The Evolution Of The Role Of The Forensic Accountant In Internal Investigations
It is now generally accepted that forensic accountants form an integral part of large-scale complex cross border fraud investigations. This has not always been the case and raises the question as to whether forensic accountants are essential. In short, in the past the answer would have been no. In times gone by, fraud investigations would be undertaken by specialist investigators, many of whom were former enforcement officers. An accountant would be used specifically to look at the transactions in the books and records. A forensic accountant is not necessarily a specialised fraud investigator and, before forensic accounting became mainstream, fraud investigators managed without them.
However, the number and scale of international investigations has multiplied over the last few years and this has coincided with a significant increase in the range of skills and specialisms that the major forensic accounting teams now possess. The term “forensic accountant” is now a generic description that extends its boundaries beyond accountants and accounting: It encompasses a diverse range of skills and expertise that is invaluable in complex investigations. This is not just traditional accounting analysis but also: providing expert evidence in fraud bribery and corruption trials; interviewing of witnesses; imaging of devices; data mining; data interrogation; data hosting; provision of sector experts and industry knowledge; asset tracing; asset recovery; and corporate intelligence. A forensic accounting practice typically offers forensic technology and e-disclosure services, large-scale document review capability, corporate intelligence skills and the ability to undertake general investigations. Furthermore, the size and diversity of offerings found in the larger accounting firms also allows an investigation team to bring in specific sector specialisms, utilising the powers of insolvency practitioners and valuation experts to support recovery efforts. Consequently, forensic accountants are commonly used by companies and their legal counsel to fulfil a wide range of investigative roles outside that of pure technical financial analysis.
This diversification in the role of the forensic accountant can be put down, in a large part, to two significant shifts in the business environment. Firstly, it is a response to globalisation, and the increasingly international nature of businesses, regulatory scrutiny and thus investigations. A large accounting firm will have professionals based in most countries of the world, it therefore will offer organisations and legal counsel the ability to deploy local resources quickly. It also reflects the fact that aspects of large international investigations are heavily process-driven; as such the skills and experience of legal counsel may be better focused on strategy and litigation. Secondly, the effect of digitisation means that the volume of data that needs to be collected and analysed has grown exponentially and it is forensic accounting teams that have invested heavily and now possess market leading expertise in this area.
The role of the forensic accountant in international investigations in general follows a standard template; investigating the facts and circumstances underlying the issue through the analysis of financial records and interviews, supporting the document review and disclosure process, tracing the destination of any misappropriated funds or assets, and assisting with recovery efforts. Indeed the modern forensic accountant may be judged by the tools and techniques that can be brought to an investigation, rather than by the traditional core set of accountancy skills; understanding the techniques for extracting and analysing data or recovering assets in far-flung territories is as important now as an appreciation of the financial statements.
It goes without saying that the forensic accountant is not the only party involved in investigations. They form part of a wider multi-disciplinary team, both alongside specialists that are now deemed to fall under the “forensic accounting” umbrella and together with management, in-house counsel, external lawyers and, on occasion, regulators.
II FINANCIAL ANALYSIS
As outlined above the traditional role of the forensic accountant in investigations has been focused on the analysis of financial and accounting records. Although forensic accounting is now much broader than this, focussed accounting analysis is still relevant. In general terms any fraud, bribery or financial misconduct will be reflected in, and evidenced through, the financial and accounting records of an organisation. While a payment or transaction may be disguised or hidden, its existence will be recorded in the accounts, any absence producing an imbalance or reconciliation error and a pointer to an issue for the entity’s management.
Thus, for example, the payment of bribes by an organisation may be recorded as, notionally, a legitimate expense: in the accounts payable ledger; as employee expenses or commissions; or as discounts in the accounts receivable ledger. The direct cost of procurement fraud may be disguised through the accounts payable ledger. Overly aggressive revenue recognition would be recorded in the accounts receivable ledger.
In the case of manipulation that is entirely ‘off the books’ as in the case of business diversion schemes where neither revenues nor any costs of sales are recognised in an organisation’s books and records, forensic analysis may be able to identify likely loss of profits from analysis of failed growth forecasts and other indicators such as falling market share.
