the sub-
The Case Report 239
ject. We will again use the Fawn scenario to demonstrate how this section of
the report could appear.
1. The jeweler stated that the Fawns jokingly said they received an
inheritance from a rich uncle when asked how they could afford
such fine watches. Both family histories were traced. John Fawn
has two aunts and no uncles. Only one aunt was married. Her
late husband (Fawn’s uncle-in-law) passed away 6 years ago in a
nursing home. His widow lives with a friend and receives Social
Security payments for her livelihood. Gayle Fawn has two uncles,
both of whom are alive and well.
2. When the curiosity of their neighbors became evident in regard
to their newly available wealth, the Fawns spread the rumor that
they won the money from a Powerball lottery ticket. Lottery
records were checked, and neither of the Fawns cashed winning
lottery tickets above the amounts required to be claimed through
the lottery headquarters. In addition, no winnings were reported
on their tax returns. Clare Fawn stated that she and John never
played the lottery while they were married.
3. If gifts or personal loans are claimed to be the source of funds
shown in the computation, the Fawns would need to bring in a
member of the organized crime family to present this defense.
It is unlikely that any member of the family would be willing
to sacrifice themselves for the Fawns. Seven of the members are
facing their own investigations for the funds that Fawn deposited
into their accounts with First Bank of Windsor.
The last section included in the investigative report would be the conclusions and
recommendations section. As in any good research paper, the introduction
240 Criminal Financial Investigations
lets the reader know what the report is about, the body gives the evidence
found to tell what the report is about, and the conclusion retells what the
report is about and what the writer (investigator) believes should be done
with the information.
The conclusion portion of this section will restate the criminal activity
shown by the evidence in the report, through the perceptions and logic
applied by the investigator. The recommendations portion will restate each
recommended charge and the specifics that support the charges. We will
again use the Fawns for our example. Note that in a case with two potential
defendants, the charges are separated as they relate to each of the individuals
who are being charged.
The evidence shows that John and Gayle Fawn entered into an agree-
ment with members of the organized crime family to illegally trans-
port U.S. currency into Canada by failing to report the currency and
filing false declarations with the U.S. Customs Service. In so doing, they
attempted to launder the currency and conceal it from taxing authorities.
The scheme ran from April 2004 through the end of 2006, and a total of
approximately $8,000,000.00 was laundered during this time. The Fawns
received 5% of the total laundered funds for their part in the conspiracy.
The share they received was used to improve their personal lifestyle and
provide them with luxury items they could not otherwise afford. John
Fawn attempted to conceal their proceeds from the scheme by opening
a foreign account himself and depositing some of their share into that
account. He made a veiled attempt to conceal the account by using a mis-
spelling of his name on the account signature card.
The Fawns failed to report any of the income derived from their part
in the money laundering scheme on their tax returns for 2004, 2005, and
2006. Their gains totaled approximately $400,000.00 over this time period.
It is recommended that John Fawn be charged with 90 counts in vio-
lation of federal Customs laws for failing to report the transportation
of currency in excess of $3,000.00 out of the country and filing false
Customs declarations on 18 of these occasions.
It is further recommended that John Fawn be charged with 90 counts
of money laundering and 1 count of conspiracy to launder money on
behalf of the organized crime family. The currency he transported was
picked up at various locations in town on Thursday evenings and taken
across the border on Fridays. The money was deposited into 10 different
nominee accounts under the control of seven members of the organized
crime family. On each occasion he received 5% of the total funds as his
fee for doing the money laundering.
It is also recommended that John Fawn be charged with two counts
of tax evasion for failing to report the income derived from the scheme
The Case Report 241
on his tax returns for 2005 and 2006. The 2004 tax year has not been
included due to the fact that John Fawn was in two marriages during the
year, and presentation of the split year might lead to confusion for a jury.
Civil authorities will still be able to recoup the taxes due for 2004.
It is recommended that Gayle Fawn be charged with 22 counts in vio-
lation of federal Customs laws for failing to report the transportation of
currency in excess of $3,000.00 out of the country, for those occasions
when she traveled to Canada with her husband and failed to acknowledge
the money being taken into Canada.
It is further recommended that Gayle Fawn be charged with 90 counts
of money laundering and 1 count of conspiracy to launder money on
behalf of the organized crime family. She shared in the knowledge of the
scheme, the overt acts of money laundering, and the financial benefits of
participating in the scheme.
It is also recommended that Gayle Fawn be charged with two counts
of tax evasion for failing to report the income derived from the money
laundering on their joint returns for the years 2005 and 2006.
It is also recommended that criminal forfeiture proceedings be con-
sidered on the assets acquired by the Fawns using the illegal income from
the money laundering scheme. The assets to which these funds can be
traced specifically are included as an addendum to this report.
After completing the report, the first priority in preparing for trial is to
ensure that all of the evidence referenced in the report is packaged in a way
that is easily accessible for review and presentation. A financial investigation
can involve hundreds of witnesses and thousands of documents. Organizing
the evidence in advance of trial is crucial to maintaining the flow of infor-
mation during the prosecution’s presentation, to being ready for redirect
examination, and to responding to defense witnesses on cross-examination.
Investigators need to develop a method they are comfortable with and that
allows them to retrieve any item of evidence quickly when it is needed.
One of the easiest ways to organize the evidence is to create a separate
file for each witness. Inside the file would be memoranda of the witness’
statements, and the documents and evidence that the witness will introduce
in trial. It is also beneficial to have a background sheet on the witness with
contact information, his or her relationship to the subject (if pertinent), the
documents and exhibits that the witness will introduce, and any relevant
information as to competency of that witness. Witnesses can be numbered in
the order they appear in the investigative report. This will allow the prosecu-
tion to follow the steps that the investigator took in building the case against
the subject. Similarly, the exhibits that the witness will introduce should
followthe order presented in the report. The witness will introduce all of the
documents he or she is responsible for, even if these are to be testified to by
subsequent witnesses.
Once the witness and exhibit folders are prepared, they should be pack-
aged together as a single collection. This can be accomplished by using cartons
243
244 Criminal Financial Investigations
other witnesses. This also provides a dress rehearsal for the presentation of
the case.
In the presentation to the grand jury, the investigator may be called
to provide a recap of the entire investigative process, and be required to
describe and explain the evidence and testimony obtained throughout the
investigation. Once the investigator is sworn in and introduced to the grand
jury panel, he or she will respond to the questions posed by the prosecutor
and any questions that arise from the panel. For indirect methods of proof,
it is beneficial and therefore customary for the investigator to explain to the
grand jury the method being applied and why it was selected in the specific
case. The investigator needs to be able to explain the method in terms that
can be readily understood by the wide variety of grand jury members. He or
she also needs to assure the grand jury that the legal requirements imposed
on the use of the method to ensure its accuracy and to protect the innocent
were met.
Grand jury panel members are selected in the same manner as trial
jurors. They are part of the local community, usually selected from voter reg-
istration records. They will have various levels of age, gender, race, education,
financial status, business acumen, and attitudes toward law enforcement.
For these reasons, the investigator must be completely familiar with all of the
aspects and nuances of the investigation, and be able to answer a wide variety
of questions.
Pretrial Conferences
Once the indictment is returned, the actual trial preparation begins. The
usual sequence is to have a planning conference with the prosecuting attor-
ney. The prosecutor will review all of the evidence and decisions that will be
made on what questions to ask each witness, the order in which the questions
will be asked, and how potential problems with the witness or the evidence
will be addressed. At this time the contact information for each witness will
be updated for preparation of the trial subpoenas, and the prosecution team
will prepare a schedule of pretrial conferences for those witnesses who will
be supplying critical evidence and testimony.
The prosecutor will usually attack the evidence in the same way that the
defense will most likely attack it. The investigator should field the scrutiny and
provide adequate responses. If difficulties are found in any of witnesses’ testi-
mony or the documentary evidence, this is the time to iron out any problems.
During this time the defense will file its motions and ask for discovery. The
investigator is usually responsible for making sure that the defense receives
copies of all the evidence and other material they are entitled to receive.
