Financial Investigations
Financial Investigations
Financial Investigations
https://books.google.com
FINANCIAL
INVESTIGATIONS.
A FINANCIAL
APPROACH TO
DETECTING
AND
RESOLVING
CRIMES.
FINANCIAL
INVESTIGATIONS
A FINANCIAL
APPROACH TO
DETECTING
AND
RESOLVING
CRIMES
DEPOSITORY
AIG 1 9 1933
UNIVERSITY OF ILLINOIS
AT URBANA -CHAMPAIGN
ISBN 0-16-041830-5
Department of the Treasury
Internal Revenue Service
Publication 1714 (6-93)
Catalog Number 15271 F
І.
TT 22.44 /2
1714
Acknowledgements
The men and women of Internal Revenue Service Criminal
Investigation are proud to present this course to the colleges, uni
versities and students who have expressed an interest in learning
ore about financial investigations .
The purpose of this course is twofold: first, to encourage
young men and women to consider law enforcement as an enrich
ing career and second, to bring to the reader's attention the seri
ous and sometimes evil crimes that are motivated by money and
greed.
We would like to thank the Internal Revenue Service Special
Agents who instructed the pilot courses at the colleges and uni
versities. We would also like to thank the colleges and universi
ties that allowed the Internal Revenue Service Criminal
Investigation to offer this new course at their institutions.
A special note of thanks goes to the National Association of
Certified Fraud Examiners, and their Chairman, Joseph T. Wells,
for their contributions to the text.
The following Internal Revenue Service Criminal
Investigation Employees were involved in the research, develop
ment, writing, editing and publishing of the text:
Index 391
CHAPTER ]1
band avoided paying more than $ 1.7 million in federal and state
taxes from 1983 through 1985 .
• Ivan Boesky was sentenced to three years in prison and
paid $ 100 million in fines for insider trading.
• Michael Milken, king of the junk bond, was indicted on 98
counts involving racketeering, insider trading, and assorted secu
rities fraud. He pleaded guilty to six counts and the government
dropped all other charges. Milken was sentenced to 10 years in
prison and agreed to pay $600 million in penalties .
• Operation Ill Wind, an investigation into Pentagon procure
ment fraud, impacted individuals as well as corporations. Among
the casualties of the probe were Unisys Corporation and Melvyn
Paisley. Unisys agreed to pay $ 190 million in fines for having
bribed its way to hundreds of millions of dollars worth of defense
contracts. Paisley, a former assistant secretary of the Navy, admit
ted he sold his influence for bribes and leaked secret government
information to defense firms bidding on weapons contracts .
• The savings and loan scandal rocked America. The col
lapse of the Lincoln Savings and Loan Association alone will cost
the American taxpayers $2.6 billion.
The list could go on and on ! And what do all of the crimes
described above have in common ? Money! It seems like most of
today's criminal activity either involves money or money is its
main motivator. And many of the crimes depicted by today's
headlines are crimes that cannot be solved solely by the use of
traditional investigative techniques.
In the past, police relied on investigative tools such as crime
scene analysis, physical evidence, fingerprint identification, eye
witness accounts, informants, and confessions of the offender to
supply the understandable proof of the crime . These general
investigative techniques work best in situations where a crime
has been committed and then law enforcement tries to find the
criminal. However, will these tools work when the criminal is
known and authorities begin an investigation to prove the crime?
4 CHAPTER 1
For example:
Organized crime legends like Al Capone, Lucky Luciano,
John Gotti, and Frank Balestrieri operated for years with relative
impunity. How does law enforcement prove criminal activity when
informants are killed , eye witnesses threatened, and confessions
are nonexistent?
CAD
otse
Infamous mobster Al Capone • Money launderers, tax evaders, and crooked politicians are
wasn't easy to catch. But when for the most part respected pillars of society. How does law enforce
IRS Special Agents, who are ment investigate the criminal activities of people like former Vice
trained accountants, stepped in
and charged him with tax eva President Spiro Agnew and rock and roll legend Chuck Berry ?
sion, this crime czar's career These are people whose power rivals that of law enforcement itself.
came to an end. Proof that some
times only the accountant can To answer these questions, it is necessary to go beyond the
apprehend the criminal. mere inclusion of aa few new tools in law enforcement's investiga
tive arsenal. A brand new approach is called for in light of the
evolution of crime in America, a financial investigative
approach. The growth of money-motivated crimes mandates the
need for financial investigations . The future success of law
enforcement is contingent upon its ability to conduct financial
investigations in conjunction with general criminal investigations.
Stored at
or retrieved
from
someplace
Given to
Purchase Movement
or received
or sale of of
money
from
something someone
Into or out
... of a
financial
institution
Summary
Today, gambling organizations, drug cartels, and “ mom and pop
grocery stores ” are at ease with the personal computer and its
capabilities . Corporate fraud, insider trading violations, and the
savings and loan scandals have been completed by the creation of
phony shell companies, ghost employees, and non-existent nomi
nees. Sophisticated money launderers, large scale robbery rings,
and embezzlement and kickback operations maintain elaborate
accounting records that often are the envy of CPAs. Big -time
crime operates as a full-time business. To resolve today's crimes
and prepare for the challenges of tomorrow, law enforcement
requires an understanding of financial information. Whether
searching for leads in society's back alleys or board room suites,
financial information is going to be discovered during the course
of a criminal investigation. Consequently, law enforcement agen
cies are seeking officers with proficiency in financial analysis .
A major challenge for financial investigators is to provide
investigative findings which present evidence of complex crimes
in simple and understandable terms which are comprehensible by
a jury. Consider the world of international high finance with its
shell corporations , universal letters of credit, offshore banks,
electronic transfers between numbered Swiss bank accounts, and
interlocking reciprocal trade arrangements. To a juror, this is
almost unfathomable. It's up to the prosecution team, of which an
investigator is part, to dissect these complex ideas and translate
them into simple thoughts that everyone can understand . It's
pretty easy to understand “ he was caught smuggling a suitcase
full of $ 100 bills out of the country .”
As you continue through this textbook, bear in mind that as
law enforcement improves its techniques for detecting, combat
ing, and resolving criminal activity, criminals will become more
sophisticated and innovative in their endeavors. You can be sure
that law enforcement practitioners will never work themselves out
of aa job .
CHAPTER 2
What is Law?
If you were to ask 10 people to define “ law ,” you probably would
get 10 different answers. Someone will see “ law ” as the police
officer who hands out speeding tickets. Another person will see
“ law ” as a judge sentencing a person to prison. And another will
see “ law” as a lawyer involved in a trial. As different as the 10
responses might be, they will all have one thing in common- a
basic effort to place the affairs of society in order. And generally,
that is what law is— a formal means of social control . It is
intended to guide or direct human behavior toward ends that sat
isfy the common good . Laws embody moral principles and
express the rights and obligations that members of society hold
toward one another. They provide for individual protection and for
the common well-being.
Categories of Law
In the legal world, there are many categories of law. There is com
mon law , the system of law that originated in England and was
the body of law carried by the earliest English settlers to the
American colonies . There is case law , the practice of judges and
LAWS RELATED TO FINANCIAL CRIMES 15
Classifications of Crime
Crimes can be distinguished between those that are felonies and
those that are misdemeanors. A felony is a serious crime punish
able by incarceration for a period exceeding one year, a fine, and
loss of certain civil rights (right to vote and to hold public office).
Misdemeanors are crimes less serious than felonies and usually
provide for incarceration periods of less than one year. Fines also
may be imposed.
Crimes also can be classified as to those that are mala in se
and those that are mala prohibita. Crimes that are mala in se are
said to be evil or immoral in and of themselves . They are
“ offenses against human conscience.” Common crimes of this
16 CHAPTER 2
type include felonies such as murder and rape. Crimes that are
mala prohibita are offenses that are made criminal by statute but
in and of themselves are not necessarily immoral. Mala prohibita
crimes include most violations of government regulations, envi
ronmental laws, and even traffic offenses. Crimes that are mala in
se often require proof of criminal intent, or, in legal terms, mens
rea. Crimes that are mala prohibita don't usually require proof of
criminal intent .
GANGSTERS States Code is updated every six years with cumulative supple
OF THIS CRIMINAL SYNDICATE
DEFRAUDED YOUR GOVERNMENT
BY EVADING ALCOHOL TAXES OF
ment volumes being issued during intervening years. You can
$ 3,750,000 usually find the United States Code in the reference section of
ENOUGH TO FEED THE CREWS OF
10 BATTLESHIPS any library.
OF THE UNITED STATES NAVY
AT SEA FOR The statutes are codified into 50 titles . Codification is the
ONE FULL YEAR
YOU
process of collecting and arranging laws by subject. For example,
WILL PAY FOR THIS FOOD ! Title 2 is called “ The Congress” and statutes relating to the elec
AID DEFENSE !
REAL AMERICANS tion of senators and representatives, the organization of Congress,
WILL KEEP SUGAR and the regulation of lobbying are found here. Titles may be fur
FROM BOOTLEGGERS !
...
RAW MATERIALS SECTION
HOL TAX UNIT, NEW YORK, N.Y.
ther subdivided into parts, subchapters, and /or chapters.
Financial investigations have
Suppose you're reading a legal document and you came
been the most effective method across the phrase " he was convicted of violating 26 U.S.C. §
of “following the money ” to halt 7201.” To find out what this person was convicted of, you need to
tax evasion since the United
be able to interpret what is meant by “ 26 U.S.C. § 7201. ” It's
States Congress enacted the
Revenue Act of 1913. The
easy— U.S.C. stands for United States Code, 26 is the title num
above poster, from the World ber, and 7201 is the statute reference. You locate the volume of
War II era, solicits the support the United States Code that contains Title 26, turn to the statute
of American taxpayers in com referenced by the number 7201 and find the following:
batting tax evasion.
Upon reading the statute, you determine that the person previ
ously referenced was convicted of tax evasion . But what did the
investigator who worked on the case have to prove to show that
the person committed tax evasion? In other words, what are the
elements of the crime ?
Elements of a Crime
Earlier, we stated that the elements of a crime are those con
stituent parts that must be proven to sustain aa conviction. Well, to
18 CHAPTER 2
gain a conviction for evasion of taxes, there are three elements that
must proven beyond a reasonable doubt. These elements are:
• The suspect owes additional taxes
• The suspect attempted to evade the taxes
• The suspect willfully attempted to evade the taxes
It is important that the financial investigator be able to use
the United States Code to locate statutes, however, with the com
plex way statutes are written, it is not always easy to sort out the
elements of the crime. If in doubt, discuss the elements with the
prosecuting attorney. An understanding of these elements will
enable an investigator to focus his of her evidence collection
efforts on pertinent information .
Since criminal statutes may be enacted by any level of gov
ernment— federal, state, and local— it is important to remember
that the elements of any particular crime may vary between the
three different jurisdictions. Investigators must be knowledgeable
about the statute used for criminal prosecution so that the appro
priate evidence can be collected .
The remainder of the chapter deals with statutes that are of inter
est to the financial investigator. Selected statutes from the follow
ing four United States Code titles will be discussed :
• Title 15, Commerce and Trade
• Title 18, Crimes and Criminal Procedure
• Title 26, Internal Revenue Code
§ 201. Bribery of public offi crime, are listed and described on the following pages . As was
cials and witnesses
stated earlier, titles may be further subdivided into parts, sub
(6 ) Whoever
(1 ) directly or indirectly, cor
chapters, and/or chapters . Title 18 happens to be divided into
ruptly gives, offers or promises 121 chapters . The Title 18 statutes described in this text are
anything of value to any public listed according to the chapter in which they are found in the
official... or offers or promises United States Code . Keep in mind that chapters often contain
any public official... to give
anything of value to any other multiple statutes, but this text lists just selected ones. So if you
person or entity, with intent — see only one statute listed under a chapter, chances are that other
( A ) to influence any official statutes exist in the chapter, but for purposes of this text they
act; or were not selected for inclusion .
(B) to influence such public
official... to commit or aid in
committing, or collude in, or
allow, any fraud, or make
Bribery, Graft, and Conflicts of Interest
opportunity for the commission Bribes are given to influence the taker's actions, opinions, or deci
of any fraud, on the United sions. Title 18 U.S.C. § 201 makes it illegal for a public official or
States; or
a witness to accept a bribe and for a person to offer a bribe to
( C ) to induce such public offi
cial... to do or omit to do any either of these parties. Section (b)(1), the part of the statute making
act in violation of the lawful it illegal to bribe a public official, is shown on the next page.
duty or such official... The elements of the crime of bribing a public official include
shall be fined not more than the following:
three times the monetary equiv
alent of the thing of value, or • The suspect knowingly offered aa bribe to a public official
imprisoned for not more than
fifteen years, or both... • The bribe was intended to influence the public officials
performance of an official act or lawful duty
20 CHAPTER 2
§ 656. Theft, embezzlement,, the prison time is less than one year. If the value is $ 100 or more,
or misapplication by bank offi- the fines and amount of prison time are much steeper.
cer or employee The elements of the crime include the following:
Whoever, being an officer, direc
tor, agent, or employee of, or • Intent
connected in any capacity with
any Federal Reserve bank ...
• The suspect is a bank employee or officer
embezzles, abstracts, purloins, or
willfully misapplies any of the • The suspect attempted to defraud the bank
moneys, funds, or credits of such
bank ... shall be fined not more
than $ 1,000,000 or imprisoned
not more than thirty years, or Extortion and Threats
both; but if the amount embez- We have to protect ourselves from being forced to do things
zled, abstracted, purloined or
against our will . Chapter 41 of Title 18 contains statutes that pro
misapplied, does not exceed
$100, he shall be fined not more
hibit the use of threats and force . Three of the statutes are listed
than $ 1,000 or imprisoned not below.
more than one year, or both.
Extortion
§ 872. Extortion by officers or Title 18 U.S.C. § 872 states that government employees and offi
employees of the United States
cers cannot use their employment status with the government to
Whoever, being an officer or
employee of the United States...
gain money or property through force or threats .
under the color or pretense of The elements of the crime include the following:
office or employment commits or • Intent
attempts an act of extortion,
shall be fined not more than
$250,000 or imprisoned not
• The suspect is an officer or employee of United States gov
ernment
more than three years, or both;
but if the amount extorted or
demanded does not exceed $100, • The suspect used his or her employment with government
he shall be fined not more than as part of the extortion scheme
$500 or imprisoned not more
than one year, or both.
• Extortion is committed or attempted
Racketeering
Chapter 95 of Title 18 contains statutes related to money launder
ing. By definition , money laundering is the process by which one
conceals the existence, illegal source, or legal application of
income and then disguises that income to make it appear legiti
mate . This is taking “dirty money ” and washing it to make it
appear “ clean ”. Through these laws, the mere moving of money
known by an individual to be the proceeds from some illegal
activity creates a substantive criminal offense separate from the
illegal activity itself. For the financial investigator, these statutes
26 CHAPTER 2
§ 1957. Engaging in monetary The elements of the crime include the following:
transactions in property derived
from specified unlawful activity • The suspect must knowingly engage in aa “monetary transac
(a) Whoever, in any of the cir- tion .” A monetary transaction is any deposit, withdrawal, transfer,
cumstances set forth in subsection or exchange, in or affecting interstate or foreign commerce, of
(d) , knowingly engages or
attempts to engage in a monetary funds or a monetary instrument by, through , or to a financial insti
transaction in criminally derived tution. It excludes “ any transaction necessary to preserve a per
property that is ofa value greater son's right to representation as guaranteed by the sixth amendment
than $ 10,000 and is derived
to the Constitution”
from specified unlawful activity,
shall be punished as provided in • The value of funds or monetary instrument involved in the
subsection (b ).
(b) (1 ) Except as provided in
transaction or attempted transaction must exceed $ 10,000
paragraph ( 2 ), the punishment
for an offense under this section
• The suspect must know that the funds or monetary instru
is a fine under title 18 , United ments involved in the transaction or attempted transaction consti
States Code, or imprisonment for tute “ criminally derived property ”
not more than ten years or both.
• The property involved in the transaction must, in fact, con
stitute the proceeds of “specified unlawful activity ”
• The offense must take place in the United States, in the
special maritime and territorial jurisdiction of the United States,
or, can take place outside the U.S. if the subject is aa United States
person— as defined in Title 18 U.S.C. § 3077, except for the
class described in paragraph (2)(D) of that section
• Willfulness
30 CHAPTER 2
• Willfulness
Summary
This chapter has detailed important federal statutes relating to
financial investigations. The successful financial investigator is
one who can sort out the elements of a crime from the legalese of
a statute so that he or she is in a position to gather the evidence
needed to prove a violation and sustain a conviction.
LAWS RELATED TO FINANCIAL CRIMES 35
1. What are the differences between civil law and criminal law ?
Evidence
in Chapter 2, some of the federal statutes of inter
w
Transactional Immunity
Transactional immunity completely protects the witness from
prosecution for any criminal offenses about which he or she testi
fies during the grand jury proceedings. If a witness states that she
has laundered money for a drug dealer, she cannot be charged for
the offense if she has been provided transactional immunity. This
form of immunity is rarely used.
Use Immunity
Use immunity protects witnesses from the prosecution’s “ use ” of
their testimony against them. Let's look at that same witness who
laundered drug money. If she is granted use immunity, she cannot
be prosecuted for money laundering unless the prosecuting attor
ney can develop independent information and evidence from a
completely separate source of the witness' criminal wrongdoing.
Immunity can be given either formally or informally. Formal
immunity is granted by the court. As part of a grand jury proceed
ing, the prosecuting attorney makes an application to a court (i.e.
federal judge) requesting a grant of formal immunity for the wit
ness. The court official reviews the application and bases his or
her findings on:
• The importance of the information to the success of the
investigation
• The availability of the information from other sources
• The culpability of the witness
If the court approves the application, a grant of formal immu
nity is issued to the witness.
Informal immunity is offered to grand jury witnesses by the
prosecuting attorney via issuance of a “ letter of immunity.”
Such a letter assures witnesses that their grand jury testimony
will not be used against them in any subsequent criminal legal
proceeding
Immunity is a powerful tool and the investigator and prose
cuting attorney must use it wisely. They must weigh the evidence
they will receive from a witness against that witness' criminal
wrong doings. The prosecutor will usually ask for a proffer. This
is a statement from the witness which details his involvement
EVIDENCE 41
What Is Evidence?
From the discussion on the grand jury proceeding, you can see
that the financial investigator's role as a gatherer of evidence is a
vital one . In its simplest terms, evidence is anything that can
make a person believe that a fact or proposition is true or false.
Both parties involved in a lawsuit can submit evidence to prove
their points . In aa criminal case, the prosecution must present evi
dence to prove the commission of aa crime. They do so by gather
ing information, documents , and other items that prove the
elements of a crime. The defense presents evidence to show that
allegations are invalid.
Standards of Proof
Evidence is collected to establish proof. In the world of law
enforcement, the concept of proof varies according to the situa
tion . In a criminal case, evidence must establish proof of a crime
“beyond a reasonable doubt.” In most civil cases, evidence must
be strong enough to incline a person to believe one side over the
other. Discussions concerning five standards of proof follow.
PAY TO
THE RDER
Reasonable doubt is the degree of certainty that you have in
Sevedehurdland WARM SPRINGS OFFICE
accomplishing or transacting the more important concerns of your
WELLS FARGO BANI
46973 WARN SPRINGS BOULEVARD FREMONT, CAO
everyday life. For example, you are out for your nightly walk
MERC
121000 2101 : 326 OK24 around the neighborhood and you stop at an intersection. At the
same time, a car happens to pull up to a stop sign at the same
IRMTE
11-24 / 12
121068 )
DANA B. OR KAT
PH . 40
intersection. You and the driver make eye contact and the driver
3441 CED
SAN JOS waves at you to cross the street. You cross because you are con
PAY TO
THE ORDER OF
BatessSutch vinced, beyond a reasonable doubt, that the car will not pull out
SucheSundhedssats i WARM SPRINGS OFFICE
and run over you.
WELLS FARGO BANK
48973 WARM SPRINGS BOULEVARD FREMONT, CA 94 €
MEMOSOS Alma We just described “reasonable doubt” in lay person's terms.
: 121000 2481: 3 26 0124 Let's see how the court defines “ reasonable doubt?” A recent
Video Spectral Comparator's are court decision (U.S. v. Sunderland) defines the concept as follows:
new technological tools used to
clarify images and differentiate A reasonable doubt, is a doubtfounded upon a consideration
inks on documents. This tech of all the evidence and must be based on reason . Beyond a
nology was used to show conclu reasonable doubt does not mean to moral certainty or
sive proof that a check originally
made payable to the IRS was
beyond a mere possible doubt or an imaginary doubt. It is
altered through the use of differ such a doubt as would deter a reasonably prudent man or
ent inks. woman from acting or deciding in the more important mat
ters involved in his or her own affairs. Doubts which are not
based upon a reasonable and careful consideration of all the
evidence, what are purely imaginary, or borne of sympathy
alone, should not be considered and should not influence
your verdict. It is only necessary that you should have cer
tainty with which you transact the more important concerns
in life. If you have that certainty, then you are convinced
beyond a reasonable doubt.
Preponderance of Evidence
The degree of proof required in many civil matters is a preponder
ance of evidence. Let's say you are sitting on a jury in a case
44 CHAPTER 3
involving aa lawsuit where one person is suing the other. You listen
to the evidence presented by the defendant and then you listen to
the evidence presented by the plaintiff. When it comes time to
deliberate, you find that you happen to believe the plaintiff. Both
sides presented evidence but the evidence presented by the
plaintiff made you believe that person. This is proof by prepon
derance of evidence- evidence that inclines an impartial mind
to one side rather than the other. And with preponderance of evi
dence, it is not the quantity of evidence that matters, it's the qual
ity. For example:
... when it is said that the burden rest upon either party to
establish any particular fact or proposition by preponderance
or greater weight of evidence, it is meant that the evidence
offered and introduced in support thereof to entitle said
party to a verdict, should , when fully and thoroughly con
sidered, produce the stronger impression upon the mind and
be more convincing when weighed against the evidence
introduced in opposition thereto . Such preponderances are
not always to be determined by the number of witnesses on
the respective sides, although it may be thus determined all
of the things being equal.2
Probable Cause
The three standards of proof just presented can be distinguished
from probable cause which serves as the basis for arrest and
search warrants . Probable cause is all the facts and circum
stances within the knowledge of an investigator about аa criminal
activity that can be considered reasonable and trustworthy. For an
arrest warrant to be issued, probable cause must be sufficient to
cause a person of reasonable caution to believe that a crime has
been committed and that the accused has committed it. To have a
search warrant issued, probable cause must be sufficient to make
a reasonable person believe that a crime has been or will be com
mitted and that the evidence sought exists in the place to be
searched. Probable cause requires more than mere suspicion or
hunches but less than a preponderance of evidence.
Suspicious Situation
At the opposite end of the spectrum from “ beyond a reasonable
doubt” in the continuum of standards of proof is the suspicious
situation. In Terry v. Ohio , 392 U.S. 1 (1968), the Supreme Court
established case law stating that police may briefly detain and
question a person for investigative purposes if there exists spe
cific “articulable suspicions.” Such a valid detainment of a sus
pect may yield evidence to effect arrest or provide evidence in
support of a crime.
Classifications of Evidence
Now that you are familiar with the standards of proof, let's look at
the types of evidence that can be presented. In legal terminology,
evidence has various classifications. Evidence may be classified
according to its proof results (direct or circumstantial) or accord
46 CHAPTER 3
Direct Evidence
A person under investigation is suspected of accepting a $5,000
bribe. Another person states that he was with the suspect on
November 12, 1992 and saw the suspect accept the bribe. This
person has provided direct evidence of the crime. Direct evidence
is evidence to the precise point at issue.* A person is suspected of
accepting a bribe; another person says he saw the suspect accept
aa bribe. Nothing needs to be inferred or presumed.
Circumstantial Evidence
Now let's look at the same suspect, only this time let's look at
some evidence that is not directly related to the point at issue. An
investigator states that the suspect's bank statement reveals that
the suspect deposited $5,000 on November 12, 1992. Another
person testifies that on November 12, 1992, she saw the suspect
having breakfast with the person suspected of offering the bribe.
When looked at individually, neither of these pieces of evidence
prove that the suspect accepted a bribe . However, viewed
together, you get the feeling that the suspect could have accepted
the bribe at breakfast and then deposited it in his bank.
The evidence presented in the previous paragraph is circum
stantial evidence. Circumstantial evidence is evidence relating to
a series of facts other than those at issue that tend, by inference,
to establish the fact at issue.5 Circumstantial evidence proves the
existence of the fact indirectly and depends on the strength of the
inferences raised by the evidence. The use of circumstantial evi
dence is recognized by the courts as a legitimate means of proof
when it involves proving several material facts which, when con
sidered in a relationship to each other, tend to establish the exis
tence of the principle or ultimate fact.
Circumstantial evidence is the only type of evidence gener
ally available to show certain elements of a crime, such as malice,
EVIDENCE 47
Real Evidence
Real evidence is evidence that is tangible; it can be presented to
the jury for inspection. Material objects such as knives, bullets,
guns, and jewelry are examples of real evidence.
Documentary Evidence
Documentary evidence consists of writings and documents, such
as judicial or official records, contracts, deeds, and the less for
mal writings such as letters, memorandums , books, and records of
private persons and organizations. Documentary evidence is pri
marily circumstantial in nature and must be introduced by a wit
ness who can testify to the existence and authenticity of the
evidence .
Testimonial Evidence
Testimonial evidence is evidence given by word of mouth .
Witnesses under oath and affirmation provide testimonial evi
dence . A witness is a person who can testify as to what he or she
knows from having seen, heard ,or otherwise observed .
Judicial Notice
Not everything presented during a trial must be proved. There are
matters so well known to the court that it would be a waste of time
to compel a party to offer evidence of their truth. For example, it
is aa well known fact that the formula for water is H20. There's no
reason for a lawyer to call a witness to the stand to attest to that
fact. The judge can allow the court to accept certain facts as evi
dence through a legal process known as judicial notice. However,
if there is evidence which reasonably puts a fact in dispute, judi
cial notice will not be taken .
48 CHAPTER 3
Rules of Evidence
The investigator is the one who gathers evidence during the
investigative process. For the investigator, evidence of financial
crimes includes the following:
Clergyman /Penitent
• Physician /Patient
• Accountant/Client
Attorney / Client
The attorney/client privilege must be strictly adhered to .
However, this privileged relationship does not make every com
munication between a client to his attorney confidential. It
applies only to those communications meant to be confidential
and made to the attorney in his or her capacity as an attorney.
When it does apply, the privilege covers corporate as well as indi
vidual clients.
For the investigator, the attorney/client privilege does not
apply when a suspect's attorney is merely a conduit for handling
funds or is involved in something like researching or recording
the transfer of title to real estate (without consultation for legal
advice). Similarly, if the attorney is acting as an accountant or tax
return preparer, this privilege may not be applicable.
EVIDENCE 51
Husband Wife
Communications between a husband and wife, privately made,
are generally assumed to have been intended to be of aa confiden
tial nature, and therefore held to be privileged. These communi
cations remain privileged even after a marriage terminates.
However, if it is obvious from the circumstances or nature of a
communication that no confidence was intended, there is no priv
ilege. For example, communications between a husband and wife
made in the presence of aa friend are not privileged.
In addition to the confidential communication privilege, there
exists an independent privilege- a testimonial privilege. A mar
ried person may refuse to testify against his or her spouse, at least
when the latter is aa defendant in a criminal prosecution.
Clergyman / Penitent
The privilege between clergyman and penitent has been recog
nized in the Federal courts , but this privilege has not been
extended to financial matters, such as contributions made through
a clergyman.
Physician / Patient
Many state courts recognize the physician/patient privilege,
although Federal courts generally have not approved it.'
Accountant/Client
The accountant/client communication privilege is not recognized
under common or Federal law. Workpapers belonging to an
accountant are not privileged and must be produced if required.
Similarly, a suspect may be required to produce an accountants
workpapers if they are in his or her possession.
An accountant employed by an attorney, or retained by a per
son at the attorney's request to perform services essential to the
attorney/client relationship, may be covered by the attorney/client
privilege.
Law Enforcement Officer / Informant
This privilege allows law enforcement agencies to withhold from
disclosure the identity of persons who furnish information con
cerning violations of law. Unlike other privileges, it is the identity
of the informant that is privileged, not the communication.
52 CHAPTER 3
• Expert testimony
Summary
The rules of evidence and procedure establish the legal frame
work within which the financial investigator works. A full confes
sion of guilt by the suspect becomes worthless if it was illegally
obtained and therefore inadmissible in court. The investigative
process requires the gathering of information, documents, and
testimony from witnesses, victims, and subjects involved in crimi
nal activities. Though the legal statutes institute the benchmarks
of right and wrong, and the elements and degrees of proof neces
sary for criminal conviction, it is the rules of evidence and crimi
nal procedure that control both the investigative process and the
resultant judicial proceeding.
58 CHAPTER 3
3. What is evidence ?
a. Todd White's wife, Kay, says that before they were married,
Todd told her that he made aa lot of money selling drugs.
1)
2)
1)
2)
60 CHAPTER 3
c . While they were married, Todd told Kay that the powder in the
bags was cocaine. Kay was not involved in the distribution of
drugs.
1)
2)
d . Todd's son , Joey, says his father asked him to sell some
cocaine at school .
1)
2)
e. Leon Norton , Todd's accountant says that Todd told him that
he had $25,000 in income from his auto repair business and
$250,000 in income from an inheritance.
1)
2)
EVIDENCE 61
1)
2)
Endnotes
1 U.S. v. Sutherland, 56-2 USTC 9651 (D.D. Colo.)
2 Wissler v. U.S. 58-1 USTC par 9414 (So. Dist. of IA)
3 Gladden v . Self, 55-1 USTC 9227 (E.D. Ark.), Add'd 224 F2d
282 (CA-8)
4 John Evarts Tracy, Handbook of the Law of Evidence,
(New York: Prentice -Hall, Inc. , 1952), p. 6
5 Handbook ofthe Law of Evidence, p . 6
6 Jack T. Wells, W. Steve Albrecht, Jack Bologna, and Gilbert
Geis, Fraud Examiner's Manual, (National Association of
Certified Fraud Examiners, 1989 ), Section 11 , p. 45
7 Fraud Examiner's Manual, Section 11 , p . 44
Sources of Information
hapter 3 focused on concepts related to the
C collection and admissibility of evidence. This
chapter addresses where to look for informa
tion that may ultimately be used as evidence against, or, on the
other hand, in support of a suspect. As a financial investigation
begins, questions concerning a suspect's finances are plentiful.
Does the suspect own the home in which she lives or does she
rent? If she owns the home, how much did she pay for it and how
did she pay for it? If she rents, how much does she pay, and is she
the one who pays or does some second party pay the rent? Does
she have a criminal record? Does she own the car she drives?
How did she pay for the trip to China she took last year? It all
seems pretty simple— just ask her! Well, sometimes, if you have
a cooperative suspect, it is that simple . But how cooperative
would you be if you had the authorities investigating your
actions— especially if you had something to hide?
This chapter begins with aa discussion on selecting suspects to
target for an investigation. The decision to target a suspect is not
made lightly as both the suspect and the investigative team can be
affected by a poor decision. The remainder of the chapter and a
corresponding appendix (Appendix A) identify some of the many
sources of information of interest to an investigator. For the inves
tigator, the important thing to keep in mind is that most financial
transactions, whether lawful or unlawful, are recorded and can be
recreated if the investigator can piece together the correct “ paper
trail”. The sources listed in this chapter and Appendix A provide a
foundation for the initiation of that paper trail.
64 CHAPTER 4
Initial Considerations
Before listing and describing various sources of information, we
will explore some of the things that are considered when an inves
tigation is initiated. What should be considered before targeting a
suspect for investigation? How should an investigator deal with a
suspect as a source of information ? What happens when a suspect
refuses to cooperate ? Each of these issues will be addressed
below.
• Public records
• Business records
• Government records
Public Records
Laws and regulations require that records of certain financial
transactions be disclosed and subject to review by anyone who
wishes to inquire. These records are known as public records and
they contain aa tremendous amount of valuable financial informa
tion . The records not only provide answers to questions such as
“ What property does the suspect own?, Where is it located? and
What did the suspect pay for it?,” they can also be used to estab
lish leads and corroborate or dispute the suspect's testimony.
Because of the wealth of information available from State,
county, and municipal records, researching public records should
be one of the first steps you take in an investigation. The secret,
of course, is knowing where to look. The following pages list and
describe various sources of public records.
SOURCES OF INFORMATION 69
Corporate Records
All corporations must file documents in the state in which the
incorporation occurred . If the incorporation occurred in one state
and the corporation conducts business in another, it normally will
have to file documents as a “foreign corporation ” in the state in
which business is conducted . Information concerning corpora
tions varies somewhat by jurisdiction , but usually the articles of
incorporation , annual reports on franchise taxes , and in some
cases , bylaws , are available . This information can be valuable in
tracing corporate ownership. Corporation documents will reflect
names of the incorporators, the registered agent in the state (nor
mally the attorney who prepared the documents ), and the initial
board of directors and officers . In a limited number of cases ,
financial statements are filed. If a company is publicly held, its
financial statements and records of significant events must be
filed with the Securities and Exchange Commission .
Partnerships
A partnership is the association of two or more persons to carry on
as co-owners of aa business for profit.? Partnership records may or
may not be a matter of record in the state where the partnership
was formed .
In the case of aa general partnership, one in which the part
ners share in all profits and losses, there is normally no require
ment to file agreements with licensing authorities . Limited
partnerships, where a partner's liability is limited to his or her
investment, are normally filed in the state in which the limited
70 CHAPTER 4
Trusts
A trust is aa legal entity in which a certain person or entity, known
as the trustee, holds and administers property on behalf of others
(the beneficiaries). Trusts commonly are used as vehicles for land
transactions and other assets. Registration of a trust is required
by some states; however, the beneficiaries of the trust are not
always named.
Chamber of Commerce
The role of aa Chamber of Commerce is to promote the local area .
It maintains information on commercial and industrial establish
ments within its vicinity as well as information on trade and
SOURCES OF INFORMATION 71
Court Records
Transcripts and legal decisions in criminal and civil law suits are
maintained at the Clerk of Court office. There are separate offices
for the Federal, State, and local court systems. Information relat
ing to divorce decrees , bankruptcy petitions, judgments, insur
ance, and property settlements are types of public records filled
with financial information.
........
Business Records
Business records are another source of financial information . Every
business, large or small, legal or illegal, generates and maintains
records. The array of records available to the investigator is as var
ied as the number of businesses in existence. Because of this, only
two examples are presented in this chapter. Appendix A contains a
number of other sources of business records.
located. The records reveal that Mr. Sinclair owns the house and
has an outstanding mortgage held by a lending company. The
“ warranty deed ” indicates that the subject purchased the property
for $ 120,000. The “ Deed of Trust " (the mortgage document filed
with the county recorder's office) reveals that an outstanding mort
gage of $ 110,000 was obtained from ABC Mortgage Company.
You figure that Mr. Sinclair put the $ 110,000 mortgage loan
toward the house and paid off the rest with a $ 10,000 downpay
ment. You contact ABC Mortgage Company and they confirm that
the suspect has a $ 110,000 mortgage, but their information does
not tell you exactly what Mr. Sinclair did with the $ 110,000.
Mortgage loans are to be applied toward the house for which they
are granted, but since you are investigating the guy because of
some alleged shady business dealings, you decide to look further.
You look to the business records surrounding the purchase of the
house. Your investigation leads you to Mr. John Phillips, the real
estate lawyer who handled the transaction.
Most real estate transactions are handled by a disinterested
third party acting for both the seller and buyer. This third party is
usually an escrow company or a real estate attorney. The mort
gage company submits a cashier's check in the amount of the loan
to the third party who ensures that all funds received are properly
accounted for and that all disbursements are properly made in
accordance with the sales contract.
A real estate sale may involve more than just a straight sale of
the property. There are often additional fees to be paid: sales
commissions to aa real estate company, fees for appraisals, payoffs
of existing mortgages, real estate taxes due, and the third party's
service fee. Incoming monies received for the purchase may
include the buyer's earnest money (money given by the buyer to
the seller to bind the purchase agreement), downpayments, and
the amount received from the mortgage company. After costs are
allocated to the seller and buyer according to the sales contract,
the third party collects and disburses any amounts due to the
seller and buyer at the closing. Records of these financial transac
tions are business records and are retrievable by the investigator.
ABC Mortgage Company had made out the cashier's check for
the mortgage loan to John Phillips , Esquire. Contact with Mr.
74 CHAPTER 4
Closing Statement
Due Seller Buyer Credit
• When all is said and done, the seller will leave the settle
ment with $ 109,700 ($ 120,000 minus $ 10,300).
• The buyer, Mr. Sinclair, must provide $ 120,300 at closing,
$ 120,000 to pay for the house and $300 for his share of the
escrow.
• Special instructions
Photocopies of instruments used to make earnest money
payments and downpayments
• Appraisals
• Receipts for currency received
Existing mortgage loan payoff calculations (most often a
statement from the existing mortgage company)
• A copy of new loan agreements, promissory notes, and
related documents
Government Records
Information relating to financial transactions is maintained by
numerous Federal, State, and local government agencies. From
“ information - gathering ” activities like the FBI's National Crime
Information Center (NCIC) to tax returns (IRS), records of finan
cial transactions are compiled, stored, and retrievable from these
sources of information. Several Federal intelligence networks are
described below. Appendix A identifies other government sources
and the information that they can provide.
Summary
Selecting a suspect to target for investigation is not a decision
that should be taken lightly. The probability of a conviction must
be considered as well as the availability of resources and jury
appeal. Once an investigation begins, information must be col
lected. Without information , an investigator's most valuable
resource— no criminal will ever be put behind bars. The source
of information with the most knowledge is the suspect. Some are
cooperative, others are not. But no matter what type of suspect an
investigator comes across, he or she must develop other sources
of information to verify or contradict what a suspect says. There
are all sorts of information available to an investigator, and the
good ones know how to focus on what they need and where to go
to get it.
80 CHAPTER 4
2. You are investigating Base Ball, Inc. You wonder if any com
plaints have been lodged against the company. You know that
Base Ball, Inc. does aa lot of business with a ball glove manufac
turing company in Raleigh, North Carolina. You do not know the
name of the company in Raleigh, therefore, you want to get a list
of companies in that geographic area.
Endnotes
1 Compendium of Federal Justice Statistics, 1985, (U.S.
Department of Justice, Office of Justice Programs, Bureau of
Justice Statistics, NCJ- 123560, July 1990), p. 9
2 Uniform Partnership Act, Section 6
CHAPTER 5
Account Transactions
Account transactions are financial events that directly affect the
movement of money through aa bank account. In this context,
“ directly affect” means deposits to, or withdrawals from , an
account . Account transactions occur in checking, savings, and
credit union accounts. Records of account transactions are main
tained through the use of the following documents:
Signature card
• Bank statements
Deposit tickets/items
• Checks/ withdrawal items
• Credit and debit memorandums
Anthony Benedict
1229 Springtide Pl, NW Statement Period
Washington, DC 20001 03 /20 /92- 04/20/92
If you have questions about your account, please call 202-555-111 or toll free 800-222-9999
Checking summary for account 097405813
Beginning balance 1,532.46 Minimum Balance 1.040.33
Bank Operations
Depositor
Cash and/or
Checks
Deposit Ticket
Transaction
Entry Point
Proof Department
Independent verification
of tellers's work and sorting
of items
•••••
Out Clearings On-Us
Transit Items Checks drawn on banks Checks drawn on
Internal Departments
Checks drawn on within area , usually Debits and
this bank and
out of town banks handled through deposit tickets credits
Clearinghouse
:................:
Collection ofout of
town checks received
from depositors
8 Address (number, street, and apt . or suite no.) 9 Occupation, profession, or business
10 City 11 State 12 ZIP code 13 Country (if not U.S.) 14 Date of birth (see instructions)
.
15 Method used to verify identity: a Describe identification >
b Issued by ► c Number ►
Part II Person (see General Instructions) on whose behalf this transaction was conducted
16 If this transaction was conducted on behalf of more than one person , see instructions and check here
17. This person is an : individual or organization 18 Iftrust, escrow , brokerage,or other 3rd party account, see instructions and check here .
19 Individual's last name or Organization's name 20 First name 21 Middle initial 22 Social security number
26 City 27 State 28 ZIP code 29 Country (if not U.S.) 30 Date of birth (see instructions)
Part III Types of accounts and numbers affected by transaction (If more than one of the same type, use additional spaces provided below )
2
Sign
Here 52 Type or print preparer's name 53 Approving official ( signature) 54 Date 55 Telephone number
.... : ......
Federal Clearinghouse Bookkeeping Department
Correspondent Reserve Exchange of checks
Banks To be posted to customer's
Banks among local banks accounts
...............:
Collection of out of
town checks received
from depositors
Pay to the
1 : 0 540009911 ; 0974058 1 31
Anthon Benidect
O 548 00000 23463 ,
Non-Account Transactions
Non-account transactions are financial transactions that occur at a
financial institution but do not flow through an account. Examples
of non-account transactions include loans; purchase or negotia
tion of cashier's checks, money orders, travelers checks; and cur
rency transactions such as exchanging currency for currency and
cashing third -party checks . For investigative purposes , wire
transfers, entries into aa safe -deposit box, and the purchase or sale
of securities are also considered non-account transactions.
Loans
Loan applications , loan repayment ledgers, and loan correspon
dence files are usually maintained by financial institutions . A
loan application usually requires a financial statement completed
by the individual requesting a loan. It represents a good “ finan
cial lead document” for the investigator. If an investigator is look
ing to identify a suspect's assets and accounts, he or she should
turn to any available loan applications , since the suspect, eager to
FINANCIAL INSTITUTIONS AS
SOURCES OF INFORMATION 101
impress the bank with his or her solvency, will identify assets and
other accounts more candidly on that document than in an inves
tigative interview. Furthermore, loan applications most often con
tain a statement that the applicant is aware, by signing the
document, that it is aa federal crime to knowingly make false state
ments when applying for aa loan.
The loan repayment schedule and correspondence files can
be used by the investigator to detect:
• Repayment methods. Lump sum, accelerated, or unusual
repayments can be traced through the bank's proof system
• Final disposition of loan proceeds. The disposition may be
within the bank (on-us items) or elsewhere . Either situation
is traceable through the bank's recordkeeping system
• Loan collateral. The security pledged for the loan, if any,
may be an unknown asset
Cashier's checks are checks drawn by the bank on its own funds
and are issued by an authorized officer of the bank . The bank
employee will ask the customer to designate a remitter (person
purchasing the check) and a payee in order to fill in these lines
on the check. A certified check is aa check where the bank guaran
tees that there are sufficient funds on deposit for that particular
check . A money order is a negotiable instrument that serves as a
substitute for a check. The money order is issued for a specific
amount of payment and the customer fills in the name of the pur
chaser and payee. The bank employee imprints only the amount
of payment. A traveler's check is an internationally redeemable
draft. It is purchased in various denominations, such as $20.00,
$50.00, and $ 100.00, and is only valid with the holder's own
endorsement against his or her original signature.
Investigative analysis of the bank checks described above
follow the “ proof process ” if they were deposited into or pur
chased by withdrawal from a known account. If these documents
were purchased with currency or checks drawn on an unknown
account, locating them is significantly more difficult. In most situ
ations, retrieval requires a hand search of each bank check writ
ten, which is a very labor intensive process. In the alternative,
interviewing bank employees in an attempt to pinpoint the transac
tion date and the amount may prove more successful. If the sus
pect goes to the same bank and uses the same bank officer or
teller to complete his or her bank transactions, these people may
be able to assist in narrowing the search for the retrieval of the
bank checks at issue .
Fundamentals of Securities
People who own stock own part of the corporation issuing the
stock . A person's ownership is represented by the number of
shares that he or she owns. The shares are a claim on the corpora
tion's assets and earnings. A bond is any interest bearing or dis
counted government or corporate security that obligates the issuer
to pay the bondholder a specified sum of money, usually at spe
cific intervals, and to repay the amount of the loan at maturity.
Stocks
When a corporation is formed, capital stock may be issued .
Capital stock is stock that is authorized by the company's charter
and represents ownership of the corporation . Each stockholder is
entitled to a stock certificate showing ownership of a specified
number of shares of stock in the corporation. There are two prin
cipal classes of stock, common and preferred. Common stock are
units of ownership that allow the owner to receive dividends on
his or her holdings . A dividend is a distribution of earnings .
Preferred stock is so called because of the preferences granted to
its owners . One preference concerns dividends. If a corporation
declares dividends, the preferred stockholders will receive their
dividend before common stockholders. Preferred stock does not
ordinarily carry voting rights . If a corporation is authorized to
issue only one class of stock, it is common stock that is autho
rized. The number of shares authorized by a company's charter
can be changed by formal approval of the stockholders.
Shares issued and subsequently reacquired by the corporation
FINANCIAL INSTITUTIONS AS SOURCES OF INFORMATION 107
Bonds
When a corporation or governmental unit wishes to borrow money
for some period, usually for more than 55 years, it will sell a bond
issue. Each bond is generally of $ 1,000 denomination and the
certificate issued serves as evidence of a loan from the bond
holder to the corporation or governmental unit. A bond pays a
stated rate of interest and matures on a stated date. On that date,
a fixed sum of money will be repaid to the bondholder.
Bondholders do not have corporate ownership privileges as stock
holders do .
There are several different types of bonds . Some are
described below.
Not only are there different types of bonds, there are also the
following classifications:
Registered Bond. The name of the owner of a registered
bond appears on the bond certificate. The owner's name is also
recorded on the proper corporate records (usually maintained by
a registrar and /or transfer agent). Interest on the bond is paid by
check directly to the registered holder. While a registered bond
possesses limited negotiability, it has the advantage of protecting
the owner in the event of its loss .
The two major exchanges are the New York Stock Exchange
(NYSE) and the American Stock Exchange (AMEX), both located
in New York City. While there are approximately a dozen addi
tional regional exchanges (Midwest, Pacific Coast, Philadelphia
110 CHAPTER 5
Over-the-counter Market
The over -the -counter securities market handles most of the secu
rities transactions that take place in the United States. In fact, its
operations are so extensive that the easiest way to describe it is to
indicate what it does not do in securities transactions. The over
the-counter market does not handle the purchase or sale of secu
rities that are listed on securities exchanges , but it handles
everything else in the way of securities transactions. Thus, securi
ties not listed on a securities exchange are " unlisted,” that is,
traded over-the-counter.
Many different types of securities are traded over-the- counter.
They include the following:
• Bank stocks
Municipal bonds
Open -end investment company shares (mutual funds)
• Most corporate bonds
• Stocks of a large number of industrial and utility corpora
tions, including nearly all new issues
• Securities of many foreign corporations
The over-the -counter market is not located in any one central
place . Rather, it consists of thousands of securities houses
located in hundreds of different cities and towns all over the
United States . These securities houses are called brokers or
FINANCIAL INSTITUTIONS AS SOURCES OF INFORMATION 111
Ownership of Securities
There are two principal ways securities are held, in the name of
the account holder or in street name. In the first instance, the
securities owned simply reflect the name of the customer who
maintains the account. When securities are held in a street name,
they are registered in the name of the broker.
Fundamentals of Commodities
Where the stock market is involved with the buying and selling of
shares in corporations , the commodities market is generally
involved with buying and selling commonly accepted quantities
of marketable materials. Things sold on the commodities market
include soy beans , wheat, corn, pork bellies , rice, gold, silver,
and many more too numerous to mention . In the commodities
market, the basic instrument of exchange is called the futures
contract. A futures contract is a legally binding commitment to
make delivery (sell) or take delivery (buy) of a given quantity and
quality of a commodity at a contracted price and date. Virtually
every type of marketable item is sold on the commodities market.
Available Documentation
A broker is an agent who handles the public's orders to buy and
sell securities and commodities, usually for a commission. A bro
ker may be a corporation, partnership, or individual and is often a
member of a stock exchange or a member of a stock exchange
securities firm . A registered representative, also known as a secu
rities salesperson, account executive, or just plain broker, person
ally places customers' orders and maintains their accounts . While
commonly referred to as a broker, a registered representative is
usually an employee of a brokerage firm rather than a member.
The broker or brokerage firm can furnish virtually all source
documents relating to securities and/or commodities account
activity. The principal documents available are:
units, the amount per unit, the total amount of the transaction, the
account balance, payments received from the customer, disburse
ments to the customer (usually with the check number issued),
and the customer's position ( securities that are held by the bro
kerage firm for the customer) . A sample statement is shown
below.
Roberts and Company Incorporated Member New York Stock Exchange - American Stock Exchange
1485 I Street, NW , Washington, DC 20006
( 202) 555-4500
Entry Bought or Sold or Price or Entry Amount Amount
Date Received Delivered Description Description Debited Credited
02/12 100 Overton Airlines Sec Rec
02/12 100 Overton Airlines 95 $936.30
02/14 100 Polk Corp. 41 5 % $ 4,098.20
02/15 Funds Cash Dsb $ 5,034.50
02/15 100 Weber Corp. 36 % $3,624.60
02/15 100 Weber Corp. Sec Rec
02/15 100 Dare, Inc. Sec Rec
02/23 100 Dare , Inc. 84 34 $8,412.50
02/28 Closing Balance $ 12,037.10
Position
None
Western Union
A financial transaction conducted with a Western Union money
order creates the following three documents:
• The original application prepared by the purchaser or sender
• The original request for payment prepared by the recipient of
the funds
Casinos
Casino operations maintain extensive financial information con
cerning the movement of money. Their records represent a blend
of information , bank account statements, credit card and loan
applications , and hotel/room service documentation . Since the
casino industry is Government regulated, currency movements in
excess of $ 10,000 (purchase of chips or redemption of winnings)
must be reported to the U.S. Treasury Department via a Currency
Transaction Report by Casinos, Form 8362. A sample Form 8362
is found on the next page .
116 CHAPTER 5
62
831992)
Fo(Rev.rm May Currency Transaction Report by Casinos
OMB No. 1545-0906
File a separate Form 8362 for each transaction . Please type or print.
Department of the Treasury
Internal Revenue Service (Complete all applicable parts — see instructions)
Partl Individual orOrganization for Whom This Transaction Was Completed
Individual's last name First name Middle initial Social security number
:
Organization's name Employer identification number (EIN ) Passport number Country
Address (number, street, and apt. or suite no .) Occupation, profession, or business Alien registration number Country
City State ZIP code Country (if not U.S.) Driver's license (number and state)
Part II Identity of Individual Conducting the Transaction (Complete only if an agent conducts a transaction
for the person in Part 1)
Last name First name Middle initial Social security number
:
Address (number, street, and apt. or suite no.) Passport number Country Alien registration number Country
City State ZIP code Country (if not U.S.) Driver's license (number and state)
2 Total amount of currency transaction (in 3 Amount in item 2 in $ 100 bills or higher 4 Date of transaction (month , day, and year)
U.S. dollars)
$ .00 $ .00
5 If other than U.S. currency is involved , please furnish the following information :
Currency name Country Total amount of each foreign currency (in U.S. dollars)
$ .00
6If a check was involved in this transaction, please furnish the following information (see instructions):
Date of check Amount of check (in U.S. dollars) Payee of check
$ .00
Maker of check Drawee bank and city
Summary
This chapter describes the types of financial information available
from banks, brokerage houses, casinos, and Western Union. The
key is to know what information is available and how to interpret
it. Seemingly insignificant details, such as charges for interest on
a bank statement , have resulted in resolving major financial
crimes. Securities held in a “street name” have lead to the dis
covery of information that has put criminals behind bars. High
rollers at “ the tables ” have been defeated by financial documents
revealing their activities. Tracing financial records to and through
financial institutions is much more than a mere paper chase .
Whether it is a check, aa wire transfer, a deposit, a sale of a stock
or bond, a purchase of aа marketable security, the movement of
money and the paper trail which it leaves behind is, for the finan
cial investigator, “ where the action is” and the road map of crimi
nal activity.
118 CHAPTER 5
Pay to the
Orderof: Hankinson's Automotive 475,00
و
Four hundred and seventy - five) and 100too Dollar
National Bank of the Nation
a. Western Union
b. A casino
11. Analyze the following three bank statements and identify four
things an investigator will want to follow up on .
FINANCIAL INSTITUTIONS AS SOURCES OF INFORMATION 121
David Davids
8 Mockingbird Lane Statement Period
Herndon, Virginia 22070 05 /01/92- 05/31/92
David Davids
8 Mockingbird Lane Statement Period
Herndon, Virginia 22070 06 /01 /92- 06/30/92
David Davids
8 Mockingbird Lane Statement Period
Herndon , Virginia 22070 07/ 1 /92-07 /31 /92
a.
b.
C.
d.
FINANCIAL INSTITUTIONS AS SOURCES OF INFORMATION 123
DEPOSIT TICKET
CASH
CURRENCY
7500 00
COIN 2-999
Larry Fox LIST CHECKS SINGLY 710
12 Mountain Drive
Barrington , Illinois 60005
1992 000
Date
July 14
DEPOSITS MAY NOT BE AVAILABLE FOR IMMEDIATE WITHDRAWAL
TOTAL FROM OTHER SIDE
TOTAL
7,500 00 USE OTHER SIDE FOR
ADDITIONAL LISTING
LESS CASH RECEIVED
DEPOSIT TICKET
CASH CURRENCY 6,000 00
COIN 2-001
Larry Fox 710
LIST CHECKS SINGLY
12 Mountain Drive
Barrington, Illinois 60005
Endnotes
1 United States Code , Title 12 , Section 3403 (c ) , “ Right to
Financial Privacy Act,” (Washington, DC : U.S. Government
Printing Office, Superintendent of Documents)
2 United States Code, Title 31 , Section 103.31 through 103.37,
inclusive, as stated in Title 12, Section 1829b, (Washington,
DC : U.S. Government Printing Office, Superintendent of
Documents)
CHAPTER 6
• Journalize transactions.
Proprietorship
Generally speaking, a proprietorship (also known as the single or
sole proprietorship) is a business owned by one person who is
TRACING THE MOVEMENT OF MONEY THROUGH A BUSINESS 127
Partnership
In order to become successful, a business may require more
resources than are available to a single person. Specific knowl
edge, skills, or management capabilities may be required that one
person alone cannot supply. In these situations, and in many oth
ers, two or more people combine assets and skills and become
joint owners in a single business- a partnership. A partner can
be a person, another partnership, or a corporation and, like a pro
prietorship, there are no special legal requirements to be met in
starting a partnership.
Partnerships have been in existence for a long time. The
English common law of partnership, from which the American
system is derived, began as Roman law. The Uniform Partnership
Act (UPA) codified the majority of the common-law rules relating
to partnership actions and is acknowledged as the controlling
document for partnership activity. Section 6 of the UPA defines a
partnership as “ an association of two or more persons to carry on
1
as co-owners of a business for profit.”? Because partners are co
owners, each :
Articles of Partnership
THIS CONTRACT, made and entered into on the fifth day of December, 1989, by and between Paul E.
Blake and Richard T. Nelson, both of Billings, Montana.
WITNESSETH : That the said parties have this day formed a partnership for the purpose of
engaging in and conducting a wholesale automotive supply business in the city of Billings under the
following stipulations, which are a part of this contract:
FIRST:The said partnership is to continue for a term of ten years from January 1 , 1990.
SECOND: The business is to be conducted under the firm name of Blake & Nelson at 159 West
Gilbert Street, Billings, Montana 59101 .
THIRD: The investments are as follows: Paul E. Blake , cash , $ 60,000; Richard T. Nelson,
cash, $ 60,000. These invested assets are partnership property in which the equity of each partner is the
same.
FOURTH : Each partner is to devote his entire time and attention to the business and to engage in
no other business enterprise without the written consent of the other partner.
FIFTH : During the operation of this partnership, neither partner is to become surety or bondsman
for anyone without the written consent of the other partner.
SIXTH: Each partner is to receive an annual salary as follows: Paul E. Blake, $27,200.00;
Richard T.Nelson, $26,000.00. One twelfth of the annual salary is payable in cash on the last business
day of each month. At the end of each annual fiscal period, the net income or the net loss shown by the
income statement, after the salaries of the two partners have been allowed, is to be shared as follows:
Paul E. Blake, 60 percent; Richard T. Nelson, 40 percent.
SEVENTH: Neither partner is to withdraw assets in excess of his salary, any part of the assets
invested, or assets in anticipation of net income to be earned, without the written consent of the
other partner.
EIGHT: In case of the death or the legal disability of either partner, the other partner is to
continue the operations of the business until the close of the annual fiscal period on the following
December 31. At that time, the continuing partner is to be given an option to buy the interest of the
deceased or incapacitated partner at not more than 10 percent above the value of the deceased or
incapacitated partner's proprietary interest as shown by the balance of his capital account after the
books are closed on December 31. It is agreed that this purchase price is to be paid one half in cash
and the balance in four equal installments payable quarterly.
NINTH: At the conclusion of this contract, unless it is mutually agreed to continue the operation
of the business under a new contract, the assets of the partnership, after the liabilities are paid, are to
be divided in proportion to the net credit to each partner's capital account on that date.
IN WITNESS WHEREOF , the parties aforesaid have hereunto set their hands and affixed their
seals on the day and year above written .
" Paul E. Blake (seal
Richard T. Nelson ( Seal)
130 CHAPTER 6
Corporation
Corporations are quite different from proprietorships and partner
ships for a number of reasons. Among them are:
Legal entity. A corporation is a legal entity and may come
into existence only by the sanction of aa state.
• An entity distinct from its owners. A corporation is aa legal
entity in and of itself, separate and distinct from its owners. It's
owners are stockholders. Whereas partners and sole proprietors
are personally responsible for their debts, stockholders are not
personally responsible for aa corporation's debts.
• Continuous existence. A corporation has a continuous exis
tence independent of the existences of its members. Partnerships
and proprietorships have limited lives .
Because a corporation is a separate legal entity, it must seek
approval to operate . Permission is granted by either State or
Federal authorities after review of the requesting organization's
Articles of Incorporation .
A corporation's Articles of Incorporation (see page 131 ) con
tains several pieces of information of interest to the financial
investigator. Items of interest include the following:
• The name and purpose of the corporation and the location
of the corporation's main office
• The date of the incorporation, the name of the state where
incorporated , and the names and addresses of the incorpo
rators
Articles of Incorporation
of
SNOWMOBILE CORPORATION
FIRST: The name of the corporation is Snowmobile Corporation .
SECOND: The principal office of said corporation is located at 21014 Beckett Avenue, in the City of
Wilmington, County of New Castle, Delaware 19805 .
THIRD: The nature of the business, or objects or purposes to be transacted, promoted, or carried on,
is to engage in the business of selling snowmobiles and all business incidental to such sale.
FOURTH : The total number of shares of stock that the corporation shall have authority to issue is
Two Thousand ( 2,000) and the par value of each of such share is One Hundred Dollars ($ 100.00),
amounting in the aggregate to Two Hundred Thousand Dollars ($ 200,000 ).
FIFTH : The amount of capital with which the corporation will begin business is One Hundred
Thousand Dollars ($ 100,000 ).
SIXTH: The names and places of residence of the incorporators are as follows:
Melvin C. Dahl 1336 Vine Place, Dover, Delaware 19901
David E. Gates 2547 Trimble Avenue, Wilmington, Delaware 19808
Gordon W. Rotz 139 Beechcrest Road, Newport, Delaware 19804
SEVENTH: The corporation is to have perpetual existence.
WE, THE UNDERSIGNED, being each of the incorporators hereinbefore named for the purpose of
forming a corporation to do business both within and without the State of Delaware, under Chapter 65 of
the Revised Code of Delaware, and the acts amendatory thereof and supplemental thereto, do make this
certificate, hereby declaring and certifying that the facts herein stated are true and accordingly have
hereunto set our hands and seals this fifth day of June , 1990 .
In the presence of: Mehm Dah ( Seal)
charter, may or may not have the right to vote for the directors. If
any profits are distributed, they are paid out according to the size
of the policy or the size of the deposit.
• Shell Corporation. A shell corporation is one that has no
assets or liabilities. It simply has a charter to do business. The
attraction of aa shell corporation is confidentiality. An application
to do business may take weeks to approve and the names of per
sons on the charter are subject to review ; however, the names of
subsequent stockholders and directors are not identified on pub
lic records.
What is Accounting?
ac' count-ing \ e' kaunt-ij \n. 1. The system of recording and sum
marizing business and financial transactions in books and analyz
ing, verifying, and reporting the results.?
TRACING THE MOVEMENT OF MONEY THROUGH A BUSINESS 135
Accounting Systems
Businesses produce goods and provide services to be bought and
sold . It makes sense that the exchange of goods and services can
be observed and measured. Accounting is the language of busi
ness because it objectively measures and records the business
exchanges that occur throughout society.
For accounting purposes, a transaction is the exchange of
goods and services and begins with recording, in dollars and
cents, what is received and what is paid out. All businesses use
some system of accounting, from the sole proprietor who runs his
or her business out of a checkbook to General Motors which
employs hundreds of accountants to keep its books . Everyone
who is faced with earning a living needs to keep track of what
they earn. That is what accounting is about.
The ultimate objective of accounting is to show, in a summary
form , the results of a business's transactions. In order to achieve
this goal , two systems of accounting have been developed.
Single-Entry Bookkeeping
The single -entry bookkeeping system has been used for most of
accounting's 3,000 -year history. It is the simplest form of noting
and recording a financial transaction. In this system, financial
transactions from all source documents are chronologically
recorded in one place, usually in columnar form . A checking
account register, an example of which is shown on the next page,
is a type of single-entry bookkeeping system.
TRACING THEMOVEMENT OF MONEY THROUGH ABUSINESS 137
Double-Entry Bookkeeping
For most businesses, recording single transactions in chronologi
cal order in a checkbook register is not a sufficient way to track
their business affairs. Let's say you are a business owner and you
want to know how much you paid your employees in 1991. Your
1
5/12 Deposit -RM ,,Inc. 250- 1043 12
83 29
814 5/13 Walker Ridge 83 29 95983
72 91
815 5/13 Kilroy's Deli 7291 886 92
84 26
5/13 Deposit - Sam Jones 84 26 971 18
293 80
816 5113 Sally Torrence 293 80 677 38
Remember to record automatic payments /deposits on date authorized
amount of furniture your business has, but, at the same time, the
amount of cash available has decreased. The double-entry book
keeping system allows this financial transaction to be recorded in
the two accounts it affects, thereby showing the full effect of the
financial transaction on the business .
....
Methods of Accounting
Within the double -entry bookkeeping system there are two recog
nized methods or ways of recording transactions , cash and
accrual.
Cash Basis
With this method, business receipts (revenue) are recorded when
cash is received and business expenditures (expenses) are
recorded when cash is paid out.
The pivotal words are “received” and “ paid out” . In other
words, only when the business has physically received the cash
(i.e. currency, check), as opposed to a promise to pay, or has actu
ally paid the expense— does the business record the transaction.
For example, aa business orders $ 500 worth of computer paper for
delivery in December, however, it does not pay for the paper until
January. When using a cash basis method of recording transac
tions, the $500 would be recorded as an expense when paid in
TRACING THE MOVEMENT OF MONEY THROUGH A BUSINESS 139
Accrual Basis
With this method, business revenues are recorded when earned
(regardless of when collected) and expenses are recorded when
incurred (regardless of when cash was disbursed ). Let's look at that
same $ 500 purchase of computer paper described above. The $ 500
would be recorded as an expense when incurred (or committed for)
in December if the accrual basis of accounting is used. Most busi
nesses maintain their accounting records on an accrual basis.
Hybrid Method
A method of accounting that combines the features of both the
cash and accrual methods is called the hybrid method . It is per
missible to use the hybrid method when it is consistently applied
and clearly reflects income . This method is most commonly used
in small businesses where the “ timing ” between the incurring of
expenses and the paying of expenses is usually of short duration
and when “ income” is reported on the cash basis. If there is no
material distortion of the matching of business income and
expenses , a hybrid method may be used.
=
The equation “ Items of Value = Claims” can now be con
verted to the fundamental accounting equation shown below :
Assets = Liabilities + Owner's Equity
A =L + OE
Balance Sheet
The Balance Sheet, often called the Statement of Financial
Condition or Statement of Financial Position, depicts the assets,
liabilities, and owner's equity of a business organization at a spe
cific point in time. It is called a balance sheet because, upon its
142 CHAPTER 6
123 Company
Balance Sheet
December 31 , 1991
Current Assets Current Liabilities
Report Form
123 Company
Balance Sheet
December 31 , 1991
Assets
Current Assets
Cash $ 130,000
Accounts receivable 486,000
Inventory 602,000
Pre -paid expenses 90,000
Total current assets $ 1,308,000
Fixed Assets
Machinery $ 364,000
Equipment 116,000
Furniture 300,000
Total fixed assets $ 780,000
Total assets $ 2,088,00
Liabilities
Current Liabilities
Fixed Assets
This class of assets , sometimes called Property, Plant, and
Equipment, includes assets that are not intended for sale but are
to be used by the business over several years. Examples of fixed
assets include:
Current Liabilities
This class of liabilities includes all debts of the business that will
come due within one year of the balance sheet date. Examples of
current liabilities include:
Owner's Equity
Owner's equity shows how much of a business has been “ fur
nished ” by its owner(s) . There are two basic accounts for owner's
equity. These accounts are:
• Paid-in Capital— When the owners invest their assets (i.e.
cash, property, etc.) into the business, they are contributing
capital which increases the worth of the business.
• Retained Earnings— The accumulated profits and losses of
a corporation .
Income Statement
The second accounting report that is important to a financial
investigator or anyone else interested in the financial condition of
a business organization is the Income Statement . The income
statement, also called the Profit and Loss Statement, reports rev
enue and expenses incurred by a business for a designated period
of time .
Single-Step Format
In its simplest format, the single-step income statement presents
the following three items:
• Revenue for the period
• Applicable expenses
• Net income or loss (revenue minus expenses)
The following shows a single -step income statement.
ABC Company
Income Statement
For the year ended December 31 , 1991
Revenue:
Sales $ 4,212,000
Expenses
Cost of goods sold $ 2,808,000
Selling expenses 936,000
Administrative expenses 116,000
Interest expense 52,000
Income tax expense 120,000
Total expenses $4,032,000
Net Income $ 180,000
ABC Company
Income Statement
For the year ended December 31 , 1991
Sales revenue $ 4,212,000
Less: cost of goods sold 2,808,000
Gross profit $ 1,404,000
Less : selling expenses 936,000
Administrative expenses 116,000
Total operating expenses 1,052,000
Operating earnings $ 352,000
Less : interest expense 52,000
Earnings before tax $ 300,000
Less: Income Tax expense 120,000
Net Income $ 180,000
TRACING THE MOVEMENT OF MONEY THROUGH A BUSINESS 149
Chart of Accounts
The number of accounts needed by aa business will depend on its
size, nature of operations, and the extent to which management
wants detailed classification of information. To assist in tracking
its accounts, a business will create a chart of accounts. A chart of
accounts is aa listing, in sequentially numbered order, of aa busi
ness's established accounts . The chart of accounts for Ogle
Insurance Company is found on the next page.
Net Worth
251 Capital, Robert Ogle
252 Drawing, Robert Ogle
253 Profit and Loss
TRACING THEMOVEMENT OF MONEYTHROUGHA BUSINESS 151
Journals
Financial information is taken from source documents and
entered into the accounting system through a business's journals.
Journals are called the Books of Original Entry and they main
tain, in chronological order,the details of each financial transac
tion entered into by a business . In the double-entry system of
bookkeeping, each transaction affects two or more accounts and,
accordingly, two or more journal entries must be made to record
the transaction , never just one.
The example below shows how a single transaction is
recorded in a journal within aa double -entry bookkeeping system.
Three entries are needed to record the following transaction:
Company X sold $2,000 worth of merchandise to MLB
Limited. The invoice shows that MLB Limited paid $500 cash
and put the remaining $ 1,500 on account.
General Journal page J- 16
Date Ledger
1992 Accounts and Explanations Folio * Debit Credit
8/13 Cash 101 500
Accounts Receivable 102 1,500
Sales 301 2,000
Sold merchandise to MLB Limited .
*
Account number - refer to chart of accounts
Types of Journals
Special types of journals are devoted to particular kinds of busi
ness transactions . Examples of these different types of journals
are the following:
• Cash Receipts Journal. Records the dates, sources, and
amounts of money received into aa business.
• Cash Disbursements Journal. Records the dates, amounts,
and recipients of payments made by aa business.
• Sales Journal (Accounts Receivable Journal). Lists sales
invoices in date or numerical order for sales made on
credit.
$3,250 $3,250
156 CHAPTER 6
The Ledger
Journalizing entries, recording each business transaction from a
source document into the journals , continues throughout the
accounting period . Because of this, financial information con
tained within the journals grows during the accounting period,
particularly in businesses that engage in a high volume of trans
actions . It would be difficult for aa business owner, accountant , or
financial investigator to analyze a journal full of financial transac
tions entered in chronological order, particularly when he or she
is searching for specific account information (i.e., “ all the rent
expense payments ” or “ all sales to a particular customer ” ). An
accounting device called a ledger is used to summarize journal
entries by specific accounts . The summary of account information
contained in ledgers is used to prepare a business's balance sheet
and income statement .
A ledger is established to accumulate all the transactions
affecting a specific account during the accounting period. For
example, all transactions affecting the “ cash account,” a busi
ness’s receipt of cash (debit) and pay outs of cash (credit)
recorded in the journals , would be summarized in the ledger
account entitled “ cash ”. At the end of the accounting period, the
balance of the ledger account (the mathematical difference
TRACING THE MOVEMENT OF MONEY THROUGH A BUSINESS 157
between the total debit entries and total credit entries) is used as
the basis for balance sheet and income statement reports.
A popular format for аa ledger is the “ T - account. ” A ledger
account in the T -format looks like the following:
Cash (101 )
1/4/92 900.00 1/3/92 394.00
+
(Dr.) (Cr.) (Dr.)
C(
)r
. (Dr.) (Cr.)
Expenses Revenue
+
+ -
Cash ( 101 )
9/1 60,000 9/3 21,000
9/5 15,000
Land (130)
9/3 21,000
Building ( 140)
9/5 36,000
Trial Balance
If the computation of account balances has been accurate, it fol
lows that the total of the accounts with debit balances must be
equal to the total of the accounts with credit balances. This proof
is called a trial balance. A trial balance is aa two-column listing of
the names and balances of all accounts in the order in which they
appear in the ledger. The debit balances are listed in the left col
umn, the credit balances in the right. The trial balance is pre
pared prior to the creation of the balance sheet and income state
ment .
Keep in mind that the trial balance proves only one aspect of
the ledgers, the equality of debits and credits. It does not prove
that ledger entries are correct or accurate.
(a) 1-1-92 10,000 1-6-92 5,000 (b) (f) 1-20-92 13,000 1-30-92 10,000 (j)
(e )1-15 15,000 1-7 2,000(c) (h)1-24 14,000
Accounts Receivable
Subsidiary Ledger
Office Furniture ( 118)
Thomas Albert
P.O. Box 123
(c) 1-7-92 2,000
N.Y. , N.Y. 001
Sales (301 )
Notes Payable
Subsidiary Ledger
Dell Clark
P.O. Box 123
1-15-92 15,000 (e) N.Y. , N.Y. 002
1-20-92 13,000(f) (k) 1-31-92 2,500 1-20-92 15,000 (g)
1-24-92 14,000 (h) 1-31 Bal . 12,500
1-31 Bal. 42,000
• The mailing address for Albert, Drew, Brown and Clark has
been identified— P.O. Box 123, New York, New York .
March
1 Tye Co. $ 6,000.00
York Co. 500.00
Mill Co. 3,500.00
York Co. 450.00
9 Smith Co. 3,250.00
10 York Co. 750.00
14 Tye Co. 5,000.00
16 Mill Co. 3,500.00
17 York Co. 10,000.00
19 York Co. 950.00
20 Miller Co. 750.00
21 See Co. 7,000.00
TRACING THE MOVEMENT OFMONEY THROUGH A BUSINESS 169
The investigator scrutinized the check and then went one step
further and compared that check to other payments made to York
Company. Something was out ofthe ordinary.
Inspection of York Company's Cash Receipts Journal shows
NO entry for the Woodruff Contracting Company payment
during the month ofMarch.
York Company
Cash Receipts Journal
Date Customer Amount
March
10 Russell Co. $ 800.00
10 Moore Manufacturing $ 500.00
12 Falls Inn $ 400.00
13 Grand Co. $910.00
14 Franklin Co. $450.00
17 Sussex Contracting $780.00
19 Campbell Co. $950.00
20 Branch, Inc. $ 700.00
22 Calhoun, Inc. $ 1,000.00
23 Adams Co. $600.00
25 Roberts Contracting $ 500.00
General Ledger
Cash 101 Misc. Expenses 800
Date Folio Debit Credit Balance Date Folio Debit Credit Balance
$82,500 $ 1,000
3/2 $ 400 82,100 3/2 $ 200 1,200
3/3 1,000 81,000 3/4 75 1,275
3/4 4,000 77,100 3/7 500 1,775
3/9 300 76,800 3/9 200 1,975
3/11 825 75,975 3/10 400 2,375
3/15 1,250 74,725 3/12 925 3,300
3/17 10,000 64,725 3/17 10,000 13,300
3/22 650 64,075 3/26 350 13,650
3/23 1.250 62,825 3/27 1,300 14,950
3/26 750 62,075 3/29 450 15,400
Pay to the
Order of: CASH 10,000.00
00
Ten thousand dollars and 100
Dollars
Pinkerton Bank
Misc . Exp .
1: 0 5610999.11; 08493112 11'
Bregory A.York
1308 , OOoooodo ,
TRACING THE MOVEMENT OF MONEY THROUGH A BUSINESS 171
COMPANY
YORK
1-CC-59199
Lois E. Smith
1: 0 560099911: 08493112 111 , 000 1000000 ,
172 CHAPTER 6
Indicators of Fraud
Fraud investigations usually are initiated when several small
events, taken together, point to a possible pattern of deception.
Within a business's accounting system, there are often physical
indicators that point to a pattern of deception. The following indi
cators may signify that financial fraud is taking place:
Maintaining two sets of books and records
• Concealment of assets
Summary
For the financial investigator, analysis of a business's journals and
ledgers and an understanding of accounting procedures can assist
in :
4. The balance sheet you are reviewing has coffee stains on it.
You can barely make out that the total amount of assets is
$675,325 and the owner's equity is $276,580. What is the total
amount of liabilities reported ?.
6. What does the phrase " the balance sheet represents a snap
shot of аa business's condition ” mean?
176 CHAPTER 6
10. Journalize the entries (as they would appear in the general
journal) for the transactions listed in question 9.
11. Make the appropriate ledger account entries (in T -account for
mat) that would result from the journal transaction in question 9.
Endnotes
1 Uniform Partnership Act, Section 6
2 Webster's New Collegiate Dictionary, (Websters New World,
1977).
Point-of-Payment Schemes
The specific item method often becomes difficult to use as an inves
tigative technique when tracing the flow of funds from the point of
receipt. For example, in instances where payments are received in
cash or the movement of money is not reflected in a business's
books and records, tracing from the point of receipt is difficult.
Luckily, the financial investigator has other options to use in these
instances— methods of indirect proof. Those methods are dis
cussed in Chapter 8. For now , we will concentrate on applying the
method of direct proof, the specific item method, to resolving crimi
nal financial activity from the point-of-payment approach.
Financial fraud, whether in the form of kickbacks, embezzle
ment, insider trading, or money laundering, is often discernible
TRACING FUNDS USING THE DIRECT METHOD OF PROOF 183
• Purchase Orders
• Invoices
Overbilling Schemes
Illicit funds may be added to legitimate payments for goods or
services provided by actual suppliers , with the additional
amounts being passed on by the supplier, or returned, usually via
currency to the payor for distribution . The records required for
tracing phony payables from both the original payor and any
intermediaries (shell companies and/or straw /nominee individu
als) are available to the investigator. Important indicators of over
payment schemes are :
• Notations on invoices or other billing documents that break
out “ extra” or special charges, particularly those which require no
delivery of goods
• Discrepancies between the purchase order or invoice
amount and the amount of payment
186 CHAPTER 7
Summary
In this chapter, you were introduced to the technique most com
monly used by the financial investigator, the specific item method
of tracing funds. The proof obtained by the application of this
method is direct proof, proof precise to the point at issue . When
investigative findings reveal specific financial transactions being
paid by or received by the suspect, direct proof of aa financial
crime is achieved. Such findings reveal a specific link between
the suspect and the transactions at issue.
