During a review of the tendering process, an internal auditor observes that unusual bidding requirements for IT hardware across several tenders appears to consistently favor one supplier. The internal auditor suspects that a bid-rigging scheme is occurring. Which of the following best describes the methodology used by the internal auditor?