40

Fraud risk management iia singapore conferenec 2013

Embed Size (px)

DESCRIPTION

By downloading or viewing this, it would at at least imply that you have a measure of interests in Fraud Risk Management. This is a PPT to assist you to have a right start in FRM, If you need to know more visit www.cfe-in-practice.com

Citation preview

Page 2: Fraud risk management   iia singapore conferenec 2013

Important Disclaimer

• A speaker’s opinions are just that – opinions

• Not offering legal advice – just discussing principles

• Any questions from audience welcome, but any replies are general comments only and should not be construed as legal advice

2

Page 3: Fraud risk management   iia singapore conferenec 2013

3

What is FRAUD ?

ICFE CONSULTANCY GROUP PTE LTDInternational Cybercrime & Forensics Examiners www-icfe-cg.com

Page 4: Fraud risk management   iia singapore conferenec 2013

4

Principles of FraudFIVE (5) ELEMENTS OF FRAUD

Mens Rea - Criminal Intent

Actus Reus - Criminal Action

Carelessness or Innocence on the part of the victim

An active participation by the victim as a result of the carelessness or innocence

The transaction is concealed to prevent detection.

Page 5: Fraud risk management   iia singapore conferenec 2013

The Fraud Triangle

Per

ceiv

ed

Pre

ssure

Ratio

naliza

tio

n

Perceived OpportunityAuditor’s Domain

Fraud Risk Management

Fraud Risk Management

5

Page 6: Fraud risk management   iia singapore conferenec 2013

14

Fraud Classification System

6

Page 7: Fraud risk management   iia singapore conferenec 2013

Internal Controls

7

Page 8: Fraud risk management   iia singapore conferenec 2013

8

       

The

Trinity

of

Controls

Internal Audit Internal Audit CPA(CIA) CPA(CIA) CSI, CSI,

CISACISA

ComplianceCompliance

CPA,LLB,CPA,LLB, CSICSI

Risk Risk ManagementManagement

CPA,CFA CPA,CFA CSICSI

Financial Control

The Fraud ExaminerThe Fraud Examiner

CFECFE

The Certified System Investigator

CSI

The Existing model

Page 9: Fraud risk management   iia singapore conferenec 2013

Limitations of Internal Control

Errors may arise from misunderstandings of instructions, mistakes of judgment, fatigue, etc.

Controls that depend on the segregation of duties may be circumvented by collusion

Management may override the structure

Compliance may deteriorate over time

9

Page 10: Fraud risk management   iia singapore conferenec 2013

10

What is Risk ?What is Risk ?

BB

EE

CC

DD

AAOperational Risk

Liquidity Risk

Credit Risk

Reputational Reputational RiskRisk

Market Risk

What happened to

Page 11: Fraud risk management   iia singapore conferenec 2013

Fraud Control Principle(the correct way in understanding

anything is to understand the principles involved)

11

Page 12: Fraud risk management   iia singapore conferenec 2013

12

No organization is immune to fraud – the next step is to

Acknowledge the need for fraud risk management.

12

Page 13: Fraud risk management   iia singapore conferenec 2013

Copyright (c)2006 13

Regardless of these variables, any Fraud Risk Management model should aim to achieve one, or all, of the fiveprimary objectives:

13

Page 14: Fraud risk management   iia singapore conferenec 2013

Copyright (c)2006 14

The firstprimary objective:_ Prevention

14

Page 15: Fraud risk management   iia singapore conferenec 2013

Copyright (c)2006 15

The secondprimary objective:_ Deterrence

15

Page 16: Fraud risk management   iia singapore conferenec 2013

Copyright (c)2006 16

The thirdprimary objectives:_ Disruption

16

Page 17: Fraud risk management   iia singapore conferenec 2013

Copyright (c)2006 17

The fourthprimary objective:_ Identification

17

Page 18: Fraud risk management   iia singapore conferenec 2013

Copyright (c)2006 18

The fifthprimary objective:_ Civil action/criminal prosecution

18

Page 19: Fraud risk management   iia singapore conferenec 2013

Copyright (c)2006 19

How to achieve the FIVE Objectives ?

We need direction……….

19

Page 20: Fraud risk management   iia singapore conferenec 2013

Use the Compass to get the right direction

in detecting/preventing

Fraud

20

Page 21: Fraud risk management   iia singapore conferenec 2013

The eight points on the compass are:

1. The fraud environment

7

Compass for Fraud Detection

1

2

3

4

5

6

2. The types of fraud

3. The execution of the fraud

7. Accomplice identification

4. eDiscovery

5. Preliminary evidence evaluation

6. Evidence collection

21

Page 22: Fraud risk management   iia singapore conferenec 2013

Determination by Area

Determination by Scheme

Determination by Person

The approach…….

22

Page 23: Fraud risk management   iia singapore conferenec 2013

23

       

Collusion between employees and third parties

represents a growing number PROCUREMENT frauds in SINGAPORE.

Page 24: Fraud risk management   iia singapore conferenec 2013

24

       

What type of individual commits FRAUD?

It is not limited to any one type of person.

Human element in all fraud

ICFE CONSULTANCY GROUP PTE LTDInternational Cybercrime & Forensics Examiners www-icfe-cg.com

Page 25: Fraud risk management   iia singapore conferenec 2013

25

Conclusion: Fraud Perpetrators Look Exactly Like Us!

Optimistic High self-esteem

Achieving Family harmony

Socially conforming Self control

Kind Sympathetic

Page 26: Fraud risk management   iia singapore conferenec 2013

26

Given the right circumstances, almost

everyone can rationalize that it is OK to commit fraud..

 

26

Profile of A Person Who Commits Fraud

Page 27: Fraud risk management   iia singapore conferenec 2013

27

“Red Flags”

Text

AlcoholAlcohol GamblingGambling

DrugsDrugs

SexSex

Profile of A Person Who Commits

Fraud

Given the “right circumstances”, almost everyone can rationalize that it is OK tocommit fraud..

Page 28: Fraud risk management   iia singapore conferenec 2013

28

The key, in any effective anti-fraud program, is to strike the right balance between

oversight

and

trust

Page 29: Fraud risk management   iia singapore conferenec 2013

The

4

Investigative methods

29

Proving wrongdoing

Page 30: Fraud risk management   iia singapore conferenec 2013

Covert Investigative Methods1.Surveillance and covert operations2.Invigilation3.Seizing and searching digital evidence on computers4.Physical evidence

Concealment Investigative

Methods1.Document examination2.Digital Audits3.Electronic searches4.Physical asset count

Conversion investigative

Methods1.Searching public records2.Online resources3.The net worth methodInquiry Investigative

Methods1.Interviews/Profiling and interrogation2.Honesty testing

30

Page 31: Fraud risk management   iia singapore conferenec 2013

31

The problem with proving intent is that it requires determining a person’s state of

mind.

As a result, intent usually is proven circumstantially.

Page 32: Fraud risk management   iia singapore conferenec 2013

32

Some of the ways we can help prove intent by circumstantial evidence include:

Motive : The motive for fraud is a strong circumstantial element.

Opportunity : Management typically has the opportunity to circumvent or override controls over financial reporting.

Page 33: Fraud risk management   iia singapore conferenec 2013

33

Some of the ways we can help prove intent by circumstantial evidence include:

Repetitive acts : Should the financial statements contain a single false journal entry, a fraudster might be able to claim it was an error.

Page 34: Fraud risk management   iia singapore conferenec 2013

34

Some of the ways we can help prove intent by circumstantial evidence include:

Witness statements : Circumstantial evidence rarely can be sufficient without the statements of witnesses.

Page 35: Fraud risk management   iia singapore conferenec 2013

For those new to evidence in general, inculpatory evidence is that which

supports a charge or accusation of wrongdoing.

Inculpatory Evidence

35

Page 36: Fraud risk management   iia singapore conferenec 2013

exculpatory evidence is that which would cast doubt or prove innocence.

Exculpatory Evidence

36

Page 38: Fraud risk management   iia singapore conferenec 2013
Page 39: Fraud risk management   iia singapore conferenec 2013

Sources of Digital Evidence Computers

4 Email4 Digital images4 Documents4 Spreadsheets4 Chat logs4 Illegally copied software or other

copyrighted material

39

Page 40: Fraud risk management   iia singapore conferenec 2013

40

       

Thank youThank you

Contact Information:

Tommy Seah

CFE, CSI, FCPA,ACIB,MSID

Regent Emeritus

ACFE Board of Regents, Texas, USA

www.cfe-in-practice.com

[email protected]

Phone : + (65) 9106 9872