Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Fraud – What it Means to YouHFMA Great Lakes Chapter
February 16, 2018
1
Who Are We?
2
Who Are We?
3
Benford’s Law
Amanda Fletcher, CPA, CFE, Manager
Kyle Sutton, CPA, CFE, Senior Consultant
We are members of Plante Moran’s Forensic Investigative Services Group. We have worked on expense reviews, asset misappropriation investigations, internal control assessments, and insurance claims. We have participated in interviews, performed financial analyses, conducted investigative research, and reviewed accounting records. We have also analyzed data to discover trends in expenses and detect fraud and have received extensive training in data analytics software.
4
Who Are We?
5
CASESTUDIES
RECENT TRENDSPREVENTATIVE/
DETECTIVE METHODS
Q&A
6
Check Tampering
7
Check Tampering
Preventative Measures• Have independent individual(s) reviewing checks• Restrict access to check stock, signature stamps, etc.• Utilize Positive Pay
Detective Measures (Data Analytics Testing)• Evaluate sequence of cleared check numbers• Compare cancelled checks to check registers• Search for duplicate check numbers• Search for multiple checks to the same vendor on the same day• Search for “off” invoice numbers
8
Check TamperingWhat can you do?
9
ACFE Report to the Nations
10
Every two years the Association of Certified Fraud Examiners publishes a
study on occupational fraud and abuse.
The report is available for free at www.acfe.com
ACFE Report to the Nations
ACFE Report to the Nations
2010 2012 2014 2016
Annual Revenues lost to Fraud
5%
Median Loss per Incident $160,000 $140,000 $145,000 $150,000
Primary Factor of Loss Lack of internal controls
Typical Scheme Time Duration
18 months
Clean Employment Histories
85% 87% 87% 95%
Typical Occurrences of Fraud
Asset misappropriation
Percentage of AssetMisappropriation
90% 87% 85% 83%
11
Summary of Trends
12
ACFE Report to the NationsOccupational Fraud by Industry
What industry had the most occurrences of fraud?
A) GovernmentalB) ManufacturingC) HealthcareD) Banking/Financial
13
ACFE Report to the NationsOccupational Fraud by Industry
14
Fraud Schemes by IndustryACFE Report to the Nations
15
DiscoveryACFE Report to the Nations
What is the most common method of identifying fraud?
A) TipB) Internal AuditC) External AuditD) Account Reconciliation
16
DiscoveryACFE Report to the Nations
17
DiscoveryACFE Report to the Nations
• Median loss: Male - $187,000 Female - $100,000 (previously
$83,000)
• Between 35 and 41 years old 55 percent
• Long-term employees = larger frauds
• May not take vacation/PTO
18
ACFE Report to the NationsThe Typical Fraudster
19
Behavioral Red FlagsACFE Report to the Nations
What was the most common behavioral red flag displayed by fraudsters?
A) Addiction ProblemsB) Living Beyond Their Means/Financial DifficultiesC) Complained About Inadequate PayD) Marital Problems
20
Behavioral Red FlagsACFE Report to the Nations
21
Impact of CollusionACFE Report to the Nations
Reimbursement Scheme
22
23
• Anonymous tip to the Board regarding improper credit card spending by the CEO.
• Board performed a preliminary investigation and found evidence to substantiated the claim.
• We were engaged to investigate: Credit card spending; Related party payments; and Expense reimbursements.
The SituationReimbursement Scheme
24
Reimbursement Scheme
25
Preventative Measures• Properly segregate duties• Ensure reviewing/approving expenses process is appropriate Subordinate should not be reviewing supervisor’s expenses Reviewer should be able to differentiate a legitimate expense from an improper
expense
• Pay attention to statement balances, not just individual transactions.
Detective Measures (Data Analytics Testing)• Search for duplicate transactions (amount, location, date, people, etc.).• Search for transactions just below documentation requirement threshold.
Reimbursement SchemeWhat can you do?
26
Reimbursement SchemeRelated Party Research
CEO
27
Are You Insured?
Situation• Loan officer would increase
customer loan balances
• Loan officer would write check to a different bank and deposit the check in a personal account
28
Are You Insured?
29
Are You Insured?
Preventative Measures• Segregation of duties
Detective Measures• Review “unusual” transactions ALL the way through the process
Case Results• Insurance recovery: $115K paid to customers for direct losses. $20K paid to customers for interest accrued.
• Check your insurance policy!
30
Fraudulent Credit Card Sales
31
Fraudulent Credit Card SalesSituation• Medical textbook/subscriptions organization was being hit with thousands
of dollars of purchases from stolen credit cards
• Wanted to know – Why?! Suspicions of a former employee exacting revenge Potential that one of their vendors wanted to increase sales, and therefore
purchases
32
Fraudulent Credit Card SalesResults• Still being determined; however, no links to former employees or vendors
identified
Testing• Data Analytics Geocoding
33
Address Geocoding
Geocoding: The process of transforming a postal address description to a location on the earth’s surface (spatial representation in numerical coordinates).