Accounting treatments, and the individual technicalities of the underlying transactions can vary significantly between countries, industry sectors and size of organisations. Certain industries have their own terminology, acronyms and jargon. It goes without saying that having the right mix of forensic accounting and sector-specific knowledge and experience in the investigation team is essential together with an appreciation of cultural differences; it may, for example, be desirable to include project accounting experience for an investigation at a construction company, or specific natural resources hedging expertise for a mining company.
Information gathering is a key component of a forensic accountant’s work and interviews form an important part of this. It would be very easy to undertake an analysis of accounting records that failed to progress an investigation if carried out blind. Hence, the accounting analysis benefits greatly from being informed and focussed. The most effective accounting records analysis is performed with a full understanding of how the specific operations of the organisation in question relate to the underlying accounting records and suspected misconduct. The best way of achieving this is by interviewing. In general, although the interview process is more often than not conducted by legal counsel, in situations where a fraud or its concealment involves even moderately complex accounting manipulation or concealment, it is likely to be beneficial to include forensic accountants in the interviews.
III ELECTRONIC DOCUMENT REVIEW & E-DISCLOSURE
The world that we now live in is driven by technology. It is difficult to imagine what our existence would be like without the digital revolution. Our computers, telephones and other mobile devices contain a digital fingerprint of our lives, both personal and business.
The volume of electronic data that we create on a daily basis has exploded and continues to grow exponentially. Ninety percent of the world’s existing data has been created in the last two years: a single computer can hold several million documents; a typical mailbox will contain fifty to one hundred thousand e-mails. The volume of potentially relevant records of a global business involved in an international investigation may number hundreds of millions. In addition, the types of data being generated have drastically changed and become more complex. We now communicate in different ways through, for example, the use of Skype, WhatsApp and the like. These continual developments render the traditional methods of data capture, processing and analysis obsolete. We must also consider the evolving business and regulatory environments; business has become increasingly global, whilst there is a growing emphasis placed on data protection and cybersecurity.
In order to address these changes, new technology and methodologies are constantly being developed; this is an area that is moving rapidly. The most significant developments are outlined below but it may be that, because change is so rapid, they will already be out of date.
(i) Disclosure Pilot Scheme
As of 1 January 2019, a Disclosure Pilot Scheme has been in operation (with limited exceptions) in the Business and Property Courts of England and Wales. This aims to address the cost, scale and complexity of the disclosure process, and encourage the use of new technologies in order to make the process more efficient and economical.
(ii) Data Collection and Analysis
Data scoping is now an essential element of any data collection exercise; it is imperative that all sources of potentially relevant data are identified and located in order to plan an efficient and defensible strategy. A plethora of tools have been developed in order to capture and analyse the various types of data that are commonplace. These include audio-visual data, social media, instant messaging and workplace collaboration applications.
The prevalence of multinational companies that operate across country borders has driven an increased demand for a more cost-effective and efficient solution for the review of multilingual data. It is now the case that machine translation is a viable alternative to human translation. For the purpose of eDisclosure, this process can be fully integrated with the review platform in order to allow reviewers to seamlessly translate documents during the course of their work.
Increasingly, companies are moving their corporate data to cloud-based systems in order to take advantage of cheaper storage. The eDisclosure industry is following suit; many of the largest eDiscovery software providers now offer the option of a cloud-based solution, and many challengers are now entering the market with purely cloud-based offerings.
(iv) Artificial Intelligence
Predictive coding has been touted as a miraculous solution to large and complex eDisclosure matters since the late nineties. However, there has been a reluctance in the market to adopt this review strategy, particularly after a number of high profile project failures resulting from poor planning and/or understanding. Since its judicial approval in the US in 2012, predictive coding has become a more accepted workflow, albeit in a measured capacity, due to more realistic expectations and a better understanding of its capabilities.
Further, the technology behind predictive coding has become more sophisticated; applications can now continuously learn from user input in order to constantly prioritise the most likely responsive data. This continual learning technology has had a quicker adoption than predictive coding, due to the simple implementation and more transparent workflow.
In addition to the above, many tools now offer investigators various options to analyse unstructured data without the use of keywords, such as through concept searching, sentiment analysis and/or the use of communication maps. These platforms allow the investigator to carry out simple early case assessment as well as discovering and exploring issues that may not have previously been identified.
