Universitas Scholarium — A Community of Scholars Log In
← All Courses
Tutorial Course

Forensic Accounting

Led by Felix Aubrey Sharpley Simulacrum

8 modules 8 modules · ~13 hours Accounting & Business Updated yesterday

Eight tutorials on forensic accounting — the discipline of investigating financial irregularities, quantifying their consequences, and presenting findings in legal proceedings. Sharpley Simulacrum leads — a former Metropolitan Police fraud-squad detective inspector who retrained as a chartered accountant and now runs a forensic practice. The course covers the fraud triangle and red-flag analysis, investigation methodology and asset tracing, quantification of loss, money laundering and financial crime, the expert witness role under the Civil Procedure Rules, working with police and SFO investigations, and report-writing and giving evidence in court. Stage 3 of the Accounting & Finance (UK) programme.

Courses are available to holders of a paid pass or membership. See passes & membership →

Forensic Accounting …1Fraud Red Flags and …2Investigation Method…3Quantification of Lo…4Money Laundering and…5Civil Litigation Sup…6Criminal Investigati…7Reporting and Giving…8
  1. Module 1 ○ Open

    Forensic Accounting · Foundations and Engagement Types

    Led by Felix Aubrey Sharpley Simulacrum

    The question

    An introduction to forensic accounting — what it is, how it differs from audit and police work, and the engagement types that structure the discipline. Sharpley Simulacrum covers the five engagement contexts (internal investigation, civil litigation, criminal prosecution, insolvency support, regulatory), the legal-privilege framework around investigative work, the ACFE fraud taxonomy, the fraud triangle (Cressey 1953) and fraud diamond (Wolfe and Hermanson 2004), and the empirical baseline of fraud detection from the ACFE Report to the Nations.

    Outcome

    The student can articulate the forensic accountant's role and how it differs from audit and police work; can identify the appropriate engagement type for a stated factual scenario; and can frame an engagement letter for a hypothetical investigation. (Forensic accounting foundations)

    Practice scenarios

    Engagement Letter for an Internal Investigation

    You frame the engagement letter and 7-day work plan for an internal investigation into £180k of unusual reimbursement patterns on a regional director's expense account at a UK-listed retail group. The work tests whether you can structure scoping, conflict checks, fee terms, legal-privilege framing, and an initial work plan defensible to the general counsel under timeline pressure.

    Your goals

    • Frame the engagement letter: parties (Sharpley Forensic Associates and the law firm acting on behalf of the corporate); scope (investigate the regional director's expense claims for the past 24 months; identify any unauthorised or fraudulent claims; quantify; advise on next steps); fees (hourly rates, weekly cap, expenses); confidentiality (recipient list; legal privilege coverage by working under solicitor instruction); conflict check (confirm no audit relationship with the corporate); deliverable (interim report at week 4; final report at week 8); legal-privilege framing (litigation privilege if proceedings contemplated; otherwise legal-advice privilege via solicitor instruction).
    • Frame the 7-day initial work plan: Day 1 — onboarding, access to expense system, interview with internal audit. Day 2 — extract 24 months of expense claims for the subject director and 5 peer directors as control. Day 3 — pattern analysis (Benford's Law on amounts, time-of-submission analysis, supplier concentration, round-number frequency). Day 4 — supplier verification (Companies House lookups, website checks, address checks, beneficial-ownership). Day 5 — document review (claims, supporting receipts, approvals). Days 6–7 — preliminary findings and interim summary for the general counsel.
    • Identify the legal-privilege strategy: the investigation is *prospectively* litigation-related (the corporate may pursue recovery, dismissal, or criminal referral); ensure that all written work product is marked privileged and addressed to the solicitor; conduct interviews with the solicitor present; keep the working file separate from any audit working file.
    • Frame as a 1,200-word response to the general counsel.
  2. Module 2 ○ Open

    Fraud Red Flags and the Fraud Triangle in Operation

    Led by Felix Aubrey Sharpley Simulacrum

    The question

    Fraud red flags and the analytical techniques that surface them. The module covers the four-layer red-flag framework (transaction profile, counterparty profile, temporal pattern, statistical pattern), Benford's Law as a leading-digit anomaly test, the typical red-flag patterns by scheme type (expense fraud, billing fraud, payroll fraud, financial-statement fraud), modern data-analytics tools (IDEA, ACL, Power BI, Python pandas), and the integration with whistleblowing infrastructure as the single most consequential anti-fraud control.

