At a recent staff training meeting, Joseph Wellington, CFE, is discussing how to investigate fraud when a case calls for concealment investigative methods because of breaches in the investigative process. He goes further to state that the evaluation of a security breach from an external source is difficult, but from an internal source it can be nearly impossible to detect if there are no internal controls or a plan to investigate internal breaches through a concealed investigative process. Please post an answer to the following questions. Support your answers with academic or real life criminal justice examples to accentuate your point. Also, you must provide at least 1 feedback post to two of your classmates. In your opinion, how would you conceal your investigative process in a case where you had to identify internal fraud crimes? What do you think is the best method to evaluate a security breach to a corporationâ⚬➢s database, employee credit cards, and corporate executive business accounts? Please answer each with a brief method on how you would approach evaluating the security breach