The specific item method can be used to trace the movement
of money from either its point of payment or its point of receipt.In
instances when specific financial events can be identified with
particular financial crimes (i.e., insider trading, kickback pay
ments, embezzlement, etc.) the specific item method can be suc
cessfully employed as an analysis technique. This method also
can be applied when financial transactions leave an audit trail,
either in a business's accounting records or a financial institu
tion's recordkeeping system .
TRACING FUNDS USING THE DIRECT METHOD OF PROOF 191
..............
Endnotes
1 Jack T. Wells, W. Steve Albrecht, Jack Bologna, and Gilbert
Geis , Fraud Examiner's Manual, (National Association of
Certified Fraud Examiners, 1989), Section 111 , pp. 38 - 44.
2 Fraud Examiner's Manual,Section 111 , pp. 17 and 18
3 Fraud Examiner's Manual, Section 111 , pp. 13 - 19
CHAPTER 8
(a) Mr. Dealer stated that as of 12/31/90 he had $ 1,000 cash -on
hand . He had no cash-on-hand at the end of 1991 and 1992 .
(Cash-on-hand is currency in possession of the suspect.)
(b) On 12/31/90, Dealer's bank account reflected a balance of
$ 1,500. On 12/31/91, it contained $4,750 and on 12/31/92, it
contained $5,225. The account earned $250 in interest in 1991 ,
$475 in 1992. Total deposits in 1991 were $22,160, with rede
posits of $660. Total deposits in 1992 were $ 19,585, with rede
posits of $ 100.
Liabilities
they really do. “ I was able to buy that boat because I had $20,000
stuffed away in a cookie jar.” This alleging a “ cash hoard” is a
common defense in a net worth case .
Cash-on-hand is almost always shown by circumstantial evi
dence. The best source for determining this figure is during the
interview process with the suspect. Questions such as: “ Did you
ever have more than $ 100 in cash -on -hand ?” or, “ more than
$ 500?” or, “more than $ 1,000 ?” may result in admissions that
can be used to establish cash-on- hand at a particular time. The
location and denomination of cash -on -hand may also be useful
information to support or refute a suspect's claims. Even without
an interview or answers to the questions , an investigator can
determine a suspect's cash- on- hand . It can be determined
through analysis of previously filed financial statements, loan and
credit card applications, and other records relating to the sus
pect's financial activity.
• Cash in Banks. Most likely, the suspect will have funds
deposited in financial institutions. Since many account state
ments have cut-off dates other than the end of the net worth
analysis period, they must be reconciled to determine the bal
ances as of the end of the period. Unusual transactions (large
deposits and /or withdrawals) that occur near the end of the analy
sis period must be traced to their ultimate source or disposition.
Unusual financial transactions can affect the net worth analysis.
For example, a large withdrawal of funds that was not used to pur
chase an asset, reduce aa liability, make a personal expenditure, or
pay a business expense, must be treated as an increase in cash on
hand . Similarly, large deposits made early in the analysis year
must be scrutinized and then allocated to the appropriate net
worth year. A consistent treatment of transactions is vital to the
validity of the net worth analysis .
• Asset Valuation . All assets should be valued at cost as
opposed to fair market value . Subsequent appreciation or depre
ciation of assets is ignored for purposes of net worth analysis.
• Known Expenses. The amount of a suspect's expenditures,
his or her actual “ cost of living,” can be difficult to document.
The amount a person spends on items such as food, entertain
TRACING FUNDS USING INDIRECT METHODS OF PROOF 203
A Court-Approved Method
Because net worth analysis provides circumstantial evidence, its
validity as a method of proving criminal activity had to be
approved by the courts . The landmark case , decided by the
Supreme Court in 1954, that established net worth analysis as
prima facia evidence of a crime was Holland v. United States,348
U.S. 121 , 75 S.St. 127. An overall description of a net worth
method is also set forth in United States v. Sorrentino , 726 F.2d
876, 879, 880 (1st Cir. 1984) and is stated in part as follows (note
that these cases relate to Federal income tax evasion, thus the ref
erences to terms relating to taxability):
“The government makes out a prima facia case under the
net worth method of proof if it establishes the defendant's
opening net worth ( computed as assets at cost basis less lia
bilities) with reasonable certainty and then shows increases
in his net worth for each year in question which, added to
his non-deductible expenditures and excluding his known
non -taxable receipts for the year, exceeded his reported tax
able income by a substantial amount. The jury may infer
that the defendant's excess increases represent unreported
taxable income if the government either shows a likely
source or negates all possible non -taxable sources; the jury
may further infer wilfulness from the fact of underreporting
coupled with the evidence of conduct by the defendant tend
ing to mislead or conceal.”
Expenditures Method
With the expenditures method, a comparison is made between the
suspect's known expenditures and known sources of funds during
a given period of time . Any excess expenditures must be the
result of income from unknown sources. The expenditures method
also can be used to compute “cash-on -hand” for the base year of
a net worth computation .
In theory, the expenditures method is closely related to net
worth analysis . They are merely accounting variations of the same
principle . Both of these indirect methods of proof look at a sus
pect's source of funds, expenditures, assets , and liabilities .
However, each method examines the items in a different way.
Let's take another look at our suspect, Jim Dealer. Through the
completion of financial profiles for the years 1990, 1991 , and
9
Expenditures Computation
Year One Year Two
Application of funds
Increase in cash -on-hand $ 0 $ 1,000
Increase in cash in banks 5,000 2,500
Increase in inventory 5,000 12,500
Increase in loans and accounts receivable 1,000 3,000
Increase in furniture and fixtures 0 1,500
Increase in real estate 0 25,000
Decrease in accounts payable 500 0
Expenditure Analysis
Suspect , Jim Dealer
Year One Year Two
( 1991 ) (1992)
Expenditures
Increase in bank balance (b) $ 3,250 $ 475
Purchase of jewelry (c) 5,000 6,000
Downpayment on house (f) 50,000 0
Purchase of car (e) 0 18,250
Yearly mortgage payments (i) 6,000 6,000
Credit card payments (j) 1,460 3,000
Loan repayments (h) 600 1,200
Other personal living expenses (k) 11,000 10,000
Total expenditures $77,310 $ 44,925
In the Jim Dealer example, both the net worth and expendi
tures methods of tracing the flow of funds resulted in identical
bottom line figures. In each case, $ 47,860 in funds from unknown
sources was discovered in 1991 and $22,250 was discovered in
1992.
As with the net worth method, there is no statutory provision
expressly authorizing the investigative use of the expenditures
analysis for criminal purposes. Accordingly, court cases have
established “ case law ” that sets forth the requirements of proof to
establish a prima facia expenditures case .3 The elements of proof
requirement for the expenditures method is identical to that of the
net worth method of proof:
TRACING FUNDS USING INDIRECT METHODSOF PROOF 209
... .....
Bank Deposit Method
Through bank deposit analysis, unknown sources of funds are
located through analysis of bank records and other financial
transactions entered into by the suspect. The bank deposit
method is applied in situations where assets and liabilities are
constant from year to year and indications of extravagant expendi
tures are nonexistent, but investigative findings reveal that the
suspect's known sources of income are being deposited into finan
cial institutions.
The suspects total outlay of funds for the period under analy
sis includes all payments in currency or by check . For analysis
purposes, there is no need to determine which part was paid by
currency and which part was paid by check. Total outlays could
include purchases of capital assets or investments, loan repay
ments, known expenses, etc.
One of the elements in the formula shown above is “ Net Bank
Disbursements .” To determine this element, a separate calcula
tion is needed . This calculation is made as follows:
TRACING FUNDS USING INDIRECT METHODS OF PROOF 211
Reference
Number Type of Transaction Amount
བྱེ
Total from known sources $365,000
Outlays
Jewelry purchase (c) $ 5,000 $ 6,000
Downpayment on house (f) 50,000 0
Loans (h ) 3,000 0
Expenditures Method
The expenditures method is used as a primary method of estab
lishing funds from unknown sources when a specific item case
cannot be made . One of the following conditions must exist:
• The suspect maintains no books and records
• The suspect's books and records are not available
• The suspect's books and records are inadequate
• The suspect withholds his or her books and records
In cases where the suspect has several assets and liabilities
216 CHAPTER 8
• Withheld
• Incomplete
The use of the bank deposit method is not limited to the
above circumstances. If the suspect's books and records appear to
be complete and accurate, the methods can be used and there is
no requirement to disprove the accuracy of the books and records
in order to do so.
Summary
Since the key to proving a financial crime often rests on a showing
of the suspect's disposition or receipt of illegal funds, the ability
to follow the flow of funds and the movement of money is of
utmost importance to a financial investigator.
The specific item method, the method of direct proof dis
cussed in Chapter 7, relies on a microscopic view of the move
ment of money through a suspect's books and records or into and
out of the suspect's bank accounts. In contrast, indirect methods
require a macroscopic view of the financial situation. To prepare
such an overview of the suspect's financial condition requires that
the investigator complete a “financial profile” or detailed finan
cial statement of what the suspect owns, owes, earns, and spends
during the particular time period under examination. The finan
cial profile identifies the assets, liabilities, expenses, and expen
ditures of the suspect. Additionally, it details the identified
sources and applications of the funds used to make the purchases
and payments. Through the use of the financial profile, financial
events can be identified which trace the movement of money by
indirect means .
Net worth analysis is one indirect method of proof. This
analysis is based on the theory that increases or decreases in a
person's or business's net worth, during a specific period, results
in the identification of unknown/illegally received funds. The net
worth formula is shown below.
-
ing inventory was $ 38,000.
d. Suspect sold stock costing $ 5,000 for $ 8,000.
e. Suspect paid $ 13,250 for aa new car.
f. Suspect embezzled $ 40,000 from his employer.
g. Suspect took out a $50,000 loan to purchase aa boat.
h . Suspect donated $ 10,000 to the University of Higher
Education .
Scenario
Richard Ross operates a flower shop downtown. It is alleged that
this business is a “front” for his bookmaking and loan sharking
activities.
Facts
a . You find a financial statement signed by Ross and dated
December 31 , 1991. The statement indicates that Ross had
$ 1,000 cash on hand.
b . Ross has a checking account which he opened on June 1 ,
1991. His balance as of December 31 , 1991 was $4,000. During
1992, Ross made total cash deposits of $30,000 and withdrawals
of $25,000. His balance as of December 31 , 1992 was $9,000.
During 1993, Ross made total cash deposits of $ 25,000 and with
drawals of $ 32,000. His balance as of December 31, 1993 was
$2,000.
c.
. A search of your county real estate records shows that Ross
purchased his present home in 1991 for $ 130,000 and that he
obtained aa $ 30,000 mortgage . Real estate taxes on the property
222 CHAPTER 8
amounted to $ 1,500 for each of the years 1992 and 1993. Contact
with the lending institution shows that Ross made monthly pay
ments of $ 1,000 to the lending institution during the subject
years . The mortgage balances are as follows :
• December 31 , 1991 $ 98,000
• December 31 , 1992 $ 96,500
• December 31 , 1993 $94,500
Interest payments are as follows:
• 1992 $ 10,500
• 1993 $ 10,000
k. Records of the local travel agency disclosed that Ross took his
girlfriend on a vacation to the Orient in 1993. It cost $ 12,000 .
1. You interviewed Ross and he showed you the books and
records for his flower shop which indicated that he had a net
profit of $40,000 in 1992 and $45,000 in 1993 .
Endnotes
1 Jack T. Wells, W. Steve Albrecht, Jack Bologna, and Gilbert
Geis, Fraud Examiner's Manual, (National Association of
Certified Fraud Examiners, 1989), Section 1ll , .
p. 46.
ON
NO
What is an Interview?
An Interview Phone interviews. Employment interviews. Counseling interviews.
• Face-to-face Investigatory interviews. As you can see, there are many types of
• Task related purpose interviews. And though they all serve different purposes, they are
founded on the same definition : an interview is a specialized
form of oral, face-to -face communication between people that is
entered into for a specific task -related purpose associated with a
particular subject matter.
For the financial investigator, two aspects of this definition
should be noted. The first one is that an interview is aa face -to - face
communication . Not only will investigators listen to what wit
PLANNING . CONDUCTING , AND RECORDING AN INTERVIEW 229
nesses say, they will be able to see what the witnesses do. The
visual and non -verbal aspects of an interview are very important
and should not be overlooked. Secondly, the interview has a spe
cific task-related purpose . This task-related purpose is what
makes an interview different from mere conversation . A conversa
tion can take off in many directions; an interview must be focused
on relevant content.
Planning an Interview
Prior to planning any interview, the investigator is usually faced
with one or more of the following conditions:
• A crime has been alleged or committed, but the facts relat
ing to the situation have not yet been established
• A complainant or victim has been identified. This could be
an individual, business, or governmental entity
• Records or documents reflecting financial transactions
relating to the suspected criminal activity have surfaced
• Rumors, innuendo, or factual information pointing to a spe
cific suspect have emerged
The investigator uses the interview to develop information
about these existing conditions. The information collected will be
used to support or dispel the allegations.
232 CHAPTER 9
Selecting Witnesses
When an investigation begins, investigators must determine who
they want to interview and in what order. Traditional criminal
cases are generally investigated by first contacting the outer cir
cle of honest, disinterested witnesses and then working inward to
the co-conspirators and ultimately to the target. Law enforcement
normally starts the interview process with the complaining wit
ness and after exhausting his or her knowledge of the facts and
reasons for suspicion, proceeds in a similar manner around the
outer circle of witnesses.
In a financial investigation this traditional sequence is often
altered. Following the movement of money dictates talking to wit
nesses that have knowledge of financial transactions .
Accordingly, the hierarchy of interviews is determined by the
degree of knowledge or participation in financial activities cre
ated by the alleged criminal event or crime at issue. For example,
in a political corruption investigation, documents showing the
movement of money from the payer of the bribe to the taker of the
bribe would be of paramount importance to the investigator.
People with documents (bankers, money couriers, business asso
ciates) would be priority contacts. In an embezzlement or tax eva
sion investigation, the key interviews would be with custodians of
accounting records and internal audit files, and tax return prepar
ers. Even in a drug case, financial transactions decide the order
of contacts for the investigator. The priority witnesses will have
records reflecting the suspect's use of proceeds from the drug
trade. While each investigation offers aa different set of interview
options and priorities, the bottom line in a financial investigation
is that every person who has documents pertaining to financial
transactions, or knowledge about them, should be interviewed.
Types of Witnesses
One of the things an investigator must consider prior to contacting
an individual for an interview is what type of witness will that
person be. Will he or she be cooperative, hostile, or have no feel
ings one way or the other? Prospective witnesses can be catego
rized into three general types :
PLANNING , CONDUCTING , AND RECORDING AN INTERVIEW 233
Types of Witnesses
Neutral
Background: DOB
SSN
Address
Married
Military
Prior Arrest, Convictions
Allen Cleveland
Massey TB Trust
Massey Cemetery
Rosemary Westbury
Tony Idaho
Toni Boise
Marc Fresno
Conducting an Interview
Once an investigator is finished with the planning phase, he or
she is ready to conduct the interview. The interview itself is com
posed of three distinct parts:
PLANNING , CONDUCTING , AND RECORDING AN INTERVIEW 237
• Introduction
• Body
• Close
Introduction
The introduction is critical as it sets the tone for the whole inter
view. It serves the following two purposes:
• Allows the investigator to identify himself or herself to the
witness
Wrong
“Mr. Smith, my name is John Jones and this is Mary Adams. We're with the
government. We're investigating Jim Dealer and we need to talk to you .”
Right
“Mr. Smith, my name is John Jones. I am a Special Agent with the Internal
Revenue Service's Criminal Investigation Division. This is Special Agent
Mary Adams from the Drug Enforcement Administration . We are currently
conducting an investigation involving alleged violations of money laundering
laws by Jim Dealer. May we speak to you for a few moments ? ”
Investigator: “We would like to ask some questions about your financial
dealings with Jim Dealer and his associates.”
238 CHAPTER 9
Investigator: “You should have thought of that sooner- it's too late now.
We can talk here or we can talk downtown. It's your choice.”
Right
Witness : “ Why should I talk to you? I don't want to get involved .”
Investigator: “You certainly are not required to talk to me. I am just seeking
some information on a serious matter which may or may not
result in legal action. By speaking informally with me now, it
may save you the trouble of having to testify later, depending
on the information you have. Is that o.k.?”
or
Witness : “ I don't want to answer any questions at this time without first
talking to my lawyer."
Investigator: “ You certainly don't have to talk to me, with or without your
lawyer. Let's do it this way. Let me ask you a few questions and
if you don't want to answer them, just say so. I'm not trying to
get you into trouble, I'm just trying to do my job and get some
answers . Is that o.k.?”
The Body
The body of the interview is the fact finding part of the interview
process. Questions are asked and answers are provided . The
structure of the interview is determined by the method of ques
tioning ( chronological, by document , or by transaction or event)
which should have been pre-determined and outlined by the
investigator.
In this stage of the interview , witnesses should be allowed to
tell their story in their own words. Recognizing that a witness's
story will usually be disjointed and rambling, the investigator
must be prepared to put order to the material— find the details,
240 CHAPTER 9
focus for clarity, and ensure the accuracy. For the investigator,
conducting an interview is much more than just asking questions
and writing down answers . This process requires concentration
and active participation by the investigator if his or her objectives
are going to be achieved .
The time-honored questioning devices of who, what, where,
when, why, and how allow investigators to push witnesses for
details. Investigators should continue the questions until they are
convinced that a witness's knowledge of a topic is exhausted.
Details, details, details ! Whether recollections or records, it is the
detail provided by the witness that lays the foundation for a suc
cessful financial investigation. The following exchange between
an investigator and aa witness illustrates how to pursue the detail
in aa line of questioning .
PLANNING , CONDUCTING , AND RECORDING AN INTERVIEW 241
Witness “ At a meeting.”
Witness : “ I don't know. Mr. X didn't count the money. He just estimated
the size of each pile.”
Investigator: “Would you say that Mr. X received about $ 100,000 also?”
the facts (what was said) from the opinions (what was talked
about). The goal is a verbatim recollection from the witness. For
example:
Wrong
“ What did you and Jim Dealer talk about? ”
Right
“What did Jim Dealer say to you?
What did you say to him ?"
Investigator: “ How long did your meeting with Mr. Grey last?”
An all day meeting with not much said should raise aa red flag
in the investigator's mind. This line of questioning needs to be
pursued.
During an interview , investigators have aa multitude of tasks to
handle simultaneously. From listening to a response and record
ing it, to formulating the next question, they have a lot to do.
There are some general “ do's and don'ts” that investigators
should consider when performing an interview . They are found on
the next page .
PLANNING , CONDUCTING , AND RECORDING AN INTERVIEW 243
• Do control the interview. Don't let, for example, an attorney who is present
disrupt the interview . Before beginning the interview , advise each partici
pant of their role in the process. This should help eliminate any control
problems.
“Mr. Smith, I know when we talked before you denied knowing Mr.
Dealer. You probably forgot about meeting him. Can we start over ? ”
• Don't make threats and avoid threatening remarks. Threats rarely work, so
overbearing tactics should be avoided. The “ good cop/bad cop ” interview
technique looks good on television but is usually inappropriate in finan
cial investigations .
