Sie sind auf Seite 1von 71

FORENSICS JOURNAL

Welcome to the fifth annual Stevenson University Forensics Journal. This year, our authors cover a wider range
of topics than ever before. New areas of exploration include immigration marriage fraud, construction fraud,
arson investigation, and fraud predictors in non-profit organizations. As a result, articles extend beyond our
usual focus areas of accounting, information technology and law.

In the Masters in Forensic Studies program, students are encouraged to consider their own careers and
education and to bring those experiences into their choices for research topics. Our students vary widely
in their skills, expertise, location, age and interest areas, allowing us to harness those differences into the
dynamic and rich group of articles presented this year.

Each edition of the Journal is meant to bring the field of Forensic Studies to the public in a way that is
understandable and relevant to the reader. It is my hope that you agree we have done so in this fifth edition
and that you enjoy the diversity of its content.

Carolyn Hess Johnson, Esquire


Editor and Publisher

1
STEVENSON UNIVERSITY

2
FORENSICS JOURNAL

TABLE OF CONTENTS

1 37
INTRODUCTION IS FAIR VALUE ACCOUNTING
CAROLYN JOHNSON A FRAUD RISK?
COURTNEY MOORE

4
INTERVIEW WITH SCOTT DECKER, PH.D

43
DEMOLISHING CONSTRUCTION FRAUD
STEPHANIE WITT
KRISTI OCONNOR

8
PRINT TECHNOLOGY AND

49
FORENSICS SOCIAL MEDIA PUBLIC OUTREACH:
AMIRA EDEN IS THE PUBLIC PLAYING A ROLE IN
THE CRIMINAL JUSTICE PROCESS?

14
ERIC SHIFFLET
THE METHODS TO PREVENT AND DETECT
FRAUD IN THE SUPPLEMENTAL NUTRITION

53
ASSISTANCE PROGRAM THE WAR ON TERROR: HABEAS
VALERIE ROEBUCK CORPUS, INDEFINITE DETENTION,
AND EVIDENTIARY MATTERS

20
U.S. CITIZENSHIP AND IMMIGRATION JAMES SEVISON
SERVICES: INVESTIGATING AND PREVENTING

59
IMMIGRATION MARRIAGE FRAUD WILL THE FUTURE OF DIGITAL FORENSICS
SARA E. TORRES AND LAW ENFORCEMENT INVESTIGATION
STRATEGIES NEED TO ADAPT TO

26
HOW FORENSIC SCIENCE HAS INFLUENCED MALICIOUS HARDWARE DEVICES?
WILDLIFE INVESTIGATIONS WESTCOTT HYDE
MEGAN ANSBERRY

64
FRAUD PREDICTORS AND NON-PROFIT

31
WHAT ARE THE BEST PRACTICES FOR ORGANIZATIONS
PREVENTING, IDENTIFYING AND INVESTI- RENITA DANDRIDGE - SHOATS
GATING ARSON BY FIREFIGHTERS?
CHRISTOPHER ALLEN

3
STEVENSON UNIVERSITY

Interview with Scott Decker


Stephanie Witt

SCOTT DECKER, BIOGRAPHY the company that I worked for was to research new procedures for
marketing infectious disease diagnostics using DNA, which was at
Dr. Scott Decker received his Ph.D. in Human this time in its infancy. At this point, the patent for PCR was being
Genetics from the University of Michigan held by a corporation named Cetus, and was not available for use. I
in 1982 where his studies focused on serum spent several years researching alternative methods to PCR, but noth-
proteins.. He then became a Post-Doctoral ing proved more successful than PCR which was eventually licensed
Fellow at Harvard Medical School in the for use. PCR has revolutionized the field of Biotechnology.
Department of Biological Chemistry where he
studied DNA replication mechanisms. Fol- WHAT IS THE RESPONSIBILITY OF THE HAZARDOUS
lowing his time at Harvard Medical, he joined a small biotechnology MATERIALS RESPONSE UNIT (HAZMAT)?
startup company in Boston. In 1990, he applied to the FBI and after
graduating from the academy, he became a special agent. His first The Hazardous Materials Response Unit included Special Agents with
appointment with the FBI was investigating bank and armored car backgrounds in science including, Biology, Chemistry, and Medi-
robberies in Boston from 1990-1997. He was then transferred to the cine. The goal was to prepare for an event of the use of weapons of
Hazardous Materials Response Unit (HAZMAT) where he stayed mass destruction against the United States. We were responsible for
until 2001. He worked as a Special Agent and Supervisory Special developing methods for processing crime scenes that were associated
Agent on the Amerithrax investigation from 2001-2007. Currently, with methods of mass destruction. These would include Radiologi-
Dr. Decker works at American International Biotechnology, LLC cal, Chemical, and Biological warfare. We also responded to crime
as the Director of Security. Dr. Decker is currently writing a book scenes around the country, because at the time there were very few
detailing the Anthrax case titled: Attribution: Inside the FBIs Anthrax agents trained in Hazardous Materials evidence collection. One case
Investigation--An Evolution of Forensics. I worked on was in Texas where several individuals were trying to
weaponize Rabies, HIV, and Botulism.
WHAT ARE YOUR CURRENT RESPONSIBILITIES AT
AIBIOTECH? HOW DID THE FBI HAZARDOUS MATERIALS RESPONSE
UNIT DIFFER FROM THEIR COUNTERPART, THE FBI BOMB
I currently act as Director of Security at AIBioTech. I oversee a range DATA CENTER?
of security programs for our company. I ensure that we adhere to
The Health Insurance Portability and Accountability Act of 1996 The FBI Bomb Data Center was responsible for investigating crimes
(HIPAA) to protect our patients who seek our services We also involving bombs and explosives. However we did work closely
maintain a Bio-Safety Level 3 Laboratory which means that we are a with them on cases involving what are known as dirty bombs or
containment laboratory certified to work with dangerous pathogens, bombs that combine radioactive or biological materials with con-
including Bacillus anthracis. In order to obtain this safety level, we ventional explosives. A bomb expert would be needed to determine
must adhere to the safety guidelines and protocol set forth by the if the device was explosive but a hazardous materials expert would
Center of Disease Control (CDC). I also oversee restricted access of be needed to examine potential radioactive or biological materials.
employees and personnel, closed circuit TV to monitor work, negative On occasion, someone who is responsible for producing destruction
and positive air pressure for ventilation and other security measures devices such as bombs and explosives, is also experimenting with
necessary to protect the sensitive materials and information that our weaponizing other materials such as botulism, radiation, and other
organization is responsible for. chemical hazards. Today the Bomb Data Center of the late 1990s has
evolved into the FBIs Hazardous Devices Operations Section.
COULD YOU EXPLAIN SOME OF THE ADVANCEMENTS IN
DNA THAT YOU WERE INVOLVED IN DURING THE EARLY DURING YOUR TIME WITH THE FBI HAZARDOUS MATE-
YEARS OF YOUR CAREER? RIALS RESPONSE UNIT, YOU WERE RESPONSIBLE FOR
RESPONDING TO THE SEPTEMBER 11, 2001 ATTACKS.
During the mid-80s, biotechnology companies were just start- COULD YOU GIVE SOME BACKGROUND ON YOUR
ing to appear and take off. These were the early days of polymerase RESPONSIBILITIES?
chain reaction (PCR). PCR is a method for replicating DNA which
involves a series of heating and cooling cycles necessary to denature, Following the 9/11 attacks we set up a command post at ground zero,
anneal, and elongate the original DNA strand to produce replicated the site where the trade center collapsed. There were several reasons
copies of the strand. At this time the PCR procedures were com- that the services of the FBI Hazardous Materials Response Unit were
pleted exclusively by hand and would require manually alternating the needed. Since there were several unstable buildings, engineers were
tubes from ice to heat. Heat stable polymerase was being developed stationed at the site to monitor the remaining buildings in the area.
at this time which allowed this process to be automated. The goal of

4
FORENSICS JOURNAL

Lasers were setup to measure the movement of these buildings. If a Terrorism is an act of violence or disruption to change government
building moved out of specification, the buildings were evacuated. action. It is important to characterize certain crimes as acts of terror-
HAZMAT teams were also present to address the hazards related to ism because these types of crimes are the number one priority for FBI
confined spaces. We were responsible for evidence recovery associ- resources. With crimes characterized as acts of terrorism, no potential
ated with hazardous materials which included jet fuel, smoke, burned leads go uninvestigated. In addition, the charges for an act of terror-
materials, and possible toxic fumes. Another reason we were stationed ism may carry the death penalty. In the case of international terror-
there was in the event of a second attack, which could possibly have ism, this characterization is very important because it invokes the use
been biological or chemical in nature. I was stationed there for 2-3 of the United States Foreign Intelligence Surveillance Court (FISA
weeks following the attacks. Court) instead of the United States criminal court.

AS A SPECIAL AGENT AND SUPERVISORY SPECIAL AGENT, GETTING BACK TO THE ANTHRAX ATTACKS, WHAT WERE
YOU WORKED WITH ANTHRAX. WHAT EXACTLY IS THE INITIAL STEPS TAKEN TO ANALYZE THE SUSPECTED
ANTHRAX AND HOW IT CAN BE CONTRACTED? ANTHRAX?

Anthrax is the disease caused by the bacteria; Bacillus anthracis. When The first step was to determine the strain of Anthrax bacteria that was
an individual is infected by the bacteria, they are said to have con- being used in the attacks. At the time, there were close to one hun-
tracted Anthrax. Anthrax can be contracted by either inhalational, dred known strains of the Anthrax bacteria. Only two laboratories in
cutaneous, or gasteointestional means. Cutaneous Anthrax is the most the country had the ability to identify the strain of the Anthrax and
common but is the least lethal whereas, inhalational Anthrax is almost because the procedure used was very new at the time, it was impor-
always 100% lethal unless treated immediately but is much less seen. tant that both laboratories conducted the analysis.
The remedy for inhalational Anthrax is high levels of intravenous anti-
biotics administered immediately. In 2001 there were 5 fatalities, but Within 24 hours, both of the laboratories conducting the analysis
there also were several survivors who were put on antibiotics. confirmed that the Anthrax used in the attacks was of the Ames
strain. The Ames strain was named for the location for where the
REGARDING THE ANTHRAX ATTACKS IN 2001, HOW DID original strain was believed to be isolated (Ames, Iowa). While it was
THE SITUATION EVOLVE? later discovered the Ames strain actually originated from Texas, the
name continued to be used.
The Anthrax attacks occurred several weeks following the attacks that
occurred on September 11, 2001. At this time, letters were mailed Determining the strain was a very important step because early in the
through the U.S. Postal Services which contained various threatening investigation, there was no threatening letter to suggest an intentional
letters accompanied by powdered Anthrax spores. At least three of act. If the strain of the Anthrax was found to be one that was regu-
these letters were mailed to news agencies, while two of them were larly used in research, this would have suggested that the attacks could
addressed to United States Senators. Over the course of the Anthrax be intentional. If the strain of the Anthrax was one not seen before, it
attacks, 22 people contracted inhalational Anthrax, which resulted in could suggest a natural infection.
5 fatalities.
The Ames strain was a well-known strain of Anthrax that was used in
The first victim, located in southern Florida, was admitted to the research and was a strain typically used to test vaccine development.
hospital after suffering an illness with symptoms of vomiting and With the knowledge that the strain was used in research and that the
shortness of breath. On Oct. 4, 2011, the Center for Disease Con- victim was from a location where a natural occurrence was unlikely,
trol (CDC) confirmed that the victim had contracted inhalational investigators were considerably sure they were dealing with an act of
Anthrax. There was initial skepticism because inhalational Anthrax biological terrorism.
had not been seen in the US since 1976. A natural occurrence of
inhalation Anthrax could be seen in arid areas where cattle ranches are ONCE THE STRAIN OF THE ANTHRAX WAS DETERMINED,
in abundance because Anthrax can come from exposure to farm ani- WHAT FURTHER ANALYSES WERE CONDUCTED?
mals that had ingested the spores through grazing. Since the victim
was located in Southern Florida, a natural occurrence was unlikely. Almost immediately following the determination of the strain of
When the second victim, also located in Florida appeared, it was Anthrax used in the case, the FBI sent out subpoenas to identify every
relatively clear that this was an act of terrorism. laboratory in the country that had Anthrax in their possession. In
1996, Congress mandated that the shipping of select agents (Anthrax
YOU MENTION THAT THIS WAS AN ACT OF TERRORISM. being one of them) had to be regulated and approved by the CDC.
HOW IS AN ACT OF TERRORISM DEFINED AND HOW
DOES IT DETERMINE THE COURSE OF ACTION IN A CASE?

5
STEVENSON UNIVERSITY

Due to this mandate, the FBI was able to access the database that Senator Leahy with identical handwriting, return address, and postage
held every transfer of Anthrax across the country to determine which as the letter sent to Senator Daschle. This unopened letter contained
laboratories had access to the Anthrax strain in question. From this nearly 1 gram of Anthrax powder which allowed us the freedom to
database, a list of institutions with Anthrax in their possession was conduct testing that previously was not available because of the small
generated. This reduced the potential laboratory sources to 16 located samples we recovered from the opened letters. It opened the door for
in the United States and 4 located internationally that possessed the Carbon-14 dating, which was very helpful in determining the age of
Ames strain of Anthrax. Obtaining the samples from laboratories the Anthrax spores.
located within the United States was relatively easy since we were
able to use the court system to subpoena the laboratories. However In this case, two laboratories were able to conduct Carbon-14 dat-
obtaining the samples from laboratories overseas was a more arduous ing and they both came to the same conclusion: the Anthrax spores
task. We could not use the legal system and had to rely on diplomatic were modern and dated from 1998-2001. This was especially impor-
means, which took much longer. We eventually were able to collect tant because the government had forbidden the use of Anthrax as a
samples from Canada, United Kingdom, and Sweden. weapon in 1969, at which point, there were hundreds of pounds of
classified dried Anthrax powder in the countrys arsenal. The Carbon
Once we obtained these Ames samples, we compared them against dating analysis showed that the samples used in this attack did not
the Ames that was found in the mailed letters. We used DNA finger- come from the government supply.
printing to identify a unique genetic signature in the mailed spores.
From this information, we were able to determine that the attack HOW DID THE CASE RESOLVE?
Ames originated from the United States Army Medical Research
Institute of Infectious Diseases located in Frederick, Maryland The samples were all shown to have originated from USAMRIID and
(USAMRIID). were traced back to one scientist located there who was an Anthrax
vaccine expert. Nine of the samples came from one flask which
originally contained 1000 ml of Ames strain spores. The scientist
named Bruce Ivins had contracted production of the spores for use in
WHAT WOULD YOU SAY WAS THE BIGGEST BREAK- vaccine challenge studies, for which he was responsible in his duties
THROUGH IN THE CASE? at USAMRIID. The samples from the flask matched genetically with
the samples taken from the mailed letters. At this time, an investiga-
There were two important breakthroughs during this case. First and tion ensued which included investigating his emails, computers,
foremost, the genetics used in this case was groundbreaking. Using purchase history which showed some very incriminating evidence.
newly available procedures in the field of microbiology, we were Once it became clear that he was close to being indicted on terrorism
able to find unique mutations in ten of the 1000 plus samples we charges that might include the death sentence, he committed suicide
had collected. We were able to match the unique mutations in the in July 2008.
samples collected from the letters with the samples in our collections
of known exemplars of Anthrax. All ten matches came from the same IN THE TERMS OF BIOLOGICAL TERRORISM ATTACKS,
location. This was the first breakthrough, which determined that the HOW WERE THE INVESTIGATORY TECHNIQUES USED IN
Anthrax came from USAMRIID. THE ANTHRAX ATTACKS DIFFERENT FROM THOSE USED
IN THE PAST?
The second important breakthrough was finding the Senator Patrick
Leahy letter in a batch of quarantined mail. After the letter sent to What was unique in the Anthrax case was the way that the FBI
Senator Thomas Daschle was found on Capitol Hill, the Sargent in structured their investigative squads. There were three squads of
Arms of the House of Representatives and Senate quarantined all FBI agents. The squad that I was a part of was responsible for the
of the mail coming into the location that day. The mail flow to the forensics and consisted of agents with scientific backgrounds such
House and Senate resulted in 642 trash-bags of unopened envelopes. as Biology, Forensic Chemistry, Medicinal Chemistry and Genetics.
We collected those trash bags in 55 gallon drums, resulting in 280 This was unique because to my knowledge, this structure had not
barrels of mail. yet been utilized and has not been used since. All of the agents were
required to have advanced degrees in their field of science and 3 years
A Biosafety level 3 laboratory was built in a vacant warehouse where
of work experience in their area of expertise. The other two squads
HAZMAT trained agents analyzed the contents. Air sampling and
consisted of agents with a variety of backgrounds including but not
swabs of the trash-bags was performed by placing Q-tips into the
limited to accounting, engineering, and military officers. This squad
bags. These Q-tips were cultured for Anthrax bacteria. One bag of
was responsible for interviews, email searches, etc. Each of the three
quarantined mail showed a very large spike in Anthrax bacteria. Once
squads also consisted of several postal inspectors.
this bag was sorted through, a letter was found that was addressed to

6
FORENSICS JOURNAL

COULD YOU EXPLAIN WHAT THE LABORATORY STEPHANIE WITT completed her Under-
RESPONSE NETWORK IS AND HOW IT WAS INSTRU- graduate studies in 2008 at the University
MENTAL IN HELPING TO INVESTIGATE THE ANTHRAX of Baltimore, with a B.S. degree in Forensic
ATTACKS? Science. She continued her studies at Steven-
son University where she received a Masters
The Laboratory Response Network was established in January 1999. degree in Forensic Science in May 2011.
The Center for Disease Control (CDC) held a meeting in which Stephanie currently works at Stevenson
representatives of the major U.S. Laboratories were present including University as the Assistant to the Dean in the
Department of Defense (DOD), Association of Public Health Labo- School of Graduate and Professional Studies.
ratories (APHL) and FBI. The idea was to create a critical component
for the countries readiness to detect and respond to bioterrorism
incidents. The CDC developed corporative agreements with the states
and larger municipalities. The CDC supplied funding to state and
large local public health laboratories to buy state of the art equipment.
The laboratories were also provided with quality-controlled reagents
and standardized protocols for the analysis of each select agent or
pathogen. This allows analytical results to be comparable between
Laboratory Response Network members. In the Anthrax case, it was
the Jacksonville Florida public health laboratory that identified the
first victim. The understanding was that these laboratories could use
the equipment for daily public health, however they would assist in
the event of a bioterrorism incident.

One reason that the Laboratory Response Network was extremely


important during the Anthrax attacks was because once it became
public knowledge that the Anthrax attacks were being conducted
through the mail, the result was a rash of white powder letters across
the country. Individuals were sending acquaintances, enemies, busi-
nesses, etc. letters filled with white powder. All of these incidents had
to be investigated and the substances had to be tested. The Labora-
tory Response Network enabled the state public health laboratories to
conduct the analyses. If the Laboratory Response Network was not
available at the time, the national level laboratories at Fort Detrick
and the CDC would have had to analyze about 50-60 thousand addi-
tional letters, during November 2001 alone. Instead, the state and
local laboratories that were part of the Laboratory Response Network
were available to test the potential Anthrax using standardized pro-
cedures, which greatly lessened the workload of the Federal Labora-
tories. These hoax incidents often developed into their own criminal
cases requiring the normal police work that accompanies criminal
cases. The Laboratory Response Network members worked with
their local FBI offices to institute procedures for maintaining chain of
custody and evidence control. Thus, if and when charges were filed
against an individual responsible for mailing white powder, the hoax
letter and its contents would be admissible in court.

7
STEVENSON UNIVERSITY

Print Technology and Forensics


Amir Eden

Three-dimensional print technology is a cutting edge technology Although 3D technology made its first appearance in the 1950s on
on the consumer market. New consumer technology creates new movie screens, the first 3D printing device was not created until
problems in need of innovative solutions. More specifically, it is the 1980s (What is 3D Printing?!). According to Tony Hoffman,
necessary to explore the issues that 3D print technology will present printer analyst and author for PC Magazine, the inventor of this
to forensic examiners and forensic investigations compared to its two- innovative device was Charles Hull, using a method known as stereo
dimensional counterpart. In the case of this emerging technology, it lithography. Within this process, an ultraviolet laser traces the object
is essential for forensic examiners to know how to access valuable data in photopolymer. Afterwards, the polymer turns solid under the
from these devices. It is also necessary for examiners to remain cur- beam and the object is printed in stacked layers based on the com-
rent on 2D print technology and explore more ways to access valuable puter design sent to the printer (Hoffman). In 1986, Hull patented
data, as well as expand current methods. Print technology can truly this method and founded 3D Systems (The Journey of a Lifetime).
impact forensic examinations. Exploration is the most effective way Following this, the Selective Laser Sintering (SLS) and Fised Deposi-
to understand the extent to which this technology will affect forensics. tion Modeling (FDM) methods debuted new 3D printers in 1992
(What is 3D Printing?, 3dPrinting.com). Depending on the avail-
Computer print technology has been in existence for quite some ability of materials and type of 3D printer, these devices can produce
time. Recently, headlines about 3D printing have surfaced in online a multitude of objects including general equipment parts, toys,
news and magazine articles with stories about this technology posted sculptures, utensils, product prototypes and more.
in online technology forums. Within the industrial sector, there is
an abundance of history surrounding 3D printers as well as its 2D Generally, a 3D printer can either be industrial, for the manufac-
counterpart. Although 3D print technology is new on the consumer turing sector and large companies, or commercial, for at home or
market, this type of technology originated in the 1980s but remained consumer use. Industrial 3D printers are massive in size and more
on the fringes of the technical market. expensive to operate as they are used to create bigger object designs
for manufacturing companies. Software for this type of printer usu-
WHAT IS 3D PRINT TECHNOLOGY? ally involves larger scale prototype designs (What is 3D Printing?,
About3DPrinters.com). For example, the automotive companies use
3D print technologies consist of a special process. This type of print- them to make test vehicle parts. In addition, developers for various
ing is also referred to as a prototyping process whereby a real object products use 3D printers for prototyping in the beginning stages of
is created from a 3 dimensional design (3D Printing Basics). This product development before mass production. The availability of
print technology requires a design. This design is either downloaded commercial 3D printers for average consumer use is a new phenom-
from a free online library or created using a computer modeling soft- enon. These printers are currently being introduced via the consumer
ware design tool, such as computer aided design (CAD) software and market. Currently, investors are being sought by small hobbyist orga-
generated by a user on a computer (Pellet). The user must then send nizations to bring more 3D printers into the homes of consumers.
his or her file containing the design to the 3D printer. From there, the This is apparent based on various 3D print funding campaigns that
printer selects the raw materials that will be used to create the real-life appear as pop-ups throughout the cyber realm. However, the lack of
replicated object. When the printer prints the design, the chosen demand for 3D printers is based on the lack of knowledge regarding
materials are layered on top of one another, forming small stacks (3D availability and capability of 3D print technology by the less technical
Printing in News). This is the basis and foundation of 3D printing consumer (What is 3D Printing?, About3DPrinters.com).
devices as objects take form.
WHAT IS 2D PRINT TECHNOLOGY?
The method used in replicating real object designs is referred to as an
additive production technique (3D Printing in News). Specifi- Lower on the printing spectrum is 2D print technology which
cally, this method refers to the process by which raw materials are produces flat, vertical or horizontal documents from computer files
added into the layers. These materials include items such as ABS and consists of two main categorical types: impact and nonimpact.
plastic, polyamide (nylon), glass filled polyamide, stereo lithography According to Jeff Tyson, author and certified systems engineer, impact
materials (epoxy resins), silver, titanium, steel, wax, photopolymers printers have parts that actually touch the paper to create a docu-
and polycarbonate (3D Printing Basics). Once a material is ment. Within this category are dot matrix and character printers.
selected, the 3D printer discharges it sparingly, just as a 2D inkjet Tyson states that a dot matrix printer uses an array of small pins. The
printer would; however, the material distributed from a 3D printer is pins strike a ribbon coated with ink, causing the ink to transfer to
printed by layer as opposed to across a page (3D Printing in News). the paper at the point of impact (Tyson). Character printers have
As a result of the additive method, all materials used to form the final a series of bars with characters on each of them consisting of normal
object are efficiently used. numbers and letters. Similar to a typewriter, each bar hits the ink

8
FORENSICS JOURNAL

ribbon and transfers the image of the character to paper. Nonimpact (How 3D Printing Is Changing). The medical industry has also
printers function as the name implies. No part within the printer been impacted by this technology. While still in the development
touches the paper. Inkjet printers employ an array of tubes that squirt stage, 3D printers can now produce molds for dentists, prosthetic
ink onto the paper (Tyson). Laser jet printers use a method of fusion, body parts for patients, and print almost functional human organs.
bonding and static electricity to place toner, also known as dry ink, on This print technology is making strides in the medicinal industry.
paper using heat (Tyson). These printers assist with drug testing and tissue re-creation (How
3D Printing Is Changing). Specifically, 3D printers assist by re-
Georgiana Bobolicu, technology journalist, reports that the first com- creating human tissue samples used to directly test the outcome and
puter associated printer was developed in 1953 by an inventor named effects of treatments. Doctors are then able to accurately document
Remington-Rand. Bobolicu further reports that International Busi- treatment effects. Since its inception, 2D technology has made an
ness Machines (IBM) marketed the first dot matrix printer in 1957. impact on everyday life. Without it, the ability to create physical
She notes that the process was a dry print method, known as electro documents from computer files, copy or even scan files to produce
photography, invented by Chester Carlson. During this process, a another document wouldnt exist. Curiously, the lesser known indi-
photosensitive surface is uniformly charged with static electricity viduals affected by both printers are the computer security personnel
forming an invisible layer (Bobolicu). Toner is finely spread, which or forensic examiners in the computer forensic field. These profes-
reveals the once invisible image. The image is then transferred and sionals will be impacted by this technology on the industrial and
developed. Next, fusion occurs between the toner and paper by commercial front.
strained heat. Residual toner is cleaned using charged electricity
particles and the process is complete. This dry print process is the COMPUTER FORENSICS
forerunner of the modern laser printer (Laser and LED Printers).
Computer forensics is defined as the application of computer inves-
Unlike 3D printers, 2D print devices are prominent on the com- tigation and analysis techniques to gather evidence suitable for pre-
mercial market. Despite the fact that large companies and business sentation in a court of law (Bassett, Bass and OBrien 22). Forensic
institutions may use them, laser and inkjet printers are generally sized examiners in this field recover data from an array of media sources
to fit on desks or table-tops. There is no special software required which include hard drives, files and even printers. It is the duty of
when using these printers other than the setup programs to connect these individuals to recover and collect important electronic infor-
the device to a network. These devices generally print documents mation for evidence. In computer forensics, examiners must follow
such as reports, presentation slides, graphs, photographs, etc. As a rigorous procedures during each investigation conducted on digital
result, only ink or toner and computer paper is needed for document media and keep clear documentation of evidence. During an inves-
production. tigation, examiners must maintain accurate records of conduct and
discoveries for presentation in court. It is the forensic specialists duty
SIMILARITIES AND DIFFERENCES to collect enough evidence to piece together a clear picture in order to
reveal criminal activity.
3D and 2D printers are the same type of product; printers. These
devices also serve the same purpose, i.e. produce a print from a file Computer forensics is a field where various specialty software tools
that is sent to it. Although this basic concept is true, these devices are used by examiners to recover incriminating data by searching for
differ in a variety of ways. The most significant difference is that a items such as recently opened and deleted files. A forensic examina-
3D printer prints up as opposed to across. As stated earlier, a 3D tion consists of searching through slack spaces as well as unallocated
printer uses materials, while a 2D printer exclusively uses ink or toner file spaces within a hard drive. Through the course of an examina-
cartridges. In addition, the time it takes to finish a print job on a 3D tion, an examiner may also look through data clusters within a hard
printer can be longer compared to the time it takes to finish a print drive in order to recover evidence or the presence of a suspicious file.
job on a standard 2D printer. This is because the 3D object is based It is a fact that erased files are never permanently deleted. This fact
on a complex design, while a 2D document is a basic computer file. makes it possible for an examiner in the forensic field to retrieve data
A more evident fact is that the end product is obviously different. A previously thought by the user to be lost. This is because the clusters
3D printer will produce an object, whereas a 2D printer will produce on the hard drive are still reserved as place holders for the erased data;
a document. Lastly, the 3D printer costs more as new consumer tech- however, to the untrained eye, it appears as if the files are gone. An
nology usually does, which makes its 2D counterpart more affordable. examiner simply has to dig in order to find this information. It is in
these areas where key evidence may surface. It is a forensic examiners
3D print technology has already made an impact on the automotive responsibility to collect as much electronic information as possible
industry through utilization of 3D printers to produce prototypes and preserve it with the utmost integrity for use, if needed, in a court
and car parts that are sturdy as metals are added into the material mix of law. An abundance of evidence must not only be retrieved, but

9
STEVENSON UNIVERSITY

collected in accordance with various ethical procedures. These ethical information from a printer can identify the device by its Uniform
procedures protect examiners and recovered evidence against any form Resource Locator (URL), embedded by manufacturers within a small
of corruption. Evidence can include any details such as passwords, microchip, which serves to monitor ink or toner supply (Hoekstra).
filenames, personal identifiable information in memory, and even
running programs and files. In the case of 3D and 2D print technol- VULNERABILITIES AND LIMITATIONS
ogy, this will include printers as the connected media.
Unfortunately, printer technology has vulnerabilities and limitations
In forensics, it is essential that examiners adhere to strict rules. These like other technological devices. In general, a major vulnerability
individuals must ensure that evidence is collected from an item (i.e. within print technology is that a printer can be readily attached to a
electronic media) that has been protected and remains in the same local area network (LAN). This feature makes a printer accessible and
state in which it was received. This ensures that potentially valuable visible to every device that is connected or able to be connected on
evidence is free from damage. Examiners discover a variety of valu- that network. Because of this security issue, printers are good targets
able data during the course of an investigation and retrieve as much for hackers. Generally, 2D printer devices use the Jet Direct protocol
information as possible whether hidden, deleted, etc. It is essential to (Guerrero). This protocol establishes contact with awaiting network
accurately organize and analyze each piece of data. Evidence pre- printers, adds information only understood by the printers, identifies
sented in court requires procedures that can be re-created to ensure what content needs to be printed, and detects the format as displayed
accuracy by a third party examiner. For this reason, it is essential that by the document file extension. As a result of the ability of a printer
forensic examiners in the field keep detailed and accurate notes so that to receive commands, a hacker gains the ability to access a variety of
an outside individual can replicate the recovery of the same evidence, print devices in different locations. This opens the door for denial-of-
executing the same process and procedures without error. service (DOS) attacks i.e. sending unrecognized information to over-
whelm the machine thus rendering it non-functional or essentially
PRINTER FORENSICS taking it off-line, and remotely controlling it with malicious intent.

A more significant branch of the computer forensic field to this explo- One other vulnerability involves the ability to circumvent authen-
ration is printer forensics. Printer forensics is not yet a defined field but tication processes. Any maliciously driven individual can entirely
it is emerging in the forensic arena. The ideal goal for printer forensic sidestep the process of authentication by making a direct connection
data recovery is to be able to identify the technology, manufacturer, to the port or sending content to print (Guerrero). This is signifi-
model, or even specific unit that was used to print a given document cant because when a print job is sent, labels appear when viewing the
(Mikkilineni et al. 223). There are currently two strategies proposed scheduled print job, which include network information, folder setup
for printer forensics using support vector machine (SVM) techniques. and structure as well as names of the folders along with filenames.
According to Mikkilineni et al. these strategies are described as passive This information can be used to gather data about a company, obtain
and active. The passive strategy involves identifying features that are sensitive information and threaten national security if attacks are car-
specific to a certain printer, model, or manufacturers products (Mik- ried out on high target printers (i.e. Department of Defense assets).
kilineni et al. 223). This will help to determine which device printed The fact that printers can potentially store print jobs leaves informa-
the document in question. The second strategy, referred to as active, tion vulnerable to unauthorized access. The fact that encryption is
involves embedded information from the printer to the document. lost once a document is sent to a printer should put many industries
Within this process, information such as the serial number of the on alert and convince them to secure printers in addition to the usual
printer and the date on which a document was printed can be found computer and other electronic devices containing sensitive informa-
embedded within a printed document (Mikkilineni et al. 223). tion (Guerrero).

There is a more commonly known technique for identifying the Numerous limitations within both the computer and printer forensic
source of a printed document. The technique for identifying the communities exist. A shared limitation in terms of print technology
relationship between a printed document and its printer is known is the lack of software constructed tools for use in forensic examina-
as banding (Mikkilineni et al.). In banding, virtual fingerprints or tions. There are many forensic tools available; however, these tools
drum rotation marks are left on each paper produced by a printer. are not designed to retrieve information from printers. Currently
The imperfect horizontal markings on printed documents reveal its available tools are also not equipped to identify tampering within
manufacturer type. Also, printer companies currently embed manu- printer hardware or software. Another limitation is that a universal
facturing codes to each document produced in addition to serial tool would not be an option since manufacturers typically keep their
numbers (Hoekstra). In this area of forensics, an examiner focuses products secret from competitors. This poses a problem because a
on the scattered dot signature left behind on documents, which can forensic examiner cannot possibly have a separate or custom made
serve as identifiable information. An examiner attempting to retrieve software tool designed for each printer on the market. This makes it

10
FORENSICS JOURNAL

difficult to create a new functional forensic tool that will recover data, not currently have a dedicated set of tools to recover information.
print history, metadata and product production dates. This makes data recovery difficult because there is no foundation on
which to start an initial analysis. There is also no set standard for data
Previously listed vulnerabilities and limitations are common for 2D collection from a printer. This makes evidence recovery a challenge.
printers when it comes to forensic data recovery; however, 3D print- A final limitation regarding 3D print technology is the protocol for
ers represent a new set of vulnerabilities and limitations. First, the documentation, preservation and storage parameters for recovered
network connection will prove to be a significant weakness. 3D data. The final limitation includes the space needed to examine 3D
printers are new to the consumer market; therefore, the product is in print objects of different shapes and sizes.
an experimental stage. This means that the ability for the device to
be connected to a computer network via physical or wireless methods DATA RECOVERY
is a considerable vulnerability. This is a likely vulnerability because
hackers can gain remote access to 3D printers and cause damage to a This brings the discussion to what significant data can be recovered
network through its connection by virtually transporting and execut- from print technology. Generally, metadata is recoverable from a
ing malicious codes or programs over open ports. This is worse in the print file. Metadata is a small hidden description of a file. This data
case of 3D printers because the device is so new that it is reasonable to typically includes the author, date of creation, last date of access,
assume all bugs have not yet been worked out. file type and other small data details. In 2D printers, it is easy for a
computer professional to locate the metadata within the file and dis-
A second vulnerability is that 3D printers have their own specialty cover key elements. This sort of data is useful in determining where a
software, which enables them to print a file from the specifically document was made and by what machine. According to Benjamin
created file extension for its particular device. Because this is true, Wright, a Professor in the law of data security and investigations at
exploits will inevitably be discovered as they are in all computer based the System Administration, Networking and Security (SANS) Insti-
technology. Specific hacking techniques will also be developed as a tute, metadata can reveal the location of the first owner through code.
result of the custom software. This will allow the software to be mali- He also states that, in theory, a 3D printer can leave trace information
ciously re-written, which will encourage hackers to create malevolent in the form of metadata, which would include numbers, words or
executable programs. A third vulnerability, is that project data will be codes physically located within the produced object. Serial numbers,
open to theft, meaning a malicious user, after gaining access on the codes, GPS location details and timestamps would also be likely to be
printer network, will be able to view print jobs in the queue. This embedded in printed 3D objects (Wright). This information will be
is a problem because if a company wants to conceal a product until useful in forensic cases where little information is known.
official release from competitors until development, exploitation of its
recent print jobs will be damaging. Metadata is not the only significant information. The material type
of a 3D printed object will be helpful in determining its source. Not
The most significant vulnerability and limitation within the forensics only can the object be physically searched for embedded information,
community is the lack of knowledge. Most forensic examiners arent but the material can also be biopsied. This will allow examiners to
aware of the type of data that a printer can hold. Many examiners identify what material was used. Material identification can lead to a
do not fully understand the technicalities of how a printer functions specific printer, which will allow the object to be traced to a particular
physically as oppose to just on the network. This fact is why print manufacturing company just as ink or toner can be traced to a certain
technology forensics has not evolved as far as computer and mobile model of 2D laser or inkjet printer. Once the identification has been
device forensics. Overall, this combination of vulnerability and made, examiners will be able to detect the printer source. This will be
limitation will hinder progress in print technology investigations until useful in cases of fraud or investigations into malicious activity.
more knowledge about print technology is gleaned.
WHATS IN STORE FOR THE FUTURE?
A plethora of limitations exist that are specific to 3D printers in foren-
sics. First, this technology is up and coming, meaning it is new and The future holds endless possibilities for 3D print technology. It
improved each day. This is a limitation because forensic examiners seems that there is no object a 3D printer will not be able to create
are bombarded with a complex new technology. In addition to that, within the next few years. This is especially true based on its prod-
the software component to a 3D printing device is open source or uct growth. At this rate, items produced by 3D printers will include
freely shared. This will present a steep learning curve for examiners. house parts, furniture, vehicles, appliances and other electronic
As a result of the open source nature, it will constantly be upgraded devices. Yet to come is the ability of 3D printers to create developed
and forensics cannot keep up with such rapid growth. Examiners are human cells, tissues, ligaments, organs and various other body parts
already at an unfair disadvantage based on the speed in which this from organic materials (Rosenbach and Schulz 2). In addition, 3D
print technology is being introduced to society. Second, printers do printers will further advance the medical field by printing prescribed

11
STEVENSON UNIVERSITY

medications. In this case, a doctor will send the prescription and its technology that will significantly impact the forensic field. Expansion
ingredient list to the computer design software. The 3D printer will of printer forensics will be important as this technology advances.
create the medication based on the doctors list and custom create a
patients prescription (Rosenbach and Schulz 2). Although there are a lot of benefits to this technology, the limitations
and vulnerabilities create concern. In order to stay ahead of the game,
3D print technology will change the manufacturing business. The forensic examiners must understand exactly how printers function.
most significant change will come in the form of profits. As 3D This will allow them to fully grasp how these devices can be exam-
companies expand with the success of 3D printers, more money will ined. The big questions are: What can be collected from a printer?
flow into them. Production costs will be cut drastically as steps are What data is physically stored on a printer? How is this information,
eliminated from the production cycle. Costs for making changes to once identified, going to be useful in an investigation? After a foren-
product prototypes will be reduced because a company will only have sic investigator learns what information a printer can provide, he or
to reprint the item (Rosenbach and Schulz 1). There will likely be a she can identify what information can be recovered from such devices.
surplus in new products because 3D printers will make it easier for
anyone to design and print prototypes. The key to a computer forensic investigation is to figure out the facts:
who, what, when, where, why and how. The answer of who, in this
It is obvious that the ability to print an item on a whim means fast case, is the hacker. Why hackers? Because these are the individuals
product delivery. This print technology device will alter the way who are sniffing open ports on a network to figure out how to gain
people shop. Not only will businesses and purchase patterns be access. In this case, what, will be the data retrieved by the hacker as
altered, but inventors and product makers will be able to enter the a result of an unsolicited intrusion. It will also include figuring out
consumer market at a lower cost than usual (Rosenbach and Schulz the type of information the examiner wishes to retrieve to prove an
1). This will happen because the cost to design, develop and produce intrusion or fraud occurred. Figuring out when, will be finding out
a product will be significantly lower. the date and time of an intrusion on a network. It will also be the date
and time a 3D object was printed. The answer to where, in this case,
In the future, 3D print technology will challenge society. When a will be the location of a potential crime. It will include the location of
product has been on the market for a certain period of time, the size, traced attacks linked back to an Internet Protocol (IP) address con-
shape and functionality is modified in order to appeal to more con- tained on a specific suspects network. Why was the crime commit-
sumers. 3D print technology will branch into full size scanning and ted? The answer will always arise as the investigation progresses if
duplication in the future. The outcome of this spread or overlapping one is not readily apparent at the outset. Last but not least, is how?
of similar types of technologies will create a bigger challenge for foren- This information will come based on the location of the evidence or
sics but will also bring innovations that have been previously unseen. lack thereof. Figuring out how a hacker gained access to or control
of a printer is essential to solve an investigation and implement new
Based on further technical advances, the printer forensics branch of methods to prevent a crime involving a printer in the future.
computer forensics will evolve into a separate discipline. The evolu-
tion of print technology will create specialized forensic examiner Tools will need to be produced which allow an examiner to examine
positions in 3D and 2D print technology, thus an understanding of print technology in a way that preserves data without alteration or
3D print technology will be critical. contamination. Once the body and components of a 3D printer
are fully understood, forensic recovery tools must be developed that
CONCLUSION will function with the in-house software components. Tools created
specifically for 3D print devices must be able to collect history, print
The success of 3D printers means a rise in crime involving fraud,
files, and identify metadata and user data residing on the network.
copyright, product patent laws and licensing rules. 3D printers will
Information will be easily recoverable for a forensic examiner seeking
open the door for imitators to copy products, works of art, etc., which
to discover evidence with the creation of forensic print tools. It will
will lead to stricter rules and ethical standards. Many legal conflicts
also be beneficial if the 3D printer companies shared the product map
will arise in the face of this new technology. Because of the intrica-
of their devices to allow examiners to build efficient general tools with
cies of patent and copyright laws, there will always be a debate about
applications.
product infringement. Unfortunately, issues regarding reproduction
are a separate topic of uncertainty in regards to 3D print technology. To gain knowledge about these devices, forensic examiners will need
to complete courses in 3D print technology. As examiners familiarize
In researching 3D and 2D print technology, it can be stated that both
themselves with the intricacies of 3D technology, variety of printers
have an effect on the forensic field. 2D technology currently impacts
manufactured, and specific attributes, these forensic experts will be able
forensics based on the hacking techniques and attacks outlined
to provide insights regarding exploitation. Additionally, reverse engi-
previously. Conversely, 3D print technology is the specific print
neering methods can provide tools to extract evidence while employing

12
FORENSICS JOURNAL

distinctive evidence collection procedures. As 3D printers become The Journey of a Lifetime. 3DSystems. 3D Systems, n.d. Web. 9 Apr.
available to consumers, the prices will drop to a reasonable range. 2013. <http://www.3dsystems.com/30-years-innovation>.
When this happens, 3D cyber-crime will increase and forensic special-
ists will be in high demand. Formal coursework and training specifi- Laser and LED Printers Technology. Mimech.com. Micromechanic
cally designed to counter 3D printing technology crimes is the solution. Company, n.d. Web. 17 Apr. 2013. <http://mimech.com/printers/
laser-printer-technology.asp>.
With all the possibilities and wonders of 3D technology, forensic
examiners must be prepared with data recovery tools, methods, tech- Mikkilineni, Aravind K., et al. Printer Forensics Using SVM Tech-
niques and tactics. This type of print technology is a challenge for niques. NIP21: International Conf on Digital Printing Technologies.
forensics as it pushes the boundaries of technology, tests the rules of Vol. 21. N.p.: n.p., 2005. 223-26. NIP 21. Engineering.purdue.edu.
evidence, reimagines intellectual property laws, and has the capability Web. 23 Mar. 2013. <https://engineering.purdue.edu/~prints/public/
to threaten society. The optimal approach for forensic professionals is papers/nip05-mikkilineni.pdf>.
to learn everything about this emergent print technology in order to
counter the threat of malicious activity, recognize it when it occurs, Pellet, Jennifer. How 3D Printing Works. T. Rowe Price. T. Rowe
and provide irrefutable evidence in court. Price Investment Services, May 2012. Web. 23 Mar. 2013. <http://
individual.troweprice.com/public/Retail/Planning-&-Research/
REFERENCES Connections/3D-Printing/How-3D-Printing-Works>.

3D Printing Basics. www.3ders.org. www.3Ders.org, n.d. Web. 23 Rosenbach, Marcel, and Thomas Schulz. 3-D Printing: Technol-
Mar. 2013. <http://www.3ders.org/3d-printing-basics.html>. ogy May Bring New Industrial Revolution. Spiegel Online. Spiegel
Online, 4 Jan. 2013. Web. 20 Feb. 2014. <http://www.spiegel.de/
3D Printing in News Videos. About3DPrinters.com. About3dPrint- international/business/3d-printing-technology-poised-for-new-indus-
ers.com, n.d. Web. 23 Mar. 2013. <http://www.about3dprinters. trial-revolution-a-874833.html>.
com/3d-printing-news.html>.
Tyson, Jeff. How Inkjet Printers Work. HowStuffWorks. HowStuff-
Bassett, Richard, Linda Bass, and Paul OBrien. Computer Forensics: Works, n.d. Web. 17 Apr. 2013. <http://computer.howstuffworks.
An Essential Ingredient for Cyber Security. Journal of Information com/inkjet-printer.htm>.
Science and Technology 3.1 (2006): 22-32. Citeseerx.ist.psu.edu. Web.
20 Feb. 2014. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10 What Is 3D Printing? 3dPrinting.com. N.p., n.d. Web. 23 Mar.
.1.1.126.2719&rep=rep1&type=pdf>. 2014. <http://3dprinting.com/what-is-3d-printing/>.

Bobolicu, Georgiana. History of Computer Printers. Softpedia. Soft- What Is 3D Printing? About3DPrinters.com. About3DPrinters.com,
pedia, 7 Nov. 2008. Web. 17 Apr. 2013. <http://gadgets.softpedia. n.d. Web. 23 Mar. 2013. <http://www.about3dprinters.com/what-is-
com/news/History-of-Computer-Printers-032-01.html>. 3d-printing.html>.

Guerrero, Sebastin. Exploiting Printers via Jetdirect Vulnerabili- What Is 3D Printing?! Squidoo. Squidoo, n.d. Web. 9 Apr. 2013.
ties. VIAForensics. viaForensics, 14 Jan. 2013. Web. 24 Mar. 2013. <http://www.squidoo.com/3d-printing-jewellery>.
<https://viaforensics.com/security/exploiting-printers-via-jetdirect-
Wright, Benjamin. 3D Printing Forensics. Legal-beagle.typepad.com.
vulns.html>.
N.p., 7 July 2011. Web. 20 Feb. 2014. <http://legal-beagle.typepad.
Hoekstra, Marjolein. Quiet Encoding: How Your Laser Printer com/security/>.
Manufacturer Has Embedded an ID Code on Every Page You Print.
MasterNewMedia. N.p., 27 Nov. 2004. Web. 17 Apr. 2013. <http:// AMIR EDEN recently graduated from
www.masternewmedia.org/news/2004/11/27/quiet_encoding_how_ Stevenson University with a B.S. in
your_laser.htm>. Computer Information Systems. She started
in Stevensons BS/MS program her junior
Hoffman, Tony. 3D Printing: What You Need to Know. PC Maga- year and is currently working to complete
zine. Zaff Davis, 17 Oct. 2011. Web. 9 Apr. 2013. <http://www. her M.S. in Computer Forensics. She is
pcmag.com/article2/0,2817,2394722,00.asp>. currently working for a defense contractor
and is looking forward to a fulfilling career
How 3D Printing Is Changing the World. About3DPrinters.com. in computer forensics.
About3DPrinters.com, n.d. Web. 9 Apr. 2013. <http://www.about3d-
printers.com/how-3d-printing-is-changing-the-world.html>.

13
STEVENSON UNIVERSITY

The Methods to Prevent and Detect Fraud in the


Supplemental Nutrition Assistance Program
Valerie Roebuck

The Supplemental Nutrition Assistance Program (SNAP)1 experienced rate has decreased from four cents per dollar of benefits redeemed
a spike in enrollment during the last few years due to the economic to one cent per dollar (Lavallee). Even though the fraud rate has
crisis (Supplemental Nutrition Assistance Program). According to declined, SNAP fraud remains a major problem and costs the Fed-
Congressional Budget Office statistics, SNAP recipients increased eral Government millions of dollars every year. Between the years
by 70 percent between 2007 and 2011 with the program now rated of 2006 and 2008, SNAP lost $330 million in benefits to trafficking
the second largest assistance program for low income families (Issa). (The Extent of Trafficking 2). The USDA should review the current
In 2012, SNAP issued over $74 billion in benefits (Supplemental methods used to combat SNAP fraud and work to identify technolo-
Nutrition Assistance Program). gies and policies which should be revised, upgraded, or modified to
prevent, detect, and prosecute fraudsters.
With the large growth in program participation and costs, the Federal
Government is scrutinizing the methods used to combat SNAP fraud PROGRAM BACKGROUND AND PARTICIPATION
(Issa). There are four basic methods of SNAP fraud: misrepresenta- REQUIREMENTS
tion, multiple states enrollment, misuse of another persons benefits,
and trafficking. The first SNAP fraud occurs when people misrepre- In order to understand the current issues of SNAP, it is important to
sent themselves on applications in order to receive or redeem benefits examine the programs background. The SNAP program is funded
(Concannon). The applicant may provide false information such as a and regulated by the Food and Nutrition Service (FNS) division of
fake Social Security number, incorrect address, or inaccurate employ- the USDA (Supplemental Nutrition Assistance Program). Each
ment status. The second fraud is when recipients violate program state administers the program and determines the eligibility of its
regulations and receive SNAP benefits in multiple states (Fong). The participants (United States Government Accountability 2). The FNS
third occurs when someone uses another persons SNAP benefits. is required to ensure that states are complying with its policies and
Only the recipient is authorized to access and use the benefits he or are taking the means necessary to prevent SNAP fraud (United States
she is awarded (Food Supplement Program). Government Accountability 2).

Trafficking is the fourth type of SNAP fraud that refers to the In the program, individuals receive SNAP benefits based on their eco-
exchange of benefits for cash or other consideration (Supplemental nomic needs. Individuals must apply in the state in which they reside
Nutrition Assistance Program: Trafficking Controls and Fraud Inves- and are not allowed to receive benefits in multiple states (Residency).
tigations). SNAP benefits may only be used on specific food items The amount of SNAP benefits a household receives is based on the
that the United States Department of Agriculture (USDA) identifies. household income, household composition, shelter costs, and other
These items include meats, vegetables, fruits, dairy, breads, cereal and expenses, such as child support and dependent care payments (Food
seed to grow food producing plants (Supplemental Nutrition Assis- Supplement Program). According to the Code of Federal Regula-
tance Program). People are not allowed to use their benefits on pre- tions (CFR), a household is eligible based on income if its income is
pared, hot foods such as food served in a restaurant (Supplemental at or below 130% of the Federal income poverty level (Income and
Nutrition Assistance Program). When individuals receive too much Deductions). Every household begins with a baseline USDA determi-
or too little in SNAP benefits, the result is a payment error (United nation as the maximum allotment for the household size (Supple-
States Government Accountability 4). The payment error rate is the mental Nutrition Assistance Program). This number is based on
percentage of benefits that were issued in error (United States Gov- current food prices and will be adjusted periodically to reflect chang-
ernment Accountability 4). The current payment error rate is 3.8 ing prices (Food Supplement Program). The higher the household
percent (Fong). In 2011, the Office of the Inspector General (OIG) income, the lower the household SNAP benefits entitlement. Shelter
audited five states (Fong). They found 8,594 cases in which benefits costs or qualified expenses will increase the benefit amount and offset
were improperly distributed resulting in a potential loss of around the income adjustment (Food Supplement Program). Applicants
$1.1 million in benefits a month due to payment errors (Fong). are required to provide verification at the time of application such
as income, identity of the head of household, alien status, and resi-
The USDA has implemented technologies and policies in SNAP to dency (Office Operations and Application Processing). States have
protect the program from fraudulent practices. Since 1993 the fraud the option to request verification of deductable expenses such as

1
The program was previously known as the Food Stamp Program. The name was changed to SNAP on October 1, 2008 to emphasis nutrition in the program and
increased benefit amounts (Supplemental Nutrition Assistance Program).

14
FORENSICS JOURNAL

shelter costs and child care costs (Office Operations and Application records the information such as where the transaction occurred and
Processing). Also, the administering offices can request additional how many benefits were used during a transaction (Hatcher). Once
documentation if they believe there is inaccurate information on the the transaction occurs, the system automatically deposits money into
application (Office Operations and Application Process). the retailers account (Food Stamp Program).

In addition to income requirements, applicants must also meet The EBT system is one of the primary tools used by fraud detection
citizenship requirements to receive SNAP benefits. As a rule, an units to identify fraudulent activities in SNAP (Hatcher). It reads into
individual must be a citizen of the United States or be a legal perma- the Anti-Fraud Locator EBT Retailer Transactions System (ALERT)
nent resident who has maintained legal status for at least five years which produces EBT management reports (Fong). The fraud detection
(Citizenship and Alien Status). There are exceptions to these rules units can look at these reports and take note of any potential fraudu-
based on age and how the person entered the country. For example, a lent patterns (Fong). One suspicious pattern is the use of benefits
legal permanent resident under the age of 18 who has not been a legal across state lines (Hatcher). If a majority of purchases are occurring in
permanent resident at least five years may qualify for benefits (Citi- a state outside the recipients residential state, this may be an indicator
zenship and Alien Status). An individual who entered the country of someone other than the recipient using the EBT card (Ballou).
as a refugee or who has been granted asylum may also be entitled to
Prior to the use of the EBT system, benefits were issued by paper
benefits (Citizenship and Alien Status). Benefits may be granted to
coupons. It was difficult to track the use of the coupons and individ-
individuals from a particular country or ethnic group that the CFR
uals could more easily traffic their benefits (Hatcher). In 1993 paper
identifies as eligible recipients2 (Citizenship and Alien Status).
coupons were still in use and an estimated $811 million dollars in
If a household is found eligible for benefits, the recipient is given a benefits were trafficked (The Extent of Trafficking 3). The amounts
set dollar amount to spend on eligible food items every month. The decreased between 1999 and 2002 to $393 million dollars (The
benefits are automatically credited to an Electronic Benefit Transfer Extent of Trafficking 3). During this time period, states were begin-
(EBT) card which is used like a debit card at participating retailers ning to implement the EBT system (Klerman and Danielson 870).
(Food Supplement Program). States are required to ensure appli- All state EBT systems were operational in 2004 and the estimated
cants and recipients know and understand the rules of the program amount of benefits trafficked between 2002 and 2005 decreased from
$393 to $278 million (The Extent of Trafficking 3). These num-
(Program Informational Activities).
bers demonstrate that EBT was successful in reducing the amount of
CURRENT TECHNOLOGY SYSTEMS benefits being trafficked.

It is difficult to identify and discuss every technology system used There are flaws in the EBT system and the way the system is handled
by the states. First, not all states are making use of the EBT man-
to combat SNAP fraud since each state is allowed to create its own
agement reports to track fraud (State Fraud Detection 2). FNS
methods of fraud detection (State Fraud Detection 5). However,
requires states to have access to the system, but does not require the
some technology systems are utilized by both the FNS and State gov-
states to utilize the system (State Fraud Detection 2). States must
ernments agencies to aid their fraud detection efforts. These systems
review the reports the system generates, but they do not have to use
include: EBT system, Anti-Fraud Locator EBT Retailer Transactions
the data from the reports (State Fraud Detection 5). This can result
System (ALERT), and income eligibility verification systems (IEVS).
in fraud detection units overlooking cases of potential fraud. In an
The EBT system replaced paper coupons and was first mandated in audit done by the USDA Office of the Inspector General (OIG) of
1996 (Klerman and Danielson 870). All states became operational the states of New Jersey and Florida, the auditors discovered 2,600
by June 2004 (Supplemental Nutrition Assistance Program). Every potentially fraudulent cases through the EBT reports that were not
EBT card is protected by a personal identification number (PIN) identified or acted upon by either state (State Fraud Detection 7).
If states are not using the information provided by the system, there
that is known only to the cardholder (Hatcher). Whenever a recipi-
could be more accounts of undetected fraud. This is a problem since
ent swipes his or her card at a retailer, the EBT system automatically

2
Refer to Code of Federal Regulations 273.4 for a detailed list of qualified alien groups.

15
STEVENSON UNIVERSITY

the Federal Government is losing large amounts of money to fraud. (Ballou). The applicants may have to provide further documentation
In addition, the fraud data collected may not be as accurate due to if they claim they are no longer working, but there is employment
cases of undetected fraud. showing in the previous quarter. If a person did not work in the
previous quarters but is currently employed, the system will not show
Another problem with the EBT system is that states claim the EBT this information. In addition, the system only shows employment
management reports are tedious and time-consuming to review in the State of Maryland (Ballou). MABS is not able to reflect work
(State Fraud Detection 9). They prefer to use their own methods information for an applicant working across state lines.
of fraud detection (State Fraud Detection 9). In many cases, FNS
and the states have online sites and telephone hotlines for the pub- There is also a nationwide IEVS available to states called The Work
lic to report suspected fraud (Supplemental Nutrition Assistance Number (Verification Services). The Work Number is an online
Program). The fraud investigators also rely on the administering site that provides employment information for individuals in any state
offices to refer potential fraud cases (Ballou). Another method of in the United States (Verification Services). The applicants Social
fraud detection used is when states concentrate efforts in areas where Security number is entered and the administering office can access the
they believe fraud may be more prevalent (State Fraud Detection applicants employment information (Malone 1). This is beneficial
9). These may be areas where trafficking occurred in the past and are since the administering agencies can verify work in any state at the
identified as high risk areas (USDA Announces Latest Actions). time of application. The drawback with Work Number is its reliance
on employers to sign up with the site in order to have their informa-
The problem is that some of the fraud detection methods chosen by tion available (Verification Services). If an applicant is not work-
the states may not be as effective as the data gathered directly from the ing for one of the employers on the system, his or her employment
EBT system. Thomas Ballou, an investigator with the Office of the information will not be reflected.
Inspector General in the State of Maryland, notes many of the fraud
reports that come from the public through the hotline and online CURRENT POLICIES
fraud site are anonymous and lack evidence (Ballou). The inspec-
tors are required to follow up on every tip, but they sometimes find The Federal Government has policies in place to protect SNAP from
they have insignificant information to pursue a full investigation (Bal- fraudulent activities. The CFR outlines the penalties of SNAP fraud
lou). With the EBT system data, the investigators are able to docu- which can deter individuals from participating in fraud. States also
ment the fraud based on the detailed transactions. This information have discretionary policies to determine what verifications are needed
can make it easier to follow through on a fraud investigation. during the application process. The area of concern encompasses
those policies that are vague, subject to multiple interpretations, com-
In addition to the EBT and ALERT systems used by FNS and the plicate both states and the Federal Government efforts to prosecute a
state fraud detection units, there are systems used by the administer- program violator.
ing agencies to verify information when someone applies to receive
benefits. One type of system is known as the income eligibility verifi- CFR 271.5 section 15(b)(1) outlines the penalties that can be applied
cation systems (IEVS) (Faulkner). With the IEVS, the administrator to individuals caught defrauding SNAP. Any fraudulent behavior
reviewing an application enters a persons Social Security number into resulting in the misuse of $100 or more in SNAP benefits is con-
the IEVS and verifies his or her employment (Faulkner). The CFR sidered a felony (Coupons as Obligations). A person can receive up
gives states the authority to use any IEVS to aid with the administer- to $250,000 in fines, up to 20 years in prison, or both for misusing
ing of benefits however the systems vary from state to state (State $5000 or more in benefits (Coupons as Obligations). For viola-
Income and Eligibility Verification System). tions resulting in $100-$4999 in benefits, a person can be fined up
to $10,000, or face up to five years in prison, or both (Coupons as
The benefit of the IEVS is that the systems can identify an applicant Obligations). A person is guilty of a misdemeanor if they misuse less
reporting false information on the SNAP application. If the appli- than $100 in benefits (Coupons as Obligations). The consequences
cant falsely reports no employment, the administrator can pull up of a misdemeanor are fines up to $1000, up to a year in prison, or
the employment information on the IEVS and despute the claim both (Coupons as Obligations). If a person is convicted two or more
(Faulkner). These systems prevent payment errors since they high- times for any level of violation, then he or she will be subject to both
light employment discrepancies. imprisonment and the fine (Coupons as Obligations). In addition
to facing a conviction in a criminal court, a program violator can
The drawback of the IEVS is that every state has its own system and face administrative consequences such as disqualification from the
the systems may have limitations. For example, the State of Mary- program (Coupons as Obligations). In lieu of imprisonment, there is
land uses an IEVS known as Maryland Automated Benefits System also the option of restitution (Coupons as Obligations).
(MABS) (Ballou). MABS is only able to show someones work his-
tory for past quarters and not the current employment information The benefit of this policy is that individuals can face a felony convic-

16
FORENSICS JOURNAL

tion in a federal court for misusing as little as $100 in benefits. With substances, as defined in section 802 of title 21, United
these consequences in place, people may be less likely to commit States Code, for coupons (Definitions).
fraud. Another benefit of this policy is it gives the option of restitu-
tion. The Federal Government loses millions of dollars every year to The definition is vague and does not account for individuals attempt-
fraud and restitution is one way to get recoup some of its losses. The ing to sell benefits or those who offer to buy benefits (Supplemental
problem is the courts lack of ability to handle all of the fraud cases Nutrition Assistance Program: Trafficking Controls and Fraud Inves-
(Ballou). If every instance of SNAP fraud resulting in $100 or more tigations). It is difficult to prosecute these individuals because the
was taken to court, the courts would be overwhelmed with cases. The definition does not specifically include these behaviors (Supplemental
state investigators have to select which cases they refer to the Federal Nutrition Assistance Program: Trafficking Controls and Fraud Investi-
Government for prosecution, thus resulting in fewer criminal pros- gations). FNS is studying a revised expanded definition of trafficking
ecutions (Ballou). The cases most likely to be referred are those that to include the phrase intent to sell (Concannon).
involve larger amounts of money (Ballou).
ANALYSIS AND PROPOSED SOLUTIONS
There are consequences in addition to the felony convictions for
individuals caught defrauding the program. SNAP violators can sign There are aspects of the current technologies and policies that are
a disqualification consent agreement in instances where they are not successful in the fight against SNAP fraud; however, there are areas
referred to criminal proceedings (Ballou). By signing the agreement, in each of the systems and policies that can be improved upon. The
the violator admits to participating in fraudulent behavior in the amount of benefits lost each year to fraud is enormous and there are
program (Ballou). The state will then disqualify the violator from the ways to increase the efforts to combat fraud. SNAP fraud is a real-
program and use methods such as wage garnishment to recoup the ity. The fraud rate is based on what percentage of benefits issued each
stolen money (Ballou). year are lost to trafficking (Lavallee). The amount of benefits issued
every year is increasing. If the fraud rate remains the same, then the
Another SNAP policy that could affect fraud statistics is that which amount of money lost to fraud is increasing as well. The statistics
that allows states to decide what verifications they will request from already show an increase in the amount of money lost every year to
applicants and recipients. The Federal Government allows the states trafficking (Extent of Trafficking 3).
flexibility to decide if they want to require verification of household
deductions (Office Operations and Application Processing). An There are several other statistics that need to be analyzed in order to
example of this is the state option to decide whether or not to require understand the reality of the fraud problem. These statistics include:
verification of housing and child care expenses (State Options fraud investigations, prosecutions, fraud hearings, disqualified consent
Report 6). agreements, fraud claims established and total number of disqualifica-
tions (State Activity Report 2). The State Activity Report issued
This policy is beneficial in getting assistance to more people since it by FNS in December 2012 shows the statistics for these areas for the
can speed up the application process. Conversely, by requiring less Federal Fiscal Years 2010 and 2011 (, State Activity Report 2). The
documentation it is more difficult to verify what people report on their only statistic that did not increase is prosecutions (State Activity
applications and fraudulent information can easily go undetected. A Report 2). This confirms the problem of unsuccessfully prosecuting
household can report more rent than it is actually paying and receive individuals (Supplemental Nutrition Assistance Program: Trafficking
more benefits than it is entitled. Without the documentation to verify Controls and Fraud Investigations). The number of investigations
the claim, the household can continue to receive an incorrect benefit increased by 1.71 percent while fraud hearings increased by 6.22
amount. The result of this is an undetected payment error. The pay- percent (State Activity Report 2). The number of disqualification
ment error rate only reflects cases where benefits are found to be issued consent agreements rose 6.45 percent, the total number of disquali-
incorrectly (United States Government Accountability 4). Without fications increased by 4.24 percent, and the fraud claims established
the documentation to show incorrect benefit issuance, the payment went up by 5.74 percent (State Activity Report 2). It is clear from
error rate may not be accurate due to undetected payment errors. these statistics that SNAP fraud continues. There are changes that
can be made to the current technologies and policies to better protect
The third policy issue that can affect SNAP fraud is policies that are the program from fraud. These changes focus on three different areas:
vague and not well-defined. An example of this is the definition of fraud prevention, fraud detection, and violator prosecution.
trafficking. The CFR definition is as follows:
The priority is to prevent SNAP fraud. This will save the program
Trafficking means the buying or selling of coupons, from paying out millions of dollars to ineligible personnel every year.
ATP cards or other benefit instruments for cash or The key to preventing fraud is to identify fraud during the application
consideration other than eligible food; or the exchange process. When applicants apply to become recipients it is up to the
of firearms, ammunition, explosives, or controlled

17
STEVENSON UNIVERSITY

state administrators to decide whether or not an individual is eligible Overall, fraud has been and continues to be a major concern in SNAP.
for benefits (United States Government Accountability 2). The The fraud rate has decreased and the implementation of systems
administrators need to have all resources available in order to identify such as EBT has been effective in lowering the fraud rate. However,
fraudulent applications. One way to do this is to provide a more the monetary loss is still substantial. The key is continuous process
effective IEVS that all states can access. There should be one system improvement, clear policies, and aggressive prosecution of violators.
that reports current and past employment history of every person pos-
sessing a Social Security number. The system should not be limited to REFERENCES
specific states or employers. This will enable SNAP administrators to
immediately verify income information for applicants and promptly Ballou, Thomas. Personal interview. 19 Feb. 2013.
catch fraudulent employment information reported on the applica-
tions. This can save SNAP from payment errors and reduce the Citizenship and Alien Status. 7 C.F.R. Sec. 273.4. 2007. Print.
number of ineligible people receiving benefits.
Concannon, Kevin. Store Food Stamp Fraud and USDA Enforce-
Another preventative method is for states to require more documenta- ment. FDCH Congressional Testimony. Committee on House
tion during the application process. Requiring less documentation Oversight and Government Reform, 8 Mar. 2012. Military and
streamlines the process; however, it facilitates fraud. The lack of Government Collection. Web. 24 Jan. 2013.
documentation makes it more difficult to verify what is on an applica-
tion, creates more opportunity for benefits to be issued improperly, Congressional Budget Office. The Supplemental Nutrition Assistance
and leads to more cases of undetected fraud and undetected payment Program. By Kathleen FitzGerald et al. N.p.: n.p., 2012. Congressional
errors. The administrators need to be able to prove that the informa- Budget Office. Web. 25 Jan. 2013. <http://www.cbo.gov/sites/default/
tion on the application is accurate in order to be certain benefits are files/cbofiles/attachments/04-19-SNAP.pdf>.
being issued properly. Also, fraud investigators rely on verifications to
Coupons as Obligations of the United States, Crimes and Offenses. 7
prove cases where fraud is discovered (Ballou). When there is a lack
C.F.R. Sec. 271.5. 2012. Print.
of proof to convict someone of fraudulent behavior, then it is more
likely individuals will not be prosecuted or disqualified. Complete, Definitions. 7 C.F.R. Sec. 271.2. 2011. Print.
accurate documentation at the outset is the solution.
Faulkner, Kenya Mann. Store Food Stamp Fraud and USDA
Fraud detection improvements are required. The EBT system is a Enforcement. FDCHCongressional Testimony. Committee on
useful tool to identify potential fraudulent activity. Since the infor- House Oversight and Government Reform, 8 Mar. 2012. Military
mation in the system is derived directly from SNAP transactions, it and Government Collection. Web. 24 Jan. 2013.
remains one of the best options to combat SNAP fraud. The problem
appears to be that the EBT management reports are difficult to ana- Fong, Phyllis K. Store Food Stamp Fraud and USDA Enforcement.
lyze and review in a manner that is time efficient (State Fraud Detec- FDCH Congressional Testimony. Committee on House Oversight
tion 9). One solution would be to have the system create reports and Government Reform, 8 Mar. 2012. Military and Government
that are more user-friendly. They can be organized and categorized Collection. Web. 24 Jan. 2013.
in a way that can help states quickly identify potential fraud. In
addition, FNS should provide more training to the state agencies on Food Stamp Program: Electronic Benefits Transfer (EBT) Systems --
optimal ways to run and analyze the reports. By providing additional Statement on Auditing Standards No. 70 (SAS No. 70) Examination
training, state employees can become more comfortable with the Requirements. 65 Fed. Reg. 10675-78. 29 Feb. 2000. Print.
reports and be able to utilize them as fraud detection tools.
Food Supplement Program. Maryland Department of Human
The final area where improvements can be made is in the prosecu- Resources. N.p., n.d. Web. 9 Feb. 2013. <http://www.dhr.state.md.us/
tion of violators. There may not be an easy solution to the problem blog/?page_id=5514>.
of courts being inundated with cases; however, the policy can be
changed to ensure SNAP violators who are sent through the system Hatcher, Jennifer. Store Food Stamp Fraud and USDA Enforce-
are not able to find loopholes in the policy. One of these changes ment. FDCH Congressional Testimony. Committee on House
is to make sure the policy is clear and well-defined. FNS should be Oversight and Government Reform, 8 Mar. 2012. Military and
actively assessing the situations where SNAP violators are not con- Government Collection. Web. 24 Jan. 2013.
victed because the policy is too vague. Based on these cases, FNS can
better determine where the policy needs to be clarified. Issa, Darrell E. Store Food Stamp Fraud and USDA Enforcement.
FDCH Congressional Testimony. Committee on House Oversight

18
FORENSICS JOURNAL

and Government Reform, 8 Mar. 2012. Military and Government 14 Feb. 2013. <http://www.fns.usda.gov/sites/default/files/10-State_
Collection. Web. 24 Jan. 2013. Options.pdf>.

Income and Deducitons. 7 C.F.R. Sec. 273.9. 2011. Print. United States Department of Agriculture. Supplemental Nutrition
Assistance Program: State Activity Report Fiscal Year 2011. N.p.: n.p.,
Klerman, Jacob Alex, and Caroline Danielson. The Transforma- 2012. United States Department of Agriculture: Food and Nutrition
tion of the Supplemental Nutrition Assistance Program. Journal of Service. Web. 15 Feb. 2013. <http://www.fns.usda.gov/snap/qc/
Policy Analysis & Management 30.4 (2001): 863-88. Business Source pdfs/2011_state_activity.pdf>.
Complete. Web. 23 Jan. 2013. <http://eds.b.ebscohost.com/ehost/
pdfviewer/pdfviewer?sid=e0a6d359-bb03-45bd-8539-77819d040107 United States Government Accountability Office. Supplemental Nutri-
%40sessionmgr113&vid=4&hid=115>. tion Assistance Program: Payment Errors and Trafficking Have Declined, but
Challenges Remain. By Kay E. Brown. Research rept. no. GAO-10-956T.
Lavallee, Aaron. FACT vs. FICTION: USDAs Supplemental Nutri- N.p.: n.p., 2010. United States Government Accountability Office. Web.
tion Assistance Program. United States Department of Agriculture 23 Jan. 2013. <http://www.gao.gov/new.items/d10956t.pdf>.
Blog. N.p., 24 June 2011. Web. 3 Feb. 2013. <http://blogs.usda.
gov/2011/06/24/fact-vs-fiction-usda%E2%80%99s-supplemental- USDA Announces Latest Actions to Combat Fraud and Enhance
nutrition-assistance-program/>. SNAP Program Integrity Strengthened Measures Help Fight Fraud in
Nations Most Critical Nutrition Assistance Program. United States
Malone, Rosemary. The Work Number Express Service. N.d. PDF file. Department of Agriculture. N.p., n.d. Web. 14 Feb. 2013. <http://
www.usda.gov/wps/portal/usda/usdahome?contentid=2012/02/0042.
Office Operations and Application Processing. 7 C.F.R. Sec. 273.2. xml&navid=NEWS_RELEASE&navtype=RT&parentnav=LAT
2011. Print. EST_RELEASES&edeployment_action=retrievecontent>.
Program Informational Activities. 7 C.F.R. Sec. 272.5. 2011. Print. <http://www.usda.gov/wps/portal/usda/usdahome?contentid=2012%
2F08%2F0269.xml&contentidonly=true>.
Residency. 7 C.F.R. Sec. 273.3. 2011. Print.
Verification Services. Theworknumber.com. Equifax, n.d. Web. 15
State Income and Eligibility Verification System. 7 C.F.R. Sec. 272.8.
Feb. 2013. <http://www.theworknumber.com/go/>.
2012. Print.

Supplemental Nutrition Assistance Program (SNAP). United States VALERIE ROEBUCK graduated with
Department of Agriculture: Food and Nutrition Service. N.p., n.d. Web. a Bachelors of Arts Degree in Sociology
15 Feb. 2013. <http://www.fns.usda.gov/snap/supplemental-nutri- from Eastern University in St. Davids,
tion-assistance-program-snap>. Pennsylvania. She has been employed
for almost seven years with the State of
Supplemental Nutrition Assistance Program: Trafficking Controls and Maryland. Mrs. Roebuck administers Long
Fraud Investigations. 77 Fed. Reg. 31738. 30 May 2012. Print. Term Care Medicaid benefits to individuals
in nursing facilities for the State of
United States Department of Agriculture. The Extent of Trafficking in Maryland. She is currently working on her
the Supplemental Nutrition Assistance Program: 2006-2008. By Richard Masters Degree in Forensic Studies in the
Mantovani and Hoke Wilson. N.p.: n.p., 2011. United States Depart- investigations track at Stevenson University.
ment of Agriculture: Food and Nutrition Service. Web. 14 Feb. 2013.
<http://www.fns.usda.gov/sites/default/files/Trafficking2006.pdf>.

United States Department of Agriculture. State Fraud Detection Efforts


for the Supplemental Nutrition Assistance Program. By Gil H. Harden.
Rept. no. 27703-0002-HY. N.p.: n.p., 2012. United States Depart-
ment of Agriculture. Web. 25 Jan. 2013. <http://www.usda.gov/oig/
webdocs/27703-0002-HY.pdf>.

United States Department of Agriculture. Supplemental Nutrition


Assistance Program: State Options Report. N.p.: n.p., 2012. United
States Department of Agriculture: Food and Nutrition Service. Web.

19
STEVENSON UNIVERSITY

U.S. Citizenship and Immigration Services:


Investigating and Preventing Immigration
Marriage Fraud
Sara Padgett Torres

Since the early 2000s, immigration to the United States via marriage record warrant the request for further information from the petitioner
to a citizen has increased exponentially (DHS Office of Immigration or beneficiary. Until officers receive the pertinent information, the
Statistics 3). In 2003, 184,741 foreign nationals obtained green cards investigation of the couple and the immigration proceedings are
through marriage, according to U.S. Citizenship and Immigration suspended.
Services (U.S. Census Bureau 6). In 2009, the number of immigra-
tion visa petitions through marriage drastically increased to 317,129 Once the criminal and immigration record of the petitioner and
(DHS Office of Immigration Statistics 3). The immigration policy beneficiary is complete, the officer examines the biographical data the
of the United States requires that alien spouses receive priority over couple submits through the I-130. The I-130 asks questions such as
all other immigration petitioners since alien spouses are in the imme- the dates of birth of the petitioner and beneficiary, where the benefi-
diate family category. The goal of the policy is to keep immediate ciary plans to live in the United States, and the last address at which
families together, by providing a higher priority status in comparison the couple lived together (Instructions for Form-130, Petition).
to petitioners who do not fall into this category. While it is possible These questions may seem typical of a government form, however
to legally immigrate to the United States without being immediate officers scrutinize the answers for any inkling of fraud. For example,
family of a U.S. citizen or permanent resident, the waiting period couples whose dates of birth are several years apart (typically over six
to receive a green card can be upwards of five years (DHS Office of years in age difference) are more closely examined than couples who
Immigration Statistics 3). Thus, the increase in petitions for legal per- may only be three years apart. Officers investigate under the belief
manent residency through marriage demands a greater investigative that spouses who are closer in age are more likely to have a bona fide
process of applicants, due to the potential of partaking in a fraudulent marriage (Bernstein). A beneficiary who responds to the question
marriage in order to expedite the immigration process. that asks where the spouse plans to live in the United States with
an address that is different than their spouse could encounter delays
The U.S. Citizenship and Immigration Services (USCIS) is the in the investigation as it raises a red flag for fraud. USCIS officers
government agency responsible for investigating and interviewing expect to see partners cohabitating before and after filing the I-130
all petitioners of green cards through marriage. USCIS employs (Bernstein). Officers make note of any discrepancy that they find in
immigration officers to conduct investigations and interviews of the the I-130 in order to discuss and verify their concerns with the couple
petitioners (U.S. citizens) and beneficiaries (alien spouses). Through during the interview.
investigative methods, officers must identify individuals who pose as
couples, but are not in a bona fide marriage. USCIS uses the term The next step in the investigation process is the interview of the cou-
bona fide to describe a legitimate marriage. Through the use of an ple. Officers see many couples throughout each day and are trained
investigative process that has adapted to the increase in petitions in to make a decision on the legitimacy of the marriage based on several
recent years, USCIS works to ensure that fraudulent marriages are not aspects. The USCIS staff instructs couples to bring evidence that
only exposed, but prevented, and violators prosecuted. documents their relationship. Evidence that helps to prove a marriage
is bona fide includes photographs of the couple and their respective
1. THE INVESTIGATIVE PROCESS families, photographs from the marriage ceremony, correspondence
such as letters, instant messages, or e-mails, and any trip itineraries
The path to receiving a green card through marriage begins when the (Chetrit 721). Officers learn to inspect all the evidence the couple
U.S. citizen files an I-130 petition for an alien relative. When USCIS submits for any obvious signs of staged photographs. USCIS officer
receives the petition, officers begin to investigate the petitioner and Bryant Chisholm recalls viewing, photos of a couple lying in bed
beneficiary. Officers conduct criminal background checks on both on their wedding nightwhat normal couple would allow someone
individuals, specifically to determine if the alien could pose a threat to come into their room and photograph husband and wife in bed?
to national security (Paulin). USCIS officers realize that an easy (Winston). Any sort of staged photographs, or photographs that are
way for a terrorist to legally enter and remain in the United States is supposed to show the couple over a period of time, but instead show
through marrying a U.S. citizen (Paulin). Beneficiaries must sub- the couple in the same clothes in each photo, are an obvious clue to
mit to fingerprinting at a USCIS field office in order to conduct the officers that the marriage is not bona fide.
criminal background check. Officers can also conduct a credit check
on the petitioner. In addition, officers check for any past immigration In addition, the couple can ask family and friends to write notarized
history for both the petitioner and the beneficiary. An attempt in letters acknowledging the relationship for the interviewing officer to
the past to submit an immigrant visa petition for a different partner, read. Even these letters can be scrutinized for fraud. Diane McHugh-
whether the petition was approved or denied, can indicate potential Martinez, an immigration attorney who has been in practice for over
fraud. Officers also search for any previous or current immigration twenty years, describes an instance in which the immigration officer
court proceedings involving the beneficiary (Paulin). Any suspi- detected fraud. The couple had four affidavits from people who
cious findings by USCIS officers regarding a criminal or immigration have similar ethnic names, such as an African last name. The officer

20
FORENSICS JOURNAL

checked the database to see if those people had marriage cases. The tion investigation process (Poole 3). By knowing what to expect and
officer later said you have someone here by this name who is vouching how to prepare for the investigation, couples who are not in a legiti-
for your marriage and you wrote a letter vouching for his marriage mate relationship are more likely to receive approval for their I-130
(McHugh-Martinez). The detection of a pattern can lead the officer to petition. Marriage brokers are an expensive, but are used to match
believe there is a possibility of fraud. In a case such as this, the officer immigrants with a potential spouse who can petition for a green
searches for a connection between different petitioning couples. card on their behalf. Marriage brokers assist immigrants who may
have overstayed their visas (such as a tourist or work visa), but want
Critical evidence used by officers to approve an I-130 petition are to remain in the United States (Smith). The marriage broker finds a
documents showing the comingling of finances and assets (Chetrit U.S. citizen for the immigrant to marry in order to file the petition to
742). Couples prove the comingling of finances and assets by sub- become a conditional resident. Usually, the marriage broker and the
mitting bank statements, insurance policy forms, mortgage or lease U.S. citizen receive thousands of dollars in compensation (McHugh-
paperwork, and bills (electric, cable, water) that show the couple Martinez). Using a marriage broker to find a spouse is not always a
live together and are financially connected. This evidence is crucial guaranteed method to obtain immigration benefits, as the new spouse
to an immigration marriage investigation, as the documents prove is only assisting the immigrant for the monetary compensation.
that the couple trusts one another with personal finances. However,
providing this evidence can be difficult in the instance where one Instead, many immigrants who have overstayed their visas may ask a
spouse has recently moved to the United States and was never issued a friend who is a U.S. citizen to marry them and petition for their green
social security number. Most banks and utility companies require an card (Poole 3). Marrying a friend can make the investigation pro-
applicant to have a social security number. These obstacles add to the cess easier since the couple already knows one another. During the
challenges USCIS officers and couples face when trying to adjudicate interview with a USCIS officer, the couple may appear more at ease
an I-130 marriage petition (Chetrit 742). since they know many of the answers to the questions the officer may
ask, such as dates of birth or the names of parents (Paulin). Friends
After reviewing supplementary evidence, officers engage the couple posing as a married couple will have overall better body language than
in simple discussions about their relationship. Officers typically ask an immigrant and a spouse that has been paid thousands of dollars.
basic questions such as how the couple met, how long they have
been in a relationship, their dates of birth, and their parents names In regards to creating documentary evidence of the marriage, couples
(Chetrit 710). Besides answering the questions correctly, the officer can be married at the local courthouse and have photographs taken
observes how the couple interacts with each other. The body lan- of the ceremony. If a couple is already friends, they are likely to have
guage of the couple plays an important role in the adjudication of photographs of themselves together through the years at different life
the petition. Officers look to see if the couple is comfortable around events. Letters confirming the marriage can be requested from friends
each other and to see if they truly appear to be a married couple. A who understand and empathize with the situation of the immigrant
couple that appears uneasy and cold around each other may alert an and want to help he or she stay, even if the relationship is not bona
officer to potential fraud (McHugh-Martinez). If the couple is easily fide. Documents proving joint assets are one of the more important
able to answer the questions posed by the officer and appear to have pieces of evidence (Chetrit 742). Couples can create a new bank
a normal marital discourse, the officer can inform the couple that he account together, yet keep their own personal accounts for security
approves the I-130 petition. If there are any signs of fraud from the reasons. While there are many ways a couple can attempt to evade
interview, whether the husband did not know the date of birth of his immigration laws and pass the interview process of a marriage inves-
wife, or the wife could not give an explanation as to how she met her tigation, USCIS officers are very skilled in detecting fraud (McHugh-
husband, the officer can choose to have the couple return in order to Martinez). Body language is key to determining the legitimacy of a
separately interview each spouse (Chetrit 710). marriage, sometimes proving to be more important than photographs
or letters (McHugh-Martinez). Most officers who have several years
2. EVADING IMMIGRATION LAWS THROUGH MARRIAGE of experience can distinguish between friends posing as a married
couple and married couples who are in love (McHugh-Martinez).
USCIS created the immigration marriage investigation process in
order to detect fraud among couples who attempt to evade immigra- 3. CHANGES SINCE THE IMMIGRATION MARRIAGE
tion laws by marrying a U.S. Citizen or permanent resident. Even FRAUD ACT
with the in-depth investigation process enacted by USCIS, there are
instances when petitioners and beneficiaries that are not in a bona The investigative process has evolved since the 1980s. Prior to 2003,
fide marriage wrongly receive immigration benefits. It is simply not the Immigration and Naturalization Services (INS) was the agency
possible to detect every fraudulent marriage case. Couples are able responsible for conducting investigations for individuals petitioning
to evade immigration laws by studying and learning the immigra- for green cards for their spouses (Moyce 2). During this period, an

21
STEVENSON UNIVERSITY

INS official would review the petition and conduct the interview submit any other petitions on behalf of immediate relatives to receive
of the petitioner and the alien spouse. The official would decide to immigration benefits (McHugh-Martinez).
grant or deny the petition based on the review of the petition and the
interview. If the official felt the marriage was not bona fide, but a 4. THE DEVELOPMENT OF THE FRAUD DETECTION AND
sham marriage, after reviewing the findings, the petition was denied NATIONAL SECURITY DIRECTORATE
(Moyce 2).
In 2004, USCIS created the Fraud Detection and National Security
In 1986, Congress became concerned with the reported increasing Directorate (FDNS) to, strengthen efforts to ensure immigration
rates of marriage fraud and decided to revise the immigration petition benefits are not granted to individuals who pose a threat to national
procedure (Moyce 3). Congress passed the Immigration Marriage security or public safety, or who seek to defraud our immigration
Fraud Amendments (IMFA) as a way to detect fraudulent marriages system (Instructions for Form-130, Petition). The goal of FDNS is
by testing the longevity of the relationship (Poole 1). The IMFA to assist USCIS officers in detecting fraud in the application process.
amended the Immigration and Nationality Act by creating the condi- By assisting in early detection, FDNS helped streamline the process-
tional green card. The conditional green card was a significant change ing of legitimate petitions. FDNS made the application process more
to the past petitioning system. Instead of granting an immediate efficient by investigating any responses to questions regarding back-
legal permanent residency status to an alien spouse whose marriage is ground information that raise concerns. FDNS uses law enforcement
less than two years old at the time the petition is approved, the alien and intelligence agencies such as U.S. Immigration and Customs
spouse becomes a legal conditional resident for a two year time period. Enforcement to conduct any additional research of a petitioner or
The conditional green card is not applicable to an alien spouse who has beneficiary (Instructions for Form-130, Petition). The objectives of
been married to their U.S. citizen spouse for over two years (Poole 2). FDNS are to ensure immigration benefits are not given to fraudulent
beneficiaries, as well as guarantee that those who deserve and have
In order to have the conditional status lifted from the green card, properly applied for immigration benefits do receive them (Instruc-
the immigrant spouse must file with their spouse 90 days prior to tions for Form-130, Petition).
the expiration date of the conditional green card. The couple must
prove that they are still in a bona fide relationship by submitting FDNS is responsible for conducting site visits for immigration appli-
documentary evidence as they had in the initial interview (McHugh- cants. The program uses unannounced site visits as a way to verify
Martinez). Officers select various couples at random to interview as information submitted in I-130 petitions. Officers conduct both
a form of auditing. Not all couples are interviewed when they file for pre- and post- adjudication site visits at random (Instructions for
the removal of conditions from the green card (Poole 2). If a couple Form-130, Petition). Site visits for purposes of investigating marriage
chooses to not file or forgets to file to have the conditions removed, petitions usually take place at the home. Many officers refer to home
the green card will expire at the end of the two year period and the visits as bed checks, meaning the officer is looking to see both spouses
immigrant spouse can face deportation proceedings (Poole 2). living in the same residence (Bernstein). Site visits to a couples home
may seem intrusive, however in many cases, the visit can assist in prov-
In addition, the Immigration Marriage Fraud Act introduced criminal ing a marriage to be bona fide. In addition, the site visits can help
penalties to individuals who attempt to defraud the USCIS by enter- deter others from attempting to commit immigration fraud. During a
ing into a sham marriage for immigration purposes (Department of site visit, the immigration officer may take digital photographs, speak
Justice). According to the Department of Justice, Marriage fraud has with those inside the home or neighbors of the couple, and review
been prosecuted, inter alia, under 8 U.S.C. 1325 8 U.S.C. and 18 the information submitted with the petition in order to verify that
U.S.C. 1546(a). The Immigration Marriage Fraud Amendments it matches the actual location. If an officer finds potential proof of
Act of 1986 amended 1325 by adding 1325(c), which provides fraud, he or she can forward the case to ICE officers for a possible
penalty of five years imprisonment and a $250,000 fine for any indi- criminal investigation (Instructions for Form-130, Petition).
vidual who knowingly enters into a marriage for the purpose of evad-
ing any provision of the immigration laws. Prosecution is usually 5. SOCIAL NETWORKING AND IMMIGRATION
only pursued for those who are part of an immigration marriage fraud INVESTIGATIONS
ring or who attempt to repeatedly defraud the U.S. government, such
as a marriage broker. Couples who act on their own and lie to USCIS Since the early 2000s, social networking has become a popular trend
officers can still expect repercussions, however, very rarely do they face in technology. Social networking is the use of Internet sites such as
prosecution in a federal court (McHugh-Martinez). Instead, USCIS Facebook, MySpace, and Twitter, to share details about an individuals
officers work with U.S. Immigration and Customs Enforcement life through photographs, messages, and postings by the user. These
(ICE) in order to begin deportation proceedings for the alien spouse, sites broadcast personal information to the masses unless the user
and the U.S. citizen or legal permanent resident is not allowed to restricts what is seen through privacy settings. Recently, immigration

22
FORENSICS JOURNAL

and law enforcement officers have begun using social networking sites the statistic given regarding marriage fraud was completely false (Win-
to investigate persons of interest (Chetrit 720). Facebook is the most ston). Immigration marriage fraud is not nearly as prevalent in the
commonly used site for investigations due to its popularity and easy United States as society may think, however it does exist. Over the
search options. years, USCIS has enacted different measures in attempts to prevent
immigration marriage fraud, but there are ways that USCIS could
In 2008, a memorandum written by FDNS, entitled Social Net- further decrease the amount of fraudulent I-130 petitions.
working Sites and Their Importance to FDNS was released. The
memorandum suggested USCIS officers create fake accounts in order Even though the Immigration Marriage Fraud Act of 1986 was devel-
to search for couples to add as friends on sites such as Facebook. oped after false reporting by the INS Commissioner Alan Nelson, the
By having access to a profile of the spouse, the officer can see their IMFA created a program of conditional residency which helped to
photographs, relationship status, current city, and other personal detect and prevent fraud in marriage petitions (McHugh-Martinez).
information. Officers can verify that the spouse is listed as married The change from receiving immediate legal permanent resident status
and that their photographs reflect an individual engaged in an exclu- to conditional resident status permitted checkpoints to be established
sive relationship. on the path to naturalization. The two year conditional approval
helped prevent fraudulent marriage petitions because U.S. citizens
The memorandum generated negative publicity for USCIS and other realize that assisting an immigrant who has paid them or an immi-
investigative government agencies. Due to its lack of guidance, the grant friend who needs a favor, is no longer a quick process of getting
memorandum does not inform officers whether they must reveal to married and filing the petition. Instead, the potential fraudulent
their new friends that they are in fact affiliated with the government marriage takes much more of a commitment on the part of the U.S.
(Chetrit 729). Many critics feel that creating fake accounts in order citizen. The ruse must be maintained for over a two-year time period,
to investigate spouses crosses the line of marital privacy. However, as as the couple committing the fraudulent marriage must file a new
USCIS stated in the memorandum, In essence, using MySpace and petition to have the conditions lifted from the green card of the ben-
other like sites is akin to doing an unannounced cyber site-visit on eficiary (Poole 1). By filing the new petition, the couple may be asked
petitioners and beneficiaries (Instructions for Form-130, Petition). to return for another interview. The couple will have to provide the
In these cases of unannounced cyber site visits, social networking sites same sort of documentary evidence to the USCIS officer as they did
have made the USCIS officers task easier. Officers conduct fewer in- during in the initial interview in order to prove that they are still mar-
person site visits and instead rely on Facebook or MySpace profiles for ried (McHugh-Martinez). The officer asks the couple similar ques-
information verification (McHugh-Martinez). tions as during the first interview to confirm that the relationship is
bona fide. If the couple does not file to have the conditions removed
The leaked FDNS memorandum reveals important issues regard- from the green card or are not approved for permanent residency at
ing the use of social networking sites in immigration marriage fraud the interview, the immigrant spouse will no longer have legal status
investigations. By considering the review of a Facebook or MySpace in the United States and deportation proceedings can begin soon
profile the same as an unannounced site visit, officers are assuming thereafter (Poole 2). In cases such as these, the consequences that the
that what an individual posts is the truth. In addition, officers assume fraudulent couple endures can be used as a deterrent to other immi-
that how an individual behaves on their profile is how he or she will grants who might consider marrying for a green card.
act in daily life (Chetrit 729). These assumptions can be untrue and
costly to those involved in an immigration marriage fraud investiga- The conditional residency process may seem like a burden to couples
tion. For example, a petitioner who does not update their profile and who feel that they have already proven their relationship to be legiti-
has very liberal privacy settings may project to the public that they mate, however this is the exact reason for the additional step. The
are not married, or even in a relationship, when in reality they may removal of conditions is another obstacle for aliens in the quest to
have just lost interest in social networking sites and have discontinued naturalization. The conditional residency has been seen as so effective
their use prior to meeting or marrying their spouse. Officers cannot in preventing marriage fraud that other countries such as the United
assume that the profile they are viewing actually belongs to that per- Kingdom, Australia, and most recently Canada (in October 2012),
son. Many profiles on social networking sites are not legitimate and have adopted such measures (The Jig Is Up on Marriage Fraud).
are created by imposters. Therefore, officers should not fully rely on These countries have faced issues with increased immigration marriage
social networking sites as a substitute for a site visit (Chetrit 731). fraud due to the desirability and benefits of becoming residents and
eventually citizens. The conditional measure improved immigration
6. IMMIGRATION MARRIAGE FRAUD PREVENTION and continues to assist in preventing fraud. The measure gives USCIS
the opportunity to catch those who committed marriage fraud in the
In 1985, INS Commissioner Alan Nelson testified before the U.S.
initial immigration process and stops the fraudulent applicants from
Senate that 30 percent of I-130 applicants attempted to commit
receiving full naturalization benefits.
immigration marriage fraud (Winston). The INS later confessed that

23
STEVENSON UNIVERSITY

6. FRAUD PREVENTION THROUGH PROSECUTION become a legal permanent resident (De Armas 6). Currently, most
fraudulent marriage cases discovered result in the immigrant spouse
The consequences for U.S. citizens who file immigration marriage entering into deportation proceedings. USCIS should consider
petitions for alien spouses in a fraudulent marriage should be more harsher penalties such as consistent prosecution for U.S. citizens who
severe. Currently under the IMFA, U.S. citizens can be imprisoned participate in fraudulent marriage petitions (Thomas 1). Pursuing
for up to five years and receive a $250,000 fine for knowingly enter- prosecution may deter other U.S. citizens who may be considering
ing into a marriage for the purpose of evading any provision of the assisting someone in filing a fraudulent petition.
immigration laws (Department of Justice). While incarceration and
fines are potential punishments for U.S. citizens, they are not used The investigative process of immigration marriage fraud by USCIS
frequently in single cases of immigration marriage fraud (McHugh- officers is a lengthy and time-consuming procedure that when com-
Martinez). If USCIS turned more marriage fraud cases over to ICE pleted successfully, detects immigrants and their U.S. citizen spouses
to pursue the prosecution of U.S. citizens found in violation of 8 attempts to defraud the United States government. It is impossible to
U.S.C. 1325(c), it could prevent immigration marriage fraud cases detect all immigration marriage fraud, however USCIS has a program
in the future, as U.S. citizens may not risk imprisonment to help in place that is capable of detecting and preventing many fraudulent
an immigrant friend. The current immigration system punishment marriage petitions.
policy for a U.S. citizen is weak. When USCIS believes a petitioner
is assisting in a one-time case of immigration marriage fraud (as REFERENCES
opposed to a marriage fraud ring or scheme), they want the peti-
tioner to confess to the officers about the illegitimate relationship and Bernstein, Nina. Without Guns or Raids, a Tiny Squad of Officers
fraudulent I-130 petition in order to begin deportation proceedings Homes in on Visa Fraud. New York Times 17 July 2007: 1. Print.
for the immigrant (McHugh-Martinez).
Chetrit, Samantha L. Surviving an Immigration Marriage Fraud
7. EVALUATION AND CONCLUSION Investigation - All You Need Is Love, Luck, and Tight Privacy Con-
trols. Brooklyn Law Review (2012): 709-43. LexisNexis Academic.
Overall, the program USCIS currently has in place to investigate Web. 6 Feb. 2013.
immigration marriage fraud cases is effective. From the beginning
of the process in which the petitioner files the I-130 petition on De Armas, Marcel. For Richer or Poorer or Any Other Reason:
behalf of the beneficiary alien spouse, to the interview portion where Adjudicating Immigration Marriage Fraud Cases within Scope of the
USCIS officers review documentary evidence to determine whether Constitution. American University Journal of Gender, Social Policy &
the marriage of the couple is bona fide, officers use a thorough process the Law (2007): 1-8. LexisNexis Academic. Web. 6 Feb. 2013.
of background and database checks to ensure the alien spouse does
DHS Office of Immigration Statistics. U.S. Legal Permanent Resi-
not pose a national security threat and should be allowed to remain
dents: 2010. By Randall Monger and James Yankay. N.p.: n.p., 2011.
in the United States (Paulin). In cases of suspected fraud, USCIS
Department of Homeland Security. Web. 7 Feb. 2014. <http://www.
officers conduct a methodical investigation where they gather evi-
dhs.gov/xlibrary/assets/statistics/publications/lpr_fr_2010.pdf>.
dence against the couple to prove the relationship is not legitimate
(McHugh-Martinez). Instructions for Form-130, Petition for Alien Relative. 18 Dec.
2012. PDF file.
The changes made in 1986 by the enactment of the Immigration Mar-
riage Fraud Act improved the previous process by granting immigrant The Jig Is Up on Marriage Fraud, says Minister Kenney. Government
spouses conditional residency as opposed to permanent residency. of Canada. N.p., 26 Oct. 2012. Web. 27 Apr. 2013. <http://www.cic.
The new change forces spouses to file a second petition requesting the gc.ca/english/department/media/releases/2012/2012-10-26.asp>.
removal of the residency conditions two years after the initial peti-
tion was granted (Poole 1). In addition, USCIS developed the Fraud Marriage Fraud. Department of Justice. n.d. Web. 7 February 2013.
Detection and National Security Directorate in order to better assure
that only deserving immigrants received immigrant benefits. FDNS McHugh-Martinez, Diane. Personal interview. 20 Feb. 2013.
uses site visits as an investigative tool to detect fraud in immigration
marriage petitions (Instructions for Form-130, Petition). Moyce, David. Petitioning on Behalf of an Alien Spouse: Due
Process Under the Immigration Laws. California Law Review 74.5
Prevention of immigration marriage fraud has expanded since the (1986): 1-12. LexisNexis Academic. Web. 16 Feb. 2013.
IMFA. The removal of conditions has served as a fraud prevention
measure due to the greater obstacles and longer waiting period to Paulin, Joshua Daley. Fraudulent Marriages in Immigration Cases.
GPSOLO 2010: n. pag. Web. 6 Feb. 2013. <http://www.americanbar.

24
FORENSICS JOURNAL

org/newsletter/publications/gp_solo_magazine_home/gp_solo_maga-
zine_index/paulin.html>.

Poole, Heather L. The Quickest Way To a Green Card Is Harder


Than You Think. Orange County Bar Association. July 2007. 1-6.
LexisNexis. Web. 6 February 2013.

Smith, Van. Maryland Immigration Attorney Pleads Guilty to


Sham-marriage Conspiracy. CityPaper. Baltimore City Paper, 11
Jan. 2012. Web. 6 Feb. 2013. <http://citypaper.com/news/maryland-
immigration-attorney-pleads-guilty-to-sham-marriage-conspir-
acy-1.1255644>.

Social Networking Sites and Their Importance to FDNIS. Memo.


20 July 2010. Electric Frontier Foundation. Web. 7 Feb. 2013.
<https://www.eff.org/files/filenode/social_network/DHS_Custom-
sImmigration_SocialNetworking.pdf>.

Thomas, Brian. Prosecuting Sham Marriage Under 18 U.S.C. 1546:


Is Validity of Marriage Material? Suffolk Journal of Trial & Appellate
Advocacy. 2006. 1-5. LexisNexis. Web. 10 February 2013.

U.S. Census Bureau. Statistical Abstract of the United States: 2006.


125th ed. Washington, DC, 2005. Google eBook file.

Winston, Ali. Marrying for Love? Youll Have to Prove It. City
Limits. n.p. 28 July 2008. Web. 8 February 2013.

SARA TORRES is currently pursuing a


Masters degree in Forensic Studies with a
concentration in Investigations from Stevenson
University. She completed her undergraduate
studies in 2009 at Towson University,
graduating magna cum laude with a BA in
Sociology/Criminal Justice and Spanish. Sara
works in the Protective Services Division at
NASA Goddard Space Flight Center.

25
STEVENSON UNIVERSITY

How Forensic Science Has Influenced Wildlife


Investigations
Megan Ansberry

The legality of wildlife killings depends not only on the species, but Arising from this international conference was a global treaty to
also the circumstance of the killing as killing animals is not always protect wildlife, the Convention on International Trade in Endan-
illegal. In order to determine the legality of a case, wildlife investiga- gered Species of Wild Fauna and Flora, (CITES) (What is CITES).
tors first have to answer three questions: What species is the victim? CITES made it unlawful to internationally trade any wildlife that may
Was the killing legal or illegal? And if illegal, who committed the be threatened or exploited by illicit trade (What is CITES). CITES
crime? Wildlife forensic scientists often find that the first question was initially signed in 1973 by 80 nations and today 178 nations
is the hardest one to answer. The potential victims of wildlife crimes voluntarily enforce CITES (What is CITES). The Endangered
include tens of thousands of species. Although wildlife forensic Species Preservation Act was further amended in 1973 and renamed
investigators may use traditional forensic techniques to answer the the Endangered Species Act so as to include implementation of
question of who committed the crime; they must constantly develop CITES (Endangered Species Act). CITES outlines different levels
new methods and techniques in order to determine the species and of protection depending on the threat levels to each species in various
legality of the killing. Appendices. Species in CITES Appendix I are the most endangered,
and thus have the most protection as they may not be imported for
Conservatively, illegal wildlife trading nets approximately $20 billion commercial trade. Species in CITES Appendix II are not necessarily
a year worldwide, with only illicit drugs and weapons sales earning threatened, but may become threatened in the future if they are not
a higher profit (Neme xii). Wildlife poaching, trafficking, and trad- currently protected. Lastly, species in CITES Appendix III are listed
ing are highly lucrative businesses. For instance, poachers can earn because they are protected by one of the countries participating in
$1000 a gram for a rare animal part, which is twenty times the profit CITES and said country requested international protection as well
of heroin (Neme xii). Whether it is selling a part to be used in the (Appendices).
fashion industry, traditional Chinese medicine, or as art, the profit
margin is high. Prior to the establishment of the National Fish and The aforementioned treaties are a few examples of the federal and
Wildlife Forensics Laboratory in 1988, wildlife crimes were difficult international laws which protect wildlife and implement a conserva-
to investigate and even more difficult to prosecute (About the Lab). tion effort. Only animals covered by a state or federal law (including
These two factors combined with high profits created the perfect busi- all species on the endangered and threatened lists) are illegal to kill.
ness for wildlife criminals. However, many unprotected animals require a permit to hunt, kill,
and/or take. Consequently, without a valid permit even an animal
Humans have always posed a threat to animals. Animals, plants, and that is not legally protected would be illegal to hunt, kill and/or take.
their respective habitats are already threatened because of climate Therefore, it is imperative that any wildlife investigator understands
change and legal human activity. Poaching further threatens their the law and knows which species may or may not be protected and
lives and well being. Endangered and threatened species require pro- thus the legality of actions affecting the animal.
tection from illegal killing, trading, and trafficking to save them from
extinction. To protect these threatened animals, Congress enacted the The United States Fish and Wildlife Forensic Laboratory is responsible
Lacey Act in 1900, which was the first federal law to protect animals. for assisting the Special Agents and Wildlife Investigators who enforce
The Lacey Act made it unlawful to transport any wildlife or wildlife the federal wildlife laws. (Science Professionals). A wildlife forensic
product acquired in violation of state law (Jackson 16). scientists duties are similar to those conducted by traditional forensic
scientists who work on human cases i.e. conducting crime scene inves-
While the Lacey Act was the first federal law to protect wildlife, it cer- tigations, determining cause of death, and linking the suspect to the
tainly was not the last. The Migratory Bird Treaty Act was enacted in crime scene. The U.S. Fish and Wildlife Forensic Laboratory is com-
1918 and made it unlawful to kill, take, or possess any migratory birds prised of five different units: Morphology, Genetics, Pathology, Crimi-
including nests and eggs (Migratory Bird Treaty Act). The Bald Eagle nalistics, and Chemistry (Science Professionals). These units are
Protection Act of 1940 made it unlawful to kill or possess the bald typically seen in traditional forensic laboratories, with the exception
and golden eagle (Bald Eagle Protection Act of 1940). The Marine of morphology. The morphology unit is responsible for identifying
Mammal Protection Act of 1972 made it unlawful to kill, possess, the species of the victim through comparative anatomy techniques
or import any marine mammal without a permit (Marine Mammal (Morphology Unit). The morphology unit is comprised of experts
Protection Act). As a way to protect endangered species, Congress in the fields of: herpetology (reptiles and amphibians), mammalogy
passed the Endangered Species Preservation Act of 1966, which made (mammals), and ornithology (birds) (Morphology Unit). Each
it unlawful to kill, take, possess, or transport any endangered or threat- expert is knowledgeable and experienced in not only the morphology
ened species. This Act was amended in 1969 to combat a global issue of the animals in his or her field, but also the evolution and taxonomy
thus making it unlawful to import endangered species into the United of the animals. The experts also have specific analytical skills unique
States; it also called for an international conference on the worldwide to their field and the animals within their field (Morphology Unit).
protection of endangered species (Endangered Species Act).

26
FORENSICS JOURNAL

The first task a wildlife investigator is faced with is to determine the Wildlife forensic scientists use and adapt the universally accepted
species of the victim. The evidence may be in the form of a dead DNA techniques to fit their needs of identifying the species of the
body, and therefore obvious because of the animals appearance, size, victim.
and shape. Conversely, it may be obscure and in the form of jewelry,
where appearance, size, and shape are of little help to investigators. In DNA can be found in the nucleus of all cells, called nuclear or
the case of the latter, the wildlife investigator would send the evidence genomic DNA and in the mitochondria, called mitochondrial DNA
to the U.S. Fish and Wildlife Forensic Laboratorys Morphology Unit. or mtDNA. DNA analysis can be performed on an individual level
Some legally protected species have similar characteristics to that of or at the species level (Rao). Species identification using genomic
an unprotected species. For example, different bird species may have DNA uses a specific nucleotide sequence known to vary between
similar looking feathers; elephant tusks at first glance appear similar to species, and if two samples have the same or similar sequences they
a mammoths tusks; and a bears inner organs may be indistinguishable are from the same species (Wildlife Crime). DNA fingerprinting
from other unprotected species (Neme). Approximately 75% of the works because of the variations found within certain fragments of
U.S. Fish and Wildlife Forensic Laboratorys work is species identifica- DNA that are known to be hyper-variable (Rao). DNA sequencing
tion. Without the forensic science techniques to confirm the species, only works with certain cases. In order to positively identify a species
investigators would have no way to determine what species the part with DNA sequencing, the laboratory has to have a reference sample
came from and therefore the legality of the trade. to compare the two sequences. Consequently, the laboratory needs to
maintain thousands of reference samples, one for each protected spe-
Wildlife forensic scientists have to conduct extensive research in order cies, in order to identify them through DNA sequencing (Neme 196).
to establish methods and protocols (for positively identifying species) Although reference samples can be hard to obtain, the U.S. Fish and
which are then accepted in a court of law. There may be only a small, Wildlife Forensic Laboratory has 40,000 samples (Neme 196). If the
indistinguishable animal part or byproduct which is available for case involves a species that the laboratory does not have a reference
analysis. One of the first established protocols for identifying a species sample for, another species identification method must be utilized.
won the U.S. Fish and Wildlife Forensic Laboratory an international
award (Our Labs Timeline). A scientific method for identifying mtDNA is circular in form and contains more copies within the
ivory had to be established concerning the unlawful import of African mitochondria than just the two copies of nuclear DNA found in the
elephant ivory as set forth in the African Elephant Conservation Act nucleus (Houck and Siegel 282). Thus, mtDNA persists longer than
of 1989. This Act made it unlawful to import or export any African nuclear DNA and can often be used in analyses when nuclear DNA is
elephant ivory or product after 1989 (Jackson 17). Criminalists Dr. degraded or the sample size is too small. mtDNA is only passed down
Ed Espinoza and Mary-Jacque Mann developed a legally accepted from the mother, unlike nuclear DNA where the offspring receives a
scientific method to distinguish the ivory of an elephants tusks from copy from the mother and father (Houck and Siegel 282). Therefore,
that of a mammoths tusks (Jackson 29). Mammoths are extinct and mtDNA genes are useful in species identification because there is little
thus cannot be harmed or threatened; however, their tusks remain intraspecies diversity (Dawnay et al. 1). Several research methods
fossilized in the earth and accessible for trade. Mammoths tusks are have been developed to use mtDNA analysis in wildlife forensics.
legal to trade because there is no harm to the animal itself (Jackson
29). Espinoza and Mann used a scanning electron microscope and The cytochrome oxidase I gene (COI) and cytochrome b are the most
measured the angles of Schreger lines, which are the lines formed on commonly used genes in mtDNA species identification (Wilson-
the ivory tusks. They concluded that the angles of the Schreger lines Wilde et al. 233). In order for these analyses to work, a reference
were different between elephants and other animals. In their analysis, database is used to compare the unknown sample with a known
they concluded that if the average of the Schreger lines angles was species sample. Currently, researchers in Australia are sequencing the
greater than 100 degrees, the ivory was from an elephant, and if the COI in all living species in order to create a barcoding database
average of the angles was less than 100 degrees, it was from a mam- (Wilson-Wilde et al. 234-235). Upon completion, this database
moth (Natural Ivory). Espinoza and Manns analysis may be used in will enable wildlife forensic scientists all over the world to positively
future elephant poaching and ivory cases. identify all species using the COI gene (Wilson-Wilde et al. 235).
The researchers used the COI gene because it is a shorter sequence
Deoxyribonucleic acid, more commonly known as DNA, is the than the cytochrome b gene, has a wide range of primers available
molecule found in cells of all living things that make them unique. for sequencing, and changes within the gene are not as rapid as with
There are several different DNA analysis techniques and methods, the cytochrome b gene (Wilson-Wilde et al. 234). The COI gene
which are used in traditional human forensic science to link a suspect also enables scientists to identify the sample down to the species level
to the crime scene. In wildlife forensics, these DNA techniques and (Wilson-Wilde et al. 234). A study was conducted on the validity of
methods may also be used to link a suspect with the crime scene, but the COI barcode database and researchers concluded that while it is
are more commonly used in species identification (Wildlife Crime). an accurate method of species identification, there were an inadequate

27
STEVENSON UNIVERSITY

number of reference samples. However, even with DNA degradation for its gall bladders (Neme 73). The fact that gall bladders are one
of samples, the COI gene could still be sequenced after four weeks of the most profitable animal products, coupled with the fact that
(Dawnay et al. 4). Therefore, even with a degraded sample, if a refer- a layperson may not be able to distinguish a bear gall bladder from
ence sample is available in the database, scientists may still be able to another animals gall bladder, creates an opportunity for traders to sell
identify the species using the COI mtDNA gene. counterfeit bear gall bladders. In order to prosecute someone for kill-
ing the bears and trading their gall bladders, scientists needed to prove
Researchers in India were able to sequence a mitochondrial rRNA the gall bladders were in fact from the protected black bears. Due to
gene fragment from a suspected tiger sample. They used this region the corrosive nature of the bile salts contained within the gall blad-
because it is highly variable between species and can be conducted on ders, scientists cannot perform DNA analysis (Neme). As a result,
a variety of different species (Prakash et al. 1240). In their analysis, the wildlife forensic scientists had to develop an alternative method to
they concluded that the skin sample was not in fact tiger, but posi- distinguish bear gall bladders from other species gall bladders.
tively identified the sample as cattle (Prakash et al. 1240 ). While
this was not what the researchers expected to conclude, their research Scientists at the U.S. Fish and Wildlife Forensic Laboratory were able
is important because they were able to positively identify a severely to develop a method of positively identifying the bear gall bladders
processed, decomposed, and therefore degraded skin sample using by the high levels of ursodeoxycholic acid, which is the very reason
mtDNA analysis (Prakash et al. 1240). In a separate study, scientists bear gall bladders are desired in the first place. The wildlife forensic
were able to extract mtDNA from a sample of just a few bird feather scientists used a technique commonly used in traditional forensic
barbs (Speller et al. 1). The scientists used both fresh and degraded science, high performance liquid chromatography (HPLC). HPLC
samples from four separate bird species. They were able to sequence separates molecules out by size creating a chromatogram, which is a
and positively identify each species with only two to five feather barbs color-coded chemical profile. This profile or chromatogram indicates
(Speller et al. 1). This study is important for two reasons. First, which molecules and chemicals are present in the sample by the colors
feather evidence may be limited and with this technique the scientists displayed (Neme 101). Each unknown sample was tested along with
do not have to destroy or use the entire feather in order to positively a known bear gall bladder sample with which to compare the chro-
identify the species (Speller et al. 2). Second, part of the feather matogram. To ensure the accuracy of the test, the wildlife scientists
may be damaged and/or destroyed prior to submission; however, also performed a more sensitive test, Thin Layer Chromatography or
scientists can still analyze and identify the species. Even if the feather TLC. TLC works in a similar manner to HPLC by separating mol-
and nuclear DNA is degraded, scientists may be able to sequence ecules in a mixture based on the size of the molecules. The scientists
the mtDNA and identify the species with only a minimal amount of determined the chromatogram for the bear gall bladder samples had
sample using this method. three distinct peaks corresponding to the high levels of ursodeoxycho-
lic acid, chenodeoxycholic acid, and cholic acid (Neme 102). With
Processed samples are common in wildlife crimes because the animal the results from the HPLC and TLC tests, the scientists realized that
part is often used for various purposes. Many times the animal part their method of positively identifying bear gall bladders worked;
is no longer recognizable as it may have been carved, dyed, ground however, in this case their unknown samples did not have the three
up, etc. These processes may have a negative effect on the DNA, and distinct peaks and therefore were not bear gall bladders (Neme).
analysis of nuclear DNA may be difficult to achieve. Being able to
analyze these products with DNA sequencing is important because This case demonstrated the importance of being able to develop a
traditional morphological techniques may not be useful if the animal scientifically accepted method of identifying bear gall bladders. Even
part is not recognizable, and there are no other available identification though their samples did not prove to be bear gall bladders, their
methods. Moreover, the International Society for Forensic Genetics analysis worked and demonstrated the ability to positively identify
has approved DNA sequencing for forensic wildlife identification bear gall bladders from those of other species. This analysis will be
(Ogden et al. 181). useful in investigating and potentially prosecuting future bear gall
bladder investigations. Wildlife forensic scientists need to continu-
Even in cases when a reference sample is available for comparison, ously develop unique methods of positively identifying different
DNA sequencing may not work. Bear gall bladders are commonly protected species.
used in traditional Chinese medicine. Ounce for ounce, bear bile is
one of the highest-value commodities on the black market (Neme Knowing whether a crime has been committed is the first step in
74). The Asiatic black bear was the most common source of bear gall any investigation. Most of the time the wildlife forensic scientists
bladders, however, all of Asias bear species have been targeted for need to identify the species of the victim in order to determine if a
their gall bladders (Neme 72). The decline in Asian bear populations crime has been committed; however, this may not always be the case.
caused them to be placed in CITES Appendix I. With the Asian Some protected animals are legal to kill in certain circumstances. For
bears protected, the North American black bear became threatened instance, Native Alaskans are able to legally hunt walrus for subsis-

28
FORENSICS JOURNAL

tence (Espinoza et al. 104). Special Agent Al Crane, of the United ent at different locations on each tusk or tooth (Nuke Test). Next,
States Fish and Wildlife Service, witnessed a scene in rural Alaska they used an accelerated mass spectrometer to compare the levels of
where hundreds of deadless walrus had washed ashore (Neme 7). Spe- carbon-14 to carbon-12. The scientists could determine when the
cial Agent Crane knew what species the victim was, a walrus; however, animal died by the carbon-14 levels present at the most recent tissue
he needed to further investigate the circumstance of the killing in formed on the tusk (Nuke Test). They concluded that their method
order to determine whether it was an illegal act. could determine if an animal died prior to 1955 because of the low
levels of carbon-14 due to pre-nuclear testing, and could determine
For the walrus killings to be legal subsistence hunting, the investiga- death within one year after 1955 (Nuke Test).
tors needed to prove the Native Alaskans killed the walrus, and that
no part of the walrus was wasted (Espinoza et al. 104). If during the As evidenced by the aforementioned cases, wildlife crimes may have
investigation the evidence proved wastefulness with only removal of exceptional situations or difficulties compared to human crime scenes.
the tusks, then the walrus killings would be an illegal act. To be con- Prior to the determination that an illegal act has occurred, multiple
sidered non-wasteful, the hunters would recover the blubber, flippers, tests, analyses, and investigations have been performed. With the
liver, heart, and ivory (Espinoza et al. 104). It would be impossible to knowledge provided by wildlife forensic scientists, investigators make
bring hundreds of walrus into the laboratory for examination. Thus, the determination whether to proceed with an investigation of a
the wildlife forensic scientists and investigators examined the walrus wildlife crime. The uniqueness of wildlife forensics lies in the fact
carcasses and performed necropsies, or animal autopsies in the field. that most of the activities are conducted prior to the identification of
the illegal act. Once the determination has been made that a wildlife
The wildlife forensic scientists conducted various studies to effectively crime occurred, traditional forensic science methods of linking the
determine the legality of the headless walrus killings. They looked suspect to the crime scene may be employed.
at the sea currents, previous studies of walrus decomposition, and
weathering of exposed bone in the climate in which the carcasses were The species identification methods the U.S. Fish and Wildlife Forensic
discovered (Espinoza et al. 104-111). Following their extensive stud- Laboratory have developed are fundamentally important to the field
ies, the scientists created five categories. The first category included of wildlife forensics. Without these methods, officers would be unable
headless walrus with clean vertebrae, which indicated the head was to conduct proper investigations. Wildlife investigators depend
removed prior to the carcass washing ashore. The killing of the walrus on the wildlife forensic scientists who conduct and adapt scientific
in this category would be illegal if no other meat or part was taken methods specific to wildlife crimes. Wildlife forensic science is depen-
from the walrus (Espinoza et al. 110). Throughout the course of the dent on the widely accepted analytical techniques used in traditional
investigation, they determined that 169 out of 249 walrus illegal forensic science. This is especially true when adapting the already
killings (Espinoza et al. 111). Categories II, III, and IV had various accepted DNA methods to species identification. Moreover, wildlife
stages of decomposition and conditions of the carcasses; all three were forensic investigators employ traditional forensic science methods
indicative of legal hunting (Espinoza et al. 111). Category V included of linking the suspect to crime scene and/or evidence on a routine
carcasses that were too decomposed to properly and accurately analyze investigatory basis. Wildlife forensic scientists have used and adapted
and no determination on the legality of the killing could be inferred many techniques from the field of human forensics. Being able to
(Espinoza et al. 111). The studies conducted by the scientists are adapt and create new and emerging investigatory techniques is criti-
reproducible; therefore it was an acceptable method of determining cal to the field of wildlife forensics. With a continued focus on the
the legality of subsistence hunting. investigation and prosecution of wildlife crime and the advancement
of wildlife forensic techniques, wildlife forensics may even influence
Many of the federal laws protecting species are effective only after new traditional forensics techniques in the future.
the date they were enacted. For example, the African Elephant
Conservation Act of 1989 made it unlawful to import or export any REFERENCES
African elephant ivory or product after 1989. Therefore the legality
of the import is contingent upon the 1989 date. If elephant ivory About the Lab. U.S. Fish & Wildlife Service: Forensic Laboratory.
was imported prior to 1989 it is legal. This may create a problem for U.S. Fish and Wildlife Service. n.d. Web. 20 Sept. 2013.
investigators and/or prosecutors because if a suspect knows the law, he
may claim he imported the ivory prior to 1989. Researchers devel- Appendices. Convention on International Trade in Endangered Species
oped a method using radioactive carbon 14 present in ivory tusks, of Wild Fauna and Flora. n.d. Web. 23 Sept. 2013.
to determine the year the animal died (Nuke Test). Nuclear tests
Bald Eagle Protection Act of 1940. Digest of Federal Resource Laws
conducted in the 1950s and 60s converted nitrogen into carbon-14,
of Interest to the U.S. Fish and Wildlife Service. U.S. Fish & Wildlife
significantly increasing the amount of carbon-14 in the atmosphere
Service. n.d Web. 20 Sept. 2013.
(Nuke Test). Scientists measured the amount of carbon-14 pres-

29
STEVENSON UNIVERSITY

Dawnay, Nick, et al. Validation of the Barcoding gene COI for Use Science Professionals. U.S. Fish & Wildlife Service: Forensic Labora-
in Forensic Genetic Species Identification. Forensic Science Interna- tory. U.S. Fish and Wildlife Service. n.d. Web. 20 Sept. 2013.
tional. 173. 1-6. 14 Feb. 2007. Science Direct. Web. 6 Oct. 2013.
Speller, Camilla, et al. Feather Barbs as a Good Source of mtDNA
Endangered Species Act. U.S. Fish & Wildlife Service: Endangered for Bird Species Identification in Forensic Wildlife Investigations.
Species. U.S. Fish & Wildlife Service. n.d. Web. 20 Sept. 2013. Investigative Genetics. 2.16. (2011): 2-7. Web. 3 Oct. 2013.

Espinoza, Edgar, et al. Taphonomic Indicators Used in Infer Waste- What is CITES? Convention on International Trade in Endangered
ful Subsistence Hunting in Northwest Alaska. Anthropozoologica. Species of Wild Fauna and Flora. n.d. Web. 20 Sept. 2013.
1997. 103-112. Web. 29 Sept. 2013.
Wildlife Crime: A Guide to the Use of Forensic and Specialist Tech-
Houck, Max M., and Jay Siegel. Fundamentals of Forensic Science. niques in the Investigation of Wildlife Crime. Department for Envi-
Burlington: Elsevier Academic Press, 2006. Print. ronment Food and Rural Affairs. Mar. 2005. Web. 28 Sept. 2013.

Jackson, Donna, M., The Wildlife Detectives: How Forensic Scientists Wilson-Wilde, Linzi, et al. Current Issues in Species Identification
Fight Crimes Against Nature. Boston: Houghton Mifflin Company, for Forensic Science and the Validity of Using the Cytochrome Oxi-
2000. Print. dase I (COI) Gene. Forensic Sci. Med. Pathol. June 2010. 6: 233-241.
Science Direct. Web. 6 Oct. 2013.
Marine Mammal Protection Act. The Marine Mammal Center. n.d.
Web. 20. Sept. 2013.
MEGAN ANSBERRy graduated from
Migratory Bird Treaty Act. Digest of Federal Resource Laws of Interest the Ohio State University with a Bachelor
to the U.S. Fish and Wildlife Service. U.S. Fish & Wildlife Service. n.d. of Science in Microbiology and a Minor
Web. 20 Sept. 2013. in Forensic Science. She is employed by
the federal government and has worked
Morphology Unit. U.S. Fish & Wildlife Service: Forensic Laboratory.
for them for the past four and half years.
U.S. Fish and Wildlife Service. n.d. Web. 20 Sept. 2013.
She is currently enrolled at Stevenson as
Natural Ivory. U.S. Fish & Wildlife Service: Forensic Laboratory. U.S. a graduate student in Forensic Studies on
Fish and Wildlife Service. n.d. Web. 20 Sept. 2013. the interdisciplinary track and hopes to
graduate July 2014. She hopes to stay with
Neme, Laurel, A. Animal Investigators: How the Worlds First Wildlife the federal government upon graduation,
Forensics Lab is Solving Crimes and Saving Endangered Species. New and either work in the field of forensics or
York: Scribner, 2009. Print. investigations.

Nuke Test Radiation Can Fight Poachers: Age and Legality of Ivory
by Carbon-14 Dating. Research From the U. The University of Utah.
1 July 2013. Web. 5 Oct. 2013.

Ogden, Rob, Nick Dawnay, and Ross McEwing. Wildlife DNA


Forensics -- Bridging the Gap Between Conservation Genetics and
Law Enforcement. Endangered Species Research 9.179-195 (2009):
179-95. Web. 3 Oct. 2013.

Our Labs Timeline. U.S. Fish & Wildlife Service: Forensic Labora-
tory. U.S. Fish and Wildlife Service. n.d. Web. 20 Sept. 2013.

Prakash, S., et al. Mitochondrial 12S rRNA Sequence Analysis in


Wildlife Forensics. Current Science. 78.10. (200) : 1239-1241. Web.
27 Sept. 2013.

Rao, Dr. G V. DNA Fingerprinting and Wildlife Forensics. Weblog


entry. The Writers Forensic Blog. 6 Apr. 2011. Web. 27 Sept. 2013.

30
FORENSICS JOURNAL

What are the Best Practices for Preventing,


Identifying and Investigating Arson by
Firefighters?
Christopher E. Allen

The fire station in the bucolic northern Vermont village of Albany was unpublished novel entitled Points of Origin, a book that authorities
destroyed by fire in August 2013. The town, whose closest mutual said mirrored his own life as a firefighter and serial arsonist (Lee).
aid department was forty minutes away, lost all of its fire appara-
tus. Immediately following the fire, Albany Fire Department Safety Some firefighter arsonists are lone wolves while others act in groups
Officer Elmer Joerg was interviewed by the media as Joerg was one or teams. One recent example of a lone firefighter arsonist was a
of the first volunteer firefighters on scene. During a rambling six volunteer firefighter in New Hampshire arrested in September 2013
minute interview, Joerg told WCAX News how frustrated he was by for setting multiple fires in February 2013 (Haas). A recent example
the crime and stated if somebody calls for help tomorrow I dont of a firefighter arsonist team is that of a current volunteer firefighter
know what were going to do (Reading). Within five days, Joerg and a former volunteer firefighter from the same department, who
was arrested for setting the very fire that had frustrated him. Joerg were arrested in September 2013 for setting fire to a vacant factory
confessed after being captured on video surveillance setting the fire, in Sellersville, Pennsylvania. Controlling and extinguishing the fire
having used his personal access code to enter the station (Reading). required the response of 16 fire departments and 200 firefighters from
Further research revealed that a business and a house owned by Joerg two counties (Domizio). A unique case involving a group of arsonist
had previously burned (in separate incidents). The house fire resulted occurred in the late 1990s, when a former volunteer firefighter was
in the death of Joergs father in law. Investigators planned on reopen- attempting to secure his position back and encountered resistance
ing both of these cases. from the chief (United States Fire Administration 10). The former
volunteer firefighter and six active volunteer firefighters entered into
OVERVIEW OF THE PROBLEM a conspiracy to burn a vacant house, thereby providing this former
firefighter an opportunity to call it in and regain the confidence of the
The firefighter arsonist is not a recent phenomenon. Archive searches chief (United States Fire Administration 10). While setting the fire,
of major American newspapers from the late 1800s reveal headlines the former firefighter became trapped inside the house and died. The
including: Incendiary Fireman, Volunteer Firemen as Incendiaries six volunteer firefighters were arrested and convicted (United States
and Fireman Accused of Arson (Report on Firefighter Arson 8). Fire Administration 10).

The fire service in the United States is comprised of career fire depart- Identifying the actual number of firefighters arrested for arson each
ments, combination fire departments (a mix of paid and volunteer year is problematic, as no national data collection system for docu-
employees) and departments staffed solely by volunteers. The number menting firefighter arson cases exists (Report on Firefighter Arson
of volunteer firefighters in the United States declined by over 18% 4). However, analysis of media reports indicates that approximately
between 1984 and 2011. The loss of volunteers has been attributed one hundred firefighters are arrested for arson each year in the United
to increased time demands, more rigorous training requirements, and States (Frankel). According to retired Bureau of Alcohol, Tobacco
the proliferation of two-income families whose members do not and Firearms (ATF) Special Agent Daniel Hebert, who arrested at
have time to serve as volunteer firefighters (Volunteer Fire Service least thirty firefighter arsonists during his federal law enforcement
Fact Sheet 2). Due to the decline in volunteers, some fire depart- career, Really, it goes on way more than anyone knows; we dont
ments have been reluctant to institute mandatory background checks, really know about most of them (Frankel).
even though background checks could potentially identify a firefighter
arsonist (Burton). Fire Chief Thomas W. Aurnhammer, who has written and lectured
extensively about the firefighter arson problem, describes the issue as
Most documented cases of firefighter arson are from volunteer fire nothing more than a cancer growing within some of our organiza-
departments, which is not surprising since volunteers far outnumber tions (Aurnhammer). San Mateo, California Fire Department
career members (United States Fire Administration 9). In addition, Battalion Chief John Warren states any firefighters who mali-
many volunteer fire departments serve less populated areas, often ciously start a fire are going against the very credo that we all honor in
resulting in lower call volumes and fewer fires leading to both boredom our profession (Lee).
and a lack of opportunities to exercise firefighting skills and equip-
ment. However, according to the FBIs National Center for the Analy- MOTIVES AND PROFILES OF FIREFIGHTER ARSONISTS
sis of Violent Crimes, probably the most prolific American arsonist of
the twentieth century was John Orr, a career fire department Captain What motivates a firefighter to set fires is a subject of great debate
and Arson Investigator in California (Waumbaugh). Orr was ulti- (United States Fire Administration 6). The U.S. Fire Administration
mately convicted on both state and federal charges for setting multiple defines motive as the inner drive or impulse that is the cause, reason,
fires over a period of two decades, including a fire in a home improve- or incentive that induces or prompts a specific behavior (United States
ment store that killed four people, one of whom was a two year old Fire Administration 6). The six general motives for fire setting include:
child (Waumbaugh). While committing his own crimes, Orr wrote an Excitement, Vandalism, Revenge, Profit, Extremist/Terrorism and

31
STEVENSON UNIVERSITY

Crime Concealment. Examples of firefighter arson can be found in TABLE 1 - COMPARISON OF SOUTH CAROLINA FORESTRY
each of the six motive categories (United States Fire Administration 6). COMMISSION VS. FBI NCAVC PROFILES

The most frequent motives of firefighter arsonists include the need


to be seen as a hero, to practice extinguishing fires, or to earn extra SOUTH CAROLINA
FBI NCAVC
money (United States Fire Administration 6). Excitement was also FORESTRY COMMISSION
a common motive of firefighter arsonists (Burton). The Australian
Institute of Criminology found that when firefighters commit arson, White male, age 17-26 White male, age 17-25
it was usually out of a desire for excitement or as a way of gaining Product of disruptive, harsh, or One or both parents missing
attention and recognition. Ken Cabe, author of a South Carolina unstable rearing environment. from home during childhood.
Department of Forestry study of firefighter arsonists, noted that If from an intact home, the
many firefighter arsonists belonged to fire departments that do not emotional atmosphere was
respond to many calls. Cabe concluded that the firefighter arsonists mixed and unstable.
are excited, eager, and motivated and that the alarm doesnt sound
Poor relationship with father, Dysfunctional. One of their
nearly often enough (Cabe). Matthew Hinds-Aldrich, an assistant
overprotective mother. parents left home before the
professor of fire science, and the lead author of the Report on the
child reached age 17. Cold,
Firefighter Arson Problem, concluded that some volunteer firefighters
distant, hostile, or aggressive
illegally set fires out of boredom (Frankel).
relationship with natural father.
Limited scientific research exists about the profiles of firefighters If married, poor marital Poor marital adjustment. If
arsonists; however, two prominent studies have been conducted. One adjustment. not married, still living at home
was Cabes study; the second study was conducted by Tim Huff of the with parents.
FBIs National Center for the Analysis of Violent Crime (NCAVC). Lacking in social and Lack of stable interpersonal
Both studies drew from small samples of arrested and convicted interpersonal relationship. relationships.
firefighter arsonists; sixty-six in Huffs research and eighty in Cabes
research (Report on Firefighter Arson16). The studies were Poor occupational adjustment, Poor occupational adjustment.
researched independently of each other yet were striking in their employed in low-paying jobs. Menial laborer, skilled laborer,
similarities (Report on Firefighter Arson 16). However, one key clerical jobs.
difference between the results was that the FBI profile showed most Fascinated with the fire service Interested in the fire service in
firefighter arsonists worked alone, yet many of the South Carolina and its trappings. the context that it provides an
cases involved several firefighters from a single department working arena for excitement, not for the
as a group to set fires (Cabe). sake of public safety.
May be facing unusual stress Alcoholism, childhood
The profiles are limited by several factors, including the small number
(family, financial, or legal hyperactivity, homosexuality,
of cases studied by each. In the vast majority of arson cases no one
problems.) depression, borderline
is arrested, thus it is likely that many firefighter arsonists remain
personality disorder, and
undetected (Report on Firefighter Arson 16). As a result, Cabe and
suicidal tendencies.
Huff had to base their research on a small sample of known convicted
firefighter arsonists, not the entire population of actual firefighter Average to above average Mixed findings on intelligence,
arsonists. intelligence, but poor or fair but most arsonists have been
academic performance in found to have average to higher
The South Carolina and FBI profile are listed for comparison pur- school. intelligence. Poor academic
poses in Table 1 (United States Fire Administration 5). performance.

32
FORENSICS JOURNAL

There are firefighters who meet some or all of the traits described The National Volunteer Fire Council developed several recommenda-
above yet do not commit the crime of arson. Forensic psychologist tions mirroring Martinezs. Their recommendations included: adopt-
Rebekah Doley noted that the similarities between firefighters who ing firefighter arson prevention training programs on a national level;
light fires and those who dont, emphasizes how difficult it is to spot conducting background checks and applicant screenings for all new
the threat from within (Report on Firefighter Arson 17). The recruits; establishing zero-tolerance policies regarding fire-setting; and
National Volunteer Fire Council described the South Carolina profile empowering members to take a stand (Report on Firefighter Arson
and the FBI profile as popular in large part because they condense 27). The last point is critical as firefighter arson was not always
a complex phenomenon into a succinct and straightforward chart considered a bad thing by some firefighters and was actually viewed
(Report on Firefighter Arson 17). However, many firefighter arson- as a rite of passage in some fire departments (Report on Firefighter
ists do not fall within the parameters of the two profiles and that Arson 12).
while firefighter arsonists may share some statistical similarities, they
are not homogenous (Report on Firefighter Arson 17). A model training program called Hero to Zero was developed by
the Pennsylvania State Police. The program is required for all recruit
REDUCING THE LIKELIHOOD THAT A FIREFIGHTER WILL firefighters in the state (Martinez 66). The goal of the three hour
BECOME AN ARSONIST program is to reduce the rate of firefighter arsons through awareness
(Report of Firefighter Arson 25). Pennsylvania State Police Trooper
As noted earlier, retired ATF Special Agent Daniel Hebert estimated David Klitsch said the program has been credited with uncovering
that he arrested at least thirty firefighter arsonists during his career. cases of firefighter arson since its inception. Trooper Klitsch expected
Hebert and Rick Jones, a retired state fire investigator in Louisiana, to see an increase in the number of firefighters arrested for arson as
developed a program called Secrets in the Firehouse and now travel the fire service goes through a period of cleansing as a result of the
together throughout the United States, discussing the firefighter information gathered through this program and the action taken by
arson problem (Hebert and Jones). Several convicted felons (former the students in identifying these criminal actions (Report on Fire-
firefighters whom Hebert arrested for arson,) often travel with Hebert fighter Arson 25).
and speak to crowds of firefighters about the life-long ramifications of
their crimes. When asked what, if anything, could have been done to RECOGNIZING A FIREFIGHTER ARSONIST
prevent the firefighters he arrested from becoming arsonists, Hebert
immediately stated 28 of the 30 would have never set a fire had they What red flags or warning signs might indicate that a firefighter
had training and education (Hebert). arsonist is at work? Before that question is answered, it is necessary
to understand how fire departments operate. Most fire departments
Hebert described most of the firefighter arsonists he arrested as kids cover a specific geographic area i.e., a city, county, town, taxing dis-
who felt bulletproof and were people trying to do right by joining trict, etc. Fire departments with more than one station further define
their local fire department. Hebert believes effective training about their coverage areas as first due territory, referring to the specific
the ramifications of firefighter arson would have made the young geographic area covered by an individual fire station. In the context
firefighters understand that setting any fire illegally was a crime. As of firefighter arson, many firefighters set fires out of excitement or
many of the fires were set in vacant or abandoned buildings, the boredom, so it is logical they would set fires in the same areas cov-
firefighters often viewed their actions as simply a training opportunity ered by their fire department or fire station. The United States Fire
or an opportunity for excitement that did not harm or risk anyone. Administration noted that firefighters are known to set fires so they
The firefighter arsonists did not consider the permanent consequences can engage in the suppression efforts (1).
of becoming a convicted felon including the loss of ability to vote,
carry a firearm, and be a member of a fire department. The firefighter Several warning signs exist that might indicate a firefighter is setting
arsonists also did not consider that a firefighter or a member of the fires. Chief Aurnhammer stated that firefighter arsonists always
public could be hurt or killed in the execution of a response, and seem to be in the right place at the right time (Lee). Firefighters
subsequent fighting of a fire. Hebert strongly reiterated that educa- who live far from the station or the fire scene yet are always the first
tion would have prevented the majority of the thirty firefighters he to arrive at the station or on-scene, particularly in the middle of the
arrested from becoming convicted felons (Hebert). night, may warrant investigation. The Report on the Firefighter Arson
Problem noted that in several firefighter arson cases, firefighters who
Brett Martinez, a veteran fire marshal, firefighter and peace officer in lived nearby confronted another firefighter who lived miles away from
New York state wrote that the three best tools for preventing fire- the fire station about how he was able to arrive so quickly in the early
fighters from becoming arsonists were screening, testing, and educa- hours of the morning (22). Firefighters noticing such red flags are
tion (65). Martinez argued that screening should be conducted to critical to reducing the firefighter arson problem.
vet for any past criminal activity and fire setting activity (66).

33
STEVENSON UNIVERSITY

Chief Aurnhammer identified another warning sign of firefighter to respond to every fire call, day and night (Report on Firefighter
arson as sudden increases in the number of fires or severity of blazes Arson 22).
(Lee). The FBI found a tell-tale sign that a firefighter may be setting
fires is a sudden increase in nuisance fires within a companys first 911 AND DISPATCH RECORDS: Firefighter arsonists have been
due area (United States Fire Administration 1).1 known to report the fires that they started to ensure that they were
able to participate in the suppression effort (Report on Firefighter
In a Louisiana case, a single rural fire department responded to over Arson 22). Some firefighter arsonists have raised the suspicions
five hundred fire-related calls in one twelve month period. At the of dispatchers by referring to them by their first name, by using fire
end of that twelve month period, the ten firefighters were arrested department codes, and even leaving their fire pager on high volume
for arson. During the next twelve month period, the fire department so the dispatcher could hear it in the background (Report on
ran only sixty-four calls, including for the first time ever, emergency Firefighter Arson 22). Dispatch and 911 recordings should always be
medical first responder calls (Hebert). Fire chiefs should pay close reviewed and preserved early in any arson investigation.
attention to sudden and sustained jumps in call volume and quickly
notify investigative authorities so that the problem can be addressed. ORIGIN AND CAUSE INVESTIGATION: Huff recommends that
at least a cursory investigation is conducted of every fire regardless
INVESTIGATING THE FIREFIGHTER ARSONIST of the size (as many firefighter arsonists begin setting small fires
before graduating to larger and more dangerous fires) (Report
As soon as it becomes evident that a firefighter arsonist may be at on Firefighter Arson 21). Unfortunately, limited resources often
work, it is critical that a coordinated, effective and timely investi- make investigating the origin and cause of every fire an unrealistic
gation is initiated. Successfully investigating and apprehending a expectation. However, fire investigators should at least develop
firefighter arsonist requires close cooperation among the fire service, systems to identify trends.
law enforcement and dispatch personnel; data collection and analysis;
review of 911 and dispatch records; use of technology; and effective The Knox County, Tennessee Fire Investigation Unit (KCFIU) is
interviewing and interrogation skills. responsible for conducting origin and cause investigations and fire
related criminal investigations in Knox County, TN. The KCFIU
COMMUNICATION AND COORDINATION: Developing positive covers a county of over five hundred square miles. Although KCFIU
working relationships between fire service and law enforcement investigators respond to every confirmed structure fire, they do not
personnel before a firefighter arsonist strikes is crucial to ensuring have the resources to respond to every car, brush or trash fire. How-
information is shared in a timely manner when a firefighter arsonist is ever, to ensure that potential serial arsonists are identified early, the
suspected (Report on Firefighter Arson 21). Fire investigation units KCFIU receives a daily report from the county dispatch center that
vary widely in staffing and duties however, proactive efforts should provides basic details about every fire related call that occurred in the
be undertaken to encourage members of the fire service to report county during the previous twenty-four hours. KCFIU investiga-
any concerns or suspicions about possible firefighter arson activity tors examine the report daily, looking for trends. When a pattern of
(Report on Firefighter Arson 21). serial fire setting is identified, KCFIU investigators concentrate their
efforts on the area of increased fire activity. This program has led to
DATA COLLECTION: Fire service run reports and incident reporting several arrests and could be a useful model for other fire investigation
software can provide valuable leads for investigators. Fire departments units when attempting to determine if a firefighter arsonist is at work
should document the names of all firefighters who responded to (Knox County Fire Investigation).
each call, noting those firefighters who were first to arrive on-scene
or at the station. Fire investigators typically want to interview the TECHNOLOGY: GPS tracking data and cellular telephone records
first arriving firefighter(s) as their observations can help narrow the have proven useful in firefighter arson investigation. The ATF
search for the fires area of origin. The information can also be useful used a GPS tracking device attached to a vehicle in order to track
in firefighter arson investigations as it may identify patterns where the movements of firefighter arsonist John Orr prior to his arrest
particular firefighters were always on the first arriving apparatus (Waumbaugh). Retired ATF Special Agent Hebert used data from
(Report on Firefighter Arson 22). This data is important as it is not GPS tracking devices to overcome denials from firefighter arsonists
statistically likely that the same volunteer firefighters(s) will be able regarding their whereabouts at the time a fire was set.

1
The term company is often used to refer to a fire department as a whole or to a single fire station.

34
FORENSICS JOURNAL

Hebert used cellular telephone records in several firefighter arson ences in the fire service. Rapport should be infused throughout the
investigations. The GPS and/or cellular site data from a cellular tele- entire interview and not simply treated as a step that can be checked
phone can be used to determine the location of a firefighters cellular off once it is initially developed (Anderson).
telephone at the time of a fire. If the investigator can establish that
the firefighter had the telephone on his person at the time the fire was As previously discussed, Hebert emphasized the importance of devel-
set, the investigator may be able to refute denials by a firefighter who oping effective themes. FLETC said that themes help suspects ratio-
insists he was not in the area when the fire was set. Cellular telephone nalize, project, and minimize their behavior, which makes it easier for
records may also be useful when investigating a group of firefighter them to confess (Anderson). FLETC recommends against judging
arsonists who are working together to set fires. Cellular telephone toll or condemning the actions of a suspect and instead, helping them
records can be used to demonstrate contacts (calls and text messages) to justify why a good person would make a mistake (Anderson).
between groups of firefighters just before or after a fire was set. FLETCs instruction directly mirrors Heberts interview theme of the
hero who made a mistake. FLETC also encourages interviewers to
Hebert used consensual monitoring of telephone calls and meetings anticipate denials. By using information gained from investigative
in several firefighter arson investigations. After successfully obtain- techniques such a GPS records or telephone toll records, investigators
ing a confession from a firefighter arsonist, Hebert was able to have may be in a better position to counter denials.
the cooperating firefighter arsonist record conversations with other
firefighter arsonists (co-conspirators) about past arsons and future Chief Aurnhammer argued that a fire chief who suspected a firefighter
planned crimes (Hebert). of setting fires but did not have specific proof may be able to con-
front the suspect with suspicions (Aurnhammer). Although Aurn-
INTERVIEW AND INTERROGATION: Hebert described effective hammer does advocate notifying law enforcement if there is hard
interview and interrogation skills as the thing that is key to bringing evidence of arson, the simple act of confronting a firefighter arsonist
these cases home (Hebert). No other investigative technique was without first contacting law enforcement could lead the suspect to
more critical to Heberts success in investigating firefighter arsonists destroy evidence, compromise the investigation, or limit the effective-
than good interview techniques. Hebert said that most of the ness of a law enforcement interview. Fire chiefs who suspect one of
firefighter arsonists he arrested were not hardened criminals but their own firefighters of being an arsonist must balance their role and
instead were people who entered the fire service for all the right duties as fire chief with the needs of law enforcement to conduct a
reasons (Hebert). thorough and complete investigation. Although the fire chief may
have to act before law enforcement has completed their work, the
Hebert believes the two most important interview techniques he used chief should consult with investigators before taking unilateral action.
with firefighter arsonists were 1) developing rapport and 2) creating,
and using effective interview themes. As most firefighter arsonists CONCLUSION
were not hardened criminals, Hebert often used the interview theme
of a hero who made a mistake (Hebert). By treating firefighter Pennsylvania State Fire Commissioner Edward A. Mann summed
arsonists as decent people versus as criminals, Hebert was able to up his views on the problem of firefighter arson by saying but if
obtain confessions from the majority of the firefighter arsonists he you are a firefighter and youre convicted of arson, you ought to have
interviewed and later arrested (Hebert). the entire damn bookcase thrown at you (Burton). In The Myth of
Pyromania, the authors note that many non-arsonists are fascinated
The Federal Law Enforcement Training Center (FLETC) defines an by fire, including firefighters, both professional and volunteer; an
interview as a conversation with a purpose or point (Anderson). extremely small percentage of firefighters actually are arsonists (Huff,
FLETC organizes the law enforcement interview into five steps, Gary, and Icove 36).
which include in order: 1) Introduction 2) Rapport 3) Questions
4) Summary and 5) Closing (Anderson). During their instruction However, that extremely small percentage of firefighters who com-
on interviewing, FLETC places an emphasis on the importance of mit the crime of arson out of boredom, for excitement, or for some
building rapport. Rapport is important as it prepares the interviewee other reason, cause great harm to the reputation of the fire service.
to talk; establishes a baseline of behavior; and can establish trust Chief Aurnhammer describes firefighter arson as a cancer that can
(Anderson). FLETC described rapport as a critical element of sus- be cured (Aurnhammer 3). Aurnhammer eloquently adds that
pect interviews and concluded that suspects confess to interviewers aggressively combatting the firefighter arson problem represents the
they like and trust (Anderson). highest form of loyalty to the fire service and its mission. Improved
firefighter selection and screening processes, better education and
FLETC recommends that the interviewer identify areas where rapport effective fire service and law enforcement investigations can drastically
can be developed. Fire department based investigators may be able reduce the occurrence of firefighter arson.
to establish rapport with a firefighter arsonist based on shared experi-

35
STEVENSON UNIVERSITY

REFERENCES Lee, Henry K. A Call to Track Firefighter Arsonists / 3rd Arrest of


Season Fuels Experts Fears. sfgate.com. San Francisco Chronicle,
Anderson, Mark A. Interviewing. Inspector General Criminal Inves- 1 Sept. 2002. Web. 9 Sept. 2013. <http://www.sfgate.com/crime/
tigator Academy. Glynco, GA. 5 June 2013. Lecture. article/A-call-to-track-firefighter-arsonists-3rd-2775743.php>.

Aurnhammer, Thomas W. Addressing the Firefighter Arson Prob- Martinez, Brett. Tools to Help Prevent Firefighters from Becoming
lem. New Mexico Fire Chiefs Association. New Mexico Fire Chiefs Arsonists. Fire Engineering (2010): 63-68. Print.
Association, Mar. 2002. Web. 9 Sept. 2013. <http://www.nmfirechiefs.
com/ee/index.php/articles/fullstory/addressing_the_fire_fighter_ National Volunteer Fire Council (NVFC). Report on the Firefighter
arson_problem>. Arson Problem: Context, Considerations, and Best Practices. Greenbelt:
National Volunteer Fire Council, 2011. Print.
Australian Institute of Criminology. Firefighter Arson: Part 1 - Inci-
dence and Motives. BushFIRE Arson Bulletin 7 June 2005: n. pag. - - -, Volunteer Fire Service Fact Sheet. Greenbelt: NVFC, 2013. Print.
Web. 10 Mar. 2014
Reading, Jennifer. Firefighter Arrested in Albany Fire Station Arson.
Burton, Jeremy G. Firefighter Arsonist Profile: Young, Vengeful With WCAX.com. WCAX-TV, 18 Aug. 2013. Web. 9 Sept. 2013. <http://
a Hero Complex. thetimes-tribune.com. The Scranton Times-Tribune, www.wcax.com/story/23148043/firefighter-arrested-in-albany-fire-
17 Apr. 2010. Web. 9 Sept. 2013. <http://thetimes-tribune.com/ station-arson>.
news/firefighter-arsonist-profile-young-vengeful-with-a-hero-com-
plex-1.733567>. United States Fire Administration. Special Report: Firefighter Arson.
Technical rept. no. USFA-TR-141. Emmitsburg: U.S Fire Adminis-
Cabe, Ken. Firefighter Arson: Local Alarm. Fire Management Notes tration, 2013. Print.
56.1 (1996): n. pag. Web. 10. Mar. 2014
Wambaugh, Joseph. Fire Lover. New York: HarperCollins, 2002.
Domizio, Tony D. Former and Current Sellersville Fire Co. Mem- Print.
bers Charged with Arson in Wednesday Fire. Montgomeryville-Lans-
dale Patch. Patch, n.d. Web. 14 Sept. 2013. <http://lansdale.patch.
com/groups/police-and-fire/p/former-and-current-sellersville-fire-co- CHRISTOPHER E. ALLEN has been
members-charged-with-arson-in-wednesday-fire>. employed as a federal law enforcement
agent since December 2001. Mr. Allen has
Frankel, Todd C. Fascination and Contradiction in Firefighters also been in the fire service since 1985,
Accused of Setting Fires. stltoday.com. St. Louis Post-Dispatch, 8 serving as a career firefighter / fire officer
Aug. 2013. Web. 9 Sept. 2013. <http://www.stltoday.com/news/ and later as a volunteer firefighter / fire
local/metro/fascination-and-contradiction-in-firefighters-accused-of- officer. Mr. Allen currently resides in the
setting-fires/article_ce8a070b-24e8-506b-b861-e2fe640d93fb.html>. Nashville, Tennessee area and is employed
as an Assistant Special Agent in Charge
Haas, Kimberley. Police: Arson Suspect Nearly Killed Three People. with a federal office of inspector general.
Fosters.com. Fosters Daily Democrat, n.d. Web. 18 Sept. 2013. Mr. Allen is also a volunteer Captain with
<http://www.fosters.com/apps/pbcs.dll/article?AID=/20130918/ his local fire department.
GJNEWS_01/130919325>.

Hebert, Daniel. Personal Interview. 11 Sept. 2013.

Hebert, Daniel, and Rick Jones. Secrets in the Firehouse. Aug.


2008. Digital file.

Huff, Timothy G., Gordon P. Gary, and David J. Icove. The Myth
of Pyromania. Fire and Arson Investigator 51. January (2002): 35-38.
Print.