Similar strides have been taken with regards to structured, typically financial, data. Platforms exist that automatically ingest significant volumes of transactional data from the most commonly used accounting systems and apply a number of tests to each, in order assign a risk score to every transaction. The system can also be trained on vast quantities of financial data to build an artificial intelligence model, thus negating the need for specific tests, but allowing anomalous transactions to be flagged automatically. The use of these technologies can identify the high risk transactions within millions of records in minutes, and more effectively than the human eye. For example, anomalous flows of funds can be identified, which would be near-impossible for a human to detect.
IV ASSET TRACING
The challenges faced when attempting to trace assets are numerous: today’s sophisticated fraudster is able to move assets quickly, making use of the mobility of assets and funds offered by globalisation, by channelling and directing them through different jurisdictions and by changing their form. Cash can be moved effortlessly, through multiple jurisdictions and converted into non-cash assets, often being split and divided and channelled in different directions. We are commonly dealing with financially astute fraudsters who are able to take action to move and hide their stolen proceeds, and take steps to frustrate recovery attempts by the legitimate owners. We are now also encountering the challenges of tracing when faced with cryptocurrencies, the fraudster seeing the attractions of the market’s pseudo-anonymity, decentralized nature, and loose regulation and exploiting this to launder the proceeds of the crime. Whilst with traditional money, fraudsters employ complicated and often sophisticated techniques involving shell companies, offshore bank accounts (sometimes temporary in nature), use of nominees, gatekeepers and other such intermediaries, in the case of cryptocurrencies, they may use various anonymization techniques in attempts to obscure the money trail. On the face of it, this makes the potential for tracing impossible. However, one of the defining features of a cryptocurrency is that its ledger, which contains all transactions that have ever taken place, is globally visible. Interestingly, recent research has demonstrated that it is often possible to track flows of money as it changes hands, and in some cases to de-anonymize users entirely, even in cryptocurrencies that are specifically designed to achieve anonymity. This is an extremely important development in relation to the tracing of funds being moved through the non-conventional financial system.
Whatever method is used by the fraudster to move the assets, victims and their legal advisers must embark upon an often lengthy and complex process of asset tracing to determine the location of the assets and to link identified assets to the crime and the offender. Every asset-tracing exercise has its unique complexities, but inevitably include a more or less iterative process of gathering and analysing evidence of asset movement.
Tracing is an almost entirely linear process: following an asset as it is moved or substituted for another and, thereafter, another and so on. While assets may be split and recombined, and mixed with other funds, the tracing exercise moves in an essentially chronological progression. In a conventional asset tracing exercise, banking records in particular are the bread and butter, representing an accurate and reliable source of evidence. Indeed, it is often the case that the only record of a flow of assets will be held by the financial institution facilitating the transaction.
Even once the flow of assets has been established, there are further hurdles that need to be negotiated. Before steps can be taken to secure and freeze identified assets, by applying legal remedies such as search and third-party disclosure orders to obtain further evidence of asset movement, the rules of tracing need to be considered. The tracing exercise is merely a process by which a claimant demonstrates what has happened to his property, identifies its proceeds and the persons who have handled or received them, and justifies his claim that the proceeds can properly be regarded as representing his property.’ In English law, for example, there are separate rules in common law and equity which determine whether or not an asset is traceable.
Common law tracing relies on the claimant having legal ownership of the property. It will fail if the property has been mixed with other property or the legal title has been transferred to anyone other than the victim. Where specific assets identified by common law tracing can be identified, a claimant will be entitled to claim them as his property. However, the major obstacle in respect of common law tracing is that assets cannot be traced once mixed with other funds. Tracing is, however, allowed through ‘clean substitutions’, meaning that if misappropriated funds are directly used to purchase another asset, ownership can be traced to and claimed in that substitute asset.
Due to the limits with common law tracing, equitable tracing is more commonly encountered in practice. It relies on there being an equitable interest in the property and can succeed where there has been mixing. Given that it is likely that the proceeds of a misappropriation will be transferred into a bank account containing funds belonging to others, the equitable remedy is important for victims of fraud.
Notwithstanding the above, the English courts have demonstrated flexibility in application of the tracing rules. As such, this is an area where it is likely that the forensic accountant will work closely with counsel, with a clear division establishing itself: the forensic accountant focussing on the messy and complex business of analysing financial, corporate and banking records to follow the money; legal counsel considering the appropriate rules to apply.