In addition, the prosecution team will want a complete set of copies of the
246 Criminal Financial Investigations
evidence to use as working copies. The working copies should be the only
documents used in pretrial planning and conferences. The original set of
exhibits should be secured and protected from contamination until they are
introduced into evidence during the trial. At this time the prosecution will
request, through motions, the defense’s proposed list of witnesses. The inves-
tigator will find out as much as possible about each of these witnesses and help
the prosecutor anticipate the relevance of these witnesses to the defense’s case.
Pretrial Interviews
Shortly before the trial is to begin, pretrial interviews will be scheduled for
the witnesses that the prosecution intends to call to the stand. These inter-
views provide a dual purpose in presenting the case in court. First, they
relieve the anxieties that the witness may have about testifying in court. The
prosecutor will explain the procedures that will take place and go over the
questions that will be asked. Second, the witnesses will have the opportunity
to review any prior testimony given to the investigator and to refresh their
memory by reviewing any documents they provided as evidence. It will also
help them renew their familiarity with the documents they will use to give
their testimony and introduce in court. This will usually be the first time that
the witness meets the prosecutor. The investigator should make the introduc-
tion and be present during the interview for advice, explanations, and as a
familiar face for the witness.
The prosecutor will use these interviews to evaluate the witnesses’ cred-
ibility and anticipate their performance in the trial. Together, the prosecu-
tor and investigator will decide on whether a witness’ anticipated testimony
needs to be strengthened with other witnesses or whether it is sufficient
enough to stand alone. Remember that there are usually several witnesses
to each transaction who can discuss the transaction through testimony
in court. In many cases, the witness will bring the original documents to
be used as evidence (included in the trial subpoena). The witness will pro-
vide those records and documents in court pursuant to the subpoena, and
these documents will supersede the backup documents obtained during the
investigation as the actual trial exhibits.
If the subjects of the investigation provided any testimony to the investi-
gator, the investigator will be a witness in the trial as to the statements made.
The prosecutor will also prepare the investigator as a witness in the same
manner as the other witnesses. As the investigator is most familiar with the
case, this preparation is usually much less formal. If the investigator is not to
be used as a witness in the case, an expert witness on indirect methods will
be used to summarize the financial schedules in the case computations. Even
if the prosecution does not intend to call the investigator as a witness, it is
Preparation for Trial 247
likely that the defense will. This gives the defense the opportunity to chal-
lenge the investigator’s impartiality and competence.
The expert witness will be given sufficient time to review the investiga-
tive report and ask any questions pertinent to the computations. If the expert
is uncomfortable with any of the deductions drawn by the investigator or the
prosecutor, these areas will be modified or corrected to the satisfaction of
the expert witness. The expert witness will be responsible for providing an
easily understood explanation of the evidence that shows the culpability of
the defendants. The pretrial interview will cover both the direct testimony on
the case and evidence, as well as an anticipated or “mock” cross-examination
to ensure that the case is solid and ready for trial. Usually, an expert witness
will provide a written summary of his or her qualifications to the court and
the defense. Both the judge and the defense may ask any questions as to the
expert’s qualifications when he or she is offered as an expert in the trial.
At this point, the case is ready for trial. Coordinating and accommodat-
ing the witnesses needs to be handled pleasantly and efficiently. Out-of-town
witnesses need to be provided with rooms and meal expenses, and the pros-
ecution needs to ensure that enough witnesses are available so as not to delay
the trial. Often a witness coordinator will assist in facilitating this aspect of
the trial.
The Trial
The standard procedures for criminal cases are followed from the filing of
motions to the turning over of the case to the jury. A few items are unique
in the presentation of indirect methods of proof cases. The prosecution will
usually file a motion to have the witnesses excluded from the courtroom
until after they have testified. This is to prevent the testimony of one witness
from having an effect on the testimony of another.
The prosecutor will ask for an exception to this motion for the case agent
and the expert summary witness, if one is used. The prosecutor will request
that the case agent be present throughout the trial at counsel’s table to assist
in the presentation. The expert summary witness must be present in the
courtroom throughout the trial (usually in the spectator area).
