590 likes | 604 Views
Explore the top fraud trends, occupational fraud schemes, effective internal controls, and data mining methods to combat fraudulent activities. Learn from real-world examples and industry statistics to safeguard your organization.
E N D
Fraud Schemes and scams: Lessons from the trenches Shauna Woody-Coussens, CFE Managing Director
Today’s agenda • Top fraud trends • Common occupational frauds • Cost effective internal controls and data mining procedures you can implement today
Occupational fraud defined • The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s resources or assets --Association of Certified Fraud Examiners “2018 Report to the Nations”
HIGH COST OF FRAUD • 5% of revenue lost to fraud and abuse each year • Cost of external assistance with investigation for insurance or criminal purposes • Lawyers • Forensic accountant • Higher insurance costs in following year(s)
HIGH COST OF FRAUD • Non-monetary loss can bemore damagingthan the actual monetary loss • Loss of reputation • Public assumptions • