Tag Archives: hidden assets

Basic Cash Concealment Strategies

One of the topics in which readers of this blog have expressed consistent interest over the years regards the many strategies of cash asset concealment employed by fraudsters; especially by embezzlers of relatively small sums from employers, who seem particularly creative at such manipulations.  Regardless of the method used to hide ill-gotten assets, one fact remains constant; proceeds from illicit activities must be disguised in some way to avoid being discovered. Those the ACFE dubs ‘asset hiders’ have developed many sophisticated techniques for working the system and accomplishing the goal of concealing their gains; in attempting to track down and recover secret stores of cash, the fraud examiner is presented with a true challenge, and the first step in meeting this challenge is to understand how asset hiders work. This post will concentrate on the concealment of raw cash.

There are three primary ways to hide cash assets. They are:

— Currency hoards;
— Cashier’s checks and traveler’s checks;
— Deposits to financial institutions.

The most basic method for hiding cash is the currency hoard, in which a person simply stores cash in a hidden location, usually in his or her home or on her property. This is the proverbial ‘cash under the mattress’ technique. In a typical home, hiding places for currency or other valuables can range from the obvious to the ingenious.

For example, precious metals and jewelry can easily be hidden in a layer of cooking grease at the bottom of a pot. The space beneath the bottom drawer of bureaus, chests, and cabinets is also a commonly used hiding place. Loose bricks in the wall or fireplace can disguise small spaces for hiding things. A more complex scheme is to build a false ceiling below the original ceiling and then use the space between the two as a hiding place.

Another place to hoard currency is in furniture. The hollow spaces of upholstered furniture make these pieces a good hiding place. Many people find false bottoms in drawers or inside stereo speakers useful places for hiding cash.

The basic structure of the home itself provides many opportunities for creating hiding places. One of the most common spots for hiding objects is in the walls. Cunning hiders may construct false walls in closets or pantries, or they may build large cavities into a wall, which is then covered with a mirror or a painting. Installing false light switch plates and electrical outlets provides easy access to spaces between walls and generally appear quite normal, although amateurs often leave tell-tale marks on the plate screws. These marks often provide searchers with signs of tampering and can lead to the discovery of a cache. An even simpler method is to hide currency inside the electrical boxes behind real electrical plates. If a larger space is needed, hiders sometimes remove the box from the wall and build a shelf below it. Significant amounts of currency can be hidden in these spaces. Currency hoards can also be hidden above ceiling light boxes in the space below the attic.

The plumbing system provides other natural hiding places. For example, many bathrooms have access holes under the sink, which are usually covered with a removable chrome disk. These access holes are designed so a cleaning ‘snake’ can be inserted into the main drain when the lines are clogged. This space is easily utilized as a hiding space. Floor drains are also used for hiding currency. Excellent hiding places can be created by installing false pipes that appear to be part of the home’s plumbing. Some individuals hide objects and money in shower curtain rods. Other places frequently used for hiding are air ducts, doors, and stairways. Heating and cooling system ducts are generally easy to access and have plenty of empty space. Hollow core doors are easily rigged for hiding. The top surface of the door can simply be cut away, allowing access to the natural secret compartment inside. Enclosed staircases have dead space underneath that is accessible. If the staircase is not enclosed, there may be usable space for small objects behind each of the risers. Stairs can be hinged, creating a hidden compartment underneath.

Cashier’s and traveler’s checks are another method used to hide assets. These instruments are useful for several reasons:

–They allow asset hiders to easily disguise their financial dealings from asset seekers like law enforcement, CFEs and forensic accountants;
–They help disguise the asset hider’s financial dealings and reduce the amount of currency physically carried;
–Cashier’s checks or traveler’s checks in denominations of less than $10,000 are negotiable financial instruments that can be exchanged almost any place in the world.

Whilst efforts to control the use of wire transfers for money laundering have traditionally been focused on banks, examiners also need to be aware that there are non-bank money transmitters that fraudsters often use to conceal cash assets.  These non-bank transmitters specialize in money transfers for individuals rather than businesses. In addition to other services, most non-bank transmitters sell money orders and traveler’s checks. These companies range from large international enterprises like Western Union to small mom-and-pop neighborhood check cashing businesses.