The expert will prepare his or her own schedules and computations
based on the evidence as it is introduced and accepted by the court. These
are the schedules that the expert will use in providing the summary of the
case testimony. To ensure a complete and accurate summation, the expert
must be present during the entire trial. The expert summary witness will also
note the evidence accepted by the court independently to support his or her
testimony at the end of the case presentation.
248 Criminal Financial Investigations
During the trial, the investigator should follow the questioning of each
witness, using the pretrial interview fact sheet, to ensure that all of the doc-
uments and testimony is obtained before the witness is excused. Another
option is to use a copy of the list of witnesses and exhibits, and to check off the
documents as they are offered and accepted into evidence. The investigator
should also note any questions that the prosecutor should ask before clos-
ing the witness’ testimony and assure the prosecutor that all of the exhibits
needed were introduced.
Special attention should be given to the testimony of the witnesses on
cross-examination. The investigator should offer suggestions for redirect
questioning and be able to locate any of the exhibits the prosecutor requests
for redirect questioning. The same procedures are followed throughout the
case in chief and become very important for cross-examination during the
presentation of the defense case.
Due to the complex nature of a financial case and the volume of witnesses
and exhibits, these trials often take weeks or months to complete. The work
of the prosecution team does not end when the court is adjourned for the
day. The team meets after court to review and analyze what occurred during
the day and plan the strategy for the following day. Each evening is similar to
the halftime break in a football game; adjustments are made to facilitate the
case presentation. The prosecutor, investigator, and the expert witness are all
involved in analyzing the daily results and progress of the criminal case. If an
additional witness is identified and needed, the investigator must obtain that
witness’ accessibility to appear in court in the evening, during breaks, or get
assistance in locating and subpoenaing the witness.
After the defense has presented its case and rested, the prosecution will
call any rebuttal witnesses to negate information or claims made by the defense
during its presentation. The trial plan for this phase of the trial is usually pre-
pared during the defense’s presentation and solidified in the evening confer-
ences. Again, if new witnesses are needed for rebuttal, they must be located
and served a subpoena to appear. If time is available (lunchtime, evenings,
and weekends), the same steps are followed that were used in preparing the
initial set of witnesses.
Once the case presentation is complete, the jury will retire for delibera-
tion. The prosecution will have custody and control of the evidence admitted
for the case, and the prosecution team will be required to provide any of the
evidence the jury asks for to assist them in their deliberations. The next step
is to anxiously await the jury’s decision.
Standard procedures are followed after a conviction. The evidence is
turned over to the court, the witnesses are paid and released from the sub-
poenas, and the sentencing process begins. The judge will request a presen-
tence report from the probation department. Probation will interview both
sides in the case. The report will then be filed with the court.
Innovative
Applications 20
New areas have emerged in which the use of indirect methods of proof in the
investigation of financial activities have gained prominence. The worldwide
expansion of international white collar crimes, corporate manipulations,
and the global concerns relating to terrorism has shown the need for compe-
tent criminal financial investigators. The size and scope of white collar finan-
cial crimes, such as the Bernie Madoff case, the “oil for food” scandal, the
recent corruption discovered in several government agencies and subsidized
companies, and the money flow supporting terrorist organizations around
the world, have pushed financial investigating to the forefront of most law
enforcement and security agencies.
Corporate fraud has resulted in the inflation of consumer goods and a
reduction in product quality. Investment and consumer fraud has eaten away
at retirement investments, adversely affected public costs for insurance, and
raised consumer fears on advertising veracity and product safety. Financial
fraud through charitable and business entities has been found to support and
pay for terrorist activities that include training and recruitment.
In many of these cases relatively new laws have been written to recover as
much as possible of the ill-gotten gains from major financial fraud schemes.
In addition, being able to follow the money and stop its flow to terrorist orga-
nizations has been a major tool used by governments in the War on Terror.
This chapter will show how the use of indirect methods of proof and forensic
accounting techniques can be applied to counter at least the financial harm
from these emerging areas of fraud and corruption. The three primary appli-
cations are forfeiture, money laundering, and the freezing of currency being
used and directed toward terrorist operations.
