“But I don’t want to be an expert”

By David Debenham, President of the ACFI, counsel of Low Murchison Radnoff, LLP (Ottawa)

Lawyers presume that all of their professional witnesses have to be qualified as experts. Do they?

Under Rule 701 of the American Federal Rules of Evidence, a witness is not testifying as an expert, if the witness testimony is limited to one that is (a) rationally based on the witness’s perception; (b) helpful to clearly understanding the witness’s testimony or to determining a fact in issue; and (c) not based on scientific, technical, or other specialized knowledge.

Lay testimony has surprising breadth. For example, most courts have permitted the owner or officer of a business to testify to the value or projected profits of the business, without the necessity of qualifying the witness as an accountant, appraiser, or similar expert, [1]  as it is based on his knowledge and participation in the day-to-day affairs of the business). Such opinion testimony is admitted not because of experience, training or specialized knowledge within the realm of an expert, but because of the particularized knowledge that the witness has by virtue of his or her position in the business. 

In Brown[2], the court declared that the distinction between lay and expert witness testimony is that lay testimony “results from a process of reasoning familiar in everyday life,” while expert testimony “results from a process of reasoning which can be mastered only by specialists in the field.” 

The Federal Rules do not distinguish between expert and lay witnesses, but rather between expert and lay testimony. Certainly, it is possible for the same witness to provide both lay and expert testimony in a single case. [3] (law enforcement agents could testify that the defendant was acting suspiciously, without being qualified as experts; however, the rules on experts were applicable where the agents testified on the basis of extensive experience that the defendant was using code words to refer to drug quantities and prices). The amendment makes clear that any part of a witness’ testimony that is based upon scientific, technical, or other specialized knowledge is governed by the standards of expert testimony.

A summary is typically presented as a chart, summary, or calculation, often presented by the witness who prepared it and is familiar with its contents; a summary can, however, simply take the form of a witness’s oral testimony.7 There are three types of summary evidence: (1) summaries of voluminous records [4](2) pedagogical summaries of evidence allowed by the court through its discretion under Federal Rule of Evidence 61 1(a); and (3) “hybrid” summaries which perform both functions in an effort to reliably assist the factfinder. Summaries contain voluminous writings, recordings, or photographs which cannot conveniently be examined in court so they may be presented in the form of a chart, summary, or calculation.  These charts are only admissible where the underlying documents they purport to summarize would be admissible.  Although the Federal Rules of Evidence do not explicitly allow – or require – the proponent of a summary chart to have the preparer come into court as a witness to explain the chart, courts have held that such testimony

is within the broad discretion of the trial court to admit or exclude evidence. These witnesses need not be experts to sift through the documents being summarized. 

By contrast, pedagogical summaries are not evidence themselves, but are demonstrative evidence used  used merely as an aid to the jury by allowing a witness to review testimonial or other evidence that has been introduced during a trial.   These pedagogical summaries apparently serve the twin aims of (a), the efficient “ascertainment of the truth” and (b) the avoidance of “needless consumption of time.

The third category is the hybrid secondary-evidence summarizing evidence and explaining its significance to the fact finder.

In R. v. Vuong [5]the crown was prosecuting a fraud over $5,000 in relation to a large-scale investment scheme. Owing to there being no prejudice, the Court of Appeal for Ontario dismissed the appellants’ application that the trial judge erred by permitting a forensic accountant to testify as a non-expert witness. The ruling permitting the forensic accountant to testify as a fact witness was focused on a “Source and Application of Funds” Analysis. His evidence was limited to following the flow of money deposited by the various complainants through the accuseds’ bank accounts.In his report, the accountant made findings, for example, that payments to investors could only have been funded by other investor deposits. That is an opinion. He also opines that the trading was speculative and not profitable. Those are also conclusions made based on his review of the underlying facts and not just a resuscitation of the facts based on his experience and knowledge as a forensic accountant. The trial judge originally found that the opinions rendered the accountant an expert.  Then the Court of Appeal released its decision in R. v. Ajise, [6] In Ajise, the majority held that a Canada Customs and Revenue Agency (“CCRA”) investigator did not have to be qualified as an expert witness because the witness offered only factual information that did not require expertise to present and could be assessed by the jury as a matter of logic and common sense. The trial judge then reversed herself and held that the accountant could be called as a non-expert witness, so long as he not to proffer any opinion evidence at trial.

Conclusion

In your case, are you really proffering an opinion that depends on your expertise, an opinion that any lay witness could come to, or simply a summary of facts?  The answer to this question can make all the difference in the world regarding whether you testify, and how.