Knox County Fire Investigation Unit. Knox County Tennessee. N.p.,


n.d. Web. 4 Oct. 2013. <http://knoxcounty.org/fire/fire_investiga-
tion/index.php>.

36
FORENSICS JOURNAL

Is Fair Value Accounting a Fraud Risk?


Courtney Moore

INTRODUCTION to sell the asset in the market. Similarly, the company is also required
to assess whether there is evidence of impairment for any of their
The Association of Certified Fraud Examiners (ACFE) defines finan- financial assets, such as an estimated decrease in estimated cash flow
cial statement fraud as [an act] in which an employee intentionally from the asset. If so, the asset must be devalued to the extent of the
causes a misstatement or omission of material information in the lost value (Wells). Subsequently, the accumulated depreciation can be
organizations financial reports (e.g., recording fictitious revenues, restated in two ways: (1) restate the amount of accumulated deprecia-
understating reported expenses or artificially inflating reported assets) tion to the change in the fair value of the assets or (2) eliminate to the
(Association of Certified Fraud Examiners). According to the ACFEs extent of the increase in fair market value (Wells).
2012 report, financial statement fraud cases comprised only 8% of the
cases in 2012, but caused the greatest median loss of all types of occu- While both methods still depreciate the assets value over its useful
pational fraud considered at an average loss of 1 million dollars per life, the fair value method requires obtaining an updated value for the
case (Association of Certified Fraud Examiners). Financial statement asset. Both International Accounting Standards and United States
fraud is so costly because investors rely on financial statements to Accounting Standards set forth three levels of hierarchy on which fair
make important financial decisions. Therefore, accounting standards value can be determined with highest priority given to the highest-
must be stringent enough to eliminate loopholes that companies use level inputs (International Accounting Standards Board 72). The
to distort their financial statements. IASB explains, Level 1 inputs are quoted prices in active markets for
identical assets or liabilities that the entity can access at the measure-
The widespread application of fair value accounting principles has ment date (International Accounting Standards Board 76). If an
become a controversial topic because critics claim that fair value asset has an active market, like most publicly traded stocks do, the
accounting contributed to the recent financial crisis (Centre for Eco- asset should be valued at such. Nevertheless, not all assets have a
nomic Policy Research). While fair value standards may offer a more readily active market to value their assets in, and if no active market
accurate picture of what a companys assets are worth, applying the exists for that specific asset, the fair market value of a similar asset that
concepts identified by U.S. accounting standards and international can be readily traded in an active market will suffice under a Level 2
accounting standards can be difficult. By examining the current input (International Accounting Standards Board 81). Lastly, if the
laws and valuation methods in place for both international and U.S. asset cannot be valued at either of the previous two levels, an entity
accounting standards and the nature of financial statement fraud, it can estimate the assets fair value using an alternate valuation tech-
can be determined whether implementing fair value standards further nique such as a Level 3 input (International Accounting Standards
would leave companies at risk for improper asset valuation. Board 86). When addressing Level 3 inputs, IFRS sets forth a general
rule that the value reflected must reasonably reflect what amount
VALUATION OF FIXED ASSETS could be expected for the asset if sold (International Accounting
Standards Board 87-89).
The two common measurements for fixed assets are historical cost
and fair value. While International Accounting Standards (IAS) Most concerns have been expressed about valuing assets with no active
allows companies to choose between historical cost and fair value market due to the recent financial crisis (KPMG). Critics of fair value
when valuing fixed assets, U.S. principles require that companies accounting believe that during the financial crisis, fair value account-
report their assets at historical cost. The International Accounting ing inflated the value of assets to reflect a market value that was not
Standards Board (IASB) states that historical cost values fixed assets at appropriate due to the long-term nature of the assets held (Centre
the amount of cash or cash equivalents paid or the fair value of the for Economic Policy Research). The general principles described give
consideration given to acquire the asset at the time of its acquisition broad guidance to accountants, but the IASB also recognized the
(International Financial Reporting Standards). The asset, when first professions need for further guidance in this area.
purchased, is valued at the consideration the company paid to acquire
it. Over time, a portion of the asset will be expensed and by the end IFRS RECENT REGULATIONS
of its estimated life, will have a value of zero.
Internationally Accepted Accounting Principles include IFRS 13, which
Fair Market Value Accounting does not value an asset at its original was enacted to provide more clarity to companies on how to apply fair
cost. Instead, the asset is periodically revalued to reflect what the value principles to fixed assets. According to the international account-
entity could receive if the asset were sold. Under the International ing firm KPMG, the standard does not introduce any new require-
Financial Reporting Standards (IFRS) revaluation method for fixed ments for financial reporting. Instead, it provides more guidance on
assets, the asset must be revalued periodically to fair market value, how the principles defined earlier can be applied, and addresses the
less accumulated depreciation and the aggregate amount of losses detail that companies must provide for disclosures pertaining to the
from the impairment of value (Wells). Each period, the company accounting methods used to value these assets (KPMG).
first revalues its fixed assets to the value they could receive if they were

37
STEVENSON UNIVERSITY

In particular, the IASB focused on disclosures for Level 3 inputs due can be developed, capital expenditure estimations can be risky because
to the increased amount of subjectivity used in applying valuation they are discretionary in nature (Harman). Not all equipment burdens
techniques (KPMG). Level 3 inputs require the following disclosures: can be predicted, and the value of an asset can be over-appreciated by
estimating cash flows. Growth rates also require many assumptions; in
a) A description of valuation processes applied. particular, using a perpetual growth rate can lead to an overstatement
of value. The assumption that a growth rate will remain constant is
b) Quantitative information about significant unobservable highly unlikely as markets are usually volatile and company earnings
inputs. can change dramatically from year to year (Harman). Each years
predicted cash flow is multiplied by these growth rates, so the methods
c) Narrative disclosure of the sensitivity of the fair value mea
are very sensitive to small changes in the growth rate.
surement to significant reasonably possible alternative unob
servable inputs (KPMG).
U.S. AND FAIR VALUE ACCOUNTING
Therefore, lower inputs in the fair value hierarchy require a greater
Over the years, the Financial Accounting Standards Board (FASB) has
extent of disclosure.
extended fair value accounting to valuing debt and equity securities
Despite such specific requirements for disclosure and guidance held for sale, derivatives, and reporting changes in fair value in the
when classifying assets among the fair value hierarchy, IASB does income statement and comprehensive income (Lefebvre, Simonova
not establish specific valuation techniques that companies must use and Scarlat). In recent years, FASB and IASB have been working
under Level 3. However, there are certain valuation methods that are together to converge U.S. GAAP with IFRS. The American Institute
generally accepted in practice, and even though IASB doesnt provide of Certified Public Accountants (AICPA) distinguishes the mean-
specific guidance, generally accepted practices give accountants some ing of convergence and adoption: convergence involves the U.S. and
guidance as to how to value assets at Level 3 (KPMG). IASB working together to develop high quality, compatible financial
statements whereas adoption would require the SEC to set a specific
LEVEL 3 VALUATION METHODS time in which public companies would be required to issue finan-
cial statements based upon international standards (International
Two commonly used methods are applicable to assessing the value Financial Reporting Standards). As of this writing, the Securities
of fixed assets: the discounted cash flow method and capitalized cash and Exchange Commission (SEC) is only focused on convergence,
flow method (Putra). The discounted cash flow method involves esti- with the expectation that it will make a determination on whether
mating the future cash flow the asset is expected to provide, which can or not the U.S. will incorporate IFRS into U.S. financial reporting.
involve either a short or long period of time. After determining what Since IFRS relies heavily on fair value accounting when valuing assets,
future cash flow the asset will bring in, a discount rate is established. convergence could involve the U.S. adopting these same rules.
Then, by multiplying expected future cash flow by the determined
discount rate, the fair value for the asset will be determined (Putra). THE U.S. FINANCIAL CRISIS

The capitalized cash flow method is very similar to the discounted In response to Enron and other accounting scandals, the SEC issued
cash flow method: the future cash flow must be determined and the many regulations in an attempt to provide more meaningful infor-
discount rate must be applied. However, the difference between the mation to investors. The Sarbanes Oxley Act of 2002 helped fund
capitalized cash flow method and the discounted cash flow method further FASB efforts to develop new accounting standards through
is that the capitalized cash flow method assumes that the discount new funding (The Sarbane-Oxley Act). Through this Act, the SEC
factor stays constant throughout the period in which the future cash increased accounting regulation and facilitated development of more
flow has been determined (Putra). Under the discounted cash flow accurate accounting standards. FASB reformed U.S. accounting
method, the discount factor can change from period to period and standards by implementing fair value accounting because officials
thus, requires a greater degree of calculation. believed market values would provide investors with more relevant
information than historical cost was providing (Shorter). The SEC
While most valuation analysts prefer the discounted and capitalized wanted to switch to fair value accounting because historical cost may
cash flow methods, applying them can be difficult in certain situations have kept potentially worthless assets on the books of companies.
(Harman). First, estimating future cash flows can be very uncertain; Specifically, many investors were worried about mortgage-backed
some valuations project cash flows for five to ten years. As the time securities (Shorter). Under historical cost, these mortgages may still
period involved becomes longer, the cash flow projection becomes have some value on the financial statements of banks, but under fair
more uncertain (Harman). The second downfall of the discounted value accounting, these mortgages must be marked down to the actual
cash flow method involves capital expenditures. When predicting amount the bank expected to collect.
future cash flows, cash outflows offset cash inflows. While budgets

38
FORENSICS JOURNAL

After the implementation of FAS 157, Fair Value Measurements, many tal-European, with investment property and excluded firms that had
insurance firms and banks criticized fair value accounting standards less than 10% of investment property (Muller, Reidl and Sellhorn).
(Shorter). FAS 157 forced companies to write down their distressed Results of the study indicated that before the IFRS implementation,
assets when many companies were already experiencing financial Scandinavian countries were the primary subjects applying the fair
hardships. Critics claimed the standard forced holders to write down value model (Muller, Reidl and Sellhorn). France and Germany
assets below their true economic value, thus potentially worsening experienced substantial variation in the application of either historical
the U.S. economic recession. Conversely, supporters claimed the fair cost or fair value standards (Muller, Reidl and Sellhorn). Ultimately,
value standards were simply protecting investors because the financial the majority of the firms that did not provide fair value information
statements reflected the coming financial downturn (Shorter). When were in countries with less effective judicial systems, less tradition for
implementing fair value, FASB and the SEC experienced a conflict law and order, and higher levels of corruption. The primary reason
their duty was to protect investors, but they did not want to add any why companies chose to provide investment property fair values was
more failing companies to the struggling economy. in response to the greater demand for such information and a com-
mitment to financial transparency (Muller, Reidl and Sellhorn). After
Financial journalists claimed, By making the banks look so value- the implementation of IFRS, the study failed to find any evidence of
less in the middle of a credit crunch, mark-to-market accounting was a change in information consistency for firm disclosure of fair value
procyclical in that it accelerated the downturn (Best of 2008). (Muller, Reidl and Sellhorn). Also, investors still perceived a lack of
Fair value accounting forced banks to devalue their long-term assets; consistency in reporting despite the implementation of a universal
despite the fact that these assets were no longer liquid in nature. It standard (Muller, Reidl and Sellhorn). These results suggest that
may not be appropriate to value illiquid assets at fair value because implementation is not a definitive solution to the inconsistencies in
it represents the current value of an asset at a given time. While fair financial statements across countries.
value accounting can provide beneficial information to investors when
an asset will be sold in the near future, fair value accounting may not Based on the results of the study, the implementation of IFRS stan-
be appropriate for assets held for longer terms. dards across European countries did little to resolve the discrepancies
in financial reporting. Therefore, if the U.S. was to implement IFRS
EUROPEAN REAL ESTATE REGULATIONS fair value standards, there would be a risk of inconsistency in financial
reporting. At the same time, results still show that fair value report-
In January of 2005, International Accounting Standards required pub- ing supports financial transparency. Therefore, the U.S. could benefit
licly traded companies within European regulated markets to imple- from implementing such a standard because some investors may find
ment IFRS standards when preparing their financial statements. The fair value information more useful than historical cost information
Harvard Business School conducted a study that examined the conse- when making investment decisions.
quences of the implementation (Muller, Reidl and Sellhorn). Before
the implementation of IFRS, asset valuation varied across countries in IFRS IN GERMANY
Europe. While the United Kingdom required companies to value their
assets based upon the revaluation model, recognizing changes in asset In 2005, the European Union (EU) required publicly traded firms
value through equity and not income, other countries could choose in Germany to prepare their financial statements based upon IFRS
between the revaluation model or cost model (Muller, Reidl and (Liao, Sellhorn and Skaife). By requiring other countries to report
Sellhorn). No countries in Europe permitted companies to recognize their financial statements under IFRS, the EU was encouraging com-
changes in asset value through income (Muller, Reidl and Sellhorn). parability of financial information across the EUs states. Despite this
effort, comparability of financial information can only be achieved
As noted earlier, IFRS allows companies to choose between report- when companies report their financial information in the same man-
ing their assets at historical cost or fair value, with changes in value ner (Liao, Sellhorn and Skaife). When accounting standards allow
recognized through income. To encourage consistency, IFRS requires companies to report transactions based on multiple methods, compa-
that companies implement one method for all investment property rability may be sacrificed. Qing Liao, Thorsten Sellhorn, and Hollis
reported (International Accounting Standards Board). While firms Skaife investigated the comparability of financial information in the
are encouraged to hire independent valuation analysts with relevant EU by comparing the valuation usefulness of earnings and book
qualifications and experience to determine asset values, they are not values (Liao, Sellhorn and Skaife).
required to do so (International Accounting Standards Board). By
reporting changes in fair value through income as opposed to equity, The results of the study suggested that in the initial years of IFRS
asset value volatility will affect and possibly distort a companys adoption, the book values of French and German firms were similar
reported earnings. (Liao, Sellhorn and Skaife). However, over time, the book values of
French and German firms were less comparable (Liao, Sellhorn and
The sample studied by Harvard included 77 firms, mostly continen- Skaife). Countries may use similar valuation techniques in the initial

39
STEVENSON UNIVERSITY

years of IFRS adoption, but the companies stray from these methods and Abdullatif ). Unlike the previous countries, Jordan is a less-devel-
in later years. oped country. Even though Jordan has an open economy and exports
phosphate, it has limited natural resources and scarce water supplies
The study of initial Germany IFRS adoption shows that a single set of (Siam and Abdullatif ).
accounting standards may not always produce comparability. IFRS
allows multiple methods for valuation techniques, and choices may Since 1998, Jordan has required its banks to report financial state-
differ across businesses and countries. When considering the benefits ments based upon IFRS principles (Siam and Abdullatif ). Therefore,
of implementing IFRS, comparability is not as a guaranteed result. fair value accounting has been implemented on a larger scale than
U.S. standards allow. In 2005, many banks in Jordan saw a boom
IFRS IN CANADA in their stock values because their financial statements made the banks
appear very prosperous. This was due in part to a prosperous econ-
Despite its close ties with the United States, Canada decided to omy; new capital was entering Jordans economy at the time (Siam
adopt International Accounting Standards rather than U.S. standards and Abdullatif ). While the banks may have in fact been more pros-
because of the growing international acceptance of IAS in the rest of perous at the time, fair value accounting increased the volatility in the
the world (The Case for Interntional Accounting). The Certified banks financial position (Siam and Abdullatif ). When the economy
General Accountants Association of Canada (CGA) recognizes that stopped expanding, investors unexpectedly lost large amounts from
U.S. standards are more rule-oriented and descriptive than interna- their bank investments.
tional standards but felt international standards would give them an
opportunity to open more trade with the rest of the world (The Case After Jordan officials witnessed the volatility in the banks financial
fo Itnernational Accounting). figures, they required the cost alternative to be used for property,
plant, and equipment under IFRS 16 and the fair value option was
When IFRS was implemented, Canadian companies experienced no longer allowed (Siam and Abdullatif ). While Canada and Europe
many changes in their financial statements. In particular, since IFRS believed that the benefits of fair value accounting outweighed the
relies more heavily on fair value than the previous Canadian standards costs, Jordan disallowed fair value of fixed assets due to extreme
did, many companies experienced changes in their income figures due volatility. According to the survey Siam and Absullatiff conducted,
to changes in asset value. Fair value accounting led to more volatility the three biggest concerns about fair value accounting in Jordan were:
in financial ratios as well, such as current and quick ratios, and return 1) fair value accounting fraud, 2) ambiguity of IFRS accounting
on assets (The Effects of IFRS). standards, and 3) reliability of valuations used to determine fair value
(Siam and Abdullatif ). In an unstable economy, fair value account-
While CGA recognized the concerns that many accountants raised ing is a concern because volatility in markets will further increase the
about Level 3 fair value measurements, the Association points out that volatility of a corporations positions. Such accounting could lead to
an insignificant amount of assets comprise Level 3 valuations (The improperly valued fixed assets and even worse, misreported earnings.
Effects of IFRS). Based on research, Level 3 valuations comprised
only 9% of assets and liabilities on the financial statements of the IFRS IN CHINA
Canadian Imperial Bank of Commerce, and only 1% of assets and
liabilities on the financial statements of other existing major Cana- China is one of the worlds largest emerging markets; therefore, it
dian banks (The Effects of IFRS). Instead, Canada favored Level plays a significant role in the global economy (He, Wong and Young
2 inputs (The Effects of IFRS). Even if some fair value concepts 538). Financial reporting in China is tailored towards a contractual
raised concerns with investors, the overall amount of assets and liabili- role rather than an informational role; if firms report losses for three
ties valued at Level 3 was insignificant. consecutive years, they are delisted (He, Wong and Young). Therefore,
business managers in China receive more pressure to report profits
Therefore, despite the increased volatility in the financial statements, than businesses in most other economies. He et al. conducted a study
the CSA decided that IFRS would be the better choice for financial to determine if the pressure China businesses receive reduced the ben-
reporting due to the benefits they would receive in the form of new efits intended from fair value accounting (He, Wong and Young).
trade. While Level 3 valuations include assumptions and estimations,
the CSA is not concerned due to the fact that the assets valued at this Before fair value concepts were implemented, Chinese businesses
level reflect a low percentage of major companies assets and liabilities. were required to report trading securities at the lower of cost or
market value (He, Wong and Young). The change from lower of
IFRS IN JORDAN cost or market to fair value accounting requires companies to report
fluctuations of asset values in earnings, which was not an allowed
Walid Siam and Modar Abdullatiff conducted a survey detailing the practice under the previous principles. If market fluctuations cause
utility of fair value accounting in the Jordan banking industry (Siam the fair value of assets to decrease, this could cause Chinese compa-

40
FORENSICS JOURNAL

nies to miss their targets as well. The study identified that due to this for valuation error due to improperly applied valuation principles.
pressure and the potential loss resulting from fair value accounting, When using externally developed appraisals, the personnel involved
firms will be more likely to set up sales for their available securities should always be independent valuation experts, and their certifica-
in order to offset these losses with gains (He, Wong and Young). tions and references verified (Putra). Hiring an independent expert
While the intended benefit of fair value accounting was to encourage will eliminate the risk of a tainted report due to conflicts of interest or
transparency, the fair market values were difficult to determine due to lack of technical expertise.
the differences in Chinese markets compared to other countries the
Chinese rarely exchanges assets between independent parties (He, Based on the research presented, the IFRS revaluation concept for
Wong and Young). Despite efforts to produce a more accurate value fixed assets may result in improper valuation in the United States.
for Chinese assets, fair value accounting actually devalued the assets Despite Canadas success implementing IFRS full-scale, IFRS prin-
to an amount lower than the company would receive when it sold the ciples have not had the same effect for all countries. In countries such
asset. While convergence of International Standards globally would as Jordan with a volatile economy, investors suffered from severe dis-
be ideal, the Chinese case study highlights the fact that markets differ tortion in company financial statements. Fair value principles require
around the world. recognition of asset market value fluctuation in earnings, which can
adversely affect a companys financial position. Over the years, the
VALUATION FRAUD CONSIDERATIONS AND U.S. has made a concerted effort to improve U.S. generally accepted
CONCLUSIONS accounting principles and provide investors with accurate informa-
tion. Implementing a standard similar to IFRS 13 could compromise
Appraisals can be developed either internally or externally, and both the integrity of financial information that the U.S. worked so hard to
are acceptable under IFRS fair value accounting standards. When improve. Fair value accounting also relies heavily on estimates and
appraisals are used to determine the fair value asset, additional consid- assumptions that can leave companies vulnerable to fraud, especially
erations need to be made. Li Dharma Putra identifies five situations when considering Level 3 fair value inputs.
in which fraudulent valuations can result: bribed appraisers, conflicts
of interest, unwitting accomplices, sham valuation specialists, and While the benefits of reliable information may outweigh the risk
altered reports (Putra). Bribed appraisers and conflicts of interest of fraud when fair valuing short-term assets, long-term assets such
involve fraudulent activity that results in a valuation preferred by as property, plant, and equipment do not benefit from fair value
management: conflicts of interest involve a concealed relationship accounting. Instead of implementing IFRS 13 when converging to
and bribes involve appraisers receiving unnecessary consideration in international standards, the U.S. should continue to disallow fair
return for a certain appraisal result (Putra). When bribed appraisers value reporting for fixed assets. Such an action will preserve the integ-
and conflicts of interest are involved, the valuation experts may have rity of U.S. financial reporting and protect the interests of investors.
the required skills needed to perform the valuation but influence
from management or another party results in an inaccurate valuation. REFERENCES
An unwitting accomplice involves either valuation personnel lack-
ing appropriate knowledge or carelessness in valuation preparation. Association of Certified Fraud Examiners. Report to the Nations on
(Putra). Unlike the last two forms of valuation fraud, this accounting Occupational Fraud and Abuse. N.p.: n.p., 2012. ACFE. Web. 11 Mar.
fraud involves a valuation analyst who is unaware that he or she is 2014. <http://www.acfe.com/uploadedFiles/ACFE_Website/Content/
inaccurately preparing a valuation. Sham valuation specialist fraud rttn/2012-report-to-nations.pdf>.
involves a fictitious valuation report that is prepared by a nonexistent
valuation analyst (Putra). Unlike other valuation fraud, no valuation Best of 2008: Fair Value. CFO. CFO, 24 Dec. 2008. Web. 18 Feb.
analyst is involved. Therefore, the fraud originates from within the 2013. <http://ww2.cfo.com/accounting-tax/2008/12/best-of-2008-
company requiring the valuation. Lastly, an altered valuation report fair-value/>.
scheme occurs when a company receives a valuation report and alters
Centre for Economic Policy Research. The Future of Regulatory
it to show a more favorable result (Putra). The original valuation may
Reform. Center for Economic Policy Research. N.p., 4 Oct. 2010. Web.
have been prepared by a qualified appraiser with proper ethics and
expertise however, fraud have occurred because companies alter the 17 Feb. 2013. <http://www.cepr.org/2432/LauxFinal.pdf>.
valuation reports and manipulate the results. Certified General Accountants Association of Canada. The Case for
International Accounting Standards in Canada. N.p.: n.p., 1999. Certi-
Based upon the five situations in which fraudulent valuations can
fied General Accountants Association of Canada. Web. 11 Mar. 2014.
result, counter measures can be identified to prevent valuation fraud.
<http://www.cga-canada.org/en-ca/ResearchReports/ca_rep_1999-
Internally developed appraisals should involve personnel with the
09_case_acc_standards.pdf>.
proper valuation expertise (Putra). Expertise will eliminate the risk

41
STEVENSON UNIVERSITY

- - -. The Effects of IFRS on Financial Ratios: Early Evidence in Canada. Shorter, Gary. Fair Value Accounting: Context and Concerns. Mark
N.p.: n.p., 2011. Certified General Accountants Association of Canada. to Market and Fair Value Accounting: An Examination. Ed. James
Web. 11 Mar. 2014. <http://www.cga-canada.org/en-ca/ResearchRe- W. Curtis. N.p.: n.p., 2009. 1-23. Print. Business Economics in a
ports/ca_rep_2011-03_IFRS_early_adopters.pdf>.. Rapidly-Changing World.

Harman, Bryn. Top 3 Pitfalls of Discounted Cash Flow Analy- Siam, Walid, and Modar Abdullatif. Fair Value Accounting Useful-
sis. Investopedia. Investopedia US, 22 Sept. 2010. Web. 26 Feb. ness and Implementation Obstacles: Views from Bankers in Jordan.
2013. <http://www.investopedia.com/articles/07/dcf_pitfalls. Research in Accounting in Emerging Economies 11: 83-107. Web. 11
asp#axzz2L7jBrQ00>. Mar. 2014.

He, Xianje, T.J. Wong and Danquing Young. Challenges for Imple- Wells, Joseph T. Let Them Know Someones Watching. Journal
mentation of Fair Value Accounting in Emerging Markets: Evidence of Accountancy (2002). World GAAP Info. IAS 16. 2008. World
from China. CAR 29.2 (2012): 538-562. GAAP Info. 10 February 2013 <http://www.worldgaapinfo.com/pdf/
IAS/IAS16.pdf>.
International Accounting Standards Board. IFRS for SMEs. 2009.
IASB: E-IFRS. 10 February 2013 <http://eifrs.iasb.org/eifrs/sme/en/
IFRSforSMEs2009.pdf>. COURTNEY MOORE is a Certified Fraud
Examiner and Certified Public Accountant
International Financial Reporting Standards. AICPA IFRS Resources.
in the State of Maryland. She currently
American Institute of Certified Public Accountants, n.d. Web. 24 Feb.
works at Hertzbach & Company, a regional
2013. <http://www.ifrs.com/updates/aicpa/ifrs_faq.html>.
accounting firm that serves clients in the
KPMG. First Impressions: Fair Value Mesaurement. N.p.: n.p., 2011. Baltimore, Washington DC, and Northern
KPMG. Web. 10 Feb. 2013. <http://www.kpmg.com/Global/en/ Virginia area. Courtney received her Bachelor
IssuesAndInsights/ArticlesPublications/first-impressions/Documents/ of Science degree in Accounting from
first-impressions-fair-value-measurement.pdf>. Stevenson University in 2012. She continued
her studies at Stevenson University and
Laio, Qing, Thorsten Sellhorn, and Hollis A. Skaife. The Cross- received her Masters Degree in Forensic
Country Comparability of IFRS Earnings and Book Values: Evidence Studies in July of 2013.
from France and Germany. Journal of International Accounting
Research 11.1 (2012): 155-84. Web. 11 Mar. 2014. <http://www.
mccf.ch/docs/Comptabilite%20et%20marches%20financiers/Papier-
%5B08%5D.pdf>.

Lefebvre, Rock, Elena Simonova, and Mihaela Scarlat. Fair Value


Accounting: The Road to Be Most Travelled. N.p.: n.p., 2009. Certi-
fied General Accountants Association of Canada. Web. 11 Mar. 2014.
<http://www.cga-canada.org/en-ca/ResearchReports/ca_rep_2009-
12_fair_value_accounting.pdf>.

Muller, Karl A., III, Edward J. Riedl, and Thorsten Sellhor. Conse-
quences of Voluntary and Mandatory Fair Value Accounting: Evidence
Surrounding IFRS Adoption in the EU Real Estate Industry. 2008. TS.

Putra, Lie Dharma. Approaches to Determine Fair Value and Its Fraud
Risks. Accounting Financial & Tax. Accounting Financial & Tax, 9
Mar. 2010. Web. 13 Feb. 2013. <http://accounting-financial-tax.
com/2010/03/approaches-to-determine-fair-value-and-its-fraud-risks/>.

The Sarbanes-Oxley Act of 2002. NYSSCPA.ORG. New York State


Society of Certified Public Accountants, n.d. Web. 25 Feb. 2013.
<http://www.nysscpa.org/oxleyact2002.htm>.

42
FORENSICS JOURNAL

Demolishing Construction Fraud


Kristi OConnor

From the beginning of time, a common goal in every business has Overbilling frequently accompanies materials fraud because it allows
been to maximize profits. In ancient Rome, builders were working to the fraudster to cash in on the difference between what they spent
find ways to make an extra profit using marble as their primary mate- on the project and what the customer reimburses them. Baker Tilly
rial source (Hurley and Harvey). The top layer of marble was easier defines these actions as abusive billing practices because they violate
to excavate, while the deeper layers took much more time and effort terms of the contract and harm the customer in some way (Con-
to extract (Hurley and Harvey). Builders found they could save time struction Fraud: Stories). This could include charging the customer
and ultimately money by using only the top layers of marble in their for first-rate materials, when cheaper goods would have fulfilled the
projects. Unfortunately, the top layer of marble was riddled with terms of the contract just as well. Contractors can overbill for both
holes and air pockets which made it less sturdy than the deeper layers the materials they used as well as the time spent working on the proj-
(Hurley and Harvey). These flaws were typical for the top layer of ect (Kolke 10). Some contractors charge for work that was not actu-
marble and could be covered up with mud putty or wax that would ally performed (Kolke 10). Many consumers can relate to this fraud if
make the marble look solid, but not strengthen it (Hurley and Har- they have ever taken their car to the maintenance shop and wondered
vey). When structures began collapsing, the government investigated, if the repairman actually performed all the tests indicated on the
resulting in a law requiring all builders to list the materials they were checklist. Unless the customer is knowledgeable about car mechanics,
using and sign a statement verifying the quality of the marble (Hurley he/she may never know if any work was actually performed.
and Harvey). If a building collapsed and the builder was found to
have used the cheaper marble, the punishment was death (Hurley Ideally, the person hiring the contractor is knowledgeable about the
and Harvey). Although the methods of building and punishments construction work to be completed and will notice if any of the bills
for crimes have changed since the first century, construction fraud seem unreasonable or fictitious. Yet even with a strong construc-
continues to exist today. This article will discuss common methods tion background and reliable estimates of costs, the process of billing
used to commit construction fraud as well as techniques to detect and for construction projects is complex because there are many ways
prevent fraud from occurring. to measure costs. Often times, contractors will agree to a cost-plus
contract instead of a fixed price contract on the entire project (Palmer
The fraud committed by the Roman builders is an example of one of 19). A cost-plus contract requires the customer to compensate the
the most common deceptions employed in the construction industry; contractor for the exact labor and materials used on the job plus pay
providing used or substandard materials on a project (Construction an agreed upon fee which represents the contractors profit on the job
and Procurement). The finished product may not meet the custom- (Palmer 19). These types of contracts are susceptible to overbilling
ers standards, last as long as anticipated or survive in harsh condi- and need to be specific in order to avoid confusion. Even if the origi-
tions. Fraudsters gain an additional benefit by billing the customer nal contract is followed precisely, change orders are almost inevitable
for new materials even if they are not used on the project (Construc- in construction projects when unexpected problems or issues arise
tion Fraud: Stories). The perpetrator gambles on the assumption the that alter the original scope of the work to be performed. The change
client will not notice the materials used on the project were not the orders have to undergo an approval process, but they still leave room
materials for which they were billed. An example of this kind of fraud for deceit and improper billing (Kolke 10).
was described in a presentation by Baker Tilly, member of a presti-
gious international accounting firm. Baker Tilly was assisting one of The frauds described thus far are executed by outsiders of the victim
their clients in performing an inspection of repair work completed company, such as contractors performing work for the victim com-
by the clients usual local contractor (Construction Fraud: Stories). pany. A more disturbing fraud is one involving insiders at the victim
The inspection team noticed the window casings were nicked and company. Collusion occurs when two or more people work together
cracked which was strange as the owner had been billed for new in order to commit fraud (Part I - Kickbacks). In the construction
materials to be used on the job (Construction Fraud: Stories). The industry this most commonly occurs between an employee of the
team then examined the records detailing the waste removed from victim company and an employee of a subcontractor, vendor, supplier
the site and noted it was less than estimated; indicating some of the or customer. Bribery is a common byproduct of collusion and cor-
waste remained on site (Construction Fraud: Stories). After inter- rupts the construction industry to an extraordinary degree. According
viewing some of the project workers, it was revealed they had been to the anti-corruption agency, Transparency International, the Public
instructed to use salvage material from the job site for the contracted Works Contracts and Construction sector is the most likely to com-
repairs (Construction Fraud: Stories). The contractor had billed the mit bribery (Corruption Prevention). The long duration of most
client for new materials and supplies needed to complete the work, contacts, the involvement of multiple suppliers, subcontractors and
but instead kept the new items for his own inventory (Construction vendors, plus the varying rules and regulations depending on the
Fraud: Stories). This left the client with subpar used materials even jurisdiction the work is being conducted in create a complex structure
though he had paid for higher quality and new materials. that is ripe for manipulation (Corruption Prevention). Construc-
tion companies have to be sensitive to these types of fraud as they can

43
STEVENSON UNIVERSITY

cause more than monetary damages. Involvement in bribery schemes the construction industry can expect their revenue loss percentage to
is likely to trigger negative media attention and can have a destructive be even higher because construction proved to be the industry with
impact on a companys reputation (Corruption Prevention). The the third highest median loss of $300,000 (Report to the Nations).
adverse publicity can cause loss of customer loyalty, resignation of staff, Unfortunately, the ACFE found that approximately half of the victim
and discouragement of interested recruits (Corruption Prevention). companies they studied did not recover any of the losses they incurred
as a result of the fraud (Report to the Nations). Other trends
Kickbacks are one of the most common forms of bribery (Part I - revealed: small businesses are more at risk than larger ones, high-rank-
Kickbacks). In the Construction Law and Business Journal, two ing officials tend to inflict more financial damage on a company than
senior managers at Ernst & Young, LLP with decades of experience lower-level employees, and most fraudsters are first-time offenders
in fraud investigations describe a kickback as when a contractor with no criminal record (Report to the Nations). The Report to the
or vendor transfers or offers to transfer a direct or indirect financial Nations seeks to educate professionals across the globe and increase
benefit to another to influence the business decision without the their awareness of various frauds that are perpetrated on the economy.
knowledge of the contracting employer (Farragher 17). An example The ACFE also offers prevention and detection techniques to help
of this would be a vendor working with the purchasing manager of businesses protect themselves. Many of these techniques are especially
the victim company to ensure the victim company purchases all of useful to combat construction fraud.
its materials from the vendor (Farragher 17). The vendor marks up
the prices of its goods in order to make more of a profit and give the In order to detect fraud within the construction industry, it is
purchasing manager payment for making the deal happen (Part I - important for managers and owners to keep track of their materials.
Kickbacks). The victim company is now overpaying for its supplies Contractors should take steps to protect the procurement area by
because of a secret agreement between one employee and one vendor. keeping comprehensive records of materials projected, bought, and
received (Noyes 10). These records should be reconciled on a regular
Another collusion fraud affecting construction companies is bid- basis and any unusual discrepancies should be further investigated
rigging. The bidding process to win the right to take on a construc- (Noyes 10). For example, a large difference between the amount of
tion job is intended to foster a competitive environment in which materials ordered and the amount of materials delivered could indi-
the best contractor for the job will be awarded the contract (Part I cate that someone is stealing goods from the company. Alternatively,
- Kickbacks). However, with the help of someone inside the com- if the amount of supplies ordered is well above the amount of supplies
pany offering the contract, an unfair advantage can be created and estimated, that could raise questions of whether the subcontractor is
the process tainted. Bid-rigging can occur in a number of ways, but overbilling the owner for unnecessary materials on the job. Managers
in its simplest form an employee inside the victim company offers should also compare the prices and quantities of goods ordered from
inside information to a competing contractor to help them win the a vendor with the same types of goods ordered for another project or
bid, usually in exchange for a kickback (Part II Bid-Rigging). This from other vendor (Noyes 10). This test of reasonableness will help
information could include when the bid is going to be made available detect any overpriced items or excessive ordering. If prices are found
to contractors and what specifications the bid entails so the contractor to be higher than those offered by other similar vendors and projects,
can get a head start on the competition (Farragher 18). Alternatively, collusion may exist between the vendor and an employee with the lat-
the corrupt employee could use his power inside the company to ter receiving a kickback for directing business to that vendor.
manipulate the bid in some way. He could alter the specifications of
the contract to involve a task that only the designated contractor can Collusion often makes a fraud even more difficult to detect because
complete or mandate qualifications on the bid with which competi- someone on the inside of the company is able to bypass or override
tors will not be able to comply (Farragher 18). Ultimately, this harms preventative controls. Therefore, it is also necessary for managers to
the victim company because they do not obtain the best possible bid analyze the financial data of each employee. A comparison of the
on the job. costs incurred on jobs as well as the number of change orders issued
on jobs between employees will reveal if any one employees numbers
It is easy for a company owner who deals in the construction industry are particularly high (Part III - Prevention). If the costs associated
to become overwhelmed with the vast number of ways his business with the employees job are consistently higher than estimated or
can be attacked financially. Fraud is a pervasive issue negatively affect- when compared to other employees, it could be indicative of a kick-
ing business entities across the globe. Every two years, the Association back or bribery scheme. Similarly, an exorbitant amount of change
of Certified Fraud Examiners (ACFE) issues a comprehensive report orders associated with one employee may be the result of collusion
detailing a study of hundreds of frauds all over the world (Report to with a vendor to overbill the company. Managers should also moni-
the Nations). The 2012 Report to the Nations estimated the aver- tor employees qualitatively by observing behavior, especially interac-
age company loses 5% of its revenue to fraud every year (Report to tion with vendors. Relationships that appear more personal than
the Nations on Occupational Fraud and Abuse). Those involved in professional in nature should be examined for illegal dealings (Part