There are several reasons fraudsters like using non-bank transmitters. First, non-bank transmitters allow individuals to cash personal checks or wire money to family members nationally or in other countries. Check cashing companies and other sellers of money orders, such as convenience stores and grocery stores, provide a much-needed service to people without bank accounts. Second, non-bank transmitters allow individuals to obtain many individual traveler’s checks and money orders in amounts less than $10,000 each. Most states regulate check cashing and the sale of money orders with licensing and bonding requirements. The Money Laundering Suppression Act of 1994 required all money transmitters to register with the U.S. Department of Treasury. Furthermore, like other financial institutions, these businesses are required to file currency transaction reports (CTRs) for transactions of $10,000 or more in currency and coins, and they are required to file Suspicious Activity Reports (SARs) with the Treasury Department for certain classes of suspect transactions.

Check cashing companies have been known to receive illegally earned or stolen currency and use it to cash legitimate checks for their customers, thus avoiding CTRs or to structure transmittals by issuing multiple traveler’s checks and money orders for less than $10,000 each. Third, the transactions of non-bank transmitters will not trigger a mechanism for identifying unreported cash. Although money transmitters are classified as financial institutions, they are not depository institutions but operate through accounts with commercial banks. And, unlike bank accounts, which contain copies of deposits and canceled checks used in locating assets, non-bank money transmitters do not maintain copies of deposits and canceled checks. Unless the money order or traveler’s check appears in the financial records of the asset hider, it will likely go undetected since there is no place for the investigator to begin a search. However, once a money order or traveler’s check has been specifically identified, it can be traced back like any other financial instrument.

Banks and other financial institutions are frequently utilized by secrecy seekers as vehicles for hiding or disguising currency. The methods used may be as simple as renting a safe-deposit box and storing currency or valuables inside.  Searching the safe-deposit box of a suspected embezzler for evidence is not easily accomplished. It requires a court order. But; even if access to the box is denied, the investigator in a hidden asset case can often make educated guesses as to the contents by observing the movements of the hider. For instance, if the subject makes a visit to her safe-deposit box after attending an antique jewelry collector’s exposition, the examiner could surmise a collection of jewelry items is stored therein. Trips made to a safe-deposit box before foreign travel may indicate that the hider is moving money from his or her native country to a foreign location.

The banking system is, without question, the most important vehicle of both lawful and unlawful financial transactions. While most bankers are not active participants in asset hiding, it can be extremely difficult to distinguish between legitimate transactions and those conducted by secrecy seekers. Some bankers even prefer to close their eyes to the sources of their deposits and, in doing so, knowingly accept tainted funds. It’s important to understand how secrecy seekers use bank deposits and funds transfers to hide assets.  For the examiner, it’s important to know that most large banks have computer programs that can retrieve a specific wire transfer record. Many medium-sized banks cannot electronically retrieve specific wire data more than a month old, and some banks would have to search manually for records. However, even small banks usually send their international money transfers through one of the large Money Center banks, thus creating a record. Many large banks have enhanced their record-keeping systems to assure themselves and bank regulators that they are in full compliance with the Bank Secrecy Act. Some institutions have systems that monitor the wire transfer activity of certain accounts and generate periodic reports highlighting the consolidation of incoming wires followed by an outgoing wire transfer. Most of these systems are designed to monitor only customer accounts and do not record funds transfer services provided for non-depositors for which the bank serves only as an intermediary.

To conduct a successful wire transfer search, the examiner should have as much information as possible relating to the transfer in question when contacting the appropriate entity. Having the following information on hand will help make the search much more efficient:

— Date of transfer
— Amount of transfer
— Names of sending and receiving institutions
— Routing numbers of sending and receiving institutions
— Identity of sender and designated receiver
— Input sequence and/or output sequence

While most banks do not actively participate in fraudulent transfers, some signs for the examiner that could indicate collusion between a bank and its customer are:
— Allowing clients whose funds are not of foreign origin to make investments limited to foreigners;
— Acting without power of attorney to allow clients to manage investments or to transmit funds
on behalf of foreign-registered companies or local companies acting as laundries;
— Participating in sequential transactions that fall under the government reporting thresholds;
–Allowing telephone transfers of funds without written authorization and failing to keep a record of such transfers;
— Entering false foreign account number designations with regard to wire transfers.

Living Underground


Register Today for Investigating on the InternetMay 18-19 2016 RVACFES Seminar!

The first signs that the tide may be turning in the world-wide battle against corruption appear to be upon us.  Issues surrounding the growing international Panama Red movement and the scandal of secret money have thrown a spotlight on what’s called the underground economy.

The underground economy is a group of clandestine transactions that create financial value, but are conducted with the intention of escaping something — primarily taxes, but also revelation of bribes, government regulations, exchange controls, or criminal prosecution.  The ACFE has been telling us for years that the underground economy exists for four primary reasons:

— to escape taxation;
— to escape regulation;
— to escape prohibition;
— to further corruption.