Recording an Interview
Investigators conduct interviews to obtain information and docu
ments in an attempt to resolve financial crimes. It is also neces
sary to prepare a permanent record of each interview for future
reference and use . Often in aa financial investigation , persons
interviewed become trial witnesses. The record of the financial
interview as prepared by the investigator can be used to refresh
the witness's memory and assist the witness in the identification
process relative to a financial document.
The complexity and investigative importance of an interview
determines the best method to record it. In situations where no
information is secured , a limited report or record of interview is
acceptable . However, in situations where “ case critical ques
tions” are answered, or denials are made by an important witness,
a more formal record becomes necessary. The only constraint in
the recordation process is the requirement for accuracy and com
pleteness by the investigator preparing the written summary.
When an investigator plays the role of an interviewer, he or
she must be accurate, fair and just. The prosecuting attorney
relies on the investigator's written notes taken during an inter
view. The investigator's portrayal of the interview process should
accurately and completely reflect the witness's testimony.
246 CHAPTER 9
Informal Notes
The " informal notes” taken by investigators during the
course of the interview, in conjunction with their recollections,
provide the basis for the written record . Informal notes should
contain sufficient detail to permit investigators to refresh their
memories as to what transpired during the interview . Any method
of recording the details is sufficient if it shows the date, time,
place, persons present, and what occurred . The following is an
example of the informal notes taken by Special Agent John Jones
during an interview with Richard Smith . Special Agents Jones
and Adams interviewed Smith concerning a financial transaction
(the purchase of a car) he had with the suspect, Jim Dealer.
Example of Informal Notes
1. S / A Adams and I made a field call to a travel agency located at 117 Elm Street, the known employer of
Richard Smith. Records obtained from State vehicle registration files reveal that Smith transferred the title
of a truck (serial number 1173945) to Dealer in May, 1990.
2. After proper introduction and identification (by displaying our credentials and badges), I asked Mr. Smith
if he would answer a few questions about the sale of his truck. Mr. Smith agreed and when asked, stated
the following:
b. Dealer responded to the ad and bought the truck by paying $25,000 in currency, composed of one hun
dred dollar bills .
c. The sale was completed on May 29, 1990, when the currency was exchanged for the truck and registra
tion paperwork.
3. Mr. Smith further stated that he would agree to reducing the information to a written affidavit and swear to
it's accuracy.
4. I suggested that we meet again tomorrow at his home to prepare the affidavit. Mr. Smith agreed.
5. This interview concluded at 10:47 a.m. when we left Mr. Smith's office.
I (prepared/dictated) this memorandum on July 26, 1991 , after refreshing my memory from notes made during
and immediately after the interview with Richard Smith.
John JonesSpecial Agent
I certify that this memorandum has recorded in it a summary of all pertinent matters discussed with Richard
Smith on July 25, 1991 .
Testimony of (name, address) given at (location including address) at (time) on (date) about (subject of investigation and their address).
Present at this interview are (names and titles of all persons present).
Questions were asked by (name and title of person asking the questions) and answers given by (person being interviewed ).
This interview is being recorded, as agreed upon, by means of (method of recording).
1. Q. You were requested to appear at (location) to answer questions concerning (subject matter ). (If appropriate, advise the person
being interviewed of his or her rights to counsel, etc..)
2. Q. Please stand and raise your right hand. Do you (person being interviewed) solemnly swear that the answers you are about to give
to the questions asked will be the truth , so help you God?
3. Q. Did you sell a truck that you owned to Mr. Jim Dealer?
A. ( answer)
120. Q. Have I, or has any other investigator or officer, threatened or intimidated you in any manner?
A. (answer)
121. Q. Have I, or any other investigator or officer, offered you any rewards, promises or immunity, in return for this statement ?
A. (answer)
123. Q. Is there anything further you care to add for the record ?
A. ( answer)
After this statement has been transcribed, you will be given an opportunity to read it, correct any errors, and sign it.
• Note: When transcribing the statement include the following:
I have carefully read the foregoing statement consisting of page 1 to (last page number), inclusive, which is a correct transcript of my
answers to questions asked me on (date of statement) at (location where statement was given), relative to (subject of investigation and
their address). I hereby certify that the foregoing answers are true and correct, that I have made the corrections shown, have placed my
initials opposite each correction , and that I have initialed each page of the statement.
Affidavit
An affidavit is aa written declaration of facts made voluntarily and
confirmed by oath or affirmation . The text of an affidavit may be
prepared extemporaneously or composed by agreement between
the affiant, the person making the statement, and the investiga
tor. An affidavit can be either typed or handwritten, and prepared
either by the affiant or investigator. There are certain advantages
to allowing the affiant to compose and write an affidavit. These
advantages are :
• The affidavit will be in the affiant's own words
Sample Affidavit
I have read the foregoing statement consisting of 1 page(s),and have signed it. I fully understand this state
ment and it is true, accurate, and complete to the best of my knowledge and belief.
I made this statement freely and voluntarily without any threats or rewards, or promises of reward having been
made to.me in return for it.
Richard L. Smith
(Signature of affiant)
Subscribed and sworn to me before this_29th
July , 1991,
day of_July
at_Miami, Florida
(Signature)
John Jones
(Title) Social Agart
Mary Adams
(Signature ofwiness, if any)
254 CHAPTER 9
Valuable in developing an
investigation
Sworn Statement
A sworn statement is, in a general sense, a declaration of matters
. may be prepared in any form and should be signed and
of fact.It
dated by the person preparing it. A sworn statement has the same
judicial bearing as an affidavit. The investigator taking the state
ment administers an oath prior to the witness signing the statement.
The following is an example of an oath that can be administered:
PLANNING , CONDUCTING , AND RECORDING AN INTERVIEW 255
Mechanical Recordings
A mechanical recording device may be used to record statements
when aa stenographer is not readily available if all parties to the
conversation consent. A recording device also may be used in
conjunction with a stenographer, when necessary, again provided
that all parties consent. When mechanical recording devices are
used, the following guidelines are suggested:
• Identify, on tape, the individuals engaged in the conversa
tion, any other persons present, and the time, date, and location
Form Letter
A form letter can be used to request information of a similar
nature from several third parties. An example of aa form letter is
found on the next page .
256 CHAPTER 9
June 4, 1992
Glynco, GA 31520
This office is conducting an investigation concerning Rosemary Westbury for the years 1989, 1990, and 1991 .
Ms. Westbury is a corporate officer of Massey TB, Inc. She is also the trustee for Massey TB Trust. We have
reviewed the bank records of Massey TB, Inc., and Massey TB Trust. We found several checks made payable
to you. Please answer the questions below which relate to the checks we found. We have included copies of
the checks for your review .
Should you have any questions,please call investigator Dennis S. Paul at the telephone number listed above.
1. Did you receive checks number 1521 , 1571 , 1681 , 1952, 1991 ?
3. Please explain why these checks were deposited into Massey TB Trust's bank account.
4. We would like to talk to you about these checks. Please call us, or provide your daytime telephone number
so we can schedule an appointment.
Summary
The goal of an investigator is to conduct each interview in such a
manner as to gather all available information and documents per
taining to the investigation and then make a permanent record of
each witness's testimony for further reference.
The planning phase of the interview process is the foundation
of an interview. Poor planning will have the same effect on an
interview as a weak foundation has on a building. Proper plan
ning enhances the probability of a successful interview. A suc
cessful interview can create a cooperative witness who can
breathe life into financial records. It could also provide additional
leads for the investigator to solve the case.
Once the investigator has decided on who, when, where, and
how to interview the witness, the investigator should prepare a
topical outline of the questions to be asked. Just as planning is
the foundation of the interview process, the opening of an inter
view sets its tone. The body of the interview is the fact finding
part of the process. The closing summarizes the key facts and pro
vides an opportunity for the witness and the investigator to agree
with the summation.
The medium used to record an interview should be reflective
of the significance of the witness and the information and records
provided by the witness.
Interviewing is aa skill that can be developed and improved
upon through practice. Few skills are as important to the financial
investigator as the ability to talk to people and successfully gather
information from them.
PLANNING , CONDUCTING , AND RECORDING AN INTERVIEW 259
Endnotes
1 Cal W. Downs , G. Paul Smeyak , and Ernest Martin ,
Professional Interviewing, ( New York : Harper and Row
Publishers, 1980), p . 5
Investigative Techniques
n the previous chapter,we discussed how to plan
and conduct a financial interview . The financial
interview, if properly done, is a very valuable tool
for the investigator. In this chapter, we will explore some other
investigative techniques. We will begin with a discussion of the
search warrant for financial records: what it is, how it differs from
a “general” search warrant, and how one is issued to an investiga
tor. We will then explore the undercover operation, surveillance,
the use of informants, recovering information from trash, gather
ing information from a suspect's mail, and retrieving evidence
from a computer. We will look at how document examiners apply
forensic science techniques to aid in investigations. The chapter
concludes with an examination of aa tool called “ link analysis.”
After studying Chapter 10, you should be able to:
• State the importance of obtaining a valid search warrant.
• Describe the terms “ probable cause” and “ curtilage .”
• State the purpose of an affidavit.
• List and describe the types of information required in an
affidavit for a search warrant for financial information .
Probable Cause
A judge or magistrate will issue a search warrant only after a find
ing of probable cause. Probable cause is all the facts and circum
stances within the knowledge of the investigator about a criminal
activity that can be considered reasonable and trustworthy.
When developing probable cause, an investigator must keep
the following two principles in mind:
• Probable cause must be current
The Affidavit
Judges or magistrates issue search warrants and do so only after a
finding of probable cause. To convince a judge or magistrate that
probable cause exists, an investigator prepares a sworn state
ment called an affidavit. In affidavits, investigators summarize
their expertise and the information gathered during their investi
gations . The investigator who prepares an affidavit is called the
affiant.
An affidavit for a search warrant should contain certain types
of information. Affidavits for “ general” search warrants and
INVESTIGATIVE TECHNIQUES 267
• Items to be seized
Cocaine
AFFIDAVIT
STATE OF WISCONSIN )
) ss
MILWAUKEE COUNTY )
John Smith, being first duly sworn on oath, here deposes and says:
1. I am a Special Agent with the IRS, Criminal Investigation Division, and have been so employed since
March, 1977. I have conducted or assisted in over forty investigations of alleged criminal violations
of IRS laws; of the distribution of drugs and controlled substances; and of money laundering. For the
past 2 1/2 years, II have held the position of Intelligence Analyst. I have been in charge of the
Division's High Level Drug Leaders Project, Project Narcotics Currency, and Project White Collar
Currency. All of these projects analyze information relative to the flow of drug proceeds throughout
the State of Wisconsin.
2. I have attended and instructed in -service training seminars which concentrated on currency report
ing statutes ( Title 31 , U.S.C.), money laundering statutes ( Title 18, U.S.C. $$ 1956, 1957) and drug
statutes ( Title 21 , U.S.C. $$ 848, 851 , 881 ). I have conducted net worth and expenditure investiga
tions and I have planned, drafted and executed both financial and traditional search warrants. I have
been qualified in the U.S. District Court as an expert in financial and money laundering investiga
tions .
3. As part of my duties, I am involved in the investigation of Tom Trio for cocaine trafficking in violation
of Title 21 of the United States Code. Special agents from the Federal Bureau of Investigation and the
Drug Enforcement Administration and officers from the City of Milwaukee Police Department have
participated in this investigation. The information in this affidavit comes from my own personal
investigation and observation, or from the information provided to me by personnel of these other
agencies.
4. In January 1992, four FBI informants who have previously provided reliable information stated that
Tom Trio was selling cocaine in the Milwaukee area . Two of the informants stated that Trio was sell
ing cocaine out of his residence. One informant reported that a friend of his had seen several trash
bags of currency in Trio's house.
5. The Milwaukee City Phone Directory lists Tom Trio's address as 102 North West Street, Milwaukee,
Wisconsin .
6. Real Estate records at the County Courthouse in Milwaukee, Wisconsin show that on August 12,
1991, Tom Trio purchased the residence at 102 North West Street from John Jakes for $ 64,000. No
mortgage documents have been located for the property.
7. In an interview with John Jakes, he stated that Trio attempted to pay cash at the time of settlement.
Jakes refused to accept payment in cash and Trio subsequently provided him with eight $ 8,000
cashier's checks .
8. Tom Trio is employed by Penders and Associates, Inc. This is his only place of employment.
INVESTIGATIVE TECHNIQUES 271
9. Local income tax records reveal that Tom Trio has reported a total income of $54,000 during the past
two years .
10. On February 6, 1992 , I collected and went through the trash left for garbage collection at 102 North
West Street. The garbage included bills addressed to Tom Trio of that address, M & I Bank
envelopes, 12 money wrappers marked for $ 2,000 each, and the title to a 1990 Mercedes with VIN
number G1AB2323. The garbage also contained freezer paper cut into small squares. Special Agent
Thomas Gore of the Drug Enforcement Administration told me that such paper is commonly used to
wrap 11 ounce quantities of cocaine. The garbage also included three large plastic garbage bags that
contained fiber glass cartons. Special Agent Gore told me that cartons of that size and type commonly
contain kilograms of cocaine . The inside of the packages had a powdery residue which Special Agent
Gore tested for the presence of cocaine. The test was positive.
11. Documentation from the dealership where Tom Trio bought the 1990 Mercedes shows that he paid
$27,000 in cash for the car.
12. Between February 16 and February 24, 1992, one of the previously mentioned informants purchased
cocaine from Tom Trio three times . Each buy was a controlled buy. All three buys took place at Trio's
house. Each time, the substance purchased was tested for the presence of cocaine. Each time, the
substance tested positive.
13. Based upon my training and experience, and my participation in other investigations involving the
distribution of cocaine, I know that:
a. drug traffickers must maintain, on hand, large amounts of U.S. currency to maintain and finance
their ongoing narcotics business;
b. drug traffickers maintain books, records, receipts, notes, ledgers, and other papers relating to the
transportation, ordering, sale, and distribution of controlled substances;
c. the aforementioned books, records, receipts, notes, ledgers, etc., are commonly maintained where
drug traffickers have ready access to them, i.e., homes, offices, automobiles;
d. it is common for drug traffickers to hide contraband, proceeds from drug sales, and records of drug
transactions in secure locations for ready access;
cocaine traffickers usually keep paraphernalia for packaging, cutting, weighing, and distributing
cocaine;
f. the courts have recognized that unexplained wealth is probative evidence of crimes motivated by
greed , particularly trafficking in controlled substances.
14. Based on the information contained herein ,and my experience and training, Ihave probable cause to
believe that Tom Trio is involved in cocaine trafficking in violation of Title 21 U.S.C. $ 881 (B). The
locations to be searched and property to be seized are included on the attachment to this affidavit.
John Smith.
Special Agent
272 CHAPTER 10
Attachment
Search the residence located at 102 North West Street, Milwaukee, Wisconsin and the 1990 Mercedes
with VIN number G1AB2323 for:
U.S. currency
Cocaine
Drug paraphernalia for packaging, cutting, weighing, and distributing cocaine, including, but not
limited to, scales, freezer paper, and spoons
Books, records, receipts, notes, ledgers, and other papers relating to the transportation, ordering,
sale, and distribution of cocaine
Books, records, receipts, bank statements and records, money drafts, letters of credit,passbooks,
bank checks, and other items evidencing the obtaining, secreting, transfer, and concealment of
assets and the obtaining, secreting, transfer, concealment, and expenditure of money
Income tax returns
INVESTIGATIVE TECHNIQUES 273
VS.
SEARCH WARRANT
(21 U.S.C. $ 881 (B))
Thomas Trio
YOU ARE HEREBY COMMANDED to proceed to 102 North West Street to seize the items listed
or described on the attachment to this warrant within aa period of three days, serving this warrant and
seizing this property during daytime hours 8:00 a.m. to 5:00 p.m., leaving a copy of this warrant, prepar
ing aa written inventory of all the property seized, and promptly returning this warrant and bringing the
inventory before this court as required by law within ten days after seizure.
Alice Miller
United States Magistrate
274 CHAPTER 10
Undercover Operations
Operation ABSCAM was an investigation into corruption among
U.S. government officials. Over the course of a year and aa half, FBI
undercover agents approached public officials thought to be
involved in political corruption and told them that oil-rich Arab
sheiks would offer money in exchange for political favors. The
agents met with the public figures and paid out considerable sums
in cash. Several public officials were indicted and convicted .
In August 1989, 46 traders from the Chicago Mercantile
Exchange and the Chicago Board of Trade were indicted on
charges ranging from defrauding customers to tax evasion to rack
eteering. The charges were the result of a two-year undercover
operation that put wired FBI undercover agents in the trading pits
at the two exchanges.
In March 1991 , law enforcement agents raided three
University of Virginia fraternity houses and arrested 12 students
for selling drugs to undercover agents. The raids came after more
than six months of investigation by federal and state officials. The
investigation involved undercover purchases of designer drugs,
LSD , cocaine, and marijuana.
Surveillance
Jonathan J. Pollard was a civilian analyst for the U.S. Naval
Intelligence Center in Suitland, Maryland. In November 1985,
Pollard's supervisor, Jerry Agee, began suspecting that Pollard
was taking classified documents from his workplace and provid
ing them to a foreign government. Agee shared his suspicions
with a senior naval intelligence officer. The Naval Investigative
Service and the FBI agreed to investigate. As the investigation
progressed, the agents determined that Pollard was providing
classified information to aa foreign government. They just did not
know which one.
Eventually the investigators discovered that Pollard was pro
viding the classified information to Israel. How did they deter
mine this ? They placed a round- the -clock surveillance on
Pollard .
On November 21 , 1985, Pollard and his wife decided to make
a run for it even though they knew that were going to be followed.
Pollard felt sure he could shake the surveillance as he and his
INVESTIGATIVE TECHNIQUES 277
What is Surveillance ?
Surveillance is the secretive and continuous observation of persons,
places and things to obtain information concerning the identity and
activity of individuals suspected of violating criminal laws. Like
undercover operations, surveillance provides a means to obtain
information and evidence which probably would not be available by
any other means. It is aa technique that requires experience, team
work, and knowledge of the “ thing” to be surveilled.
Surveillance vans assist investi
Private citizens who form neighborhood watch groups use sur
gators while conducting moving,
stationary and electronic sur veillance to gather information. So do private companies that
veillance. Some surveillance employ security cameras. Countries use intelligence agencies to
vehicles contain hidden cam
set up surveillance operations that are a matter of national secu
eras, microphones, instamatic
cameras that zoom in on license rity.Even criminals perform surveillance on their suspects before
plates and two-way radios to committing crimes.
communicate with a command
base.
Objectives of Surveillance
The objectives of aa surveillance are to:
• Obtain evidence of аa crime
Types of Surveillance
Various types of surveillance activities are utilized by law
enforcement. They can be classified as follows :
• Stationary
• Moving
• Electronic
Stationary
Stationary surveillance is where neither the suspect or the agent
maintaining the surveillance are mobile. Sitting in an unmarked
car and watching someone's home or office is an example of sta
tionary surveillance . A common term for stationary surveillance is
stakeout. The surveillance on Jonathan Pollard began as a stake
out. But when Pollard and his wife decided to make a run for it,
the surveillance requirements changed. A moving surveillance
was needed .