44
FORENSICS JOURNAL

III - Prevention). Other red flags corrupt employees often exhibit tions of the business can quickly spot when something is awry. The
include: living beyond their means, never taking vacations, and being infamous WorldCom fraud case in which executives used accounting
overly protective of their project duties (Part III - Prevention). All maneuvers to misstate over $7 billion in earnings was uncovered by a
executives want to trust the people whom they employ, but owners team of internal auditors who noticed that $500 million in computer
should be aware that too much trust in one individual might establish purchases did not have any supporting documentation (Pulliam and
a baseline for future fraudulent activity. Solomon). While WorldCom will be remembered as one of the larg-
est occupational frauds in American history, the same concepts can
Many times fraud will be detected by someone in the company who be applied to any company. It is important for auditors to look for
does not have the proper authority to take action against it. The discrepancies and then gather evidence to support those discrepancies.
witness may be afraid of getting his coworker in trouble or he may
not want to be involved in the situation at all. Arguably the most In order to gather evidence to investigate audit findings, the auditor
beneficial fraud detection technique is to implement a whistleblower must make inquiries of management (Auditing: CPA Exam A4-16).
hotline. According to the ACFEs 2012 Report to the Nations, Possessing strong interview skills is not only helpful in gaining a better
43.3% of occupational frauds are discovered by tips from whistle- understanding of certain situations, but is critical in detecting fraud.
blowers, the majority of whom work for the victim organization The Journal of Accountancy, among many other publications, stresses
(Report to the Nations). This is by far the most effective detection the need for auditors to practice their interviewing skills and offers a
technique and is worthwhile for every company to have. The CPA number of suggestions to conduct a purposeful inquiry (Ten Steps).
Journal highlights some key recommendations to ensure a whistle- The inquiry should seek to gain more information and encourage
blower hotline will operate successfully (Eaton and Akers). First, the cooperation from the person being interviewed without being accusa-
policy should explicitly state who is protected under the program tory. The auditor should be conscious of taking her time and not be
(Eaton and Akers). Employees of the organization should be included pressured to move along to the next question until she is comfortable
in this description, as well as those who do regular business with the with the explanation she has received (Ten Steps). Internal and
organization such as vendors, suppliers, subcontractors and custom- external auditors alike may have the tendency to drop an issue if the
ers (Eaton and Akers). Even though most frauds are detected by interviewee becomes frustrated or impatient. However, the auditor
someone inside the company, sometimes it is easier to see malpractice should know that those traits are more common in guilty individu-
from an outside perspective. The policy also needs to explicitly state als and should continue to press the interviewee until the matter is
how the confidentiality of the whistleblower will be maintained and settled (Ten Steps). Auditors should not be ashamed for being
how she will be protected from retaliatory and discriminatory actions adamant in understanding a policy or transaction because that is part
(Eaton and Akers). Those who suspect fraud is occurring may be of the job description. Auditors conducting inquiries should also be
hesitant to report it because they are afraid it will negatively impact careful not to suggest answers to the interviewees (Ten Steps). It
their career with the company. If the whistleblowers name is released may seem helpful to offer a theoretical explanation for a proposed
or if she tells someone who is actually involved in the fraud, she could question in order to help stimulate an answer, but that is not advis-
be demoted, fired, and possibly even blacklisted in the industry. The able. Instead, the auditor should ask her question and wait for an
whistleblower policy should clearly state who the whistleblower is answer (Ten Steps). The CPA Journal advises interviewing audi-
reporting to in order to ensure she feels comfortable telling an objec- tors to do more listening than talking because that is the only way
tive source (Eaton and Akers). Of course for any of this to work, the they are going to get the desired information (Ten Steps). While
hotline needs to be communicated to all those potentially involved the auditor is listening to the interviewees answers, she should also
and encourage them to use it (Eaton and Akers). The employee be aware of the nonverbal cues the interviewee is providing (Inter-
handbook, training sessions, the company newsletter or even a state- viewing Techniques). Lack of eye contact, fidgeting, and sweating
ment on all company emails are useful ways to foster awareness of may indicate that the interviewee is hiding something (Interviewing
the whistleblower policy. Enlisting the help of employees, suppliers, Techniques). Some people will naturally exhibit these tendencies
vendors, subcontractors and customers to detect fraud sets a strong if they are nervous with the general interview process. However, if
foundation for an ethically stable corporation. these traits do not subside as the interview continues or they increase
in intensity when tough questions are asked, it may be indicative of
Executives should also take advantage of their internal and external deception (Interviewing Techniques). Auditors should never make
audit teams to join the battle against fraud. Internal audits are the any accusations, but should note when the person showed signs of
third most effective detection technique according to the 2012 ACFE uneasiness and expand the investigation in those specific areas.
study, detecting 14.4% of cases (Report to the Nations). Internal
audits fall only .2% behind the second most effective detection tech- If a manager or employee behaved suspiciously during an interview
nique of management review which detects 14.6% of cases (Report or was unable to explain discrepancies during a job, an appropriate
to the Nations). Internal auditors familiar with the daily transac- follow-up detection technique is conducting a surprise on-site audit of

45
STEVENSON UNIVERSITY

that project (Noyes 10). Many times visual observations can alert an could suggest that improper techniques are an acceptable means to
auditor or owner to fraudulent acts. As described in the Baker Tilly reach a desired result. Managers need to find a way to motivate their
case above, on-site auditors were able to note that substandard materi- employees to help the company perform well while emphasizing
als were being used on the job and not as much waste as predicted was ethical business practices. Pressure and stress should not blind staff
being generated by the project (Construction Fraud: Stories). Audi- members from being able to discern right from wrong.
tors should examine how many people are working on the job site and
compare that to the daily payroll records (Noyes 10). This will help Many owners assume they can avoid fraud by simply hiring the right
detect if the owner is being overbilled for labor costs. On-site audits individuals to run their company. While it is vital for a successful
operate as effective internal controls and should be utilized to detect company to hire dependable and trustworthy workers, executives
and prevent fraud. should never assume their employees are incapable of deceitful
acts (Roberts). As noted previously, the majority of offenders have
The methods described above are some of the many detection tools never committed a criminal act prior to their fraud (Report to the
and techniques owners, auditors, employees, customers, vendors, Nations). Even if the background search is negative for question-
and suppliers can utilize to uncover fraud. However, the easiest and able behavior and no prior employers complain of deceitfulness, the
most effective way to combat fraud is to prevent it before the scheme interviewee is not automatically immune to engaging in fraud. It is
begins. The ACFE recommends that of all the prevention techniques necessary to develop a level of trust throughout the organization, but
available to business owners, the most critical to implement is tar- management needs to be wary of placing too much responsibility in
geted fraud awareness training for all levels of employees (Report the hands of one trusted employee (Roberts). In order to guarantee
to the Nations). This training should be mandatory and should be that no one individual has enough authority to override controls,
conducted at least once a year. During the training, fraud should there are some guidelines to put in place. Requiring all employees to
be defined with specific examples related to the industry of opera- take their vacation can help deter fraud (Roberts). Employees who
tion (Report to the Nations). Upper management is responsible to never take a vacation are often afraid that their fraud will be uncov-
ensure the rules are understood throughout their organization. The ered if they are away from work for too long. Another way to prevent
fraud training should also cover how fraud is destructive to everyone employees from committing fraud is to segregate duties within the
within and around the entity (Report to the Nations). First-time organization.
offenders may believe they are actually helping the company when
they falsify the financial statements in order to make results look more At a minimum, the responsibilities of authorizing transactions,
favorable. However, they need to understand their actions are directly recording transactions, and maintaining custody of the related assets
harming potential investors, bankers who rely on financial informa- should be separated amongst different employees (Auditing: CPA
tion to approve the company for loans, and the future of the entire Exam A3-52). The more processes that are segregated in a single
company when the fraud is eventually discovered. Lastly, the training transaction, the less risk exists that a fraud will be concealed. This is
should articulate how someone can disclose suspicious activity to the especially important for the construction industry concerning materi-
appropriate source (Report to the Nations). This would be an ideal als fraud. One person should be responsible for approving material
time to mention the whistleblower hotline if one is in place or direct acquisition forms, another person should be in charge of recording
their complaints to another objective source such as the independent those purchases on the books, and a third person should be held
auditors, the Board of Directors, or even the Securities and Exchange accountable for receiving the materials. At each step in the process,
Commission (SEC). The training will serve as a solid base for pre- a new person is checking and reviewing the transaction to make sure
venting fraud throughout the company and will help ensure everyone everything appears correct. Similarly, the cash receipts process should
is following the same ethical guidelines. be split between those who collect the payments and those who
record the payments in the system (Auditing: CPA Exam A4-26).
In order for employees to be willing to follow the ethical guidelines Segregating duties can be difficult in smaller businesses where there
established by management, they must have strong leaders to set an are fewer people to carry out complex transactions. This is one of the
example. The tone at the top sets the precedence for all those on main reasons small businesses are more susceptible to fraud and need
the lower rungs of the corporate ladder (Preventing & Detecting to take even more actions to protect their company (Report to the
Fraud). The idea is that the morals and values of the top executives Nations). Oversight is also an important duty to implement in every
will trickle down to be reflected in their subordinates. Conversely, if accounting process. Giving one person sole authority to approve all
the top executive behaves unethically, his subordinates are likely to purchasing activities leaves the company vulnerable to overbilling
engage in similar fraudulent activities. Management is also responsi- and kickback schemes (Occupational Fraud). Companies should
ble for monitoring the pressures they place on their employees (Pre- consider using double approvals for large purchases or rotating the
venting & Detecting Fraud). All companies strive to make a profit, approval duty.
but placing too much emphasis on meeting budgets or expectations

46
FORENSICS JOURNAL

Similar to interviewing employees, owners of construction compa- and materials to what the subcontractor purchased for supplies and
nies should also screen their business partners (Noyes 10). As with materials on the same job. The general contractor is usually permitted
employees, it is impossible to know unequivocally whether someone to inspect documents and make inquiries of the subcontractors staff
is more prone to commit fraud, but there are traits to avoid in busi- (Palmer 21). Not all standard contracts include a right to audit clause
ness relationships so as to reduce the risk of dealing with a crook. so the general contractor should make certain that one is explicitly
Construction companies are encouraged to conduct research before stated (Palmer 21).
working with a new supplier or subcontractor (Noyes 10). First, it
is important to find out how long the company has been in busi- Fraud is an inevitable part of doing business that has existed since the
ness (Noyes 10). This does not imply that all start-up companies beginning of time and will continue to exist as long as individuals
are corrupt, but lack of experience may result in a company being are able to exercise free will. Construction companies are particu-
susceptible to fraud. Construction companies should also perform a larly vulnerable to a number of damaging frauds such as materials
background check on the supplier or subcontractor to see if they have fraud, overbilling, and bribery. Awareness of the types of fraud that
been involved in any illicit business in the past (Noyes 10). A quick the industry frequently encounters can help owners develop ways to
internet search can uncover any unfavorable media attention the com- detect fraud in their own companies. Common detection methods
pany may have received and a search of the SEC filings can determine in the construction industry include protecting the procurement
if they have ever been investigated for fraudulent activity. A clear area, creating a whistleblower hotline, conducting internal audits,
record is a good sign, but should not be misconstrued as an indica- interviewing staff, and implementing surprise on-site audits. Perhaps
tor of a flawless company. Owners of construction companies could more beneficial than detecting frauds currently afflicting a company is
also contact industry peers to check if anyone else has conducted identifying proactive measures to prevent fraud before it occurs. Con-
business with the potential candidate (Noyes 10). People who have ducting fraud training, setting an ethical tone at the top, hiring the
worked with the supplier or subcontractor can share their experiences, right people, segregating duties, screening suppliers, drafting detailed
whether positive or negative, thus allowing the owner to obtain a bet- contracts, and including a right to audit clause are all invaluable
ter understanding of the quality of work the company performs. techniques for preventing fraud in the construction industry. It is
imperative that those working with construction entities realize fraud
Subcontractors are crucial to the success of a construction contrac- is a common occurrence and could happen to their company. Man-
tor because they are relied upon to perform work for which general agement should take proactive and deliberate steps to protect their
contractor will be ultimately responsible. Subcontractors usually company and business partners. A combined and determined effort
perform work according to a contract agreed upon with the general can help reduce construction fraud to rubble.
contractor. A useful fraud prevention technique is to ensure the
contract is detailed enough to specifically cover what the general REFERENCES
contractor wants completed. If a fixed price for the project has been
set, the general contractor needs to stipulate the type and quality of Auditing: CPA Exam Review. Becker Professional Education. 2011
materials he wants for the job (Palmer 21). Since the price on the ed. Devry, 2010. Print.
contract is essentially non-negotiable, general contractors need to be
very precise about the end result so the subcontractor cannot take any Construction and Procurement Fraud. False Claims Act Resource
cost-cutting measures. If the contract is a cost-plus contract, then the Center. False Claims Act, 2013. Web. 8 Sept. 2013.
price will fluctuate depending on the materials and labor used on the
job (Palmer 19). In this case, the general contractor can protect him- Construction Fraud: Stories from the Field. Baker Tilly. Baker Tilly
self from overbilling by setting a price ceiling that the contract cannot Virchow Krause, LLP, 2010. Web. 8 Sept. 2013.
exceed (Palmer 21). The more detailed a contract becomes, the less
Corruption Prevention in the Engineering and Construction indus-
room it will leave for misinterpretation and mismanagement.
try. PricewaterhouseCoopers. PricewaterhouseCoopers, LLP, 2009.
Another essential element to include within the contract with a sub- Web. 24 Sept. 2013.
contractor is a right to audit clause (Palmer 21). This clause states
Eaton, Tim V., and Michael Akers. Whistleblowing and Good Gov-
a distinct time period during which the general contractors audit
ernance. CPA Journal 77.6 (2007): 65-71. Web. 30 Sept. 2013.
team can examine the accounting records of the subcontractor (Noyes
10). The inclusion of this clause in all contracts is advantageous to Farragher, George P., and Stephen M. Nelder. Construction Fraud-
the general contractor because he will have the ability to perform The Cost Of Doing Business? Construction Law & Business Journal
substantive audit procedures that may detect fraud. The audit team 2.2 (2001): 17-20. Business Source Complete. Web. 10 Sept. 2013.
can compare what the general contractor was billed for supplies

47
STEVENSON UNIVERSITY

Hurley, Richard, and Tim Harvey. All Construction Frauds Lead KRISTI OCONNOR graduated from the
Sincerely to Rome. Fraud Magazine. Association of Certified Fraud University of Maryland, College Park in 2010
Examiners, May/June 2012. Web. 10 Sept. 2013. with a degree in Accounting. She worked at
a CPA firm for 3 years performing tax and
Interviewing Techniques for Investigations and Audits. AICPA. audit services primarily in the construction
Web. 17 June 2013. industry. Kristi is now pursuing a Masters in
Forensic Accounting at Stevenson University.
Kolke, Kelly. Construction Fraud. Canadian Consulting Engineer She is a licensed CPA in Virginia and is
54.1 (2013): 10. Business Source Complete. Web. 10 Sept. 2013. currently working as an accountant for Flying
Dog Brewery.
May, Don. Bribery in the Construction Industry: Part I Kick-
backs. Construction Executive. Magazine Xperts LLC, 30 Jan. 2013.
Web. 24 Sept. 2013.

May, Don. Bribery in the Construction Industry: Part II Bid-


Rigging. Construction Executive. Magazine Xperts LLP, 31 Jan. 2013.
Web. 29 Sept. 2013.

May, Don. Bribery in the Construction Industry: Part III Preven-


tion and Detection. Construction Executive. Magazine Xperts LLC, 4
Feb. 2013. Web. 29 Sept. 2013.

Noyes, Mike. Combating Construction Fraud. Engineering News-


Record. The McGraw-Hill Companies, Inc., 10 Sept. 2008. Web. 8
Sept. 2013.

Palmer, Eric. Contract Analysis. Internal Auditor 67.4 (2010):


19-21. Business Source Complete. Web. 25 Sept. 2013.

Preventing & Detecting Fraud in Construction Companies. Feeley


& Driscoll, P.C. Feeley & Driscoll, P.C., 2013. Web. 8 Sept. 2013.

Pulliam, Susan and Deborah Solomon. How Three Unlikely Sleuths


Exposed Fraud at WorldCom. The Wall Street Journal. Dow Jones &
Company Inc., 30 Oct. 2002. Web. 30 Sept. 2013.

Report to the Nations on Occupational Fraud and Abuse. 2012


Global Survey. Association of Certified Fraud Examiners, 2012. Web.
25 Sept. 2013.

Roberts, Jeff. Managing Fraud Risk in Construction. BKD Forensics.


22 August 2012. Web. 28 Sept. 2013.

Wells, Joseph T. Occupational Fraud: The Audit as Deterrent.


Journal of Accountancy. April 2002. Web. 7 Oct. 2013.

Wells, Joseph T. Ten Steps to a Top-Notch Interview. Journal of


Accountancy. Nov. 2002. Web. 30 Sept. 2013.

48
FORENSICS JOURNAL

Social Media Public Outreach: Is the Public


Playing a Role in the Criminal Justice Process?
Eric Shifflett

Social media use as a law enforcement tool is a recent phenomenon. munity outreach. To date the IACP survey/studies do not provide
The Boston marathon investigation is a recent example of this public/ a clear profile of community outreach and social media use in law
private collaboration. On April 17, 2013, the marathon festivities, enforcement. Research data findings in such an area currently rely on
were cut short when two bombs detonated close to the finish line of smaller samples and case studies.
the Boston Marathon, causing damage to runners and onlookers alike.
By evening, three people were confirmed dead and 144 more were One smaller scale case study conducted in 2012 focused on the Phila-
being treated at Massachusetts General Hospital (Levs and Plott). In delphia Police Department (PPD). The research scope was limited to
order to counteract the ensuing chaos immediately after the explo- arrests by the PPD through the use of community outreach on social
sions, law enforcement reached out to the public through social media, media. These social media arrests were made by posting information
provided up-to-date information about the investigation, corrected about the crimes on the social media accounts owned by the depart-
misinformation to alleviate panic, and requested photos or footage ment (Philadelphia, Pennsylvania, Police). The primary social media
of the finish line from the public (McGovern). Partnering with the websites used by the Philadelphia Police Department were Facebook,
public via social media assisted law enforcement agencies during the Twitter, and YouTube. The PPDs social media public outreach begins
manhunt and eventual capture of the two suspects, Tamerlan Tsarnaev on YouTube with posting of a video and further dissemination to
and Dzhokhar Tsarnaev. This incident raises the question of whether other social networks (Philadelphia, Pennsylvania, Police). The
the positive results from public outreach over social media on a larger social media methods used by the PPD are replacing or supplementing
scale benefit both the public and law enforcement as a whole? the traditional methods used by law enforcement in the past. Tradi-
tional techniques included: speaking to news reporters, placing tips in
To answer this query, the social media foundation used by law enforce- newspapers, holding press conferences, going door-to-door requesting
ment requires analysis. Social media websites law enforcement may crime details, or spreading the pertinent information through CD-
use include: Facebook, Twitter, YouTube, Myspace, LinkedIn, and ROMs. The Philadelphia Police Department finds the new social
other smaller, tight-knit social networks. In 2010, the International media outreach approach to be more effective and efficient than past
Association of Chiefs of Police (IACP) Center for Social Media con- communication methods with the public. As the crime details are
ducted a survey examining the use of social networks as a tool for law an online link which is easily accessible to the public on social media,
enforcement agencies. The survey encompasses 728 law enforcement the agency receives a greater number of tips about suspects still on the
agencies with an 81 percent positive response rate for active social loose (Philadelphia, Pennsylvania, Police). Not only is the depart-
media use (International Associations of Chiefs, 1). When asked ment obtaining a large amount of feedback, but it is also saving time
which social media websites were utilized, the most prominent net- and money due to the relative ease of using social media and the lack
work was Facebook reflecting 66.8 percent of the 728 police agencies of service fees (Philadelphia, Pennsylvania, Police). These statements
(International Associations of Chiefs, 1). Additional social media and details provided in the case study demonstrate that social media
sites law enforcement agencies signed up for include: Twitter (29.8%), methods of communicating with the public are effective in time,
Nixle (29.8%), Myspace (21.6%), and Youtube (17.6%) (Interna- feedback, and money thus positively increasing the number of success-
tional Associations of Chiefs, 6). The study reflected estimated future ful arrests.
growth rates with 61.6 percent not currently using social media plan-
ning to begin signing onto such websites (International Associations In October 2012, Erik Barrett was arrested through an anonymous
of Chiefs, 4). The results of this study show the use of social media is tip. The tip arrived a few days after the Philadelphia Police Depart-
quickly gaining traction in the field of law enforcement. ment posted a surveillance video on social media. Barretts arrest was
a milestone for the department, as it was the 100th arrest made since
Police organizations maintain a presence on social media sites for a February 2011 as a result of the departments social media community
variety of purposes including: community outreach, citizen engage- outreach (Your Tips at Work). Overall, the PPD received 6,500 tips
ment, and case closure. The IACP Center for Social Media survey which resulted in a 33.5 percent clearance rate due to social media
noted 40.3 percent of the departments that used social media posts (Your Tips at Work). The results of the study are promising for
reported doing so for the purpose of community outreach and citi- the use of social media by law enforcement.
zen engagement (International Associations of Chiefs, 3). Agencies
surveyed found that social media was instrumental to case closure. The Philadelphia Police Department is a prime example of success-
Overall, the survey results indicate 45.3 percent of agencies found ful community outreach by law enforcement through social media.
social media helpful, 23.1 percent were not sure, and the remainder Corporal Frank Domizio of the Philadelphia Police Department
agencies found it to be of little assistance (International Associations explained that while the chance of arrest, clearance rate, and number
of Chiefs, 9). While these statistics appear to be promising, the data of closed cases associated with social media may not seem impres-
is incomplete. The statistics provide insight regarding the general use sive, the statistics would be much lower without the agencys use of
of social media by law enforcement but not specifically about com- networking (Philadelphia, Pennsylvania, Police). The Philadelphia

49
STEVENSON UNIVERSITY

Police Department continues to refine and modify its social media in the investigation progress. On the fourth day after the riot, the
outreach processes. Vancouver Police department released statistics that provided insight
as to just how much help the agency received from the public. Within
The United States is not the only country having success with com- a four day span, the community sent approximately 3,500 e-mails to
munity outreach through social media. In 2011, Canada explored and the Vancouver Police Department (Riot Investigation Fact Sheet).
exploited this tool. During the 2011 Vancouver Stanley Cup, a riot The department noted 676 of the e-mails contained hyperlinks to
broke out in Canada. When the game officially ended, thousands of YouTube videos and 1,011 provided links to social media networks,
fans began to riot in the streets. There were reports of people breaking with most hyperlinks from Facebook (Riot Investigation Fact
windows, causing fires, flipping over vehicles, and looting numerous Sheet). The department reported twelve suspects voluntarily reported
establishments (Schneider & Trottier, 58). People were injured in to the Vancouver Police and three other persons to other jurisdictions
the riots due to stabbing incidents. Vancouver riot police expended (Riot Investigation Fact Sheet). The information received from
several hours dispersing and arresting the rioters. The chaotic nature the public is still being used two years after the investigation. The
of the riot resulted in the police being unable to take every criminal police reported in June 2013 that ten more rioters were charged with
into custody (Schneider & Trottier, 58-59). Therefore, the Vancouver crimes, bringing the total number of rioters charged to 325 (Riot
police requested public assistance through social media to locate miss- Investigation Update). While not every rioter was arrested and
ing suspects involved in criminal activities during the time of the riot. charged through the assistance of the social media community, the
Millions of people all over the world were watching the riots either on ample amount of social media evidence received by the department
television or on the web. People close to the rioting were using their was undoubtedly a factor in the arrest of many rioters. The Vancouver
phone to text information, record videos, or take pictures of the events Police Department, in an effort to assist with the identification of riot-
as they unfolded (Schneider & Trottier, 60). The pictures, messages, ers, even created a website listing the top most wanted rioters in June
and videos from the mobile devices were then posted online with the 2012 (Riot Investigation Update). By the next year, law enforcement
content being passed around on various social media sites (60). By was able to identify seven of the rioters on the list through the public
using the information posted on social media, online members of the and the website (Riot Investigation Update).
websites were able to identify certain suspects from the riot. Numer-
ous identifications resulted from videos, photos, and details from the The analysis of the 2011 Vancouver Stanley Cup riot does not reflect
riot posted online, as this public information caused people to turn the exact number of persons brought into custody solely due to social
themselves in or be reported to the police by friends or family. media outreach. However, the Vancouver Police and people who
have studied the riot have provided evidence that social media made a
In the analysis of social media during the 2011 Vancouver Stanley difference in some cases. The Vancouver Police Department released a
Cup riot, the authors focused on the website Facebook. A group was review entitled 2011 Stanley Cup Riot which stated that the phe-
created on Facebook shortly after the riots called Vancouver Riot nomenon of turning oneself into the police seems to be impacted by
Pics: Post Your Photos. Within the next 24 hours, 70,000 persons the media and social media commentary (Schiender & Trottier, 64).
subscribed to or liked the page (Schneider& Trottier, 61). A few The review further explained that there was a slight increase in the
weeks after the riot, the page recorded a total of 102,784 subscribers number of people who turned themselves in because of social media
(Schneider & Trottier, 61). The group members were reading the (Schiender & Trottier, 64).
material, sharing it on their Facebook profiles, and commenting on
the posts with relevant information. The number of posts in those few The Boston Marathon, the Philadelphia Police Department case study,
weeks amounted to 12,587 separate postings on the page (Schneider and the 2011 Vancouver Stanley Cup riot all present evidence that
& Trottier, 61). These postings resulted in some persons turning social media community outreach can positively affect case closure
themselves in or leading the police to suspects. One case involved a rates. Despite the pros of using social media for community outreach,
twenty-one year old man who lived in Vancouver. A few days after the departments should also be aware of the cons. While the Vancouver
riot, a picture of the man was posted on the Facebook group (Schnei- Police riot had great success with utilizing the community and social
der & Trottier, 64). Upon seeing his photo on the site, the man called media during the 2011 Vancouver Stanley Cup investigation, the
the Vancouver police to apologize for the damage he caused to cars departments use of social media also created negative consequences.
during the riots (Schneider & Trottier, 64). Using the description of Such pitfalls included false accusations and privacy violations alike.
the man who called, the police were able to determine that the man
participated in five other crimes by viewing videos of the riot (Schnei- Nathan Kotylak became a target over social media following the 2011
der & Trottier, 64). Vancouver Stanley Cup riot. At the time, Nathan Kotylak was a
seventeen-year old water polo player who was photographed attempt-
From June 2011 to the present, the Vancouver Police Department has ing to light a police car on fire during the riot (Beaumont). The public
posted updates, released statements, and kept the community engaged outrage concerning Nathan Kotylaks action prompted concerns about

50
FORENSICS JOURNAL

the investigation and justice. As Kotylak was still a minor, his name cally classify Sunil Tripathis death as a suicide, there were factors
should not have been made public (Beaumont). As a result of his indicating his death was likely a suicide. In March 2012, Sunil Tripa-
name being released, Kotylak and his family were forced to flee their thi disappeared from his apartment and left behind a note that hinted
home because their address was posted on social media and the inter- at suicide (Schaefer). The Tripathi family was concerned previously
net by the public (Beaumont). The posting of the address by social with Sunil Tripathis mental health, as he suffered from depression
vigilantes caused the family to relocate, thus impeding the investiga- (Schaefer). Speculation remains that the incident did not help Sunil
tion, prompting concerns about rights, and violating the Youth Crimi- Tripathis troubled mindset. The police require further investigation,
nal Justice Act (Schiender & Trottier, 60). but social media witch hunts during the Boston Marathon bombing
raise concerns about social media as a law enforcement tool.
However, problems with citizen engagement and social media during
the 2011 Vancouver Stanley Cup riot investigation were not limited to When assessing the different methods law enforcement use on social
the case of Nathan Kotylak. A suspects information posted on social media to assist in capturing criminals, most of the statistics and
media sites also caused many hate and prejudicial messages to appear. research relating to social medias effect on closing cases is minimal.
When people on the internet tag or link the suspects details to posts Efforts to determine social medias effect on law enforcement focus pri-
made about him or her, it allows persons to easily access a medium marily on case studies or single case incidents. While these studies give
through which to send messages. One of many victims of such mes- a reader a personal look into the impact social media has on particular
sages was Robert Snelgrove who was intoxicated after the game and cases, it does not provide a comprehensive picture. Determining how
joined the rioting (Beaumont). Snelgrove was identified on social many cases are solved directly through social media outreach across the
media sites and hateful messages were sent to his profiles (Beaumont). United States or on a global scale remains difficult. Research compiled
He explained that the messages were mild at first, but then got worse thus far is insufficient. Case studies show promise for community
as persons began to use homophobic slurs and tell him that he should outreach through social media, making additional research in this area
kill himself (Beaumont). Snelgrove and other victims abused by the crucial. Surveys remain a valid data collection tool. The survey should
public online must be of equal concern to the justice community as have the same scope as the Uniform Crime Report under the jurisdic-
the messages escalated into action. tion of the Federal Bureau of Investigation. In order for the Federal
Bureau of Investigation to create the Uniform Crime Report, police
The Boston Marathon bombing also prompted negative public behav- agencies across the United States submit crime statistics to the FBI for
ior through social media which adversely affected the investigation. compilation and analysis. The FBI could modify the Uniform Crime
Early in the investigation, a bombing suspect was identified through Report to report various crime statistics and to also report the number
social media. Users on these social networks believed a missing college of cases solved through social media outreach. While it would not give
student, Sunil Tripathi, was a possible suspect due to a former high a global perspective as to the number of cases solved through social
school class posting on a popular social news site that she recognized media outreach, it would still provide insight on a larger scale than
him in a picture of the finish line near where the bombs exploded is currently available. Reporting of this nature would provide better
(Sunil Tripathi). On the social media site Twitter, members began to insight as to whether the social media methods used by the police are
re-tweet messages saying that Tripathi was one of the suspects (Sunil effective in all cases or in only high profile cases. If modification of the
Tripathi). People continued to spread this news despite the fact police Uniform Crime Report is not feasible, a survey designed by appropri-
announced Tripathi was not one of the suspects (Sunil Tripathi). ate subject matter experts should still be created in order to obtain the
While people eventually began to realize that Tripathi was misidenti- necessary details regarding social media use by law enforcement.
fied, the damage was already done. The media had already begun to
hound the Tripathi family with a multitude of phone calls and attacks The survey should be meticulously designed and beta tested. If pos-
on the Facebook page maintained by the family who were attempting sible, the IACP Center for Social Media should head the initiative due
to locate the missing relative (Sunil Tripathi). Even after the man- to the organizations current experience with social media research.
hunt for the two true suspects ended, the effects continued to be felt Funding would hopefully come from the federal government as the
by Sunil Tripathi and his family. studies could assist in persuading law enforcement organizations at all
levels of the benefits or consequences of utilizing social media public
Police were unable to locate Sunil Tripathi after the Boston Marathon outreach methods. The survey should not ask questions about the
bombing, and the search for him continued until April 25, 2013, number of cases solved through social media outreach because accurate
when his body was found in a river near the City of Providence (Fam- statistics will not be produced. The questions should examine what
ily of Sunil Tripathi). Although an official statement as not been types of cases were assisted by social media outreach, but also seek to
released, the police examiner explained while further examination is obtain some sense of how much social media use affected the case.
necessary, he does not believe there was any foul play involved (Fam- The study should be voluntary and the IACP Center for Social Media
ily of Sunil Tripathi). While the lack of foul play does not automati- could contact the law enforcement agencies used in the past surveys

51
STEVENSON UNIVERSITY

such as the 728 law enforcement agencies who answered in the 2013 Buncombe, Andrew. Family of Sunil Tripathi - Missing Student
Social Media Survey. The researchers should create a trend study that Wrongly Linked to Boston Marathon Bombing - Thank Well-Wishers
is one of the three sub-types of longitudinal surveys. Since the research for Messages of Support. The Independent. independent.co.uk, 26 Apr.
will include a longitudinal survey, the analysis will be gathered over a 2013. Web. 8 Oct. 2013.
long period of time such as one year. To keep the populations consis-
tent, the survey should focus on rural versus urban police departments. Buncombe, Andrew. Sunil Tripathi: The Other Victim of Bostons
The trend study would request police departments to submit the Bombs. The Independent. independent.co.uk, 23 Apr. 2013. Web. 8
number of cases that used any form of social media public outreach to Oct. 2013.
further the investigation. This could include a tip submitted on social
Domizio, Frank. Philadelphia, Pennsylvania, Police Department -
media, a photo posted to assist in identification, a cellphone video
Thoughts on Content, Data Analysis, and Media. IACP Center for
tweeted to a police organization, or any submission over social media
Social Media. N.p., 6 Feb. 2013. Web. 5 Sept. 2013.
by the public to help the investigation. In order for a case to count
towards the survey, the social media public outreach must further the Domizio, Frank. Your Tips at Work: 100 Arrested through the Use
case in some way, such as providing evidence, assisting in identifying a of Social Media. PhillyPolice Blog. N.p., 10 Oct. 2012. Web. 8 Oct.
suspect or posting a location of stolen goods. The information should 2013.
be gathered at the end of the month for a year. The survey would then
show a year trend of social media public outreach and whether the International Association of Chiefs of Police 2013 Social Media
cases affected by social media are increasing, fluctuating, or decreasing. Survey Results. IACP Center for Social Media. N.p., 2013. Web. 8
The trends could also show whether social media public outreach is Oct. 2013.
better implemented in urban, rural, or both areas. This information
gathered from such a survey would allow police departments to make Levs, Josh, and Monte Plott. Boy, 8, One of 3 Killed in Bombings
more effective decisions about how to utilize social media. at Boston Marathon; Scored Wounded. CNN U.S. Cable News
Network, 18 Apr. 2013. Web. 8 Oct. 2013.
Social media in the hands of law enforcement is a powerful tool, espe-
cially when the public is included in the process. Police departments McGovern, Alyce. Crime-fighting, Twitter and the Boston Bombing.
can choose to reach out to the public by posting details on agency The Crime Report. N.p., 7 May 2013. Web. 8 Oct. 2013.
profiles in hopes of receiving tips from the public, a method found to
be successful in cases such as the Boston Marathon bombing, the 2011 Riot Investigation - Fact Sheet. The Vancouver Police Department.
Vancouver Stanley Cup riot, and the Philadelphia Police Department City of Vancouver, 20 June 2011. Web. 8 Oct. 2013.
case studies. While social media outreach has had great success in the
field of law enforcement, it has also caused issues that affect investiga- Riot Investigation Update. Riot Investigation Update. City of
tions negatively. Asking for the assistance from the public can lead to Vancouver, 14 June 2013. Web. 8 Oct. 2013.
persons sponsoring vigilantism or initiating witch hunts. Vigilantism
Schaefer, Mari A. How Sunil Tripathis Family Coped with Tragedy.
and harassment may have caused a suicide in the Boston Marathon
Philly.com. N.p., 7 Aug. 2013. Web. 8 Oct. 2013.
bombing and also impeded the investigation of 2011 Vancouver
Stanley Cup riot. While there have been many small scale examples Schiender, Christopher J., and Daniel Trottier. The 2011 Vancouver
of social media outreach, not many studies have looked at the bigger Riot and the Role of Facebook in Crowd-Sourced Policing. BC
picture. A more accurate assessment of how law enforcement should Studies 175 (2012): 57-72.
use social media and social medias effect on law enforcement should
be conducted using teams of researchers to send out surveys on a large ERIC SHIFFLETT completed his
scale that ask agencies questions regarding social media outreach. undergraduate degree in Criminal Justice at
The current research being conducted is a step in the right direction; Stevenson in 2013. He currently is working
however, more research needs to be conducted before the true impact at Stevenson University as a Graduate
of the use of social media techniques by law enforcement can be Assistant for the School of Graduate and
understood. Professional Studies. At the same time, he is
completing his Graduate Degree in Forensic
REFERENCES Studies at Stevenson.

Beaumont, Peter. Vancouver Rioters Named and Shamed in Internet


Campaign. The Guardian. Guardian News and Media, 30 June 2011.
Web. 8 Oct. 2013.