 

[1] R. v. Vuong and Quach, 2018 ONSC 3631 (CanLII), <https://canlii.ca/t/ht7kj>

[2] 2018 ONCA 494, 361 C.C.C. (3d) 384, aff’d 2018 SCC 51, [2018] 3 S.C.R. 301.

[3] See, e.g., Lightning Lube, Inc. v. Witco Corp. 4 F.3d 1153 (3d Cir. 1993)

[4]  836 S.W.2d 530, 549 (1992),

[5] See, e.g., United States v. Figueroa-Lopez, 125 F.3d 1241, 1246 (9th Cir. 1997)

[6] as provided in Federal Rule of Evidence 1006;

 

 

Tracing Bitcoin: Navigating the Complex Web of Digital Transactions

By Dave Oswald, Forensic Restitution

In the digital age, cryptocurrencies have emerged as revolutionary financial instruments, with Bitcoin being the pioneer. The allure of cryptocurrencies lies in their promise of financial autonomy, offering a level of anonymity and detachment from traditional banking systems. This very feature has made cryptocurrencies a subject of intense scrutiny and debate. Tracing Bitcoin transactions, therefore, is not just about understanding a digital phenomenon; it’s about navigating a complex web of technological innovation, legal frameworks, ethical considerations, and criminal activities.

Understanding the Blockchain: The Foundation of Bitcoin

The blockchain, the technology behind Bitcoin, is a public ledger that records all transactions made with Bitcoin. Each transaction is visible to anyone who accesses the blockchain, but the identities behind these transactions are encrypted. Transactions are stored in blocks, each linked to the previous one, forming a chain. This structure ensures that once a transaction is recorded, it becomes immutable, meaning it cannot be altered or deleted. This immutability makes the blockchain a trustworthy and secure technology for financial transactions.

Example: Imagine a chain of blocks, each representing a transaction or a series of transactions. When John sends 1 Bitcoin to Alice, this transaction is recorded in a block. If Alice then sends 0.5 Bitcoin to Bob, this is recorded in a new block that is linked to the previous one. Anyone can see that 1 Bitcoin was transferred from John to Alice, and then 0.5 was sent from Alice to Bob, but the identities of John, Alice, and Bob remain concealed behind their cryptographic addresses.

The Complexity of Anonymity and Pseudonymity

While transactions are transparent and traceable on the blockchain, the identities of the individuals or entities behind these transactions are not directly visible. Bitcoin operates under a level of pseudonymity where addresses identify users – strings of alphanumeric characters that do not directly reveal the user’s identity.

Example: If John’s Bitcoin address is ‘1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa’, and he sends Bitcoin to Alice’s address ‘3J98t1WpEZ73CNmQviecrnyiWrnqRhWNLy’, anyone looking at the blockchain can see the transaction but cannot inherently know that John sent funds to Alice.

The Role of Advanced Analytical Tools in Tracing Bitcoin

Despite the pseudonymity of Bitcoin transactions, various analytical tools and techniques have been developed to trace these digital trails. One such method is cluster analysis, which groups together Bitcoin addresses based on transactional behaviours, potentially linking them to the same owner.

Example of Cluster Analysis: If a group of addresses frequently interact with each other and have similar transaction patterns, they might be controlled by the same entity. For instance, if addresses A, B, and C frequently transact with each other, and one of these addresses is later identified to belong to a particular individual or entity, there’s a possibility that the same individual or entity also controls the other addresses in the cluster.

Forward and Backward tracing

Tracing Bitcoin in the context of a known fraudulent transaction, such as a ransomware attack, exemplifies the power and complexity of blockchain analysis. When a ransom is paid to a hacker’s wallet, investigators begin to trace the funds. A forward trace is conducted from the hacker’s wallet, following the digital breadcrumbs as the ill-gotten gains are moved, possibly through various addresses, in an attempt to obscure their origin. This forward tracing can reveal the network of wallets involved and identify withdrawal points where the funds are converted into fiat currency or other assets. Concurrently, a backward trace from the identified wallets can be just as revealing. It can uncover a pattern of transactions leading back to the hacker’s wallet, potentially unveiling a broader web of victims who might have been exploited in the attack. This dual approach of tracing not only sheds light on the perpetrator’s attempt to launder the ransom but also helps in piecing together the scale of the attack, offering insights into the number of victims and the total sum extorted, thus painting a fuller picture of the cybercriminal’s operation.

The Use of Mixers and Tumblers: Complicating the Trace

To enhance privacy, some users employ services like mixers or tumblers. These services obfuscate the trail of Bitcoin by pooling together funds from multiple addresses and redistributing them, making it more challenging to trace the original source of the funds.