Moving
A moving surveillance is one where the suspect does not remain
in one position. Following a suspect in an automobile is an exam
ple of аa moving surveillance. Following a suspect on foot or in a
boat, or watching a car from an airplane also would be considered
moving surveillances.
The risk of detection is higher in a moving surveillance than
it is in aa stakeout. Also, a moving surveillance consumes signifi
cantly more manpower. In the instance of following an automo
bile , aa minimum of three cars with radio contact would be
necessary. In most investigative situations, surveillance tech
niques mandate that it is better to lose the suspect than compro
mise the surveillance.
Electronic
The FBI agents who went undercover as traders in the pits at the
Chicago Mercantile Exchange and the Chicago Board of Trade
secretly tape recorded hundreds of incriminating conversations.
To make sure they would not lose touch with the Pollards dur
ing a moving surveillance, the FBI planted an electronic tracking
device inside the bumper of the Pollard's car.
INVESTIGATIVE TECHNIQUES 279
Informants
Larry Bullock was an Illinois State Representative who dreamed
of becoming Chicago's first black mayor. His district encom
passed McCormick Place Exposition Hall, a place that would
play an active role in the 1992 World's Fair if Chicago was
selected as the host city.
By law, a certain percentage of all public construction pro
jects had to be awarded to minority business enterprises (MBE).
Eugene Blackmon was an MBE general contractor and he was
experiencing difficulty in getting his money from another general
contractor to pay his sub-contractors . Blackmon approached
Bullock to enlist his aid in securing his money. Bullock said he
280 CHAPTER 10
Blackmon did not have the money to pay Bullock. But he was
desperate to get his money, so one Friday afternoon he went to the
Office of the U.S. Attorney and told them about his encounter
with Bullock. The government and Blackmon reached an agree
ment where Blackmon would become an informant and would
meet with Bullock to discuss fixing contracts and other matters in
political corruption . In return, the government would give
Blackmon money to “ pay ” Bullock so that his contract money
would be released .
Over the next few weeks, Blackmon had a series of meetings
with Bullock and paid him thousands of dollars of FBI money.
Blackmon wore a concealed recording device to the first meeting
but something went wrong with the equipment and, instead of
recorded conversations, all the FBI got was a mess of spaghetti
tape because the tape had come off the spool . At all subsequent
meetings, Blackmon wore a recording device and had aa transmit
ting device concealed in his briefcase.
Toward the end of the investigation, Bullock and his attorney
were invited to the U.S. Attorney's Office and were treated to
selected portions of the recorded conversations . The government
offered Bullock the opportunity to cooperate with them in investi
gating political corruption. Bullock refuses, choosing rather to go
to trial. After a long trial, during which Blackmon spent a week
on the stand testifying, Bullock was found guilty of aa multitude of
offenses. He was sentenced to six years in prison.
What is an Informant ?
In the case described above, it is important to note that the role of
the informant was key in carrying out the investigation. An infor
mant is a person who has specific knowledge of a criminal event
and provides that information to a law enforcement officer.
The development of an informant to provide confidential
information is a legitimate function of investigators. If properly
developed, informants can greatly enhance an investigation.
Many criminal cases have originated from informant informa
INVESTIGATIVE TECHNIQUES 281
Forensic Science
Timothy Wilson Spencer was suspected of murdering aa number of
women in Richmond and Arlington, Virginia. Police had reason to
suspect Spencer but had no confession, no witnesses, and a lim
ited amount of physical evidence . Then it was found that
Spencer's DNA perfectly matched that from semen found at three
of the murder scenes . The likelihood that someone else could
have produced all three matching patterns was 1 in 135 million.
Subsequently, Spencer was found guilty on four counts of murder
and sentenced to death.?
Genetic fingerprinting played a crucial role in the case
against Spencer. Genetic fingerprinting is aa technique used in
forensic science. Forensic science is the application of scientific
techniques to legal matters, in particular to investigations of crim
inal activities . The forensic sciences have been utilized in the
investigation of violent crimes for centuries . Traditional tech
niques such as fingerprint identification , ballistics classifications,
and drug, blood, and urine analyses have served the purposes of
law enforcement successfully in the past.
Not all criminal cases evolve around forensic evidence like
fingerprint identification and ballistics classification. Sometimes
evidence comes from the forensic analysis of documents involved
in the crime. Take, for example, the Lindbergh kidnapping case.
On March 1 , 1932, 20-month old Charles A. Lindbergh, Jr. was
284 CHAPTER 10
On May 12, 1932 the child's body was found in some woods a
few miles from the Lindbergh mansion. It wasn't until September,
1935 that a person was charged with the kidnapping and murder
of the Lindbergh baby. On January 2, 1935 Bruno Richard
Hauptmann went to trial. Since the ransom note was a key piece
of evidence, the prosecution needed to show that Hauptmann
wrote the note . They obtained other samples of his handwriting
and compared them to the ransom note. Handwriting experts took
the stand and stated that Hauptmann's handwriting and that of the
ransom note were one and the same . This crucial testimony
helped convict Hauptmann.
• Handwriting analysis
• Typewriter analysis
• Alteration analysis
• Ink analysis
• Paper analysis
• Document restoration
Handwriting Analysis
Over the years, an individual's brain ,arms, and fingers create
a pattern of handwriting. Everyone's handwriting possesses “ nor
mal” or “ natural” variations . But the basic pattern does not
change. When analyzing handwriting, the document examiner has
the suspect submit an exemplar, a sample to be used in compari
son to the questioned document. The document examiner deter
mines the range of variation in a person's handwriting from the
exemplar and compares that handwriting to the questioned docu
ment. The document examiner can determine if the writing on the
questioned document falls within the individual's “ normal ” or
“ natural ” range .
Typewriting Analysis
Every typewriter is unique. Each one types differently from every
other one because typewriters develop individual characteristics
during the manufacturing process and through use. Examiners
attempt to determine a document's type style and escapement
(pica, elite, or proportional) to establish the make and model of the
typewriter that created it. Also, the examiner attempts to find hori
zontal and vertical misalignment of characters, which if signifi
cant, is considered to be an identifying characteristic. Examiners
also search for any typeface defects or damaged letters.
286 CHAPTER 10
Alteration Analysis
Document examiners can determine if a document has been
altered. They look for additions ( inserts between lines, addition of
a word, sentence, or paragraph to a document) and deletions (era
sures or obliterations ). Utilizing infrared and ultraviolet viewing
techniques and photography, alterations unseen by the naked eye
become apparent. By looking through a microscope, a document
examiner can determine if information was erased by determining
if paper fibers were disturbed due to abrasive action.
Sophisticated chemical deletions such as white-out oblitera
tions or ink over -writes can be examined through infrared reflec
tants .
Document Restoration
It is possible to restore a document that has been torn , mutilated,
or even burned. Through scientific processing, some documents
that have been partially destroyed can be pieced together and
used for investigative purposes.
In this age of desktop publishing, a new type of forgery has
INVESTIGATIVE TECHNIQUES 287
Link Analysis
Link analysis is a technique for evaluating, integrating, and pre
senting complex information by taking bits of information col
lected from various sources and putting them together to show
patterns and meanings . It provides a graphic picture of associa
tions and relationships among various of persons and organiza
tions. Link analysis is ideally suited for showing the associations
among identifiers such as:
• Telephone numbers
• Vehicle license plates
• Aircraft/boat/vehicle registration numbers
288 CHAPTER 10
• Property ownership
• Financial transactions
ABC DEF
Corp Corp
Smith
LTD 1 LTD 2
3rd
Green PTRN
INVESTIGATIVE TECHNIQUES 289
450-1011 1 550-2022
3 7.
8 2
650-3033
8 9
750-4044 850-5055
Summary
An investigator's success or failure is often determined by the
investigative techniques used . “ Proving aa financial crime ”
requires evidence of guilt beyond a reasonable doubt. This often
can be achieved only through the use of specialized techniques.
With the continuing growth and sophistication of financial crimes,
knowing what investigative means are available and how to apply
them is the trademark of a successful financial investigator.
INVESTIGATIVE TECHNIQUES 291
b.
.
c
d.
292 CHAPTER 10
e.
f
.
Endnotes
1 Jack T. Wells, W. Steve Albrecht, Jack Bologna, and Gilbert
Geis , Fraud Examiner's Manual, (National Association of
Certified Fraud Examiners, 1989), Section 11 , p. 85
2 “ Strife and Death in the Family,” Time, January 18, 1988, p . 21
3 Fraud Examiner's Manual, Section 11 , p.. 85
4 Wolf Blitzer, Territory of Lies, (New York : Harper & Row
Publishers, 1989), Chapters 7 and 8
5 Jay Robert Nash , Encyclopedia of World Crime, Volume 1 ,
(Wilmette, IL: CrimeBooks, 1990), pp. 603-618
6 “ Lifting the Lid on Garbage,” Time, May 30, 1988, p.54
7 Gordon Hinkley, “ The Search for the South Side Strangler,"
Reader's Digest, April 1991 , pp . 73-78
QUELLE
Gross National Product of the of crimes committed in America today are motivated by money
Netherlands. Traditional drug and that many of these crimes cannot be solved solely by the use
interdiction methods haven't
of traditional investigative techniques. In fact, not only are new
been effective — the emphasis
has now switched to hittingdrug investigative techniques required, a whole new approach to inves
dealers where it really hurts: in tigation is needed - a financial approach. The quote above con
the wallet. firms all of this . Investigations are now being geared to the
financial aspect of the crime.
This chapter deals with the crime of money laundering. The
term “money laundering” typically invokes the thought of money
being transported to a foreign country and, through some vague
method, being “ cleaned up .” This clean cash is then somehow
secretly transported back to the United States for use by narcotics
traffickers. The truth is, money laundering can occur on any street
corner or in any bank; may not involve currency; and does not
exclusively relate to narcotics trafficking. The growth of this
crime poses a major challenge to law enforcement because money
laundering takes place in the majority of financial crimes commit
ted in America.
In a report issued by the Presidential Commission on
Organized Crime, money laundering was defined as “ the process
by which one conceals the existence, illegal source, or illegal
application of income and then disguises that income to make it
appear legitimate.” The financial criminal has a need to manipu
late the proceeds generated from a crime so that he or she can use
them for personal benefit. Both the embezzling bank teller and
MONEY LAUNDERING AND FORFEITURES 297
Transaction Systems
Everyone conducts financial transactions. Activities such as buy
ing groceries , paying bills, carrying on a business, and conduct
ing an illegal activity all involve financial transactions . These
transactions are conducted either by a cash system or by what can
be referred to as a business system . The cash transaction system
is a method of conducting all financial transactions exclusively
through the use of currency. The business transaction system is a
method of conducting transactions that generates a trail of finan
cial records (i.e., checks , receipts , invoices , deeds , etc. ) . The
resultant records summarize the financial activity by reflecting
specific sources, destinations, participants, and dates.
For the financial criminal there are advantages and disadvan
tages to both systems. The table on the next page lists the advan
tages and disadvantages of both transaction systems.
If it was feasible to remain entirely within one system, partic
ularly the cash system, criminals would be afforded strong protec
tion from law enforcement's detection and scrutiny. However,
motivations exist for financial criminals to carry out some of their
activities in both systems, and virtually all move from one system
to the other. From an investigative viewpoint, the movement
between systems is often where the criminal is most vulnerable.
298 CHAPTER 11
Lack of records makes it difficult to connect Losses owing to employee theft are controllable
a person with a criminal activity or with
the purchase of illicit goods and services Other business opportunities are available such as
legitimate investments in real estate and securities
Unreported revenues are not taxed
A legitimate business is a valuable base of operations
Currency is universally accepted and source of cash for criminal activities
Disadvantages Disadvantages
In large amounts, cash is suspicious and calls Taxes must be paid on reported revenues
attention to those who hoard it
Business records are subject to
Lack of records makes it difficult to prevent examination by authorities
theft by employees
Falsification of records is a criminal act and
Large amounts of cash are difficult to can lead to a prosecution even without
handle and transport proof of other criminal activities
Certain assets cannot be acquired for cash Transactions have a source and destination
without an extensive inquiry into its source which can lead to the criminal activity
• Legitimate businesses
Buy/sell transactions
• Offshore havens
them show the full price on the sales invoice — “for bookkeeping
purposes.” For 1992 , total legitimate cash sales as recorded on
invoices amounted to $300,000. The 15% cash discount reduced
actual cash receipts by $ 45,000 , for net cash receipts of
$255,000. Now November can deposit $45,000 of drug proceeds
into the business's bank account to replace the discount reduc
tion .
Expenses :
Salaries/wages 96,000 144,000
Supplies 6,000 10,000
Rent 36,000 36,000
Interest expense 12,000 12,000
Telephone 9,000 9,000
Consultants' fees 0 10,000
Buy/Sell Transaction
Besides using legitimate businesses as a way of moving money
into the business transaction system , the manipulated buy/sell
transaction can accomplish the same thing. Real estate or other
types of personal property transactions can be manipulated to
hide the flow of illegal proceeds and provide an apparent source
of legitimate income to the financial criminal. Suppose you're
buying a house that has aa fair market value of $2 million. You and
the seller agree that you will pay $ 1 million dollars for the house
and pay the balance paid off the books (i.e. in currency, drugs). In
this instance, the transfer from the cash transaction system to the
business transaction system has been accomplished and money
laundering has occurred . In principle, this type of money laun
dering can be used in any buy/sell transaction. Through indepen
dent appraisals or comparative sales data, the “ real value ” of a
transaction can be discovered .
MONEY LAUNDERING AND FORFEITURES 305
back in the form of “ tax - free ” sources of income. Loans, gifts and
investments used to capitalize or start- up a business are nontax
able receipts and represent a nontaxable source of income to the
alleged money launderer.
The investigator's most valuable asset in a money laundering
investigation is information . Information is developed through
informants or by the utilization of undercover and surveillance
operations. Of particular importance is information concerning
the movement of money through financial institutions. Once cur
rency that is generated from an illegal activity enters the banking
system, it loses its identity and becomes inseparable from other
funds inside the bank. The transaction entry point (i.e. the teller
window), is where currency moves into the business transaction
system . It is here that the Currency Transaction Reports (Form
4789) are generated when more than $ 10,000 in currency is
deposited, withdrawn, or exchanged. The information provided by
these reports is used to detect money laundering activities .
Similarly, Currency and Monetary Instrument Reports (Form
4790) are required to be filed with the U.S. Customs Service when
more than $ 10,000 in currency or monetary instruments crosses
an international border. The failure to file either of these reports
is aa criminal violation of the money laundering laws. Additionally,
structuring transactions in such a way as to avoid the $ 10,000
benchmark for either the CTR or the CMIR , can be a prose
cutable offense.
(i) to conceal or disguise the nature, the location, the source, the
ownership, or the control of the proceeds ofspecified unlawful activ
ity; or
tion at the time and in the way the Secretary prescribes. A partici
pant acting for another person shall make the report as the agent
or bailee of the person and identify the person for whom the trans
action is being made...
( c)( 1) A person (except a domestic financial institution designated
under subsection (b ) of this section ) required to file a report under
this section shallfile the report
Asset Forfeitures
The money criminals make from their financial crimes is often
put toward their personal benefit. They buy cars, boats, property,
clothing, etc. Fortunately for law enforcement, new and stronger
laws provide the means to divest criminals of their illegal gains .
This means is commonly referred to as "forfeiture." A forfeiture
is a legal proceeding that the Government initiates against the
proceeds of an illegal activity. The term "proceeds” is aa flexible
term that appears in many areas of the law and in virtually every
context, the term means “ whatever is received when an object is
sold, exchanged, or otherwise disposed of.” It does not necessar
ily mean just money. Each time proceeds are disposed of and
exchanged for other property, the newly -acquired property
becomes proceeds. In a sense, proceeds is a status that attaches
to any property substituted for what was originally exchanged.
MONEYLAUNDERING AND FORFEITURES 315
( C ) Any coin and currency ... or any interest in any other property,
including any deposit in a financial institution, traceable to such
coin or currency involved in a transaction or attempted transaction
in violation of Sections 5313( a) or 5324 of Title 31 may be seized
and forfeited to the United States government...
§ 881. Forfeitures
( a ) Subject property
The following shall be subject to forfeiture to the United States and
no property right shall exist in them:
( 1) All controlled substances which have been manufactured, dis
tributed,dispensed, or acquired in violation of this subchapter.
( 2) All raw materials, products, and equipment of any kind which
are used, or intended for use, in manufacturing, compounding,
processing, delivering, importing, or exporting any controlled sub
stance in violation of this subchapter.
( 3 ) All property which is used, or intended for use, as a container
for property described in paragraph (1) or ( 2 ).
(4 ) All conveyances, including aircraft, vehicles, or vessels, which
are used, or are intendedfor use, to transport, or in any manner to
facilitate the transportation, sale, receipt, possession, or conceal
ment of property described in paragraph ( 1) or ( 2 ), except that
( A ) no conveyance used by any person as a common carrier in the
transaction of business as a common carrier shall be forfeited
under the provisions of this section unless it shall appear that the
owner or other person in charge of such conveyance was a consent
ing party or privy to a violation of this subchapter or subchapter II
ofthis chapter; and
( B ) no conveyance shall be forfeited under the provisions of this
section by reason of any act or omission established by the owner
thereof to have been committed or omitted by any person other than
such owner while such conveyance was unlawfully in the possession
of a person other than the owner in violation of the criminal laws
ofthe United States, or of any State.
( 5 ) All books, records, and research, includingformulas, microfilm ,
tapes, and data which are used , or intendedfor use, in violation of
this subchapter.
(6 ) All moneys, negotiable instruments, securities, or other things
of value furnished or intended to be furnished by any person in
exchangefor a controlled substance in violation of this subchapter,
MONEY LAUNDERING AND FORFEITURES 321
Summary
Money laundering is the process by which one conceals the exis
tence, illegal source, or illegal application of income and then
disguises that income to make it appear legitimate. There are two
basic transaction systems money launderers work with: the cash
transaction system and the business transaction system. The goal
of the money launderer is to move from the cash transaction sys
tem to the business transaction system. The goal of the investiga
tor is to spot this movement and halt the laundering operation.
There are three basic methods available to launder money:
through legitimate businesses, buy/sell transactions, and off shore
havens. Legitimate businesses launder money by overstating legit
imate revenue and expenses, or by depositing currency into busi
ness accounts. Buy/sell transactions are manipulated financial
transactions that use an apparent legitimate purchase or sale of an
324 CHAPTER 11
5. List three methods used to move U.S. currency into and three
methods used to move currency out of the United States.
Endnotes
1 “ Laundering Drug Money: Whitewash— or Crackdown ?”,
Economist, (Volume 310, Issue 7592 , March 4, 1989), p. 76
2 President's Commission on Organized Crime , The Cash
Connection, (U.S. Government Printing Office, October 1986),
P. vii
Chapter 2
1 Civil law deals with private conflicts and differences between
individuals, whereas criminal law deals with public wrongs
against the state. Remedies for violations of civil law are usu
ally in the form of money damages or court -ordered actions to
do, or refrain from doing, certain specific things. Remedies for
violations of criminal law include fines, penalties, and /or incar
ceration.
• Scheme to defraud
• Willfulness
330 RESPONSES TO END - OF - CHAPTER QUESTIONS
Chapter 3
1 a. 16 to 23 people “ sit” on a federal grand jury.
b . It takes 12 jurors to return an indictment.