Forfeiture
Forfeiture statutes are divided between civil and criminal litigation. Civil
forfeiture is used to take property used in the commission of a crime or
acquired from the commission of a crime. For example, if a person uses
their car to commit a burglary and to remove the stolen property, then it
can be seized and forfeited through civil litigation. Criminal forfeiture is
brought about by a governing authority against property as a punishment for
249
250 Criminal Financial Investigations
new assets. The logic behind the statutory provisions is that none of
the new assets could have been acquired from any legitimate income
and therefore the perpetrator is not entitled to keep the assets.
If any assets were acquired over the amount of legitimate income,
these assets could be subject to forfeiture since the only source for
the additional funds would be the false claims income. The vehicles,
coins, and jewelry could be subject to the forfeiture proceedings if
it could be shown that the funds used to acquire these assets had to
have been generated by the false-claim fraud scheme.
2. The investigation of an individual reveals that through corporate
embezzlement, the individual stole $480,000.00 over 2 years. The
embezzlement is discovered 3 years after it occurred and is success-
fully prosecuted. The embezzler has used the proceeds to enhance
his lifestyle. Any assets that have been identified through the finan-
cial investigation as being purchased with the proceeds are then
traced to the current holdings of the perpetrator. By following the
money through various asset conversions, it was shown that the bulk
of the embezzled funds were eventually used to purchase a duplex in
Florida that was used as a winter home. Under the substitute asset
provisions of the forfeiture law, the Florida property would be sub-
ject to forfeiture proceedings.
In this case, if the known amount of the financial crime was less
than the cost of the substituted asset (the Florida property), the
property could still be seized, forfeited, and then sold to obtain the
amount of money decided upon by the court.
Money Laundering
The term money laundering applies to the attempt to change the appearance
of funds from an illegal action to that of legitimate financial gains. This can
apply to the proceeds from any financial fraud, any illegal source of funds,
or just the failure to report legitimate income for the purpose of facilitating
tax fraud. Money laundering can be done in a variety of ways. Offshore bank
fronts, dummy corporations, and intricate banking transfers and manipula-
tions have all been used to try to give illegal funds a legitimate appearance, to
conceal the nature of the funds from taxable to nontaxable sources, or to hide
252 Criminal Financial Investigations
the true origin of the funds. Indirect methods of proof and forensic account-
ing techniques can help the investigator to follow the money backward in
time to discover its true nature or forward to identify the persons involved in
facilitating the money laundering scheme.
If someone has made the decision to violate laws for personal gain and
taken the time to develop, implement, and maintain an elaborate fraud
scheme or criminal enterprise, it only stands to reason that they will want to
maximize their gains and have it appear to have been generated from honest
hard work or good fortune. If the scheme has operated for any period of time,
the individual will have enjoyed a rising level of status in the community and
will do whatever is necessary to avoid having the new social and financial
status tainted by fraud and deceit.
Since most fraud schemes are relatively intricate, the major fraud artist
spends the majority of his time keeping the scheme concealed and running
smoothly. Due to this fact, those conducting major fraud schemes and multi
million dollar tax schemes do not have the time or expertise to formulate
an adequate money laundering scheme with which to conceal their gains.
This has resulted in the birth of a new criminal industry: money laundering.
A new criminal element skilled in financial record keeping, and national
and international financial regulation have set up shop to accommodate
drug cartels, organized criminal enterprises, and the larger financial and tax
fraud perpetrators. For a fee ranging between 2% to 10% of the money laun-
dered, they transform the nature and character of the monies made through
these activities.
The small time or financial crime beginner or the individual tax evader
does not have the contacts, business acumen, or resources to employ a profes-
sional money launderer. Although the fraud scheme being perpetrated may
involve substantial amounts of money, it would pale in comparison to cases
such as Bernie Madoff, the major drug cartels, organized crime, and inter-
national corporate fraud. That does not stop them from taking various steps
to conceal the true nature of their receipts or to rely on the hope that their
scheme will go unnoticed. This does not preclude the investigator from pur-
suing money laundering charges in conjunction with the primary charges
for the financial crime. The subject must however meet all the element provi-
sions of the money laundering statute. The definition of money laundering is
relatively short and simple: Any actions that are designed to hide or alter the
nature, origin, ownership, or control of money to avoid reporting require-
ments under laws or regulations; or to conceal the fact that the money was
obtained by unlawful means.