Example of Mixing Services: John sends 1 Bitcoin to a mixing service, Alice sends 2 Bitcoins, and Bob sends 3 Bitcoins. The mixer pools the 6 Bitcoins and then redistributes them such that John receives 2 Bitcoins, Alice receives 3 Bitcoins, and Bob receives 1 Bitcoin, but not from their original inputs. This process obscures the trail of individual Bitcoins, making it difficult to trace the path from sender to receiver.

Legal and Regulatory Frameworks: The Evolving Landscape

The pseudo-anonymous nature of Bitcoin has attracted privacy-conscious individuals and those involved in illicit activities. This has prompted governments and regulatory bodies worldwide to develop legal frameworks to monitor and regulate cryptocurrency transactions.

Example of Regulatory Action: In a bid to combat money laundering, the European Union’s Fifth Anti-Money Laundering Directive (5AMLD) requires cryptocurrency exchanges and wallet providers to implement strict Know Your Customer (KYC) and Anti-Money Laundering (AML) procedures. This includes verifying the identity of their users and monitoring transactions for suspicious activities.

Law Enforcement and Blockchain Analytics

Law enforcement agencies and private firms specializing in blockchain analytics use sophisticated software to analyze the blockchain and detect suspicious patterns. These tools can link pseudonymous addresses to real-world entities, aiding in criminal investigations.

Example of Law Enforcement Action: The U.S. Federal Bureau of Investigation (FBI) has successfully traced Bitcoin transactions in various cases. In the infamous Silk Road case, law enforcement shut down the dark web marketplace and traced millions of dollars worth of Bitcoin transactions to the site’s operator, Ross Ulbricht, leading to his conviction.

Privacy Concerns vs. The Need for Regulation

The ability to trace Bitcoin transactions raises significant privacy concerns. Privacy advocates argue that financial privacy is a fundamental right and worry that tracing Bitcoin could infringe upon personal freedoms.

Example of Privacy Concerns: In a hypothetical scenario, if John donates Bitcoin to a controversial cause or organization, the ability to trace his transaction could potentially expose his personal views or affiliations, leading to social or legal repercussions, especially in countries with repressive regimes.

The Future of Bitcoin Tracing

The future of Bitcoin tracing will involve a delicate balance between enhancing privacy measures and developing more sophisticated tracing methodologies. As regulatory frameworks evolve and integrate cryptocurrencies into the traditional financial system, standardized approaches to monitoring and tracing digital assets may emerge.

Example of Future Developments: Innovations in privacy-enhancing technologies, like Confidential Transactions or Mimblewimble, could further obscure transaction details on the blockchain. In response, regulatory agencies might develop more advanced analytical tools or collaborate with cryptocurrency platforms to ensure compliance with AML and KYC regulations, striking a balance between privacy and transparency.

In conclusion, tracing Bitcoin transactions is a complex endeavour that sits at the intersection of technology, law, ethics, and finance. While the blockchain provides a level of transparency, the mechanisms of pseudonymity, privacy-enhancing technologies, and regulatory efforts add layers of complexity to the tracing process. The evolving nature of cryptocurrencies and their regulatory environment suggests that the field of Bitcoin tracing will continue to adapt and evolve, representing a pivotal aspect of the ongoing discourse surrounding digital currencies and their place in the modern financial landscape.

https://forensicrestitution.com/

 

 

Fraud Schemes to Watch Out for in 2023: A Guide for Businesses

By Dave Oswald, Forensic Restitution

With the ever-evolving landscape of the business world, accounting and financial professionals must stay vigilant in their efforts to detect and prevent fraud. The COVID-19 pandemic has further accelerated this trend, with remote work, digital transformation, and economic uncertainty all presenting new risks for companies. In this blog post, we’ll explore five of the most common and pressing fraud schemes that organizations need to be aware of in 2023.

Cyber Fraud:
Cyber fraud has been on the rise for several years, and it’s only becoming more prevalent with the increasing dependence on technology and remote work. From malware and ransomware to password cracking and phishing scams, cyber criminals have a range of tools and techniques at their disposal. This year, companies must be particularly vigilant in their cybersecurity efforts, as fraudsters are likely to take advantage of the ongoing pandemic to target businesses and individuals alike.

Vendor and Seller Fraud:
Fraud by vendors and sellers is another common type of financial crime. From fictitious billing to duplicate invoice payments and check tampering schemes, it’s essential that organizations remain aware of these schemes and have processes in place to detect them. This year, it’s more important than ever to work closely with suppliers and ensure that they are adhering to best practices and established protocols.