2 If a witness is granted transactional immunity, he or she cannot
be prosecuted for any criminal offenses about which he or she
testifies during grand jury proceedings . The witness could
admit to murder and drug trafficking, and not be prosecuted for
them.
If a witness is granted use immunity, the testimony that the
witness provides cannot be used in prosecutions against the
witness. For example, a witness testifies that she forged checks
in order to get cash to buy drugs. If that witness is brought up
on drug charges, that testimony cannot be used against her.
Transactional immunity is rarely used . If immunity is
offered, it is more likely to be use immunity.
3 Evidence is anything that can make a person believe that aa fact
or proposition is true or false.
4 Proof is the result of evidence.
5 In criminal cases, the standard of proof is ““ beyond a reason
able doubt ;” in most civil cases the standard is “preponder
ance of evidence .” “ Beyond a reasonable doubt" is a greater
degree of proof than is “ preponderance of evidence .” To reach
a conviction in a criminal case, each juror must have no doubt
that, based on the evidence presented, the accused committed
the crime. Verdicts in civil cases where the preponderance of
evidence is the standard of proof, are reached by the jurors
weighing the evidence presented and deciding who they
believe, the plaintiff or the defendant.
RESPONSES TO END- OF- CHAPTER QUESTIONS 331
Chapter 4
1 According to the table in Appendix A, a social security number
that begins with the numbers “ 421,” is issued in the state of
Alabama.
.
33 a. If you want information concerning a suspect's use of his or
her American Express Card , you can contact the American
Express Company in New York City.
b. By analyzing a suspect's credit card activity you can find
RESPONSES TO END - OF - CHAPTER QUESTIONS 333
out all sorts of things. Has the suspect made any major pur
chases using the credit card ? If the suspect used the card on a
trip, you can track where the suspect went as well as what the
suspect purchased. Did the suspect use the credit card to get a
cash advance? How does the suspect pay off what he or she
owes on the credit card? These are just some of the things that
an investigator can discover about a suspect when analyzing
the suspect's credit card activity.
4 The following factors come into play when selecting a suspect
to target for investigation:
• Available law enforcement resources
Chapter 5
1 The check provides the following information:
• Owner of the account is Allison Henderson . She lives in
Rockville, Maryland, at 923 Prospect Lane.
• The payee is Hankinson's Automotive. Apparently, Allison
took her car in for a tune up and paid for it on June 8,
1992 .
334 RESPONSES TO END -OF - CHAPTER QUESTIONS
3. A safe -deposit box rental agreement and entry log are avail
able. The rental agreement will show who rented the box and
on what date. The entry log shows the date and times of visits
to the box and who made them . Bank records do not reveal the
contents of the box .
12 Both of the deposit slips show that currency was deposited .The
total amount deposited equals $13,500. Had all of the currency
been deposited into one account, the bank would have had to
file a Currency Transaction Report (CTR). Since the deposits
are into two different accounts owned by the same person , it
looks like that person may have split the deposit to avoid hav
ing to have a CTR filed.
Chapter 6
1 In a proprietorship, the owner of the business is responsible for
all debts incurred. In a partnership, the partners are personally
responsible for the business's debts. Since a corporation is a
legal entity in and of itself, it is responsible for its debts, not its
owners (stockholders).
2 A corporation's Articles of Incorporation and a partnership’s
Articles of Partnership are important to the financial investiga
tor because of the information they provide. Each of these doc
uments provides personal and financial information relating to
those involved in the start up of the business.
3 A liability is a claim on an asset by a creditor. An asset is
something of value owned by a business and the owner's equity
is the amount of capital furnished by a business's owner(s).
4 Based on the equation A = L + OE, and given that assets
equals $675,325 and owner's equity is $276,580, it follows that
liabilities equals $398,745.
5 Accounting is able to show, in summary form , the results of a
business's financial transactions through financial records such
as journals, ledgers, balances sheets, and income statements.
338 RESPONSES TO END - OF -CHAPTER QUESTIONS
10,000
Accounts Receivable
10,000
Collier Company
Balance sheet
10
Gollier Company
General Journal
Date Ledger
1992 Accounts and Explanations Folio Debit Credit
12/12 Cash 25,000
Capital 25,000
Stock sale
11
12
Pratt, Inc.
Income statement
For the year ended December 31 , 1992
Sales revenue $ 155,000
Less: sales returns and allowances 5,000
Net sales $ 150,000
Less : cost of goods sold 30,000
Chapter 7
1 With the specific item method, the investigator tries to find a
direct link between a suspect and a specific financial transac
tion involving the payment or receipt of illegal funds. Once dis
covered, this direct link is very difficult for the suspect to deny.
2 Bank account information is the type of information most use
ful in a fictitious payable scheme.
3 An investigator will want to look into an employee's travel
expenses because travel expense reimbursements may be
padded to generate illicit funds.
RESPONSES TO END -OF -CHAPTER QUESTIONS 341
Chapter 8
1 Indirect methods of proof are most useful when the suspect is
taking currency or other payments that cannot be directly
traced .
Minus:
Liabilities
Loan- pool $ 0 $ 7,000 $ 1,000
Mortgage- residence 98,000 96,500 94,500
Loan- finance company 5,000 5,000 5,000
Total liabilities 103,000 108,500 100,500
Expenditures
$
Increase in bank account $ 5,000 0
Purchase of jewelry 25,100 0
Outlays:
Jewelry purchase $ 25,100 $ 0
Mink coat purchase 0 15,900
Boat purchase 0 24,000
Downpayment - pool 10,000 0
Pool loan repayments 3,000 6,000
Mortgage repayments 12,000 12,000
Real estate taxes 1,500 1,500
Apartment rental payments 18,000 18,000
Lease payments— car 3,600 3,600
Vacation 0 12,000
Total outlays $73,200 $ 93,000
Chapter 9
1 A financial interview is conducted to obtain information and
documentation from aa witness. A financial interrogation is con
ducted for aa different purpose. Its purpose is to elicit confes
sions or admissions of culpability from suspects or hostile
witnesses .
Chapter 10
1 If an investigator seizes evidence from a suspect's home or
office without first obtaining a search warrant, the evidence
collected could be ruled inadmissible.
3 a. Affiant's experience
b. Detailed account of criminal activity
c. Description of place(s) to be searched
d. Financial evidence
e . Items to be seized
Fraternity
House
Roundball Rebound
Baseball
Team
Bench
Jack Kurt
Dice Dice
Prison
Chapter 11
1 With the cash transaction system , all financial transactions are
conducted exclusively through the use of currency. In the busi
ness transaction system, financial transactions are conducted
using methods that generate a trail of financial records .
2 The three characteristics of aa business used as a money laun
dering front are:
• Deals primarily in currency
• Has relatively fixed costs
• Is exempt from bank currency reporting requirements
3 By overstating its revenue, a business increases its taxable
income. They reduce their tax liability by overstating their
business expenses .
4 You and your friend could agree that you purchase the car for
some amount less than $ 20,000 and then pay the remainder of
the balance off the books.
Contingency CR
A possible future event or con- Abbreviation of credit.
dition arising from causes
Credit Entry
unknown or at present undeter An entry on the right-hand side
minable .
of a T -account.
Contra Account
Creditor
One of two or more accounts
One who lends money.
which partially or wholly offset
each other. On financial state- Criminal Law
ments , they may either be That branch of law that deals
merged or appear together, for with offenses of aa public
example , an account receivable nature , that is, wrongs commit
from and payable to the same ted against the state .
individual .
Curtilage
Cooperative The area inside the boundary
A corporation in which profits of a person's residence or busi
are distributed to shareholders ness location which has been
in proportion to the amount of marked off by man-made or
business each shareholder does naturally -occurring devices.
with the company .
Debit Entry
Counterfeiting A entry on the left-hand side of
Copying or imitating an item a T -account.
without having been authorized Debt
to do so and passing the copy Current and non - current liabil
off for the genuine or original ities .
item .
Defalcation
Corporation The embezzlement of money .
An artificial being or business
entity created under state or Depreciation
federal law which is legally The expiration of an asset's
separate from the persons who " quality of usefulness .”
own it . Ownership is in the Discount
form of stock and the liability
of the owners is limited to the Amount by which the face
value of a financial instrument
amount of their investment in
exceeds the sales price.
the company .
GLOSSARY 359
Forgery Hearsay
Passing a false or worthless Evidence that does not come
instrument, such as aa check or from the personal knowledge of
counterfeit security, with the the declarant but from the rep
intent to defraud or injure the etition of what the declarant
recipient. has heard others say.
Forfeiture Hybrid Method
A legal proceeding that the Method of accounting which is
Government initiates against the a combination of the cash and
proceeds of an illegal activity. accrual methods .
Fraud Immunity
Falsely representing a fact to An investigative tool used by
another in order to induce that the grand jury that allows aa wit
person to surrender something ness to provide testimony or
of value . documents without fear of pros
ecution .
General Partner
A partner personally liable for Income Statement
partnership debts. A financial statement showing
Goodwill
revenues earned by a business,
the expenses incurred in con
An intangible asset represent
ducting business, and the
ing the difference between the
purch ase price and the valueof resulting net income or net loss.
the tangible assets purchased. Income, Net
Excess of total revenues over
Grand Jury
total expenses in a given
A jury who hears evidence
period.
obtained by the prosecution
and then decides whether or Indictment
not a trial ought to occur. A formal written complaint of
criminal charges.
Guarantor
One who promises to make Indirect Methods
good if another fails to pay or Ways of proving unknown or
otherwise perform an assigned illegal sources of funds which
or contractual task. rely upon circumstantial evi
dence .
362 GLOSSARY
Subpoena Torts
A document that requires a A terms used in civil law , it
witness to appear before a refers to the private wrongdo
grand jury or requires the wit ings between individuals.
ness to produce records and
Transaction
documents for the grand jury.
The exchange of goods and ser
Substantive Law vices .
The body of law that creates, Treasury Bill
discovers, and defines the
rights and obligations of each A short-term security offered
by the U.S. Government with
person in society.
maturities of 13 weeks , 36
Surplus, Capital weeks , and 52 weeks .
An increase in owner's equity
Treasury Bond
not generated through the com
A long -term security offered by
pany's earnings. the U.S. Government with
Surveillance maturities of 10 years or longer.
The secretive and continuous
observation of persons, places, Treasury Note
An intermediate -term security
and things to obtain informa
offered by the U.S. Government
tion concerning the identity with maturities from one to ten
and activity of individuals sus
years.
pected of violating criminal
laws . Trial Balance
A list of the account balances
T -Account
arranged in “ balance sheet
An accounting device used for
order” by debits and credits
recording increases and
decreases on either side of ver
with adjustment columns for
entries. Used as a basis sum
tical line, with account title on
the top mary for financial statements.
Undercover Operation
Tax Evasion
An investigative tool where law
Committing fraud in filing or enforcement officers or private
paying taxes .
individuals assume an identity
other than their own for the pur
pose of gathering information
relating to criminal violations.
368 GLOSSARY
Cleveland, OH
properties and business
Salt Lake City, UT
382 APPENDIX A
South Dakota
050 - 134 New York 505 - 508 Nebraska
135 - 158
-
Utah
646 - 647 allocated , not in use
252 - 260 Georgia 530 Nevada
261 - 267
-
Washington
589 - 595
268 - 302 Ohio 540 - 544
-
Oregon
303 - 317
-
Indiana 545 - 573
-
California
602 - 626
318 - 361 Illinois 574 Alaska
362 - 386 Michigan 575 - 576 Hawaii
387 - 399 Wisconsin 577 - 579
-
Washington, DC
400 - 407 Kentucky 580 groups 01 - 18-
Virgin Islands
408 - 415 Tennessee 580 (groups above 20) - Puerto Rico
584, 596 - 599
416 - 424
-
Alabama 586 Guam , American
Samoa, Northern
Mariana Islands,
Philippine Islands
425 - 428, 587
-
Oklahoma
384 APPENDIX A
Appendix B
3 - Philadelphia
4- Cleveland
5- Richmond
6- Atlanta
7- Chicago
8 - St. Louis
9- Minneapolis
10 - Kansas City
11 - Dallas
12 - San Francisco
390 APPENDIX B
1 New York , N.Y. 14 New Orleans , La. 26 Memphis, Tenn. 38 Savannah, Ga.
2 Chicago, Il . 15 Washington, D.C. 27 Omaha, Neb. 39 Oklahoma City,
Ok .
3 Philadelphia, Pa. 16 Los Angeles, Ca. 28 Spokane, Wash. 40 Wichita, Kan .
4 St Louis, Mo. 17 Minneapolis, Minn. 29 Albany, N.Y. 41 Sioux City, Iowa
5 Boston , Mass . 18 Kansas City, Mo. 30 San Antonio, Tx. 42 Pueblo, Co.
6 Cleveland, Ohio 19 Seattle, Wash . 31 Salt Lake City, Ut 43 Lincoln, Neb .
7 Baltimore, Md. 20 Indianapolis, Ind . 32 Dallas , Tx . 44 Topeka, Kan .
8 Pittsburgh, Pa. 21 Louisville , Ky. 33 Des Moines, Iowa 45 Dubuque, Iowa
9 Detroit, Mich . 22 St. Paul, Minn . 34 Tacoma, Wash . 46 Galveston , Tx.
10 Buffalo , N.Y. 23 Denver , Colo. 35 Houston, Tx . 47 Cedar Rapids,
Iowa
11 San Francisco, Ca. 24 Portland, Ore . 36 St. Joseph , Mo. 48 Waco, Tx.
12 Milwaukee, Wis. 25 Columbus, Ohio 37 Fort Worth , Tx. 49 Muskogee, Ok.
13 Cincinnati , Ohio
A Transit Number 96
Account 144 Articles of Incorporation
Account Transactions 85 content 130
Accountant /Client Privilege 51 sample 131
Accounting Articles of Partnership
defined 134, 135 content 128
function 135 sample 129
fundamental equation 140 Assets
141 current 144
methods 138 described 140
methods compared 139 fixed 145
systems 136-137 Association Matrix 288
Accounting Systems Assumed Name Index 70
compared 138 Attorney /Client Privilege 50
double -entry 137 Auditing 160
single-entry 136
Accounts Payable Journal 153
Accounts Receivable Journal B
153 Balance Sheet
Accrual Basis Accounting 139 account form 142
Affiant 252 , 266 accounts 144-146
Affidavit described 141-144
advantages and disadvan report form 143
tages 254 Bank Credit Cards 103
described 252, 266 Bank Deposit Method
for search warrant 266-272 described 209-214
sample 253 , 270-272 example 212, 213
Alteration Analysis 286 formula 209
American Banker's Association formula components
392 INDEX
Indictment 38 J
Informal Immunity 40 Joint Stock Company 134
Informal Notes Joint Venture 134
described 246 Journal
sample 246 accounts payable 153
Informant 280 accounts receivable 153
Ink Analysis 286 cash disbursement 153
Insider Trading 7 cash receipts 153
Internal Revenue Code described 151 , 152
statutes 29, 30 general 153
Internal Revenue Service 11 purchases 153
International Criminal Police recording entries 152
Organization 78 sales 153
Interview sample entry 151
body 239-244 types of 153
closing 244, 245 Journal 151
conducting 236 Judicial Notice 47
contacting the suspect 234
defined 228
do's and don'ts 243 K
informal notes 246 Kickback
introduction 237 described 7
memorandum 246 statute 23
outline 236
phases 231
planning 231-234 L
question and answer state Larceny
ment 249 described 6
questioning methods 234, Law
235 categories 14, 15
recording 245, 250 defined 14
selecting witnesses 232 Law Enforcement
IRS National Computer Center Officer /Informant
78 Privilege 51
Ledger
described 156, 157
posting 158
recording entries 157
INDEX 397
0 clergyman /penitent 51
Offbook Schemes 186 husband /wife 51
Office of the Inspector General law enforcement officer/
10 informant 51
Official Records Rule 54 physician /patient 51
On- Us Items 96 rule of evidence 48
Operation Ill Wind 3 Probable Cause
Out Clearing Item 96 described 45, 266
Over-the -Counter Securities forfeiture investigations
Market 110 315, 321
Overbilling Schemes 185 Proceeds 314
Owner's Equity 140, 146 Proof
beyond aa reasonable doubt
42
P clear and convincing evi
Paper Analysis 286 dence 44
Partnership described 42
Articles of Partnership 128, preponderance of evidence
129 43
described 69, 127-129 probable cause 45
general 69 suspicious situation 45
limited 69 Proof Numbers 91
Partnership Records 69 Proprietorship 126, 127
Payroll Kickback Schemes 184 Public Records
Physician/Patient Privilege 51 assumed name indexes 70
Point-Of-Payment Schemes Better Business Bureau 70
182 Chamber of Commerce 70
Post-Qualifying Number 98 corporate 69
Posting, to a ledger 157 court 71
Pre -Qualifying Number 98 list of 71 , 72
Preferred Stock 106 partnership 69
Preponderance of Evidence real estate 69
43, 44 trust 70
Prima Facie Case 16 Uniform Commercial Code
Prior Statements 53 Filings 71
Privileged Communications Purchase Journal
accountant/ client 51 described 153
attorney /client 50 sample 156
INDEX 399
Q S
Question and Answer Statement Safe -Deposit Boxes 103
advantages and disadvan- Sales Journal
tages 251 described 153
described 249-251 sample 155
sample 250 Savings and Loan Scandal 3
Questioned Document 284 Search Warrant
described 264, 265
financial 265
R Secondary Evidence 56
Racketeer Influenced and Securities
Corrupt Organizations 27 documents available 112
Racketeering types of ownership 111
described 7 Securities Act of 1933 31
statute 25, 26 Securities Exchange 109
Real Estate Records Securities Exchange Act of
business 72 1934 31
public 69 Securities Market 106
Real Evidence 47 Shell Corporation 134
Reasonable Doubt 42 Shop Book Rule 54
Registered Bond 109 Signature Card 85
Registered Coupon Bond 109 Single -Entry Bookkeeping 136
Registrar 107 Specific Item Analysis
Relevancy And Competency point-of-payment analysis
rule of evidence 49 181
Res Gestae Statement 54 point-of-receipt analysis
Rose, Pete 6 182
Rules of Evidence Specific Item Method
best evidence 56 currency schemes 186
chain of custody 55 described 180
privileged communications fictitious payable schemes
50 183
relevancy and competency ghost employee schemes
49 184
requirement of original 56 offbook schemes 186
overbilling schemes 185
payroll kickback schemes
184
400 INDEX
cash 297 W
Transactional Immunity 40 Wedtech 2
Transfer Agent 107 Western Union 115
Transit Items 95 Wire Fraud 25
Traveler's Check 102 Wire Transfers 103
Treasury Bills 108 Witnesses, types of 232
Treasury Bond 109
Treasury Notes 108
Treasury Stock 107
Trial Balance
described 159
sample 159
Trust 70
Typewriting Analysis 285
U
U.S. Customs Service 9
U.S. Marshall Service 10
U.S. Secret Service 10
Undercover Operation
described 274
objectives 275
Uniform Commercial Code
Filings 71
United States Code
described 16
Use Immunity
described 40
formal 40
informal 40
V
Valid Confession 53
Vehicle, records 76
ISBN 0-16-041830-5
90000
1 .
UNIVERSITY OF ILLINOIS -URBANA
3 0112 046957764