V ASSET RECOVERY
Tracing the assets, however, is only the start. Arguably the most important aspect is recovery; in this regard the value of the assets is crucial – this must be weighed up against the costs of physical recovery and realisation where appropriate. The value of any underlying asset is often surrounded by uncertainty, particularly in cases where funds have been secured from third parties based upon spurious asset values: these assets consist of properties, businesses, shareholdings or entities that can be located in far-flung countries; consequently, they can prove to be extremely difficult to value. Once again, the sophisticated forensic accountant will be able to turn to specialists in his or her team who will be experienced in undertaking valuations of these assets with their associated complications.
In the case of both conventional assets and those of a more unusual nature, it needs to be established that it makes sense economically to pursue recovery. Once this appears to be the case, the method of doing so should be determined. There are a number of approaches that can be used to recover assets: the most usual route is by way of conventional litigation, albeit that this is often complicated by the need to litigate in a number of countries and different legal systems. The role of the forensic accountant then shifts to providing litigation support, feeding into various particulars of claim and witness statements, etc.
A less common, albeit potentially effective, route is to use the formal powers of insolvency practitioners to take control and ultimately realise the assets. Most insolvency practitioners in the UK are accountants or insolvency experts working in firms of chartered accountants. Upon formal appointment, an insolvency practitioner takes on certain powers and responsibilities that can prove particularly helpful in gaining control of assets that would otherwise require an unwieldy and ultimately costly legal process to achieve the same end result. It is helpful that many of the offshore jurisdictions where control of such assets ultimately rests adopt the English legal system or variations thereof. The insolvency practitioner, once appointed, is able to utilise his or her powers, often across borders, to control assets and ultimately realise them for the benefit of creditors (which, where there is fraud or misappropriation of assets, will likely include the victim).
In respect of insolvent entities, potential recoverable assets could be unconventional in their nature. For example, there may be outstanding litigation against certain parties or, indeed, claims that arise as a consequence of the insolvency itself. This may include such matters as professional negligence claims against advisers. This would likely involve the skills and expertise of a forensic accountant, this time not from a pure investigative capacity but as an adviser on quantum. The forensic accountant would assist the insolvency practitioner (and his or her legal advisers) in quantifying the losses suffered and assisting with formulating the damages claim. The forensic accountant or (with independence in mind) another forensic accountant may ultimately be required to act as an expert under CPR35 or its equivalent in overseas jurisdictions should the matter proceed to litigation.
About the authors
Stephen is a forensic accounting partner at BDO in London. He has some 20 years of diverse experience in investigations and litigation matters and international arbitration. Stephen graduated with honours with a BSc degree in civil engineering. He is a fellow of the Institute of Chartered Accountants in England and Wales and has a postgraduate certificate in fraud risk management from John Moores University, Liverpool.
Much of Stephen’s experience involves cross-border disputes and investigations and he has worked throughout the world. He has been involved in expert-witness assignments in the areas of breach of contract and loss of profits, acquisitions and disposals disputes, minority shareholder and joint-venture disputes, insurance claims, valuations, accounts interpretation, directors’ disqualifications and intellectual property matters.
Stephen leads BDO’s contentious insolvency team in the forensic accounting group and regularly works alongside insolvency practitioners in a number of roles: expert witness; advisor; undertaking investigations to follow cash; and tracing and recovery of assets.
Natalie is a director in the Forensic Technology team; a part of BDO’s Forensic Services practice in London. She has spent approximately 13 years in the forensic technology and eDisclosure fields, having graduated with honours with a BSc degree in Information Technology, Business Management and Language. Natalie is a fellow of the Association of Chartered Certified Accountants; the global professional accounting body.
Natalie has worked on a significant number of large eDisclosure projects throughout all areas of the process, from data scoping and collection right through to production and trial support. She is an expert in handling complex disclosures and is also experienced in data analytics. Natalie has worked directly with corporate clients in addition to their legal advisors and government bodies including the Securities and Exchange Commission, the Financial Conduct Authority and the Competition and Markets Authority. She has worked on many multijurisdictional cases and where mobile laboratories have been implemented due to strict data protection rules.
55 Baker Street
Tel: +44 20 7486 5888
Fax: +44 20 7487 3686
Tel: +44 20 893 3480
Fax: +44 20 7487 3686
 Stephen Peters is a partner at BDO LLP.
 Natalie Butcher is a director at BDO LLP.
 IBM’s Marketing Cloud
 (Foskett v. McKeown, ).