Payment Fraud:
Payment fraud continues to be a major concern, with false transactions, lost or stolen merchandise, and false requests for refunds all falling under this umbrella. Companies must be proactive in their efforts to detect and prevent payment fraud, using data analytics, fraud investigation techniques, and computer-aided auditing methods to uncover any irregularities.

Healthcare Fraud:
Healthcare fraud is a significant issue, with schemes ranging from billing for services not rendered to misrepresenting the provider of service. In this year, it’s essential to have robust internal controls and a well-trained staff to identify and prevent healthcare fraud. Certified Professional Accountants (CPAs) can play a critical role in detecting and preventing healthcare fraud, leveraging their expertise in financial analysis and investigation to uncover any fraudulent activity.

Identity Theft:
Identity theft is a growing concern, with two main types: traditional identity theft and synthetic identity theft. Traditional identity theft involves a criminal stealing an individual’s personal information, while synthetic identity theft involves a fraudster using a combination of real and fabricated information to create a new identity. This year, organizations must remain vigilant in their efforts to protect sensitive personal information and ensure that their cybersecurity measures are up to date.

Combating fraud requires a multi-disciplinary approach, leveraging the expertise of accounting, financial, and legal professionals, along with the use of advanced data analytics techniques. With these tools and techniques, organizations can better detect and prevent fraud, reducing their exposure to financial crime and other risks. To stay ahead of the curve, companies should invest in the training and development of their staff, ensuring that they have the skills and knowledge necessary to detect and prevent fraud in the business world of 2023.

For more articles from Forensic Restitution, check out their blog Forensic Insights

 

 

 

 

How to get the Opportunist Fraudster to Confess

By David Debenham

In our paper last month, we found that the difference between those who committed opportunistic fraudsters were more likely to be overconfident to pull off a fraud than those who might actually have the ability to do so, but who feared all of the “unknown-unknowns” that could catch them out.   These overconfident people falsely transfer their brilliance in one field into their abilities in fields they know nothing about such as fraud.  Their body language, vocal tone, and rates of participation suggest confidence because of this false transference. This means that these overconfident individuals speak more often, speak with a confident vocal tone, provided more information and answers, and acted calmly and relaxed as they work with their peers in the midst of perpetrating a fraud. In fact, overconfident individuals were more convincing in their displays of ability than individuals who were actually highly competent in their tasks, who, when questioned, become nervous when their conduct is called into question.  The over-confident do not say “I’m really good at this.” Because for them they are past that stage: Instead, they led their “ability” speak for itself as they explain in great detail what they do, and how they do it, in a calm and relaxed way.’  These status seekers who believe their competence at coding transfers into their ability to play poker, chess, or commit fraud, will want to demonstrate this by simply participating more and exhibiting more comfort with any task you put to them, and that is the key to catching them out.  [1]

The key is to enlist the fraudster’s advice in solving the various issues in your case, much as Columbo does in virtually every episode.   So long as you don’t appear to be as capable as the suspect (and how could you be considering their status and yours?) you can simply pose a serious of problems and let the fraudster solve them for you, all the while incriminating himself. Consider Columbo’s “Bye-bye Sky High IQ Murder case”. Genius accountant Oliver Brandt has been embezzling funds in order to keep his high-maintenance wife in fine frocks and tropical getaways. His business partner Bertie Hastings has just found out – and he must be killed.  Oliver shoots him and rigs an umbrella to take the murder weapon up a chimney. He puts a heavy dictionary on the arm of a chair, balancing precariously.  Oliver then starts a record player playing by pushing the start button, which eventually leads to the sound of two shots fired sometime later when Oliver is safely ensconced in a room full of witnesses who have just entered the adjoining room.  The sound of a body falling between the two shots alarms the witnesses.   The group runs into the room to see Bertie shot. In the confusion Bertie pockets the Dictaphone. Later Oliver recovers the umbrella and disposes of the murder weapon.  Columbo asks if the record had the shots. Of course not.  There were caps in the umbrella that were exploded as soon as the arm of the record player moved.  So too the dictionary was pushed off the arm of the chair by the movement of the arm of the record player, so in sequence it was cap explosion, dictionary fall (“the body”), and second cap explosion. At each stage Columbo suggests a hypothesis and the overconfident “high IQ” Oliver sets him straight, until at the end there is no more mystery to resolve.  Interview technique has outwitted the overconfident murder.   So too, for you.  Enlist the overconfident fraudster to incriminate himself.

[1] https://newsroom.haas.berkeley.edu/why-are-people-overconfident-so-often-it%E2%80%99s-all-about-social-status/