Forensic Data Analytics: Geocoding is a precise method for performing address matches (such as vendor-employee matches) or finding addresses within a close proximity.
34
https://en.wikipedia.org/wiki/Geocoding
What is geocoding?Address Geocoding
35
Map of ResultsAddress Geocoding
36
Excel Fuzzy Lookup MatchAddress Geocoding
• Add-in for Excel available on Microsoft’s website
• Useful for comparing data from two sources Address matching Name matching
• Simple to use
37
Excel Fuzzy Lookup Match ResultsAddress Geocoding
38
Detection Methods
39
Detection Methods
• Surprise procedures
• Ask questions and get answers
• Anonymous hotline and/or cameras
• Forensic accountants
• Periodic data monitoring
Detection Methods
Definition – the process of analyzing many fields of data within databases to find correlations, patterns and anomalies.
Depending on the data and the source, examples include:
40
Periodic Data Monitoring
IDEA
Access
Excel
ACL
Tableau
Alteryx
Detection Methods
41
Periodic Data Monitoring
Checks on non-payroll days
42
Beyond the Accounting Data
43
• Allegations that the former Finance Director used the organization’s credit card for personal purposes.
• No paper documentation existed (all destroyed).
• The former Finance Director moved out of state (i.e., not available for interviews).
Beyond the Accounting Data
44
Background research identified Finance Director’s daughter lived near Ft. Myers, FL
Beyond the Accounting Data
45
Beyond the Accounting Data
46
Beyond the Accounting Data
47
Beyond the Accounting Data
48
Beyond the Accounting Data
Takeaways:• Think about how you can use the information available when you are missing
the “ideal” information.
• You may not be able to see the answer using only one source of data; use multiple sources of information to piece together the puzzle.
49
Billing and Corruption
50
• $1B+ entity• Internal service arm considered small at
$15M/year in expenses• Internal audit finally audited them …
Address 533…on Manta matched residence
of employee per Spokeo
Billing and Corruption
51
Initial engagement:perform background
research on select personnel and
vendors.
Found connections with multiple
vendors.
Billing and Corruption
52
Email #1Senior Manager of the internal service arm
copied on a quote from one of their vendors (Vendor A) to another vendor (Vendor B).
Billing and Corruption Vendor A
Vendor B
53
Email #2Senior Manager emails other
company employees to issue RFQ to Vendor B.
Email #3Employee emails Vendor B the
RFQ.
Billing and Corruption
54
Email #4Senior Manager receives quote from
Vendor B.
Billing and Corruption
55
• Quote from “original supplier” to vendor: $30,000
• Quote from vendor to company: $65,000
• Mark-up on transaction: $35,000
Billing and Corruption
56
Billing and Corruption
57
Total estimated loss from mark-up scheme:
Over $6 Million
Vendor Invoice TotalVendor 1 10,119,949.00$ Vendor 2 7,725,317.32 Vendor 3 7,220,706.32 Vendor 4 7,063,603.93 Vendor 5 4,506,756.93 Vendor 6 3,581,829.00 Vendor 7 3,506,255.35 Vendor 8 3,296,604.40 Vendor 9 2,353,896.95 Vendor 10 1,049,634.88 Vendor 11 741,366.00 Vendor 12 563,455.50
Top Paid Vendors Total Invoiced April 20, 2009 through June 30, 2016 Vendor 1Vendor 12 Vendor 2 Vendor 4
Billing and Corruption
58
• Corruption can be VERY difficult to detect and even more difficult to prove. We needed to: Utilize our background research tools. Perform social media research. Perform an exhaustive review of email activity using key-word searches. Even surveillance was performed to supplement our findings.
• However, a simple Google search by internal audit was all it took to start unraveling the scheme.
• Follow-up if you see something that doesn’t make sense. Identifying that the quote from one vendor to another vendor seemed unusual and digging in further was key to piecing together the mark-up scheme.
Billing and Corruption
59
What do you look for?• Missing information: Addresses Invoice numbers Logos
• Inconsistent information: Fonts Formats Addresses
• What is the business purpose? Ask ownership
• Confirm the legitimacy, not the existence• Think outside the box!
Billing and Corruption
60
Dixon, IL
Dixon, IL
61
2013 Population – 15,333
2012 Median household income - $38,719
2012 Median house/condo value - $83,601
2012 Total expenses $15.6M
Dixon, IL
62
Long-term employee
Started as in intern in high-school in 1970
Named Treasurer and Comptroller in 1983
Lack of internal controls
Reconciled accounts
Made deposits
Requested funds
Controlled the mail (PO Box)
The Background
Dixon, IL
63
What’s Wrong?
Dixon, IL
64
What’s Wrong?
Dixon, IL
65
Real Invoice
Dixon, IL
66
The Scheme
Dixon, IL
67
How Much Did She Take?
Dixon, IL
68
How Much Did She Take?
Dixon, IL
69
How Was She Caught?