    Outcome

    The student can identify the fraud-triangle conditions in a described scenario; can apply Benford's Law to a dataset of transactions and interpret the chi-square result; and can structure a red-flag analysis plan for a typical forensic engagement. (Fraud red flags and analytics)

    Practice scenarios

    Benford's Law on Halberd Procurement Data

    You analyse a year of procurement transactions from a UK retail group's procurement subsidiary using Benford's Law and identify a leading-digit pattern consistent with threshold-avoidance kickback arrangements. The work tests whether you can interpret the chi-square result, recommend the next supplier-concentration analytical step, and resist a defensive head-of-procurement's challenge that *Benford is just one statistical test*.

    Your goals

    • Compare observed vs expected: digits 1–3 under-represented (24% vs 30%; 16% vs 18%; 13% vs 13% — first two materially low); digits 4 and 5 over-represented (11% vs 10%; 12% vs 8%); digits 6–9 in line with expectation.
    • Calculate the chi-square statistic: Σ ((observed − expected)² / expected) summed across the 9 digits; with 8 degrees of freedom; compare to critical value at 95% (15.51) and 99% (20.09); the result here would likely be significant (the digit-5 over-representation alone contributes substantially).
    • Frame the inference: the deviation pattern (low 1, elevated 4–5) is consistent with *threshold avoidance* — entries clustered just under £5,000 (a typical procurement-approval threshold) producing excess leading-4 and leading-5 amounts, with corresponding deficit in leading-1 (which would dominate amounts under £2,000 in a natural distribution).
    • Recommend the next analytical step: extract all transactions in the £4,000–£4,999 range; profile by supplier; identify suppliers concentrated in this range; cross-reference with employee expense-claim approvals; investigate suppliers with high concentration in the £4,500–£4,999 band (just-below-threshold pattern).
    • Frame as a 1,000-word analytical memo for the engagement partner.
  3. Module 3 ○ Open

    Investigation Methodology · Evidence, Interviews, Document Review

    Led by Felix Aubrey Sharpley Simulacrum

    The question

    Investigation methodology — the structured discipline of evidence preservation, document review, and interview technique. The module covers the seven steps of a forensic investigation (scoping, evidence preservation, data extraction, document review, interviews, hypothesis testing, report), modern eDiscovery and technology-assisted review, the PEACE interview model used by UK police and forensic interviewers, the contemporaneous-documentation discipline, and the chain-of-custody preservation that protects evidence for later legal proceedings.

    Outcome

    The student can plan an investigation methodology including evidence preservation, document review, and interviews; can apply the PEACE model to a witness or subject interview; and can articulate the chain-of-custody and contemporaneous-documentation discipline. (Investigation methodology)

    Practice scenarios

    Interviewing the Regional Director

    You plan and conduct the formal interview with a regional director suspected of operating a kickback scheme through three suppliers connected to his wife's brother. The work tests whether you can apply the PEACE model under realistic conditions — building from agreed facts to challenge, presenting evidence at the right moment, recording responses contemporaneously, and pausing the interview when the subject requests his own solicitor.

    Your goals

    • Plan the interview using PEACE: pre-interview prepare a topic guide covering general expense practice (build agreed-fact base) before specific suppliers; identify the key evidence to be presented at challenge stage (the three suppliers' Companies House records, the wife's-brother connection, the absence of supporting POs); set the interview at the company's solicitor's offices (neutral ground; legal-privilege protection); have the solicitor present.
    • Conduct the engage-and-explain phase: confirm interviewee identity, explain that the interview is part of a workplace investigation, confirm legal advice has been offered (employment-law context), confirm contemporaneous note will be taken.
    • Conduct the account phase: open-ended questions on his expense practice, the suppliers he typically uses, his approval process; let him commit to positions.
    • Conduct the clarification phase: probe for specifics on the three named suppliers; ask how he selected them, what services they provide, the relationship with the director-of-record.
    • Conduct the challenge phase: present the Companies House evidence, the wife's-brother connection, the missing POs; observe response.
    • Conduct closure: invite further account, summarise, indicate next steps.
    • Frame the interview as an 800-word interview-plan memo plus a 1,200-word post-interview note (illustrative based on hypothetical responses).
  4. Module 4 ○ Open

    Quantification of Loss

    Led by Felix Aubrey Sharpley Simulacrum

    The question

    Quantification of loss — the central technical work of most forensic engagements. The module covers the major quantification frameworks (direct loss, lost profits, diminution in value, restitution, reasonable royalty), the *but-for* counterfactual construction for lost-profits work, the role of contemporary forecasts and industry data as evidence, the discounting of future losses to present value, the mitigation analysis required by law, and sensitivity analysis as the standard practice. The worked example builds a five-year lost-profits quantification for a distribution-agreement breach.