52
FORENSICS JOURNAL

The War on Terror: Habeas Corpus, Indefinite


Detention, and Evidentiary Matters
James Sevison

INTRODUCTION World War II

Throughout American history there have been numerous attempts to Franklin Rooseveltin the aftermath of the attack on Pearl Har-
encroach upon the right to petition for habeas corpus relief. These borsuspended habeas corpus via Executive Order 9066. This Order
earlier bids to cast aside individual freedoms encountered great relocated people of Japanese ancestry, involuntarily placing them
opposition and routinely sparked fierce debate. This same firestorm in government run internment camps. According to the National
of criticism has recently been reignited, as civil libertarians and Archives and Records Administration, Nearly 70,000 of the evacuees
human rights organizations have begun to censure current legislation were American citizens. The government made no charges against
concerning the practices of habeas corpus suspension and indefinite them, nor could they appeal their incarceration (National Archives
detention. However, despite common belief and although highly and Records Administration). The Supreme Court decisions handed
unpopular, the suspension of habeas corpus and the practice of indefi- down in Hirabayashi v. United States, Yasui v. United States, Ex parte
nite detention remain unequivocally permissible under this nations Endo, and Korematsu v. United States upheld the legality of Execu-
current system of laws. Furthermore, the practice of using inaccessi- tive Order 9066, thus depriving Japanese-Americans (United States
ble, classified information as a means to sustain an individuals deten- citizens) the right to challenge their detentions.
tion is not only permissible but gains its authority from the pre-9/11
Classified Information Procedures Act of 1980. The perception that Global War on Terror (GWOT)
these practices are constitutionally proscribed is more public opinion
than comprehension of applicable law (Classified Information Proce- In response to the attacks of 9/11, Congress passed legislation aimed
dures Act). An examination of relevant lawboth past and present at bringing to justice those responsible for creating such devastation,
will lay the foundation for current government policy. ultimately granting the President extensive authority. George Bush,
in his memoir, aptly attributed his wartime powers as President to
Habeas corpus is the legal concept that ultimately allows a prisoner to Article II of the Constitution and the Authorization for Use of Mili-
challenge the basis of his confinement before the court, subsequently tary Force (AUMF) issued by Congress following 9/11 (Bush, 154).
forcing the government to show just cause. Those who are found to On November 13, 2001, President Bush signed a Military Order
be unjustifiably detained must be released. Nevertheless, issues have titled Detention, Treatment, and Trial of Certain Non-Citizens in
arisen regarding the continued detainment of suspected terrorists the War Against Terrorism which established military tribunals to try
despite the government producing justification. While the privilege captured terrorists. According to Bush, this system was based closely
of the writ of habeas corpus is constitutionally mandated, one must on the one created by FDR in 1942 (Bush, 167). The ensuing sus-
understand that it can be lawfully invalidated under certain condi- pension of habeas corpus, as witnessed, would be the eventual cost of
tions. As stated in Article I, Section 9, Clause 2 of the U.S. Con- doing business in the Bush Administrations post-9/11 world. Unfor-
stitution, The privilege of the Writ of Habeas Corpus shall not be tunately, for the Administration, a series of complex legal challenges
suspended, unless when in Cases of Rebellion or Invasion the public would expose this policy to keen scrutiny, and it would ultimately
Safety may require it. This clause, more commonly referred to as face strong resistance.
the Suspension Clause, ultimately allows the government to rescind
habeas corpus protection in the face of looming turmoil. As history INDEFINITE DETENTION
has shown, the suspension of habeas corpus has deep roots in Ameri-
The Bush Administration cautiously acknowledged that the war
can law.
on terror would be drastically different from any war ever fought
A BRIEF HISTORY OF HABEAS CORPUS SUSPENSION (Margulies, 3). In order to effectively fight terrorism there would
be sacrifices both abroad and at home. The Administration cited Ex
Civil War parte Milligan, Ex parte Quirin, and Johnson v. Eisentrager to legiti-
mize its legal policy, but this did not pacify the critics. According to
In the opening months of the Civil Warin the aftermath of the Margulies, in regard to the ongoing war in Afghanistan, The Bush
attack on Fort SumterAbraham Lincoln authorized Union officers Administration maintains that people seized in this conflict may be
to suspend habeas corpus when required by the public safety in and takenkidnapped if necessaryfrom any location in the world, even
around parts of Maryland, Pennsylvania, and Washington, DC (Fed- thousands of miles from any battlefield, without the knowledgeof
eral Judicial Center, 3). In Ex parte Merryman, Circuit Court Chief the host government and without any judicial process (Margulies, 3).
Justice Roger B. Taney ultimately held that the President did not have
the authority to suspend habeas corpus (Sauter and Carafano, 6). Margulies, although somewhat critical, captured the reality of the
Lincoln sustained his directive despite being indemnified. Administrations overall strategy and policy concerning suspected
terrorists. This policy would be used in the ensuing war in Iraq, and

53
STEVENSON UNIVERSITY

it would subsequently be used to detain practically any suspected Bay holding facility. In his first year in office, Obama amended the
terrorist nearly anywhere in the world. The purported purpose of this MCA by signing into law the National Defense Authorization Act for
plan was to more effectively fight terrorism and to ultimately secure Fiscal Year 2010. This Act contained revisions to the MCA of 2006
the homeland; however, its constitutional infringement, and legal and ultimately became known as the MCA of 2009. This amended
aftermath, instead created difficulties for the Administration. version of the MCA addressed concerns about detainee resources,
but otherwise remained unchanged, thus reinforcing the MCA of
The Bush Administration elected to try captured enemy combatants 2006. This was not the expected outcome. Also unchanged was the
in military courts, but the legal consequencesand ensuing mis- promise to permanently close Guantanamo Bay. What remained was
stepsconflicted with efforts to effectively capture and try suspected an ad hoc court system charged with addressing the rising concerns
terrorists. Additionally, prison conditions rapidly deteriorated and regarding potentially unlawful and indefinite detentions. While the
allegations of prisoner mistreatment and abuse began to surface. The Boumediene decision guaranteed defendants a habeas review, it was
Administration attempted to deflect many of these allegations as the the lower courts responsibility to decide what evidence, if any, was
misdeeds of a few rogue soldiers but the courts took notice (Margu- sufficient to justify continued imprisonment (Boumediene v. Bush).
lies, 229). From the establishment of the Military Order of Novem- This caused confusion amongst law professionals, as the burden of
ber 13, 2001 until June 28, 2004, the Bush Administration effectively proof was less than uniform.
detained suspected terrorists without challenge. In some cases, little
to no credible evidence was needed to essentially condemn an indi- In the years following passage of the MCA of 2009, and in further
vidual to a life sentence (Military Order, 2001) opposition to the projected stance of his Administration, President
Obama signed the National Defense Authorization Act of 2012
In 2004, several U.S. Supreme Court decisions were handed down (National Defense Authorization Act for Fiscal Year 2012). This
regarding the Bush Administrations detention policy and its suspen- new legislation would reignite previous fears as a close examination
sion of habeas corpus. Hamdi v. Rumsfeld and Rasul v. Bush ulti- revealed baffling findings. The NDAA 2012 essentially reinforced
mately declared that U.S. citizens labeled as enemy combatants retain Bush Administration policy, thus prolonging the practice of indefi-
habeas corpus rights, and that the U.S. court system maintain jurisdic- nite detention. The ACLU abhorred the NDAA 2012, labeling it as
tion over Guantanamo detainees. The U.S. Supreme Court, in 2006, worldwide detention policy (American Civil liberties Union). The
ruled in Hamdan v. Rumsfeld that the military tribunals established to ACLU said this about the NDAA 2012:
try enemy combatants violated the Uniform Code of Military Justice
and the four Geneva conventions. This appeared to be a setback, but On December 31, 2011, President Obama signed the National
the Administration responded with legislation of its own. Defense Authorization Act (NDAA), codifying indefinite
military detention without charge or trial into law for the first
In the wake of Hamdan and in an attempt to circumvent the Courts time in American history. The NDAAs dangerous detention
decision, Congress passed the Military Commissions Act of 2006 provisions would authorize the president and all future
(MCA). The MCA essentially gave congressional approval to try presidents to order the military to pick up and indefinitely
enemy combatants via military tribunals and to deny them habeas imprison people captured anywhere in the world, far from any
corpus rights. This marked the first time since WWII that habeas battlefield. (American Civil Liberties Union)
corpus had been formally suspended (Military Commissions Act).
Despite initial success, the victory was short lived as the Supreme The controversy referenced just two sections in the lengthy document:
Court handed down a landmark decision in the 2008 case of Boume- sub-sections 1021 and 1022. These sub-sections (found under Title
diene v. Bush. In Boumediene, the Court affirmed that Guantanamo X, Subtitle D) dealt specifically with counterterrorism (National
prisoners have the right to challenge their detention, and the suspen- Defense Authorization Act fir Fiscal Year 2012). Section 1021
sion of this right under the MCA of 2006 was unconstitutional; granted the President the broad authority to arrest and indefinitely
therefore, if the government wanted to indefinitely detain suspected detain covered persons, while Section 1022 authorized trial by
terrorists they would only be able to do so after showing just cause military tribunal (National Defense Authorization Act for Fiscal Year
(Boumediene v. Bush). This shifted the burden of proof onto the 2012). This authority extended to individuals arrested on Ameri-
government, forcing them to appear before the Court with sufficient can soil, and was recognized as pertaining to citizens as well. The
evidence justifying the detention of every petitioner. Instead of term covered persons was vague and open to misinterpretation, but it
focusing all of its resources on the GWOT, the government was put remained nonetheless. Section 1021 of the NDAA 2012 describes
in the position of defending its policy. With the election of President covered persons as the following:
Barack Obama, civil liberties authorities expected a policy change.
A covered person under this section is any person as follows:
Upon taking office, President Obama vowed to review the practice (1) A person who planned, authorized, committed, or aided
of indefinite detention and pledged to shut down the Guantanamo the terrorist attacks that occurred on September 11, 2001, or

54
FORENSICS JOURNAL

harbored those responsible for those attacks. (2) A person who the preponderance standardbecause preponderance of evidence
was a part of or substantially supported al-Qaeda, the Taliban, is typically the standard presumptively applied in habeas contexts
or associated forces that are engaged in hostilities against the (Waxman, 248). This would essentially become the post-Boumediene
United States or its coalition partners, including any person requirement for habeas reviews.
who has committed a belligerent act or has directly supported
such hostilities in aid of such enemy forces. As noted earlier, the courts opinions regarding indefinite detention
have not been uniform. Although the U.S. Supreme Court justices
The ambiguity of this language was the reasoning behind Hedges v. agreed upon a standard of proof in the case of Al-Bihani, they left
Obama, an ongoing case. This case, filed by a team of former report- the weight of the evidentiary material presented to be decided by
ers, is seeking to receive clarification on several aspects of the NDAA the lower courts (Vladeck, 1453). This freedom of interpretation
2012. For example, are reporters interviewing and chronicling the has resulted in rulings on both sides of the preponderance line
doings of Taliban and al-Qaeda fighters effectively aiding and sup- (Waxman 249). For example, in the similar cases of Al Mutairi
porting their efforts? As of this writing an injunction is pending. v. United States and Boumediene, the presiding judges came to
conflicting conclusions. In Al Mutairi, Judge Colleen Kollar-Kotelly
Subtitle D, drawing on the AUMF, also authorized the indefinite declared that the government failed to provide sufficient evidence
detention of covered persons under the law of war without trial until justifying the defendants continued detention (Al Mutairi v. United
the end of the hostilities authorized by the Authorization for Use of States). Judge Kollar-Kotelly offered that simply linking the defendant
Military Force (National Defense Authorization Act for Fiscal Year to al-Qaeda through his actions was not, in itself, enough to meet
2012). It was further argued by the ACLU that the breadth of the the preponderance standard. In Boumediene, a consolidated case,
NDAAs worldwide detention authority violates the Constitution Judge Richard Leon ordered five of the six defendants to be released;
and international law because it is not limited to people captured in however, the detention of the sixth defendant was upheld citing
an actual armed conflict, as required by the laws of war (American evidence (behaviors) linking him to al-Qaeda (Boumediene v. Bush).
Civil Liberties Union). The detention policy of the Obama Admin-
istration failed to address the concerns of civil libertarians, and despite Both cases offered evidence linking the defendants to the al-Qaeda
aggressive opposition carried the same policy into the ensuing year. terror organization, yet contrasting conclusions were reached: In Al
Mutairi the defendant was released, but in Boumediene the defen-
On January 2, 2012, President Obama signed into law the National dant was detained. Waxman offered that the courts descriptions
Defense Authorization Act for Fiscal Year 2013 (National Defense highlight how easily different judges viewing the same evidence could
Authorization Act for Fiscal Year 2013). The NDAA 2013 continued reach different conclusions, either because they weigh certain pieces
to authorize the practices of indefinite detention and trial by military of evidence differently, or because they view the standard differently
tribunal. An amendment seeking to eliminate the controversy caused (Waxman, 249). Despite this imbalance, the preponderance standard
by the NDAA 2012 was deleted from the final version of the bill. has been adopted by both military and federal courts alike; however,
The Feinstein-Lee Amendment would have excluded American citi- the amount of classified evidence introduced in habeas hearings and
zens from the above stated practices by affording them habeas corpus criminal proceedings has provoked an added debate on both sides. It
rights and due process of law; however, the House of Representa- is a complex issue that must be discussed.
tives removed it without explanation prior to finalizing the bill. The
NDAA 2013, in support of the AUMF, is the current standard for the CLASSIFIED EVIDENCE
Obama Administrations handling of suspected terrorists.
Since the wars inceptionand after several key decisionsthe
STANDARDS OF PROOF amount of evidence required to indefinitely detain a suspected terror-
ist has unquestionably changed. The courts have, over time, created
In the early years of the GWOT, the standard of proof required to a more uniform standard in dealing with suspected terrorists, but
detain suspected terrorists was vague and open to interpretation; only debate continues. The governments stance on classified evidence has
some evidence was required to lawfully detain suspected terrorists. The created what can be considered an unfair advantage which favors the
various levels of the American court system created their own require- government. For example, while petitioners are now afforded habeas
ments for what was deemed, in the eyes of the individual judge, to corpus protection, they may find themselves unable to refute govern-
be sufficient. Over time this changed to a more universally accepted mental claims as incriminatory evidence may be deemed classified;
system of finding. Referencing Al-Bihani v. Obama, Stephen Vladeck this renders it inaccessible by the defense. The underlying concept
stated, the court (as it did with respect to the governments detention suggests that evidence detrimental to government interests and
authority)agreed with the government that preponderance of the national security be excluded.
evidence is the appropriate burden of proof (Vladeck, 1466). Mat-
thew Waxman suggests that the courts probably gravitated toward

55
STEVENSON UNIVERSITY

In 1980 Congress passed the Classified Information Procedures Act While CIPA was not drafted with the GWOT in mind, it is the cur-
(CIPA) in an effort to address mounting concerns related to the rent accepted framework being utilized to address issues arising from a
introduction of classified material in criminal proceedings. According non-traditional war environment. There is no readily available remedy
to Melanie Reid, CIPA was not intended to alter the Federal Rules to appease the critics; however, some solutions have been proposed,
of Evidence, but was rather intended to provide a procedural frame- such as a National Security Bar (Litt and Bennett, 13). As proposed
work (Reid, 274). CIPA is not a foolproof remedy. Just as judges are by Litt and Bennett, Congress should establish a National Security
granted discretion in determining the value and weight of evidence Bar, consisting of lawyers with the highest level of security clearance.
in habeas hearings, they are also the ultimate authority in determin- These lawyers would agree to be available for appointment to repre-
ing what classified material is inherently relevant to the issue at hand. sent defendants in terrorism-related cases (Litt and Bennett, 13). The
Stephen Schulhofer asserts that CIPA requires the judge to make courts will continue to review the procedures outlined in CIPA in
difficult determinations about precisely what information should be order to make them more applicable to the current, ongoing war.
disclosed to the defense and what information should be withheld
(Schulhofer, 65). This wide scope of authority creates tension between GATHERING EVIDENCE
the government and the defendant(s), as governmental interests and
individual rights to a fair trial may be in conflict. The presiding judge Gathering sufficient evidence during an active military operation is
has the final say in what is admissible and what is inadmissible. a difficult task at best. Professionals have developed an across-the-
board standard; however, new approaches are being examined. While
Reid says, many of CIPAs provisions have provided a skeletal infra- a range of theories are available for consideration, they all seek to
structure but relatively little substantive guidance to courts, leaving address the same fundamental issue: how can one effectively collect
judges to set forth differing standards on classified informations use, and maintain evidence on an active battlefield? It is undoubtedly dif-
relevance, and admissibility at trial (Reid, 278). CIPA allows the ficult, at times, for qualified law enforcement professionals to observe
government, upon approval, to withhold or redact classified evi- and gather evidence within a secure, domestic crime scene. Envision
dentiary material. As illustrated by Robert Litt and Wells Bennett, now a young soldier: no law enforcement experience, in the moun-
critical evidence against a defendant may derive from the intercep- tains of a foreign country, attempting to gather evidence in the heat of
tion of communications, yet the government may not wish to reveal combat. Some may offer that it is virtually impossible. Furthermore,
that it has the capability to intercept those communications (Litt and one must consider that evidence may be inaccessible or destroyed on
Bennett, 6). This poses a significant challenge for defendants, as their the battlefield.
lone source of exoneration may rely upon information that has been
deemed inadmissible due to security concerns. While the process may The difficulties are obvious and a definitive solution is an arguable
be controversial, it does follow appropriate procedure. For example, if topic of discussion; nevertheless, ideas have been proposed. For
the government does not wish to disclose specific information dur- example, it has been suggested that military units keep an embedded
ing proceedings, they must abide by the rules set forth in Section 4 forensics expert among their ranks for this very purpose. The belief is
of CIPA (Reid, 280). According to Reid, Section 4 applies when a that these experts will recognize what evidence needs to be collected
defendant is unaware of the classified information, and the prosecutor and how to go about collecting it efficiently and quickly. This could
does not want to disclose such information during discovery (Reid, minimize the exclusion of tainted evidence. Another suggestion
280). Reid further states Section 4 authorizes the government to offers that the federal courts grant some leniency in recognizing these
file a written motion requesting either a protective order prohibiting hardships. Litt and Bennett believe that federal evidentiary rules
disclosure of the classified information or the granting of a partial are too strict, thus making the prosecution of terrorists too difficult
redaction/substitution/summary of the classified materials at issue (Litt and Bennett, 9). For instance, they offer that hearsay evidence
(Reid, 280). be permissible and the absence of Miranda warnings be forgiven (Litt
and Bennett, 9-10). As with the concept of classified evidence, there
CIPA may be regarded as controversial; however, national security is currently no definitive cure-all. Evidence collection in such poor
remains a critical underlying factor. Reid states that The United environments will continue to be a challenging feat.
States government maintains certain sources and methods at a classi-
fied level and withholds information from the public at large in order CONCLUSION
to protect its security. What seems to concern most people is that
this entails a great deal of trust on our part that our government is The governments decision to deny enemy combatants the right to
not abusing this right (Reid, 300). As seen with past habeas corpus petition for a writ of habeas corpus, and to detain them indefinitely,
suspensions, the act of denying a defendant full access to the evidence has been a source of great controversy and debate. The GWOT
held against them will continue to be subject to criticism. remains a war like no other. The series of decisions made in the
immediate aftermath of the attacks of 9/11 were done so hastily

56
FORENSICS JOURNAL

and without due regard for civil liberties. The idea of indefinitely hensive study of relevant law confirms the legality of its actions. The
detaining someone with no legal resources and no immediate end in current system in place is not flawless, but an unconventional war
sight remains controversial. Nevertheless, this power was ultimately calls for unconventional methods. While they may not be widely
granted to the President via Article II of the U.S. Constitution, and accepted, present governmental actions are permissible under this
the AUMF of 2001. nations current system of laws.

As history demonstrates, and this article discusses, past presidents


REFERENCES
have enacted questionable policies, particularly during times of
war. Although these policies are debatable, they are not necessarily Al Bihani v. Obama. 590 F.3d 866. District Court of the United
unlawful. In support of the AUMF, the MCAs of 2006 and 2009, States. 2009. Legal Information Institute. N.p., n.d. Web. 29 Jan. 2013.
and the NDAAs of 2012 and 2013, have codified the Presidents
ability to carry out these actions officially and lawfully. For obvious Al Mutairi v. United States. Civil. Action No. 02-828 (CKK). District
reasons, the Founding Fathers maintained that no single branch of Court of the United States. 2009. Legal Information Institute. N.p.,
government be granted excessive power. Still, in a system of checks- n.d. Web. 7 Feb. 2013.
and-balances, all three branches of government have found reason to
believe that these practices are legitimate and necessary. For instance, American Civil Liberties Union. Indefinite Detention, Endless World-
the Supreme Court concluded in Hamdi that the President does in wide War and the 2012 National Defense Authorization Act. New York:
fact have the authority to indefinitely detain individuals, and Con- American Civil Liberties Union, 22 Feb. 2012. Web. 27 Jan. 2013.
gress penned the MCAs and NDAAs that now bear the Presidents
signature of approval. Authorization for Use of Military Force Against Terrorists. Pub. L.
107-40. 115 Stat. 224. 18 Sep. 2001. Web. 26 Jan. 2013.
Standards of proof have remained the same as a result of the Boume-
diene and Al-Bihani rulings; however, the level of evidence required Boumediene v. Bush. 553 U.S. 723. Supreme Court of the United
to satisfy the preponderance requirement still rests solely with the States. 2008. Legal Information Institute. N.p., n.d. Web. 25 Jan.
presiding judge. This ultimately creates a system of imbalance. As 2013.
was illustrated, the same evidence can authorize the continued deten-
Bush, George. Decision Points. New York: Crown Publishers, 2010.
tion of a suspected terrorist, or conversely direct their release. These
Print.
inconsistencies in court opinion must be minimized, and current
criterion must be reviewed in order to preclude the potential for an Classified Information Procedures Act. Pub.L. 96-456. 94 Stat. 2025.
unfair trial. The Supreme Court should offer unequivocal guidance in 15 Oct. 1980. Print.
lieu of the broad discretion currently practiced. Contradictory court
opinions (e.g., Al Mutairi and Boumediene) only create skepticism Ex parte Endo. 323 U.S. 214. Supreme Court of the US. 1944. Legal
and confusion. Information Institute. N.p., n.d. Web. 25 Jan. 2013.
Evidentiary omissions and redactions, chiefly the exclusion of classi- Ex parte Merryman. 17 F. Cas. 144. Circuit Court of the United
fied evidence in a criminal trial, are an issue that should be addressed States. 1861. Legal Information Institute. N.p., n.d. Web. 25 Jan.
as well. CIPA provides an operational framework, but this framework 2013.
was never intended to combat terrorism at its current level. Several
ideas have been proposed, and some are plausible. The suggestion of Ex parte Milligan. 71 U.S. 2. Supreme Court of the US. 1866. Legal
a national review panel of lawyers and judges seems reasonable, but a Information Institute. N.p., n.d. Web. 25 Jan. 2013.
definitive decision must be made. Evidence gathering techniques also
are a work in progress. The concept of an embedded forensic expert Ex parte Quirin. 317 U.S. 1. Supreme Court of the US. 1942. Legal
seems to be the most practical method of combating evidentiary Information Institute. N.p., n.d. Web. 25 Jan. 2013.
concerns. Evidence is the backbone of the prosecution, and proper
collection techniques, along with a clear and indisputable chain-of- Hamdan v. Rumsfeld. 548 U.S. 557. Supreme Court of the US.
custody, are indispensable. 2006. Legal Information Institute. N.p., n.d. Web. 25 Jan. 2013.

Overall, American citizens traditionally react negatively to what they Hamdi v. Rumsfeld. 542 U.S. 507. Supreme Court of the US. 2004.
perceive as an injustice; however, what is perceived as unjust does not Legal Information Institute. N.p., n.d. Web. 25 Jan. 2013.
equal unlawful. The belief that the government is currently acting
Hedges v. Obama. No. 12 Civ. 331. District Court of the United
outside constitutional law limits is a matter of opinion, as compre-
States. 2012. Legal Information Institute. N.p., n.d. Web. 7 Feb. 2013.

57
STEVENSON UNIVERSITY

Hirabayashi v. United States. 320 U.S. 81. Supreme Court of the US. Vladeck, Stephen. The D.C. Circuit After Boumediene. Seton Hall
1943. Legal Information Institute. N.p., n.d. Web. 25 Jan. 2013. Law Review 41.4 (2011): 1451-90. Web. 29 Jan. 2013.

Johnson v. Eisentrager. 339 U.S. 763. Supreme Court of the US. Waxman, Matthew. Guantanamo, Habeas Corpus, and Standards
1950. Legal Information Institute. N.p., n.d. Web. 25 Jan. 2013. of Proof: Viewing the Law through Multiple Lenses. Case Western
Reserve Journal of International Law 42.245 (2009): 245-66. Web. 9
Korematsu v. United States. 323 U.S. 283. Supreme Court of the Feb. 2013.
United States. 1944. Legal Information Institute. N.p., n.d. Web. 25
Jan. 2013. Yasui v. United States. 320 U.S. 115. Supreme Court of the US.1943.
Legal Information Institute. N.p., n.d. Web. 25 Jan. 2013.
Litt, Robert, and Bennett, Wells. Better Rules for Terrorism Trials.
Counterterrorism and American Statutory Law 8 May 2009: 1-29.
Print. JAMES SEVISON is a twelve year veteran of
the United States Secret Service and a sixteen
Margulies, Joseph. Guantanamo and the Abuse of Presidential Power. year veteran of the federal government. He
New York: Simon & Schuster, 2006. Print. holds a Bachelor of Science in Criminal
Justice from the University of Maryland
Military Commissions Act of 2006. Pub. L. 109-366. 120 Stat. 2600.
University College. Currently, James is
17 Oct. 2006. Print.
enrolled in the Graduate and Professional
Military Order of November 13, 2001, Detention, Treatment, and Studies program at Stevenson University,
Trial of Certain Non-Citizen in the War Against Terrorism. 66 Fed. where he is pursuing a Master of Science in
Reg. 57,833. 16 Nov. 2001. Print. Forensic Studies. Presently, James serves as a
nationally accredited instructor at the United
National Archives and Records Administration. Executive order 9066: States Secret Service training academy.
Resulting in the Relocation of Japanese. Washington: GPO, 1989. Web.
27 Jan. 2013.

National Defense Authorization Act for Fiscal Year 2010. Pub. L.


111-84. 123 Stat. 2190. 28 Oct. 2009. Print.

National Defense Authorization Act for Fiscal Year 2012. Pub. L.


112-81. 125 Stat. 1298. 31 Dec. 2011. Print.

National Defense Authorization Act for Fiscal Year 2013. Pub. L.


112-479. 74 Stat. 128. 2 Jan. 2013. Print.

Rasul v. Bush. 542 U.S. 466. Supreme Court of the US. 2004. Legal
Information Institute. N.p., n.d. Web. 25 Jan. 2013.

Reid, Melanie. Secrets behind Secrets: Disclosure of Classified


Information before and During Trial and Why CIPA Should be
Revamped. Seton Hall Legislative Journal 35.2 (2012): 271-301.
Web. 9 Feb. 2013.

Sauter, Mark, and Carafano, James. Homeland Security: A Complete


Guide to Understanding, Preventing, and Surviving Terrorism. New
York: McGraw-Hill, 2010. Print.

Schulhofer, Stephen. Prosecuting Suspected Terrorists: The Role of


the Civilian Courts. The Journal of the ACS Issue Groups 2.2 (2008):
63-71. Web. 9 Feb. 2013.

U.S. Constitution, Art. I, 9, cl. 2.

58
FORENSICS JOURNAL

Will the Future of Digital Forensics and Law


Enforcement Investigation Strategies need to
Adapt to Malicious Hardware Devices?
Westcott Hyde

INTRODUCTION ing community, the DIY hobbyist electronics community has grown
exponentially. This growth is due to low cost and easy consumer
As digital computing technology continues to rapidly evolve and accessibility to programmable microcontrollers. The electronics DIY
become more affordable and accessible to the public, law enforce- industry expansion was recently featured by the financial publica-
ment and digital forensic investigators will be increasingly challenged tion - Entrepreneur Magazine. One of the more popular online
to identify and respond to electronic devices leveraged for criminal DIY embedded system retailers, Adafruit Industries, founded by
activities. An emerging technology that will test digital forensic skills Limor Fried, was featured as 2012s entrepreneur of the year (Wang).
and resources involves adaption of embedded microcontroller systems Last year New York City-based Adafruit did a booming $10 million
for criminal use. Embedded microcontrollers enhance functionality trade in sales of DIY open-source electronic hardware kits, so-called
of refrigerators, microwaves and automobile control systems but have because project designs are free and publicly accessible, and custom-
recently emerged as deployable criminal tools. Once the exclusive ers are encouraged to modify or hack the final product (Wang).
domain of electrical engineers, embedded microcontrollers have been Retailers such as RadioShack recognize the market potential of these
adapted and adopted by hackers and criminals at a disturbing rate. devices and have expanded their inventories to cater to the electronic
Malicious hardware previously described technological devices DIY hobbyist community. An unanticipated growth occurred within
designed to perform targeted covert missions. Today the definition criminal enterprises which capitalized on quick and easy access to
includes small embedded microcontroller systems that can be rapidly these powerful microcontroller devices. The Arduino and Raspberry
prototyped, quickly programmed and discretely deployed in order to Pi open source microcontroller devices have dominated this niche
execute a spectrum of nefarious targeted missions. In a counter intui- market but they are not the only (nor the most powerful) feature-rich
tive sense, the complexity and availability of these devices has become devices commercially available. The Arduino in particular, is highly
inversely proportional to their sophistication and criminal capability. successful because of its open source support, diverse capabilities, gen-
erous learning curve, cheap entry fee, and massive online attention.
Digital forensic investigations deal almost exclusively with conven-
tional computing devices such as cell phones, laptops, tablets and THE EVOLUTION OF MALICIOUS HARDWARE
personal computers. While extracting evidence from these digital
systems can certainly be challenging for the forensic investigator, data Only within the last five years have law enforcement agencies discov-
storage mediums and evidence extraction techniques for these devices ered miniature circuit based devices performing high tech criminal
are generally well understood. With embedded malicious hardware, tasks. In Northern England, 2008, European law-enforcement
classic digital forensic methodology is inadequate. officials uncovered a highly sophisticated credit-card fraud ring that
funnels account data to Pakistan from hundreds of grocery-store card
WHAT IS MALICIOUS HARDWARE? machines (Gorman). Uncovered in this sophisticated operation was
a professionally designed piece of malicious embedded hardware that
Malicious hardware consists of some form of complex integrated mated perfectly with the internal circuitry and was small enough to
circuit based system where either the embedded microprocessor or fit inside the plastic swipe patron checkout terminal without any
the actual device circuitry is constructed to execute instructions or case modification. The malicious circuitry was designed to record
perform functions in an unexpected and nefarious way. Leveraged for information from the magnetic stripe on the back of credit cards,
their autonomous functionality, low power consumption, compact store the information and transmit the siphoned credit card records
circuit density and powerful digital processing, hardware systems can to a criminal faction allegedly operating in Pakistan (Gorman). This
be transformed into dangerous and potent criminal devices. Embed- international case of malicious embedded hardware was an omen in
ded systems (sometimes referred to as programmable microcon- the then nascent world of criminalized malicious technology.
trollers) are an amalgamation of conventional computer technology
and dedicated functionality; a footprint that defies common sense. Devices like those discovered in Northern England (and other parts
These devices rely on minimal constituent resources: power, memory of Europe) are also present in the United States. Malicious hardware
and external user interfaces such as the common keyboard or mouse. was discovered in gas pumps in Alachua County, Florida. In 2005,
The result is a compact device with negligible reliance on external Lt. Stephen Maynard explained, Our device is not the traditional
control or interaction from a human user, which is an ideal conduit skimmer but rather a Bluetooth enabled equivalent of a thumb drive
for a criminal requiring a low or virtually non-existent profile while programmed to capture the data as it was transmitted from point A
committing a crime. to point B inside the gas pump itself (Krebs). Gas pumps, checkout
counter swipe terminals and ATM machines are popular credit card
Today embedded programmable microcontrollers can be purchased at siphoning targets but often employ differing embedded system tech-
a local RadioShack and programmed with free downloadable software nology and strategies. The successful exfiltration of credit card infor-
within minutes of acquisition. Spurred on by the computer hack- mation from these malicious hardware devices is on the rise. In 2012,

59
STEVENSON UNIVERSITY

Sparkfun Electronics was subpoenaed for their customer database device to execute directed missions such as confidential communica-
because a similar malicious embedded device was discovered in a gas tion interception. The introduction of malicious hardware into systems
pump in Coweta County, Georgia (Seidle). As embedded technol- running critical national infrastructure presents a clear and present
ogy becomes easier to understand and programming code becomes danger. Large scale manipulation of hardware was articulated by the
more pervasive on the Internet, the more germane the technology will Defense Science Board Task Force 2005 report on High Performance
become to motivated criminals. The boundaries of criminal potential Microchip Supply. The report noted, Because of the U.S. dependence
and utility are not only continually being expanded but also being on advanced technologies whose provenance is progressively more
streamlined in the process. This was discussed in July, 2012 at the offshore, opportunities for an adversary to clandestinely manipulate
Black Hat Conference in Las Vegas, Nevada when Cody Brocious, a technology used in U.S. critical microelectronics applications are
security researcher for Mozilla Software Corporation, demonstrated enormous and increasing (Department of Defense 14). The Defense
that with less than $50 of off-the-shelf hardware and a little bit of Science Board has noted that this type of malicious hardware can be
programming, it is possible for a hacker to gain instant, untraceable placed in any domain that inherently relies on circuit based technol-
access to millions of key card-protected hotel rooms (Anthony). The ogy. However, the most common large scale malicious hardware opera-
device configuration could be accomplished in less than 15 minutes tion that law enforcement is likely to encounter would be some form
while all the programming software is freely available on the Internet. of covert communication interception and/or corporate espionage.
This demonstration transferred embedded malicious hardware from
the realm of tech savvy hackers to the everyday activities of criminals. The 2005 Defense Science Board report was referenced by an Octo-
ber, 2012 report released by U.S. Government House Intelligence
SCOPE OF MALICIOUS HARDWARE Committee. The 2012 report announced that there could be substan-
tial security risks if domestic companies purchase communications
Malicious embedded technology resides in a large illicit domain. The equipment from Chinese companies such as Huawie or ZTE (House
criminal potential ranges from misdemeanor crimes (e.g. breaking and of Representatives, Permanent). In the report, Chairman Mike
entering - as in the hotel door locks) to national infrastructure failures Rogers (R-MI) stated, Any bug, beacon, or backdoor put into our
(e.g. gas pipelines, water treatment and power facilities). This mas- critical systems could allow for a catastrophic and devastating domino
sive scope complicates law enforcement countermeasures. One logical effect of failures throughout our networks (House of Representatives,
response is to create a basic taxonomy of malicious device attacks. Permanent). These interlocutor devices include communication infra-
A hierarchical measure of malicious technology is now necessary for structure components such as routers, switches and other evolving
both forensic investigators and digital forensic researchers to facilitate man-in-the-middle communications technology that could allow for a
these complex investigations. However, current research revealed the variety of espionage acts.
lack of a viable malicious hardware classification strategy. The lack of
any classification strategy may be attributed to the variety of available The utility of malicious embedded systems is only bounded by a
microcontrollers and endless potential device circuit manifestations. criminals imagination. Small scale operations can leverage microcon-
Further impediments to identifying an organized taxonomy are com- troller technology to supplant wireless utility meter readings thus in
plicated by the disparity in technological acumen required to turn a effect modifying utility company billing. A microcontrollers inher-
microcontroller into a malicious device and the availability of mali- ent small size and power make them uniquely attractive for placing
cious related programming through mediums such as the Internet. remote sensing devices in a variety of discrete locations. There are
The suggestion that a taxonomy of malicious hardware be created is, two fundamental inherent qualities of embedded malicious hardware
in itself, a clarion call to any digital forensic unit. that are cause for law enforcement concern. First, todays embedded
microcontroller reduced form means that they can be integrated with
While this paper asserts the ease of use and accessibility of microcon- commercially developed devices and covertly placed inside the manu-
trollers such as the Arduino will facilitate criminal potential, there facturers original casing. Second, light weight and reduced power
exist even more advanced and sophisticated microcontrollers such as consumption equates to longer lasting operation when powered by
the ARM (found in many modern cell phones). These are more pow- Lithium Polymer battery technology thereby enhancing their autono-
erful however require a higher degree of microcontroller architecture mous and prolonged functionality.
understanding and programming. With the ubiquity and simplifica-
tion of these devices, the domain of the criminal threat landscape is Drone technology is not a domain restricted only to military, industry
destined to expand. As a result, many law enforcement agencies will or tech savvy engineers. Airborne remote control toys can be pur-
contend with devices as compact as a small cellphone but capable of chased for less than one hundred dollars from various toy retailers and
performing any number of sophisticated criminal operations. easily converted to relay video imaging or wireless communications
for only a modest additional investment. For the criminal, the return
Large scale clandestine operations can leverage an innocuous appearing on this modest investment can range from focused espionage pay offs

60
FORENSICS JOURNAL

to acquisition of private information to invasion of privacy. In previ- but information gathering and digitized evidence collection from
ous decades, a remote control toy was simply that, but today there these devices remains complex.
is an increasing likelihood that the device is actually on a targeted
mission. CHALLENGES FOR DIGITAL FORENSIC INVESTIGATORS

IMPACT ON LAW ENFORCEMENT INVESTIGATIONS Conventional digital forensic investigations focus on where to find
incriminating evidence within the file or memory structure of a
Malicious hardware devices have a unique potential for harboring or conventional computing device. The lack of internal access to an
creating backdoor technology. Hardware facilitated backdoors allow embedded data storage system memory represents one of the most
unauthorized access into a target system in order to command said challenging aspects of malicious embedded hardware forensic analysis.
target system to perform specific unauthorized tasks. This is problem- With data, programming and mission objectives buried deep within
atic if the malicious hardware is embedded in the design of a com- the chips parceled circuitry, there is no easy way to interface with
mercial product. This subject was comprehensively covered in a 2010 or extract evidence. To contend with this fundamental issue, digital
IEEE report, A Survey of Hardware Trojan Taxonomy and Detection forensic units will need to expand their hardware reverse engineering
(Tehranipoor and Koushanfar 1). The report articulates how hard- skills and embedded system understanding. For specific investigations
ware Trojans are likely to be a specific integrated component of the and circumstances, the device itself without forensic dissection, might
overall system circuitry and architecture. Malicious hardware Trojans constitute sufficient corroborating evidence for a prosecutor. How-
are extremely difficult to detect and represent a unique challenge for ever, without legal precedent this postulation could be a legal gamble.
digital forensic investigators.
Forensic investigation practices must be rigorous and performed using
This level of malicious hardware detection and forensic dissection well established protocol based strategies that withstand courtroom
will require substantial resources and technicians skilled in reverse scrutiny. Digital forensic practitioners are trained to follow stan-
engineering electronic circuitry, which is currently outside the realm dardized procedures accepted by the court to be defensible. These
of conventional digital forensic lab capabilities. Forensic units should procedures are largely based on extracting data or evidence without
develop a system of resources that can be accessed in the event a manipulating or disturbing the original data/evidence. This can be
device like this is encountered. Malicious embedded hardware con- accomplished by creating cloned copies (forensic images) of disk
stitutes unfamiliar territory for a majority of law enforcement agen- drives and dumping resident memory using legally established pro-
cies and digital forensic units. The number of differing devices and cedures and certified digital forensic technology. With an embedded
their infinite configurations can even confound individuals trained in malicious hardware system this poses a difficult challenge for the
electrical and computer engineering. forensic team as there exists little legal precedent to support reverse
engineering or data extraction strategies on these systems. Reverse
Contemporary digital forensic kit suppliers focus on data extraction engineering analysis of malicious hardware can be destructive, or at
from cell phones, computers, or tablets because this type of consumer the very least - manipulative. This strategy will fail most legal cross
technology is pervasive in society and therefore more likely to be examinations and tampering of evidence tests.
utilized by common criminals. Often digital evidence can be extracted
from these devices despite the efforts by a device owners proactive For the digital forensic team there must be a standardized and legally
attempts to circumvent digital forensics. A host of evidence can be sustainable approach to examining a microcontroller. One possible
obtained from these conventional computing devices which corrobo- method is debugging. If a debugging option is available on the mali-
rate both device ownership and deliberate usage that will satisfy the cious device and it is enabled, (or the option has not been locked
requirements of digital nonrepudiation (that the data discovered on out), a forensic investigator has non-destructible access to valuable
the device is the result of the owner or primary user of the device). As features, i.e. internal memory structures and input/output decoding.
digital microprocessor technology becomes more advanced, compact, Debugging permits an embedded system developer to validate vari-
power efficient, affordable, and embedded, malicious hardware archi- ous functioning aspects of the system design during prototyping. It
tects will be more difficult to trace. is normally a non-destructive technique that gives a unique view into
the processor and can possibly reveal a disassembly of the code run-
A unique quality of embedded systems is the proprietary nature of ning on the device. This can be important and useful for a variety of
its functionality. An investigator cannot simply plug it into a foren- forensic related reasons such as unique code based signatures, undis-
sic computer via USB or other serial interface and quickly generate closed or undiscovered device functionality and functionality specific
a canned report establishing the presence or absence of digitized to criminal development and deployment.
evidence. The programming is also unique and proprietary to each
embedded device. It is easy to program and pass data to these devices

