At a recent staff training meeting, Joseph Wellington, CFE, is discussing how to investigate fraud when a case calls for concealment investigative methods because of breaches in the investigative process. He goes further to state that the evaluation of a security breach from an external source is difficult, but from an internal source it can be nearly impossible to detect if there are no internal controls or a plan to investigate internal breaches through a concealed investigative process. In your opinion, how would you conceal your investigative process in a case where you had to identify internal fraud crimes? What do you think is the best method to evaluate a security breach to a corporation’s database, employee credit cards, and corporate executive business accounts? Please answer each with a brief method on how you would approach evaluating the security breach.