How do these violations look when being performed by the financial
criminal? Several methods have been used to attempt to achieve this goal.
To hide or alter the money, an individual may divert the funds to an offshore
bank or company, and withdraw the money in the form of loans on which no
Innovative Applications 253
actual repayments are made. An individual may also open a bank account in
a false name or use a nominee (an account opened in the name of a relative
or acquaintance over which they have full control). The money is thereby
concealed as to true ownership and monies taken back out are altered to
look like a gift or personal loan, which also falsifies the origin of the funds.
A fictitious business may be created through which the monies are put in and
subsequently funneled back to the individual. This may also be done to give
illegally obtained funds the appearance of being acquired through legitimate
business dealings.
Most governments regulate the movement of currency to monitor and
control the distribution of their currency. In the United States, currency
transaction reports (CTRs) are required to be filed by financial institutions
for cash transactions in excess of $10,000.00. Also, U.S. Customs requires
that anyone carrying more than $3,000.00 in currency declare the money on
their Customs declaration prior to traveling outside of the country. Violation
of either of these requirements can be considered a criminal violation and
prosecuted under money laundering statutes.
Failing to report currency being taken outside of U.S. borders facili-
tates the use of offshore banking and corporate fraud schemes. The funds
are moved offshore, given the appearance of legitimate financial transactions
and then brought back in for use by the violating parties. The amounts of
currency involved in major illegal activities are great. Drug cartels and orga-
nized criminal enterprises amass billions of dollars in U.S. currency each
year. The criminal activities deal primarily in cash to keep from generating
more of a paper trail, and their customers and victims use cash to conceal
their involvement in criminal behavior. To move these amounts of currency,
these groups will most often use professional money laundering operations
and cooperative employees of legitimate international banking institutions.
Violators of these money laundering provisions may be caught in the act
by Customs or Coast Guard personnel. In many cases however, the violations
will be discovered through financial investigation of those involved when
the money is returned to the United States and put to use on lavish lifestyles.
The financial investigator must keep in mind that risking prosecution and
incarceration to gain millions of dollars is of no value if the perpetrator can-
not use and enjoy the fruits of the crime. The indirect methods of proof help
the investigator to identify not only the illegal or unreported monies being
received but also to identify those involved in laundering the money. Once
a laundering enterprise is identified, it opens a whole field of new investiga-
tions by identifying the customers and clientele of the money launderers.
So as not to be misunderstood, not all offshore financial institutions
are involved in money laundering. Many major banks have international
offices to accommodate an expanding global economy. The use of sham-type
offshore financial institutions is patterned to look like a legitimate institution,
254 Criminal Financial Investigations
1. Information has been received that three individuals are living lavish
lifestyles with no apparent means of support. The net worth method
reveals that each of these individuals has unexplained income of more
than $1 million for each of the past 3 years. Further investigation
establishes illegal narcotics trafficking as the likely source of the unre-
ported illegal income. The income reported by these three is shown as
consulting fees totaling $30,000.00 per month going to each of them.
The consulting fees come from ABC Financial, a Panamanian corpo-
ration. The investigation reveals that ABC Financial was incorporated
in Panama 4 years ago and that the same three individuals are the
officers for the corporation. The company has no actual customers
and only the three employees. The money laundering occurs with the
deposit of illegal funds (narcotics sales receipts) into the account of
ABC Financial and again as the funds are paid to the three individuals
as consulting fees. In addition to the money laundering charges, the
unreported narcotics trafficking income (the amount over and above
the $360,000.00 per year) can be proven through the use of indirect
methods and used for prosecution of tax evasion charges. This also
opens up the potential for the pursuit of seizure and forfeiture of the
illegal proceeds from the narcotics trafficking operation, and may
identify other players in the narcotics ring.
