Asia (Other)

W: www.kroll.com

E: sdemichelis@kroll.com Screen Shot 2017-12-15 at 3.00.19 pm

 

There are endless ways to identify assets, but it can be a costly exercise.

 

Corporations can face financial exposure from a variety of sources including, but not limited to, regulatory disputes, medium to large outstanding receivables, arbitration and outright internal and external frauds.

We are often approached by companies that have experienced such financial losses to assess the asset position of respondents prior (and/or during) arbitration proceedings or to assist in litigation and the identification and recovery of assets.

When it comes to identifying assets, the investigative venues and methodologies are endless and greatly depend on a number of factors, including the nature of the subject (ie, company, individual, trust, etc) being investigated; the jurisdictions involved; and the amount sought by our clients. Unfortunately, asset tracing can be a costly exercise and the amounts involved might have a direct impact on the willingness of the client to pursue recovery.

For the purpose of this article, we will describe just a few of the sources of information that can be used when an organisation is considering asset recovery:

  • Public records. Public record research is a basic stepping stone when searching for assets. Corporate filings, property registers, and media (including social networks) can be critical in assessing the subject’s direct or indirect asset holding methods.
  • Cash movement. The old mantra “follow the money” highlights one of the first places to start, especially when access to the books and records of a company is possible and when cryptocurrencies are not involved. This can provide an initial understanding as to where funds might have been transferred. Swift messages are fairly easy to review and are normally used for international transfers. In the case of former owners of acquired companies, it is not uncommon to see funds being paid to companies not linked to the business or to personal bank accounts.
  • Phone records. Reviews of itemised phone bills of the subject (both landline and company mobile phone) might provide an insight as to calls made to landlines and/or international numbers not linked to the business of the company. Granted, with the increased use of VoIP calls (eg, FaceTime, WhatsApp,) this exercise might yield little or no results.
  • Books and records. Forensic accounting reviews of books and records can provide investigative leads worth pursuing. For instance, payment of real estate agents’ fees, flights and hotels might yield an insight as to where properties might have been purchased or assets hidden.
  • Digital footprints. Individuals tend to use office computers and mobile phones for personal matters. As a result, forensic review of these devices can provide exceptional information about a subject. For instance:
  • Computers might retain (in addition to emails and deleted and active documents), internet logs, keyword searches on internet engines (eg, Google, Yahoo), chat and snippets of online mail accounts, pictures, audio files, email identifiers and contacts that can be reviewed to understand the behaviour of a subject. The purpose of this exercise is not to identify matters of a personal nature (eg, medical history), but to identify, if possible, the whereabouts of assets and names of people related or close to the subject.
  • Mobile phones can be a treasure chest of information including, among other things, messages (eg, viber, wechat, line, whatsapp, imessages, sms, etc); geolocation (ie, places frequently visited, pictures taken and uploaded, etc); and phone call mapping (ie, the ability to identify the timing, length and number of conversations with specific parties, etc).
  • HR files. Reviewing HR files is often overlooked, but this part of any investigation might provide very good leads when it comes to the identification of potential proxies, nominees, addresses, phone numbers and email addresses that can be used to unravel complex webs of companies and individuals.

In all cases, asset tracing exercises need to be supported by a clear legal strategy, sound methodology and a phased approach to increase the chances of success and keep costs under control.

 

Kroll Logo

 

 

 

 

 

By Stefano Demichelis, Principal, Investigations and Disputes

W: www.kroll.com

E: sdemichelis@kroll.com

Tags: Data Privacy, Disputes, Forensic accounting
Related Articles by Firm
Physical security key to data centre protection
Controls that prevent physical access to servers must be a fundamental component of any information security programme ...
Combating private sector corruption in Indonesia: A challenge to address in 2019
With elections just around the corner, corruption involving government and public service agencies will likely be a top issue ...
Infrastructure investment in emerging markets — mitigating the risks
Infrastructure projects in emerging markets attract investors on the back of potential returns that can outstrip yields in mature markets ...
Defeatist data security cultures no more
Organisations need to recognise that information security is a question of risk and step up defences now ..
Innovating internal investigations in today’s hyperconnected world
Data visualisation tools have emerged as a powerful resource for internal investigations ...
Why asset searches are increasing in Singapore
Parties choose to resolve their disputes in Singapore for the relative ease of enforcement of awards and judgments.
New ultimate beneficial ownership disclosure requirements: An important step in combating financial crime in Indonesia
The requirement will strengthen and amplify the anti-corruption, anti-money laundering, anti-tax avoidance/evasion and anti-monopolism efforts.
Kroll: Opaque ownership fastest-growing concern for compliance professionals
Less than 25 percent feel highly confident in their program’s ability to address these risks.
Singapore gets serious in fight against bribery and corruption
Conducting joint investigations and joint enforcement actions with foreign authorities may become a new norm ...
Global Fraud & Risk Report – 2017/18
Forging New Paths in Times of Uncertainty ...
Law firms play a critical role in the new Indian Insolvency & Bankruptcy Code
Many new reforms and regulations have been introduced to support economic growth. However, one area that was always neglected was bankruptcy law ...
Risks for investors ahead of 2018 Malaysia elections
Investors should be aware of elevated fraud and corruption risks in the lead-up to the election ...
Buyer, beware!
The final of four reports from Kroll and Liberty Asia on how to mitigate any hidden compliance and reputational risks relating to human trafficking issues …
Forewarned is forearmed
The third of four reports from Kroll and Liberty Asia on how to mitigate any hidden compliance and reputational risks relating to human trafficking issues …
Crime vs. Ethics: Changing corporate culture to reduce modern slavery
The second of four reports from Kroll and Liberty Asia on how to mitigate any hidden compliance and reputational risks relating to human trafficking issues …
Reducing and removing involvement in modern slavery
The first of four reports from Kroll and Liberty Asia on how to mitigate any hidden compliance and reputational risks relating to human trafficking issues ...
Related Articles
Joko Widodo re-elected: How will it affect doing business in Indonesia?
In his election campaign, Jokowi declared nine missions ...
Africa: Guinea emerging from the shadows
Recent reports from three respected international organisations sketch a relatively upbeat picture of economic prospects in the west African state of Guinea ...
Philippines: The POGO problem – Harmonising immigration, gaming and gambling
It is highly illegal to gamble in China save for a few state-run lotteries. To avoid this prohibition, gambling companies operate offshore so that they may continue catering to Chinese nationals who play casino and e-games online ...
Related Articles by Jurisdiction
Avoiding data breaches and managing them if they happen
As the risk of a data breach has rapidly increased with constantly changing technology, businesses have to address the issue now.
A roadmap for response and remediation
Cybersecurity professionals are no doubt familiar with the oft-repeated adage that there are only two kinds of companies — ‘those that have been breached’ and ‘those who do not know it yet’ ...
Keeping track of sanctions
Governments around the world are increasingly using economic sanctions and embargoes as a foreign policy tool ...
Latest Articles
Joko Widodo re-elected: How will it affect doing business in Indonesia?
In his election campaign, Jokowi declared nine missions ...
Africa: Guinea emerging from the shadows
Recent reports from three respected international organisations sketch a relatively upbeat picture of economic prospects in the west African state of Guinea ...
Keeping track of sanctions
Governments around the world are increasingly using economic sanctions and embargoes as a foreign policy tool ...