    Outcome

    The student can build a lost-profits quantification using the but-for counterfactual approach; can apply discounting to future losses; can perform sensitivity analysis on the key inputs; and can articulate the difference between direct loss, lost profits, diminution, and reasonable royalty. (Quantification of loss)

    Practice scenarios

    Quantifying Lost Profits in a Distribution-Agreement Breach

    You quantify lost profits over five years for a UK distributor whose £8.2m-revenue exclusive distribution agreement was terminated in breach, including a but-for revenue projection, mitigation analysis on substitute product lines, and sensitivity analysis on growth and contract-term assumptions. The work tests whether you can build a defensible quantum number under challenge from the defendant's expert.

    Your goals

    • Build the but-for revenue projection: 2023 £11.0m (10% growth); 2024 £12.3m; 2025 £13.8m; 2026 £15.4m; 2027 £17.3m. Sensitivity: also calculate at 8% and 12% growth.
    • Apply the historical gross margin (32%) to project but-for gross profit by year.
    • Subtract the product-line-specific operating costs (the *avoidable costs* — staff and marketing genuinely tied to these products): £1.4m/year × 5 = £7.0m.
    • Calculate but-for operating profit by year: 2023 £2.1m; 2024 £2.5m; 2025 £3.0m; 2026 £3.5m; 2027 £4.1m. Total but-for profit £15.2m.
    • Calculate actual operating profit on the substitute lines: 22% margin × volume profile × less avoidable costs = approximately £6.5m over 5 years (lower margin, slower ramp).
    • Net loss before discounting: £15.2m − £6.5m = £8.7m.
    • Apply discount: assume 5% discount rate for future periods; PV adjustment reduces total to ~£7.6m.
    • Apply a *contract-term* sensitivity: the agreement had no fixed term but could have been terminated on 12 months' notice in good faith; this affects the recoverable period; calculate the alternative on a 1-year-only loss basis (~£1.8m) for the court's consideration.
    • Frame the quantification as a 2,000-word section of the expert report including sensitivity analysis and explicit assumption disclosure.
  5. Module 5 ○ Open

    Money Laundering and Financial Crime

    Led by Felix Aubrey Sharpley Simulacrum

    The question

    Money laundering and the UK financial-crime framework. The module covers the three-stage canonical model (placement, layering, integration), the typology (cash-business, trade-based, real-estate, shell-company, crypto, professional-services laundering), the principal UK statutes (POCA 2002, MLR 2017, Criminal Finances Act 2017), the FCA's expectations of regulated firms, the SAR regime and the DAML defence, the post-Russia-sanctions expansion of the financial-crime perimeter, and the forensic role across compliance review, SAR investigation, regulatory enforcement support, and POCA proceedings.

    Outcome

    The student can articulate the three stages of money laundering and the UK regulatory framework; can identify the customer-due-diligence obligations of a regulated firm under MLR 2017; and can structure a forensic AML investigation in response to a SAR or regulatory inquiry. (Money laundering and financial crime)

    Practice scenarios

    Investigating a Suspicious Transaction at a UK Bank

    You investigate a suspicious-transaction pattern at a UK retail bank — £4.2m in 11 wire transfers from Latvian banks to a UK property-investment company with Russian-Belarusian beneficial owners, used for cash purchases of London residential property. The work tests whether you can apply the placement-layering-integration model, recommend immediate SAR and DAML actions, and defend the investigation against a relationship-manager's pressure to *trust the introducer*.