256 Criminal Financial Investigations
The increase in terrorist actions around the world in the past two decades has
raised concerns by governments in how to address the problem and maintain
security for their people. A major factor in the capabilities, recruitment, and
longevity of terrorist organizations is the flow of money needed to finance
and sustain the terrorist groups. Several steps have been taken to cut off the
funding to these organizations.
To recruit members to a terrorist organization, the organization has to
maintain a steady flow of propaganda to keep their message in the minds of
the people. This can be accomplished through radical speech by charismatic
individuals, keeping a media staff at work publishing its propaganda in print
or through the Internet, and by conducting dramatic attacks that will whet
the appetite of the news media and be televised and talked about around
the world. Once individuals are recruited, they require resources to reinforce
their conversion. The recruits need to be removed from the general popula-
tion to insure that they do not lose their enthusiasm and resolve. They also
need to be fed, clothed, housed and supported at least as well, and usually
better, than the lives they left behind. The last major task is to train them for
their acts of violence and equip them to carry out their attacks.
Terrorist organizations also need a safe haven in which to formulate
their plans and house their operational structure. This is achieved by acting
as “hired guns” for rogue nations that either cannot carry out the offensive
Innovative Applications 257
attacks against a perceived enemy or that want to retain anonymity from the
attacks and have plausible deniability diplomatically in the world community.
A more frightening new development has been the alliance of terrorist organi-
zations with major international drug cartels around the world. This alliance
stems from the common goal of wanting governments to have to deal with a
constant state of chaos, and to be viewed as weak and incapable of protecting
their populations. Terrorist actions by narcotics cartels have been constantly
increasing in an attempt to secure and expand their operations and to allow
them to function without impediment from enforcement agencies. The con-
stant fighting and bloodshed in Afghanistan has been primarily fueled by the
drug production that has been a mainstay of their economy.
When you analyze the financial aspects of the tragedy that occurred in
the United States on September 11, 2001, the cost for this devastating attack
seems minimal. Investigation has shown that the cost to place, train, and
support the terrorists for 18 months was less than $500,000.00. However,
the costs to al-Qaeda for training and recruitment are substantially more.
The funding used to sustain and grow these terrorist organizations is gener-
ated from a wide variety of sources. As touched on earlier, some governments
are willing to pay terrorist groups to conduct acts of terrorism covertly on
their behalf against a common enemy. Narcoterrorists fund terrorist actions
to insulate themselves against government interference with their illegal
activities and to intimidate the people in their areas of operation. The terror-
ists themselves will use organized crime tactics such as kidnapping, arson,
and extortion to finance their operations.
There are also several more subtle ways in which funds are funneled into
terrorist organizations. Terrorists have become more sophisticated and use
sham charities, humanitarian organizations, and corporations to generate
profits and solicit contributions. Sometimes they will disguise their cause
and receive funds from legitimate charities without revealing the true use of
the funds to the donor. They will also create or use existing ethnic, religious,
or racial organizations to further their terrorist activities. Because of these
innovations, it has become more important for enforcement and regulatory
agencies to be able to utilize sophisticated forensic accounting techniques to
turn off the flow of money to terrorist groups.
In response to the increasing threat of terrorism around the world, many
governments have taken steps to provide the means of freezing and confis-
cating funds that are directed to these radical organizations. Steps have also
been taken to penalize legitimate financial institutions for the lack of due
diligence in dealing with substantial monetary transactions. The problem
lies in being able to determine intent on the part of the contributing party
and being able to quantify the amounts that were sent or intended to be sent
to terrorist organizations. Although the indirect methods of proof were
originally designed to identify tax fraud schemes, they were subsequently
258 Criminal Financial Investigations
purpose of gaining more power and control. In the case of terrorism, part
of the quest for power is hoped to be achieved through the dissolution of
the existing authority of government so as to be able to take that author-
ity for themselves. Every criminal investigator and financial analyst should
be familiar with the methodology and understand the benefits of indirect
methods of proof.
FORENSICS AND CRIMINAL JUSTICE
Second Edition
Written by a former Special Agent with the Criminal Investigation Division of the
U.S. Internal Revenue Service, this volume sets out a successful methodology
enabling readers to identify, pursue, and successfully prosecute financial white
collar crime.
K15970