Page 179 - Deception at work all chapters EBook
P. 179

180 Deception at Work

Nature of information                                     Comments

                          Previous statements on the subject

Statements                                                Interview preparation
Interview notes                                           To detect conflicting evidence

Covert inspections

Of the suspect’s home(s)                                  Estimate of price
                                                          Building works
                                                          Cash spending

Of the suspect’s office                                    Analyse these carefully
Analyse an image copy of his computer (if company owned)  Extract ‘key points’
                                                          Add to the diary of events

    In important cases, examine the suspect’s financial and domestic position, as these often
establish his motive. It is also essential that you carefully analyse any explanations given by
the subject. Important facts should be thoroughly checked and discrepancies should be sched-
uled as ‘key points’ so that they can be presented to him at the appropriate time.

ON SMALL DETAILS                               home revealed that he was living well
                                               beyond his means (and in one case a man on
Background analysis of the type suggested      £25,000 a year had a £120,000 sports car
in Table 5.8 has thrown up some critical       parked on his drive). In other cases vacation
clues and evidence. In a number of cases,      addresses turned out to be a villa owned
suspects had authorized payments to            by a supplier. And in the most surprising
fictitious vendors in the maiden names          case of all, involving manipulation of an
of their wives, to ex-employees who            electronic payments system, the suspect
mysteriously appeared as vendors               had noted the method of fraud used as well
immediately after the suspect joined the       as incriminating memory dumps in copies of
victim employer or at addresses owned          procedure manuals issued to him
by a family member or at one of their own
previous addresses. Inspection of a suspect’s

    An argument is sometimes put forward – based on a misinterpretation of the Data Protec-
tion Act – that information from personnel files cannot be accessed. This is incorrect and
any data – even the most personal – can be used for the purpose of preventing and detecting
crime.

PREPARE A DOSSIER ON SUSPECT COMPANIES

Prepare a full dossier on the background of each suspect company, extracting details from:

• official files, showing names of directors, shareholdings, annual accounts etc.;
• credit agencies, such as Dunn and Bradstreet or Experian;
• bank references;
• trade directories;
   174   175   176   177   178   179   180   181   182   183   184