    Your goals

    • Apply the placement-layering-integration model: this case shows clear *integration* (funds emerging as UK property purchases) following *layering* (Latvian-bank intermediation, multiple counterparties).
    • Identify the regulatory questions: was the original CDD adequate (likely no — *family business in Russia* is not adequate source-of-wealth documentation); was the EDD applied (was the customer correctly classified as high-risk given the jurisdictional link); should the relationship have been terminated or further EDD applied as the activity escalated.
    • Recommend immediate actions: (1) suspend further activity on the account pending investigation; (2) file SAR with the NCA describing the pattern; (3) consider DAML application before completing any pending property transactions; (4) engage external counsel; (5) freeze the customer relationship within sanctions-screening protocols (check for OFSI sanctions designation against UBOs).
    • Recommend the longer-term forensic procedures: counterparty UBO verification (using corporate registries, OFAC and OFSI lists, beneficial-ownership databases like Open Ownership); transaction-pattern analysis across the customer's complete account history; review of the bank's CDD documentation and risk-rating decisions; review of the relationship-manager's notes for pre-existing flags.
    • Recommend the institutional implications: thematic review of similar customers (Cypriot or Latvian intermediation, Russian/Belarusian UBO link, recent expansion of activity); FCA notification considerations.
    • Frame as a 1,500-word AML investigation memo to the head of financial crime.
  6. Module 6 ○ Open

    Civil Litigation Support · The Expert Witness under CPR Part 35

    Led by Felix Aubrey Sharpley Simulacrum

    The question

    The expert witness role under the Civil Procedure Rules Part 35 — the procedural framework within which most forensic accountants operate in UK civil litigation. The module covers the expert's overriding duty to the court (rule 35.3), the report content requirements (Practice Direction 35), the truth statement and expert's declaration, the engagement workflow from instruction through to court attendance, the experts' meeting and joint statement procedure under rule 35.12, and the discipline of resisting instructing-solicitor pressure to strengthen conclusions beyond what the data supports.

    Outcome

    The student can structure a CPR Part 35-compliant expert report including the truth statement and expert's declaration; can articulate the expert's overriding duty to the court and how to manage solicitor pressure; and can identify the components of the experts' meeting and joint statement procedure. (Civil litigation support)

    Practice scenarios

    Drafting an Expert Report on the Distribution-Agreement Case

    You draft an expert report under CPR Part 35 on lost profits for the distribution-agreement case from Module 4, structured for service in the High Court Commercial Court. The work tests whether you can produce a report that survives the experts' meeting, the joint statement, and cross-examination, while resisting an instructing solicitor's predictable pressure for a higher headline number.

    Your goals

    • Outline the report structure: (1) instructions and questions; (2) expert qualifications; (3) information sources; (4) facts and assumptions; (5) lost-profits methodology; (6) lost-profits quantification with sensitivity analysis (per Module 4); (7) period-of-loss analysis with the contract-term sensitivity; (8) mitigation analysis; (9) summary of conclusions; (10) range-of-opinion section addressing any reasonable alternative; (11) truth statement; (12) expert's declaration.
    • Frame the *facts and assumptions* section: distinguish facts within knowledge (the historical financials; the documentary evidence; the industry data) from assumptions (the growth rate absent breach; the discount rate; the substitute-product margin trajectory).
    • Frame the *range-of-opinion* section: identify two reasonable alternative views (the slower 8% growth scenario; the contract-term 1-year sensitivity); explain why the central estimate is preferred but acknowledge the range.
    • Anticipate the experts' meeting: identify the likely agreed points (the historical financials; the methodology of lost-profit calculation); the likely disputed points (the growth assumption; the period of loss; the substitute-product margin); prepare positions for each.
    • Address the practical pressure: the instructing solicitor has asked for *the highest defensible loss number*; respond by holding to the central estimate as the *best estimate* with sensitivity range showing both higher and lower; the solicitor may use the higher end in pleadings but the expert maintains the central estimate.
    • Frame as an 8,000-word draft expert report (illustrative — outline the structure rather than full text; key sections in detail).
  7. Module 7 ○ Open

    Criminal Investigation · Working with Police, SFO, NCA, CPS

    Led by Felix Aubrey Sharpley Simulacrum

    The question

    Forensic work in criminal investigations and the UK criminal-justice architecture. The module covers the institutional framework (police economic-crime units, the Serious Fraud Office, HMRC Fraud Investigation Service, FCA enforcement, the National Crime Agency, the Crown Prosecution Service), the procedural rules (PACE 1984, the Criminal Procedure Rules, the CPIA disclosure regime), the substantive offences (Fraud Act 2006, Bribery Act 2010), the Deferred Prosecution Agreement framework, and confiscation orders under POCA. The closing scenario supports an SFO procurement-fraud investigation.