Because all of these activities are illegal and the individuals involved in them want to escape detection, the underground economy operates on secret money. Economists have attempted to determine the exact size of the international underground economy, but have, thus far, met with limited success because the main premise of the underground economy is that income is not reported. In the early 2000’s, India, the United States, Canada, Russia, Nigeria, and Italy were believed to have the largest underground economies in the world. According to estimates, the underground economy in the United States has grown significantly, totaling as much as $2.25 trillion annually. Today, most observers in the United States estimate that ten percent of the actual Gross Domestic Product can be attributed to criminal activity.

The underground economy in the United States (as it does to the tax collection efforts in other developed economies) is undermining the effectiveness of the Internal Revenue Service, which is highly dependent on employee’s withholding taxes. If the IRS could collect all of the taxes that it says it is owed from the underground economy, then the current budget deficit would decrease overnight. The IRS has estimated that its tax gap, the estimated amount of taxes owed minus the amount collected, is around $600 billion in any given year. The gap number measures only a portion of the underground economy. Because the number is extrapolated from audited returns, it makes no allowance for criminal enterprises that report no income, and it even fails to capture some typical varieties of non-reporting. This gives just some idea how much the underground economy is costing the U.S. economy alone.

In response to these issues, the IRS developed the Criminal Investigative Unit. This unit serves the American public by investigating potential criminal violations of the Internal Revenue Code and related financial crimes in a manner that fosters confidence in the tax system and compliance with the law. The enforcement efforts of this unit include tax violations, money laundering, currency crimes, and asset forfeiture.

The Criminal Investigation Program Strategy falls into three interdependent categories: Legal Source Tax Crimes, Illegal Source Financial Crimes, and Narcotics-Related Financial Crimes. The Legal Source Tax Crimes Program Strategy addresses tax investigations involving taxpayers in legal occupations and legal industries. The Illegal Source Financial Crimes Program Strategy recognizes that illegal source proceeds, which are part of the untaxed underground economy, are a threat to the voluntary tax compliance system, and that failure to investigate these cases would erode public confidence in the tax system. The primary objective of the Narcotics-Related Financial Crimes Program Strategy is to reduce the profit and financial gains of narcotics trafficking and money laundering organizations that compromise a significant portion of the untaxed underground economy.

The foremost reason for the existence of the underground economy is to escape taxation, which in some countries can be more than half of a person’s yearly income. Swiss bankers have a saying, “There would be no tax havens without tax hells.” As the rate of taxation increases, so does the cost of honesty. The higher the tax burden, the more incentive people have to attempt evading those taxations. Because it’s illegal, tax evasion always involves financial secrecy. And tax evasion, as the Panama Paper’s illustrate, transcends national boundaries due to the investigative and jurisdictional limits set by each country for revenue authorities. While there is a great deal of cooperation between international governments in matters of tax evasion, there are many loopholes that make overseas transactions appealing and profitable to the secrecy seeker.

The second factor that motivates the underground economy is the desire to escape regulation. Government-imposed regulations are often perceived as hindrances to the efficient flow of business. Regulations might affect prices, wages, returns on capital, exchange rates, and so forth. As with taxes, each time a new regulation is enacted, an economic incentive is created to find a way to evade it. In many countries, parallel financial markets, also known as curb markets, are the result of stringent financial controls. These controls also give rise to parallel foreign exchange markets involving currency smuggling and transfer pricing. All of this economic activity is conducted in secrecy and is neither taxed nor reported in official statistics.

Prohibition is defined as the forbidding by law of certain activities. Avoidance of prohibitions is the third reason underground economies exist. Prohibition is usually associated with criminal activities such as narcotics smuggling and sales, prostitution, gambling, and usury (i.e., the lending of money at excessive interest rates). Most of these transactions are made with cash and are therefore extremely difficult to detect and trace.

The final reason for the perpetuation of the underground economy is corruption. Corrupt activities include bribes on public procurement contracts, customs clearance, traffic violations, zoning ordinances and building permits, investment licenses, import and foreign exchange permits, allegations of consumption, investment, and infrastructure goods that are in short supply. As the current revolt of the Mexican people against corruption illustrates, bribery is commonplace in many countries and is pervasive among public officials. Despite official laws banning bribery, the practice is sometimes an intrinsic part of a country’s cultural, political, and economic system. In these places, it is tolerated or simply overlooked.

One of the most important services fraud examiners can render to their clients and to the general public is to increase awareness of the pernicious effect on economic freedom and liberty of the underground economy phenomena, not just in the developed countries in which we primarily practice, but world-wide.