Whether the investigators could be trusted, whether the sysadmin password could be used to discover fraud if fraud was actually committed, and whether the sysadmin password could be used to create a fake trail of supposed fraud. Oh, and whether an article in Gateway Pundit could be trusted in the slightest.
no subject