    Outcome

    The student can articulate the UK criminal-investigation architecture; can identify which agency leads which case type; can identify the differences between civil and criminal expert work; and can frame an expert engagement supporting a criminal prosecution. (Criminal investigation forensic work)

    Practice scenarios

    Supporting an SFO Investigation into Procurement Fraud

    You support an SFO investigation into £4m of procurement-director kickbacks at a UK government-services contractor, planning the analytical work across full-population contract review, supplier-margin analysis, bank-statement analysis, and chronology building. The work tests whether you can frame the work plan defensibly to an SFO investigator pressing for an accelerated timeline and definitive findings before the analysis supports them.

    Your goals

    • Frame the analytical work plan: (1) full-population review of contracts awarded by the procurement director's office over 5 years; (2) supplier-by-supplier margin analysis (kickback-receiving suppliers should show higher margins than peer suppliers, since the kickback is funded from the inflated contract price); (3) bank-statement analysis on the procurement director's accounts (and family-member accounts identified through electoral roll, Companies House, social-media due diligence); (4) communications review (email, messaging where preserved); (5) chronology building each contract decision against the suspicious-payment pattern.
    • Address PACE compliance: any interview the firm conducts under SFO direction is governed by SFO procedures (which include caution-equivalent for s2-compelled interviews); the firm should not interview suspects directly without SFO instruction.
    • Frame the disclosure obligations: under CPIA the prosecution must disclose unused material; the firm's working papers and analytical files must be preserved in a way that permits later disclosure; everything documented contemporaneously.
    • Address the firm's *dual role* risk: instructed by SFO but conducting work that may also be needed if the company faces civil-recovery action; clear scoping in engagement letter; preserve professional independence.
    • Identify the likely outcome scenarios: (1) charging of individuals (procurement director plus suppliers); (2) corporate DPA (the company self-reported and cooperated; likely DPA-eligible); (3) confiscation order against individuals based on criminal benefit calculated by the firm.
    • Frame as a 1,500-word work-plan memo to the SFO investigator.
  8. Module 8 ○ Open

    Reporting and Giving Evidence in Court

    Led by Felix Aubrey Sharpley Simulacrum

    The question

    Reporting and giving evidence in court — the deliverable that completes most forensic engagements. The module covers the report structure (executive summary, introduction, background, methodology, findings, opinion, limitations, appendices), clear writing for a legal audience, cross-examination preparation, demeanour in the witness box, the common cross-examination tactics and how to respond, and the discipline of credibility — built by the report's quality, reinforced or undermined by the witness-box performance, lost by overreaching. Concurrent evidence (hot-tubbing) closes the course.

    Outcome

    The student can structure a forensic report with appropriate sections; can prepare for cross-examination on a specific opinion; and can articulate the discipline of credible expert testimony — including the willingness to concede defensible points and to maintain core opinions under pressure. (Reporting and giving evidence)

    Practice scenarios

    Cross-Examination Preparation on the Distribution-Agreement Case

    You prepare for cross-examination on the distribution-agreement case — your central £8.7m loss number under attack on three lines (growth assumption, period of loss, substitute mitigation). The work tests whether you can hold defensible positions under hostile counsel's pressure, concede defensible points on the sensitivity range, and resist the *yes-or-no* trap without losing the central estimate.

    Your goals

    • Identify the three lines of cross-examination and prepare responses for each.
    • *Growth rate (10%)*: response — the rate is supported by historical 3-year CAGR; consistent with industry data; sensitivity analysis presents 8% as a lower-bound; the central estimate is 10%; the expert can defend it but acknowledges 8%–12% as a reasonable range.
    • *Period of loss (5 years)*: response — the agreement had no fixed term; the breach was wilful; the legal counterfactual is what the parties would have agreed had they continued; the 5-year horizon represents reasonable continuation; the 12-month-notice sensitivity is presented as the lower-bound; the expert can defend 5 years against challenges to a longer or shorter period within the analytical structure.
    • *Substitute mitigation*: response — the substitute lines have not fully mitigated; the lower margin (22% vs 32%) is structural; the volume ramp took 14 months; the analysis incorporates the actual mitigation achieved; the expert can defend against the *full mitigation* assertion by reference to the actual data.
    • Prepare for the *yes-or-no trap*: counsel may ask *do you accept that an 8% growth rate is also reasonable?* — the honest answer is *yes, within the sensitivity range* — defensible without damaging the central estimate.
    • Prepare for the *expertise-stretch*: counsel may ask about the legal interpretation of *good faith termination*; response — that is a question of law for the court, outside my expertise.
    • Frame as a 2,000-word cross-examination preparation memo for the trial team.