Phil Beckett discussing effective investigations for fraud and money laundering - Global Banking & Finance Review
Phil Beckett from Proven Legal Technologies emphasizes the importance of effective investigations in light of new sentencing guidelines for fraud, bribery, and money laundering offences.
Business

HOW TO EXECUTE EFFECTIVE INVESTIGATIONS IN WAKE OF NEW SENTENCING GUIDELINES FOR FRAUD, BRIBERY AND MONEY LAUNDERING OFFENCES

Published by Gbaf News

Posted on November 4, 2014

5 min read

· Last updated: November 1, 2023

Add as preferred source on Google

Phil Beckett, partner at Proven Legal Technologies – the corporate forensic investigation and e-disclosure firm, discusses how firms must take steps towards preparing for and carrying out an effective investigation themselves, following new sentencing guidelines for fraud, bribery and money laundering offences. Beckett also highlights the importance of understanding how to manage data during an investigative process.

Understanding the New Sentencing Guidelines

On 1st October 2014, new guidelines for fraud, bribery and money laundering offences came into effect. The guidelines outline the sentencing ranges for these offences, depending on their level of seriousness. It is encouraging to see that the guidelines continue to emphasise the significance of these crimes. When this is combined with the prosecutorial approach that David Green is advocating for the Serious Fraud Office (SFO), there is a clear consistent message from policy makers for companies to take these offences very seriously indeed.

However, given the current priorities of the relevant law enforcement agencies, unless the size or characteristics of the alleged offence demands it, the investigation is often left to companies themselves to carry out. For this reason, firms must take steps towards preparing for and carrying out an effective investigation alone. For the inexperienced, investigations can be full of complex procedures and stress. Consequences of an investigation could include legal responsibilities, admissibility of evidence, strain on human resource, potential bad PR and the simple fact that investigations can dramatically distract management from day-to-day operations.

Communications evidence

Phil Beckett (Proven Legal Technologies - Good Governance Group)

Phil Beckett (Proven Legal Technologies – Good Governance Group)

Collecting and Analysing Communications Evidence

The key to investigating allegations often lies in evidence that is housed on computers and emails. This evidence not only reveals ‘smoking gun’ documents, but also the communications surrounding the alleged offences. Most businesses use an array of technical devices as part of their daily routine, including laptops, personal smartphones and tablets, all of which hold a vast amount of information. Emails and other communicative means are often overlooked, but due to the details and context they can provide, they must be seen as a fundamental source of evidence in helping unravel the facts behind allegations.

Dealing with data

Top Considerations When Handling Digital Data

There are three essential considerations that must be taken on board when dealing with data during an investigation. The first being that it is important, especially given the seriousness of the offences, that a full forensic approach is followed. Not only does this ensure that any evidence or intelligence that is identified through the investigation is admissible, but it also provides access to many investigational sources that are not readily available. These include the ability to: recover deleted files, including those partially overwritten; analyse internet browsing artefacts, specifically looking at web-based communications, such as webmail and chat messages; and examine the internal-workings of the operating system to, for example, identify the use of USB devices, smartphone backups and the use of cloud-based storage.

The second consideration is that the relevant data universe must be understood. It is important to look at this from two dimensions: firstly, who is likely to hold relevant documents; and secondly, what devices they used could hold relevant information. As a minimum, the following systems need to be considered as part of an investigation: computers/laptops; smartphones/tablets; network data (home, shared and profile directories); e-mail and chat data (live and archives); back-up media (official and personal); and application/structured data.

Finally, it is paramount that appropriate intelligent tools and methodologies are used to investigate the data that is forensically captured. This is not as obvious as it sounds, as one of the paradoxes of data is that as well as containing useful and relevant information, there will also be huge volumes of irrelevant material that must be sifted. This compounded by the fact that key documents are not always obvious in isolation, especially if the suspects are aware that (a) what they are doing is wrong and (b) there is likely to be an investigation at some stage. Suspects therefore tend to use code-words or phrases, in order to not use official forms of communication and try to hide potential evidence. Therefore, it is essential that appropriate methodologies and tools are used within the investigation. This tends to lead to two streams of investigation: the first looking at documentary content and the second a forensic artefact analysis. It is critical that these tasks are not performed in isolation and that they are fully integrated into the other investigation tasks. This is so that the findings from one stream can enlighten the other.

Leveraging Technology in Investigations

Using technology intelligently

Intelligent technology also has a role to play here. Amongst other things, it allows for duplicates and near-duplicates to be ignored, the possibility of locating non-work email accounts, the identification of password protected documents and the use of linguistic clustering and concept analysis for enhanced searching. However, it is important here, not to get too distracted by technology, but to harness it so that it enhances the investigation process.

Given the seriousness of these offences, the impact they can have on an organisation and the priorities of law-enforcement, it is paramount that an organisation conducting an internal investigation does so professionally and thoroughly so they avoid any subsequent issues compounding an already significant issue.

Phil Beckett, partner at Proven Legal Technologies – the corporate forensic investigation and e-disclosure firm

Key Takeaways

  • New UK sentencing guidelines effective 1 October 2014 raised the stakes for fraud, bribery and money laundering investigations.
  • Companies may need to conduct internal investigations due to enforcement focus and resource constraints.
  • A forensic, data-driven approach ensures admissible evidence, including recovery of deleted files and analysis of emails, web, cloud and device usage.
  • Understanding the data universe—who holds data and on which devices—is crucial for comprehensive investigations.
  • Using intelligent forensic tools and methodologies is key to efficiently process captured data and derive actionable intelligence.

References

Frequently Asked Questions

When did the new UK sentencing guidelines for fraud, bribery and money laundering come into effect?
They came into effect on 1 October 2014, applying to individuals and organisations sentenced on or after that date regardless of when the offence occurred.
Why might companies need to conduct internal investigations themselves?
Because law enforcement agencies may prioritize larger or more characteristic cases, leaving smaller or nuanced allegations to be handled internally by companies.
What makes a forensic approach important in investigations?
A forensic approach ensures evidence admissibility and enables recovery of deleted files, analysis of browsing and communication artefacts, cloud use, USB activity, and other digital footprints.
What does 'data universe' refer to in this context?
It refers to identifying who might hold relevant data and which devices or systems—such as laptops, smartphones, network shares, emails, backups—could contain investigative evidence.
Why are intelligent tools and methodologies essential in investigations?
Because large volumes of captured data require advanced tools and methods to process effectively, uncover critical evidence, and support legal defensibility.

Tags

Related Articles

More from Business

Explore more articles in the Business category