61
STEVENSON UNIVERSITY

The embedded system undergoing analysis in the forensic lab must any electrical device to a (often wireless) network like environment.
support debugging. While this is typically the case for a majority of As devices like refrigerators, home security systems, automobiles,
microcontrollers it might not be the case for specific commercially door locks, lighting systems and surveillance systems become more
available microcontrollers. However, despite a microcontrollers interconnected the potential increases that a criminal will attempt
support for debugging, it can and often will be, programmatically electronic manipulation or electronic molestation through malicious
disabled with lock bits and/or fuse bits. Normally, these bit specific hardware projects. If these devices (e.g. home security system, door
directives function to protect and conceal the internal programming, locks) have anything of value behind their functionality, then there
which is the intellectual property (IP) of the commercial manufac- must be an automatic assumption that it is a legitimate target for the
turer. These lock bits can also disable external access to data and flash malicious hardware capable criminal.
memory resident on the chip further limiting forensic analysis.
The Internet of things is prevalent in the medical field. This makes
Due to the number of microcontroller variants on the market, a homicide now plausible by way of leveraging the growing intercon-
consequence is that each variant requires a unique debugging interface nectedness of embedded hardware enabled devices. For instance,
and debugging methodology. Debugging is only industry standard- implantable cardiac defibrillators (ICDs) and insulin pumps can
ized to a certain extent and requires a different level of understand- now be controlled remotely and wirelessly. Newer devices recently
ing, expertise and interaction as compared to conventional computer approved by the FDA operate with wireless transceivers from a range
based forensics. This means a digital forensic unit should be well of up to 400MHz, or roughly 400 meters (Kirk). In a disturbing
versed in the more common microcontroller variants that are likely malicious hardware example, security researcher Barnaby Jack from
to be used by criminals. Without access to the internal memory or the security firm IOActive has successfully demonstrated how to take
data storage medium within malicious embedded hardware, other over these specific devices and turn them into murder weapons. Jack
less conventional forensic strategies and methodologies must undergo stated that not only is it possible to assassinate a target victim, it is
systematic and departmental legal scrutiny. Many devices will have possible to upload specially-crafted firmware to a companys servers
to be externally stimulated in order to produce an observable output that would infect multiple pacemakers and ICDs, spreading through
that can be readily interpreted. Improper external stimulation, how- their systems like a real virus (Kirk). This presents an entirely differ-
ever, can potentially cause unseen harm to the internal circuitry of ent challenge for law enforcement and digital forensic investigators.
the device. This approach will fail under courtroom scrutiny since the
evidence may be considered tampered with and device functionality There are two important prerequisites to effectively investigate and
is no longer reproducible if the device is damaged. prosecute crimes involving malicious hardware. First, law enforcement
and investigators must be aware of the expanding use of malicious
WHY INVESTIGATORS AND LAW ENFORCEMENT NEED TO hardware in order to quickly recognize its potential use in criminal
BE CONCERNED acts. Investigators must recognize that an innocuous (or confusing)
looking electronic device might be a key piece of evidence related to a
The ability to remotely commit a physical crime is a quality belonging particular type of remote crime. Knowing where to look for these key
almost exclusively to the domain of malicious hardware. Criminals pieces of evidence is essential to solving complex crimes that incor-
will become increasingly clever in exploiting embedded systems for porate technology. Second, a plan to forensically analyze malicious
criminal acts. A critically important characteristic of malicious hard- hardware is essential for all forensic labs. New forensic methodologies
ware allows a device to perform what a human could or would not. must withstand courtroom scrutiny, build on existing legal precedent
Timing of instructions and actions can be extremely precise allowing while exploring new interpretations and reflect consultation with
a device to execute criminal activities in a more reliable and consistent subject matter experts in the technology, forensics, and legal fields.
manner than a human could. Additionally, in an embedded system
(or any computing system) the element of psychology is completely REFERENCES
removed allowing the hardware device to execute unethical actions
without emotional concerns or accidental abortion. Divorcing the Anthony, Sebastian. Black Hat Hacker Gains Access to 4 Million
physical and emotional element from a criminal act is another unique Hotel Rooms with Arduino Microcontroller. Extreme Tech. Ziff
and enticing attribute of malicious embedded systems. Davis, 25 July 2012. Web. 18 Jan. 2013. <http://www.extremetech.
com/computing/133448-black-hat-hacker-gains-access-to-4-mil-
While malicious hardware related crime will not rival the scope of lion-hotel-rooms-with-arduino-microcontroller>.
conventional criminal acts, it is inevitable that malicious hardware
related crime will expand and become pervasive in society. A major Department of Defense. High Performance Microchip Supply. By
reason for this is the increasing computerization of the social environ- Defense Science Board Task Force. ACQWeb. N.p., 2005. Web. 26
ment. The phrase the Internet of things relates to the connection of Feb. 2014. <http://www.acq.osd.mil/dsb/reports/ADA435563.pdf>.

62
FORENSICS JOURNAL

Gorman, Siobhan. Fraud Ring Funnels Data From Cards to Paki- WESTCOTT HYDE received his Bachelor of Science
stan. The Wall Street Journal. Dow Jones & Company, 11 Oct. (double major) in Computer Science and Computer
2008. Web. 26 Feb. 2014. <http://online.wsj.com/news/articles/ Networking from Regis University, Denver, Colorado.
SB122366999999723871>. He holds a Master of Science in Information Assurance
(specializing in Computer Security) from Regis University,
House of Representatives. Permanent Select Committee on Intel- Denver, Colorado. He is currently a candidate for a
ligence. Investigative Report on the U.S. National Security Issues Posed Master of Science Forensic Studies - Computer Forensics
by Chinese Telecommunications Companies Huawei and ZTE. By at Stevenson University. Additionally, he is currently a
Mike Rogers and Dutch Ruppersberger. U.S. House of Representatives student working on an additional Bachelor of Science in
Permanent Select Committee on Intelligence. N.p., 8 Oct. 2012. Web. Electrical and Computer Engineering at the University
26 Feb. 2014. <https://intelligence.house.gov/sites/intelligence.house. of Colorado, Boulder. He works as a Computer Scientist
gov/files/documents/Huawei-ZTE%20Investigative%20Report%20 assisting in cyber investigations and is directing his skills
(FINAL).pdf>. by specializing in malicious embedded hardware devices
and developing sound forensic strategies for the same.
Kirk, Jeremy. Pacemaker Hack Can Deliver Deadly 830-volt Jolt.
Computerworld. Computerworld, 17 Oct. 2012. Web. 19 Feb. 2013.
<http://www.computerworld.com/s/article/9232477/Pacemaker_
hack_can_deliver_deadly_830_volt_jolt>.

Krebs, Brian. Skimmers Siphoning Card Data at the Pump. Krebs


on Security. Krebs on Security, 20 July 2010. Web. 11 Feb. 2013.
<http://krebsonsecurity.com/2010/07/skimmers-siphoning-card-data-
at-the-pump/>.

Seidle, Nathan. SparkFun Gets a Subpoena. SparkFun. SparkFun


Electronics, 9 May 2012. Web. 12 Feb. 2013. <https://www.sparkfun.
com/news/836>.

Tehranipoor, Mohammad, and Farinaz Koushanfar. A Survey of


Hardware Trojan Taxonomy and Detection. IEEE Design & Test of
Computers 27.1 (2010): 10-25. Web. 26 Feb. 2014. <http://aceslab.
org/sites/default/files/A%20Survey%20of%20Hardware_0.pdf>.

Wang, Jennifer. Entrepreneur of 2012: Limor Fried. Entrepreneur


Magazine 18 Dec. 2012: n. pag. Web. 26 Feb. 2014. <http://www.
entrepreneur.com/article/225213>.

63
STEVENSON UNIVERSITY

Fraud Predictors and Non-Profit Organizations


Renita Dandridge-Shoats

As of 2006, the Association of Certified Fraud Examiners estimated External frauds are committed against the non-profit organization by
that non-profit organizations experience approximately $40 billion in persons outside the organization, such as vendors, grant applicants,
losses due to fraud (Greenlee et al. 677). While this reflects an average sub-recipients, and program participants. The most common forms
6% of revenue lost to fraud across all organizations it still represents a of external fraud are vendor billing schemes, sub-recipient fraud,
nominal amount of funding that is not available for these non-profit and financial assistance fraud. Vendor billing schemes may involve
organizations to meet obligations and fulfill missions of assisting overbilling the non-profit organization or billing the non-profit
those in need (Greenlee et al. 677),. Quite literally, every dollar lost organization for fictitious goods or services. Sub-recipient fraud
to fraud represents a lost ability to provide needed public services can involve fraudulent reporting of program data to the non-profit
(Greenlee et al. 677). Reducing fraud for non-profit organizations organization awarding the grant. Financial assistance fraud usually
allows these entities to provide additional benefits and services to pro- involves program participants who apply for and receive assistance or
gram participants. As non-profit organizations face increased public benefits under false pretenses (Nonprofits Not Immune to Fraud;
scrutiny, reducing fraud also strengthens their integrity and reputation Keller & Owens, LLC).
as legitimate and trustworthy operations which are fiscally responsible
for the procurement, management, and usage of the charitable dona- As non-profit organizations are susceptible to internal and external
tions they receive (Greenlee et al. 677). As organizations experience frauds committed against and by the non-profit organization, these
fraud and become aware of relevant fraud risk factors, they can ana- entities should consider, evaluate, and monitor relative fraud risk fac-
lyze this historical data to identify patterns and incorporate valid risk tors. From an audit perspective, this is often accomplished through
factors to develop functional fraud predictors. This article discusses a fraud risk assessment where the auditor should consider fraud risk
different types of fraud that affect non-profit organizations, identifies factors that relate to misstatements arising from fraudulent financial
non-profit fraud risk factors, and focuses on the use of possible fraud reporting and misstatements arising from misappropriation of assets
predictors to assess and mitigate fraud risk for non-profit organizations. (Grice). For asset misappropriation, two categories of risk factors
By understanding known fraud risk factors and using various fraud are noted: susceptibility of assets to misappropriation and con-
predictors, non-profit organizations can effectively and proactively trols (Grice). Susceptibility of assets to misappropriation involves
address, and possibly minimize, their exposure to fraud-related losses. understanding the assets of the organization and how specific assets
may be more or less prone to theft, manipulation, misuse, or abuse.
Non-profit organizations are exposed to internal and external frauds. Controls relate to the supervision, oversight, and monitoring (or
Internal frauds are committed by persons within the organization, lack thereof ) of assets and financial transactions. One common
such as employees, volunteers, managers, directors, and officers. example among smaller and non-profit entities is a lack of resources
These internal frauds may be committed against the non-profit that does not allow for adequate and effective supervision or separa-
organization or by the non-profit organization. Internal frauds com- tion of duties. For fraudulent financial reporting, three categories
mitted against the non-profit organization typically occur in the form of fraud risk factors are noted: management characteristics and
of asset misappropriation, which includes revenue and cash receipt influence over the control environment, industry conditions, and
schemes (skimming); theft of cash, property, or other non-cash dona- operating characteristics and financial stability (Grice). Manage-
tions (larceny); purchasing and cash disbursement schemes (check ment characteristics and influence over the control environment
tampering, register disbursements, credit card abuse, and fictitious relate to the abilities, pressures, style, and attitude of management
vendors); and payroll and employee expense reporting schemes (ghost in implementing and following policies and procedures for the
employees, overstated hours, fictitious or duplicate reimbursable internal controls and the financial reporting process (Grice). This
expenditures). Internal frauds committed by the non-profit organiza- category can also be viewed as management setting the tone at the
tion usually occur in the form of fraudulent financial reporting. This top by establishing, expecting, demonstrating, and requiring ethi-
can involve the misclassification of restricted donations, failure to cal behavior within the organization. Industry conditions relate to
make required disclosures, revenue overstatement, timing differences, the economic and regulatory environment in which the organization
misclassification of fundraising and administrative expenses, inappro- operates. Operating characteristics and financial stability are usu-
priate asset valuation, and submission of false statements to external ally organization-specific, relating to expected types of transactions
parties for application or compliance requirements. Internal frauds (including the documentation and recognition of those transactions),
committed by the non-profit organization also occur in the form of financial position, and profitability (Grice). For non-profit organiza-
fraudulent fundraising practices where the organization misrepresents tions, examples can include aggressive goals and accounting practices,
the extent of a charitable contribution deduction entitled to a donor, unfavorable changes in political or legal arenas, and liberal interpreta-
fails to comply with donor-imposed restrictions on gifts, manipulates tion of split-interest agreements or donor stipulations.
various costs to improve expense ratios, or misrepresents the portion
of donations used in charitable programs (Nonprofits Not Immune While most organizations are predisposed to these fraud risk fac-
to Fraud; Keller & Owens, LLC). tors, non-profit organizations are usually more vulnerable due to one

64
FORENSICS JOURNAL

major reason the inherent environment of trust that is so easily and ment (founders or executive directors), lack of board members with
frequently presumed within and relative to these types of organiza- expertise in financial oversight, and limited resources for financial
tions. Excessive trust and control is placed in the founder, an execu- management (Holtfreter 46). The same challenges are still prevalent
tive director, or a substantial contributor or sponsor. Only limited ten years later, especially for smaller non-profit organizations.
resources are available to be allocated to accounting operations, inter-
nal controls, and financial oversight; for example, only one person A 2008 study supports earlier findings that focusing on victim organi-
completes all the steps in the payroll process. Members of the Board zation characteristics of financial controls, nonfinancial mechanisms,
of Directors are usually volunteers, whose financial oversight experi- and management oversight and behavior can reduce losses experi-
ence is minimal. In daily operations, many volunteers have access to enced by non-profit organizations. Some of these control mecha-
assets and confidential information. Charitable contributions are also nisms include pre-employment background checks, internal controls,
at greater risk of theft compared to other more traditional exchange- internal and external audits, and the use of anonymous employee
type transactions. Because non-profit organizations are also more hotlines (Holtfreter 48 49). Pre-employment screenings can iden-
vulnerable to the impact of negative publicity, they are less likely to tify potentially questionable applicants; this information can be used
report occurrences of fraud (Nonprofits Not Immune to Fraud). to disqualify applicants or determine more appropriate assignments
As these risk factors should be considered individually and collec- for new employees. As post-employment control mechanisms, inter-
tively, it is also beneficial for the auditor to tailor the risk factors nal controls should be adequate and effective in segregating duties and
so that [they] particularly are applicable to [non-profit organizations] monitoring and supervising activities where assets are exposed and
(Grice). This type of fraud risk assessment is not restricted to audit financial transactions can be impacted. This study also cites internal
procedures the non-profit organization should perform a similar and external audits as vital post-employment controls (Holtfreter 49).
evaluation in the form of a fraud risk self-assessment. Noting that employee tips are the most frequent method of fraud
detection, anonymous hotlines assist early detection and can minimize
A 2013 case study observed several characteristics that can make losses (Holtfreter 49). As of 2012, the Association of Certified Fraud
a non-profit organization particularly vulnerable to asset misap- Examiners reports that fraudulent activity is detected with employee
propriation (Ulmer and Noe 159). First, non-profit organizations tips via organization hotlines in more than 50% of fraud cases (Asso-
receive a high volume of cash contributions, many of which are not ciation of Certified Fraud Examiners 16).
well documented. This makes it difficult for management to estimate
incoming donations and detect fraudulent shortfalls. Second, non- As internal fraud can occur in the form of asset misappropriation or
profit organizations are usually managed by a board of volunteers, fraudulent financial reporting, the known risk factors, whether pre-
which is often amateurish in composition, and can easily become dictable or not, pivot on the control environment and management
more of a social organization than a conscientious oversight body oversight. Weak internal controls and ineffective oversight are often
(Ulmer and Noe 159). The naivet that everyone is dedicated to cited as the most significant predictors of internal fraud. Within the
the cause and thoughts that nobody would steal from a non-profit culture of trust without oversight, non-profit organizations need
organization often translate to a disadvantage in the fiduciary respon- appropriate internal controls and effective financial oversight to proac-
sibility of the board. Third, with limited resources, non-profit organi- tively prevent opportunities for internal fraud (Ulmer and Noe 162).
zations typically have smaller accounting operations where separation
of duties is often inadequate. Fourth, another less obvious character- The primary goal of a strong internal control system is to reduce
istic is the non-profit organizations desire to protect its reputation and opportunities for fraudulent activity. These internal controls should
avoid negative publicity about any fraudulent activity. The non- incorporate background checks on all employees, separation of duties,
profit organization has a primary interest in maintaining public trust proper authorizations, and moderate reliance on or trust in one indi-
since there is a significant reliance on public generosity and support. vidual to preclude opportunities for asset misappropriation (Galla-
Where the occurrence and prosecution of fraud committed against the gher and Radcliffe 321). Background checks should be completed for
non-profit organization are not made known to the public, this may all potential employees, especially those who will have access to cash
lead a prospective fraudster to believe that punishment will be slight and other liquid assets (Greenlee et al. 690). As a pre-employment
and possibly attract other fraudsters seeking to deceive the non-profit requirement and form of due diligence, a comprehensive background
organization (Ulmer and Noe 159). Subsequent admission of a fraud check may reveal a criminal record or other questionable activity that
cover-up may result in even more damaging consequences than should be treated as possible warning signs. This information should
had the act been handled openly from the beginning (Ulmer and be considered relative to the responsibilities of the potential employee
Noe 159). Earlier studies in 2003 demonstrated that internal fraud and his/her possible access to organization assets. Background checks
committed by employees posed a greater immediate risk than external may even be warranted for certain volunteers who will have direct
fraud for non-profit organizations. Risk factors identified specifically access to valuable or otherwise susceptible assets. Non-profit organi-
to non-profits include: heightened trust, excessive control by manage- zations should also consider investing in insurance or surety bonds for

65
STEVENSON UNIVERSITY

these same employees, as well as volunteers, who have access to cash resources. As an internal supervisory body, an audit committee can
and similar assets (Greenlee et al. 691). New employees and volun- be an effective vehicle for preventing fraud, embezzlement, and mis-
teers should also receive orientation and training encouraging aware- management of assets (Gallagher and Radcliffe 322). These preven-
ness and accountability. tion efforts should include conducting a periodic review of internal
controls, facilitating means for confidential reporting of fraud and
The separation of duties involves the assignment of authorization, cus- abuse, and educating employees about the full impact of fraud to the
tody, and record-keeping functions to separate individuals (Gallagher non-profit organization (Greenlee et al. 691). The audit committee
and Radcliffe 322). This fundamental principle of internal controls should also oversee the internal audit function, if applicable, as well as
simply requires different individuals to complete different steps of an the completion of any independent external audits. Diverse members
accounting process. As a result, the likelihood of theft [asset misap- and members with financial expertise are also beneficial to both the
propriation] or error going unnoticed is greatly reduced (Gallagher Board of Directors and the audit committee.
and Radcliffe 322). If one person completes all steps of the process,
the offender is also able to conceal his/her fraud. Lastly, a fraud response plan should be established before fraud occurs.
This plan should include the non-profit organizations fraud policy,
Proper authorizations should only be given by someone who is at an who to contact when fraud is suspected or detected, steps to take
appropriate level and understands the transaction to be approved, the if fraud is detected, and how to handle related inquiries (Gallagher
reason for the transaction, and the impact of the transaction. Clear and Radcliffe 323). With an established fraud response plan, the
lines of authority and proper procedures for authorization of transac- non-profit organization is prepared to handle fraud incidents proac-
tions should be established and enforced (Greenlee et al. 689). Proper tively, thus minimizing the negative impact. A strong management
authorizations can also require requests to be made in writing and response to alleged or suspected fraud is also important in deterring
multiple approvals, e.g. dual signatures. The lack of proper authoriza- future incidents (Greenlee et al. 689).
tions compromises both the monitoring and supervision functions.
As stated before, membership diversity may also be a benefit to the
Moderate reliance on or trust in one individual actually limits the oversight boards of non-profit organizations. A 2013 study exam-
authority of one person to establish, implement, monitor, and ined the composition and compensation of the Board of Directors as
enforce any single function of an organization (Gallagher and Rad- predictors of fraud. In the world of public companies and for-profit
cliffe 322). This reinforces the separation of duties so that one person entities, the Board of Directors serves to ensure profitability maximi-
does not have excessive authority without proper supervision. zation and oversight of ethical behavior and the quality of financial
statements (Kim et al. 142). Regulators and investors are aware of
As non-profit organizations may also be inclined to fraudulent aggressive goals and lucrative incentives that can and have resulted in
financial reporting, effective management oversight can inhibit this fraudulent financial reporting. Recent high-profile accounting frauds
type of internal fraud by providing additional supervision. Aspects have resulted in a loss of investor confidence and a crisis of trust
of effective management oversight should include an informed and (Kim et al. 142). Any type of fraud can be detrimental to even the
conscientious Board of Directors, the formation and/or existence of largest non-profit organizations and agencies. Relative to the com-
an audit committee, and a fraud response plan (Gallagher and Rad- position of the Board of Directors, this particular study considered
cliffe 321). As the Board of Directors is responsible for governing the the gender, independence, financial expertise, tenure, and segregation
non-profit organization, this includes addressing legal requirements, of positions of board members. Fraud firms (firms with reported
managing financial risks, and setting expectations. In this oversight SEC violations) had significantly fewer female board members, fewer
role, the board should set the tone regarding ethical behavior in its independent board members, and board members with longer tenure.
response to risks and opportunities. This includes establishing the Fifty-three percent of these fraud firms also had CEOs serving dual
control environment, being aware of operating characteristics and roles as both CEO and Chairman of the Board, indicating that fraud
industry conditions, and empower[ing] employees in a positive is more likely when these two positions are combined. Here, fraud
workplace environment (Greenlee et al. 689). Board members and is more likely [to occur] when an entrenched board compromises
directors should also be independent. Based on the Sarbanes-Oxley the oversight function of the Board of Directors. Including more
Act that regulates public companies, recommendations also include women, finance and accounting professionals, and independent direc-
prohibiting personal loans to non-profit board members and execu- tors to the board can further reduce entrenchment (Kim et al. 149).
tive directors and prohibiting the appointment of any individuals who Similarly, the audit committees of these fraud firms were reported to
have been barred from serving as board members or directors by the have fewer female members and members with longer tenure. Rela-
Securities and Exchange Commission (SEC) (Greenlee et al. 689). tive to the compensation factors, this study found that compensation
in the form of stock and stock options was positively associated with
An audit committee is helpful for minimizing potential financial
fraud (reported as SEC violations) when compared to firms with
losses and ensuring compliance for the receipt and use of specific

66
FORENSICS JOURNAL

board members who only received cash compensation. This estab- doubtful accounts, inventory, total assets, debt, and earnings before
lished that cash-based compensation [was] not associated with an interest and taxes. The following financial ratios were noted: accounts
increased risk of fraud (Kim et al. 148). receivable/sales; accounts receivable/total assets; inventory/sales; net
property, plant, and equipment/total assets; debt/equity; sales/total
This study also makes policy suggestions to reduce the likelihood of assets (Fanning and Cogger 34). Additional testing revealed lower
fraud based on these findings, some of which reinforce previously sales growth, higher accounts receivable to sales ratios, and higher
discussed recommendations. Realistic goals and incentive structures debt to equity ratios for companies with fraudulent financial state-
should be developed, so managers are not tempted to commit fraud ments. These results indicate that these companies may be experienc-
in order to meet high earnings expectations. Organizations should ing slower growth, accounts receivable manipulation, additional debt,
increase board diversity, as board behavior appears to improve with and even manipulation of underlying trend variables (Fanning and
the presence of women and other diverse directors; organizations Cogger 37). Applied to non-profit organizations, fewer donations,
should also consider term limits as this can address the issue of pos- distinct changes in accounts receivable, unexpected debt, and unusual
sible board entrenchment (Kim et al. 152). By applying these find- trends may indicate financial distress and the existence of fraud within
ings and extending these policies to non-profit organizations, directors the financial statements. Even as non-profit organizations may be
can attempt to reduce the likelihood of internal fraud. Applying these more familiar with adverse operating conditions and regular financial
policies may also prove to be a cost effective way for these organiza- distress, these indicators should still be treated as financial statement
tions to reduce fraud. With a greater number of females than males fraud predictors. Awareness and assessment remain a necessity in the
working in the non-profit sector and higher-dollar fraud losses associ- monitoring and review of financial statements and unusual accounting
ated with male managers and/or executives non-profit organizations transactions. Many non-profit organizations experience the pressures
should consider increasing their number of female board members of maintaining or increasing revenue/donations, meeting forecasts,
(Greenlee at al. 683),. For more independent board members, some achieving favorable budget variances, and the reality of overutilization
non-profit organizations may need to move beyond the obvious or (doing more with less). Preserving donor approval and substantial
readily available sources, i.e. organization founders and significant related resources could lead to questionable accounting maneuvers
contributors. The same should apply in seeking out board members resulting in fraudulent financial statements.
with financial expertise, preferably in the nonprofit arena. While the
organization founders and significant donors may be extremely loyal A study published in 2007 incorporated non-financial information
and even trustworthy, this does not mean these individuals have the in the form of a fraud questionnaire to assess fraud in certain service-
relevant experience needed to fulfill this oversight role effectively. based enterprises. Contrary to most studies, the use of financial
Concerning compensation, non-profit organizations should also be information and standard ratios may not provide the most appropriate
careful to limit and monitor the use of non-cash perquisite benefits measure for these types of enterprises. This study used a questionnaire
provided to board members. to evaluate various risks - management, industry, earnings, and oper-
ating - with a more subjective approach. Sample firms responded to
With the examination of financial statements as a means to highlight questions based on individual characteristics, specific conditions, and
fraud predictors, several studies have identified and tested specific actual experiences, not just numbers in the form of financial results
variables to measure the likelihood of financial statement fraud. A and ratios. An Excel spreadsheet function was then used to assign
study published in 1998 tested corporate governance and financial appropriate fraud variable values based on the questionnaire and
statement accounts and ratios, accounting choices, operating results, scoring logic for the questionnaire responses. Combined with a fuzzy
and trend analysis, among other variables based on public informa- logic model, the results produced a 76.7% overall accuracy rate in
tion, as possible indicators of financial statement fraud. These familiar predicting whether these service-based firms issued fraudulent finan-
corporate governance variables were associated with fraudulent finan- cial statements (Lenard et al. 135). These results also indicated that
cial statements: a smaller Board of Directors (fewer board members), an industry-specific model could be more useful than a general fraud
a lower percentage of outsiders on the Board of Directors, absence detection model to external interested parties (Lenard et al. 136).
of an audit committee, absence of a compensation committee, and Non-profit organizations and other interested parties can experience
the dual-role position of CEO and board chairperson (Fanning and greater benefit from fraud detection models developed explicitly for
Cogger 32). Supplemental multi-variable testing suggested additional non-profit organizations. These organizations can assess their most
outside directors may provide additional oversight that helps prevent relevant aspects of fraud risk factors and interested parties can be more
[fraudulent financial statements] (Fanning and Cogger 36). Account- confident in their review of and/or reliance on the financial statements
ing choices such as inventory valuation and depreciation methods of these non-profit organizations.
were not found to be significant variables, but individual accounts and
specific financial ratios were found to be statistically significant factors. External fraud usually occurs in the form of consumer or recipient
These individual accounts included accounts receivable, allowance for fraud. For this context, recipient fraud includes service applicants or

67
STEVENSON UNIVERSITY

program participants who receive benefits or other assistance based on Again, the most prominent example of external fraud against a non-
their submission of falsified information. In essence, these recipients profit organization is healthcare fraud. The Federal Bureau of Inves-
make fraudulent claims to qualify for payments or services for which tigation estimates $80 billion in annual healthcare fraud costs, and
they would not qualify otherwise. This type of fraud is harmful not close to $700 million annually when fraud and improper payments
only to non-profit organizations, but also to legitimate applicants are combined (Worth). The Centers for Medicare and Medicaid
who may be rejected because fraudulent recipients have usurped the Services (CMS) is a prime target for fraudulent claims. Processing
designated resources. Since this will always be a risk to non-profit more than 4.8 million claims per day, CMS is the most well-known
organizations, understanding related predictors becomes a strategic healthcare entity using analytics (Worth). The 2010 Small Business
tool in identifying and denying fraudulent claims. Predicting external Jobs Act authorizes the use of predictive modeling and other analyt-
fraud can also be particularly difficult when any number of variables, ics technologies to identify improper claims for reimbursement and
or combination thereof, may be considered key indicators or red to prevent the payment of such claims under the Medicare fee-for-
flags that a claim may be fraudulent and requires additional inquiry service program (Roehrenbeck). This predictive modeling program
or analysis to determine its validity. The central purpose for these is intended to capture and provide a comprehensive view of provider
predictors is for non-profit organizations to increase internal confi- and beneficiary activities across all regions with the goal of detecting
dence of identifying fraudulent claims before assistance or benefits are patterns and networks that represent a high risk of fraud (Roehren-
expended in error. This can be accomplished through the application beck). This modeling program can also be used to identify other
of fraud detection models utilizing data mining, where this analytical improper payments not related to fraud.
approach to fraud detection uses historical data to identify possible
predictors of fraud associated with known fraudsters and their actions The analytics are divided into four categories: normal rules of health-
in the past (Nisbet et al. 350). Generally speaking, this methodology care and how these rules may be violated; anomalies; predictive
utilizes pattern analysis in the creation and application of rules, gen- modeling using patterns based on cases of fraud; and social network-
eral principles, red flags, and alerts to generate a decision that recom- ing that analyzes the financial ties of a fraudster-provider (Worth).
mends acceptance, rejection, or review; or a score or profile indicating This fourth category is a form of link analysis, which is a data analysis
the likelihood of possible fraud. Predictive analytics and link analysis technique that examines the relationships among claims, people,
may be more common end-user terms for some of these fraud detec- and transactions (Schreiber). With the natural evolution of fraud
tion models. Fraud detection systems are also available commercially schemes and interrelated factors, the inherent intelligence in the pre-
as fraud detection software. The most common application for these dictive analytic system learns from the new rule patterns and builds
fraud detection models are credit card fraud, check fraud, application increasingly more sophisticated models, adapting for new types of
fraud, claim fraud, and healthcare fraud all forms of external fraud. fraud as new rules are developed (Schreiber). Predictive analytics
and link analysis relate a greater number of highly arbitrary, and even
Due to the nature of healthcare needs and associated costs, the rate of unexpected, variables to detect and prevent fraud. This is significant
external fraud against non-profit healthcare organizations is probably as external fraud can be more elusive and less discernible when com-
one of the highest. A 2004 article notes that the National Health pared to the typical predictors of internal fraud.
Care Anti-Fraud Association estimates 3% to 10% of every dollar
spent on healthcare in the U.S. is lost to fraud, totaling $39 billion While the use of data mining, predictive analytics, and link analysis
to $150 billion a year (Mantone). With increasing healthcare costs, may be useful for external fraud prevention efforts of larger non-
one would only expect these fraud losses to increase. To mitigate this profit organizations, prospective detection may still prove difficult for
risk of external fraud, non-profit healthcare organizations currently smaller non-profit organizations. These entities can purchase more
use fraud detection software and predictive modeling in a continu- modest versions of fraud detection software or build their own inter-
ous effort to detect fraudulent claims before making payments. The nal databases and create rules to flag suspicious applications or claims
Government Employees Hospital Association uses a Fair Isaac Cor- for benefits or services. Key factors to consider may include timing
poration (FICO) software product that assigns a fraud-risk score for and frequency of applications, referral sources, application inconsis-
each billing transaction. According to the Associations data analysis tencies, and other observable characteristics. These fraud detection
manager, the software also increases productivity as employees can and prevention efforts could also become the impetus for larger multi-
focus more on the fewer number of flagged claims instead of attempt- organizational databases managed by federal or local government
ing to review all claims as possible fraudulent cases (Mantone). agencies or other related support agencies. The availability and use
Overall, the Association is better equipped to reduce fraud and related of this type of information can be key for non-profit organizations to
costs, as well as improve employee productivity and positively impact conduct risk self-assessments, reduce exposure to external fraud, and
customer service. enhance their ability to manage and mitigate that risk.

68
FORENSICS JOURNAL

Nonprofit organizations are by no means immune to fraud losses Kim, Joung Yeon, Dianne Roden, and Steven Cox. The Composition
(Greenlee at al. 691). Considering their operating characteristics and Compensation of the Board of Directors as Predictors of
and industry conditions, these organizations are more vulnerable to Corporate Fraud. Accounting and Finance Research. 2.3 (2013): 142-
fraud than their for-profit counterparts. Non-profit organizations are 154. Directory of Open Access Journals. Web. 28. Aug. 2013.
susceptible to both internal and external fraud, namely in the form of
asset misappropriation, fraudulent financial statements, and recipient Lenard, Mary Jane, Ann Watkins, and Pervaiz Alam. Effective Use
fraud. As part of their fiduciary responsibility, these organizations of Integrated Decision Making: An Advanced Technology Model for
should conduct fraud risk self-assessments to gain a better under- Evaluating Fraud in Service-Based Computer and Technology Firms.
standing of their general and specific exposure in various functions Journal of Emerging Technologies in Accounting. 4 (2007): 123-137. Web.
and processes, namely internal controls and management oversight.
Mantone, Joseph. Like a locomotive. Modern Healthcare. 34.26 (28
By developing and maintaining strong internal controls and effective
Jun. 2004): 28-30. Business Source Complete. Web. 14. Sep. 2013.\
management oversight, non-profit organizations can safeguard assets
and ensure financial statement integrity. Some of the simplest best Nisbet, Robert, John Melder, and Gary Miner. Handbook of Statistical
practices can minimize fraud opportunities and improve fraud detec- Analysis & Data Mining Applications. Oxford: Elsevier, 2009. Print.
tion and prevention. Non-profit organizations should also consider
red flags and other proven fraud predictors in the fight against Nonprofits Not Immune to Fraud. EisnerAmper Accountants and
fraud. These organizations may benefit from the use of analytical Advisors. EisnerAmper, 22 Apr. 2010. Web. 26 Feb. 2014. http://
methods, commercial software, and other analytical applications that www.eisneramper.com/non-profits-fraud-0410.aspx
can detect prospective fraud and avoid the unnecessary related losses.
Even in an atmosphere of trust, non-profit organizations can be more Keller & Owens, LLC. Preventing and Detecting Fraud in Not-for-
aggressive in their fiduciary responsibility as they establish and imple- Profit Organizations. Digital file.
ment best practices, conduct regular fraud self-assessments, seek out
effective fraud detection tools and applications, and consider alterna- Association of Certified Fraud Examiners. Report to the Nations on
Occupational Fraud and Abuse. Austin: ACFE, 2010. Digital file.
tive approaches and resources to actively reduce fraud by limiting the
frequency and amount of related losses. Roehrenbeck, Cybil. Predictive Modeling: The New Frontier in
Medicare Claims Review. ABA Health eSource. 8.8 (Apr 2012). Web.
REFERENCES 8 Sep. 2013.

Fanning, Kurt M., and Kenneth O. Cogger. Neural Network Schreiber, Russ. Fighting fraud with predictive analytics and link
Detection of Management Fraud Using Published Financial Data. analysis. Healthcare Finance News. 2012. Web. 8 Sep. 2013.
International Journal of Intelligent Systems in Accounting, Finance &
Ulmer, Jin, and Kelly Noe. Embezzlement in the Library. Journal of
Management. 7 (1998): 21-41. Web. 24 Sep.2013.
Business Case Studies. 9.2 (Mar/Apr 2013): 157-163. Business Source
Gallagher, Mark, and Vaughn Radcliffe. Internal Controls in Complete. Web. 24 Sept. 2013.
Nonprofit Organizations: The Case of the American Cancer Society,
Worth, Tammy. Fraud prevention through prediction. Healthcare
Ohio Division. Nonprofit Management & Leadership. 12.3 (Spring
Finance News. 2013. Web. 8 Sep. 2013.
2002): 313-325. Web. 27 Sept. 2013.

Greenlee, Janet, Mary Fischer, Teresa Gordon, and Elizabeth Keating. RENITA E. DANDRIDGE-SHOATS is
An Investigation of Fraud in Nonprofit Organizations: Occurrences a graduate student in the Forensic Studies
and Deterrents. Nonprofit and Voluntary Sector Quarterly. 36.4 (Dec program at Stevenson University. She
2007): 676-694. ILLiad Interlibrary Loan Electronic Delivery. 7 Oct. received her B.S. degree in Accounting from
2013. Morgan State University (Baltimore, MD).
She is a Certified Public Accountant and has
Grice, Sr., John Stephen. Fraud Detection in Audits of Not-For-
worked in the private accounting sector for
Profit Organizations. National Public Accountant. 46.1 (Feb/Mar
several public and private companies.
2001): 10-15. Business Source Complete. Web. 14 Sept. 2013.

Holtfreter, Kristy. Determinants of Fraud Losses in Nonprofit Orga-


nizations. Non Profit Management & Leadership. 19.1 (Fall 2008):
45-63. Business Source Complete. Web. 13 Sept. 2013.

69

Das könnte Ihnen auch gefallen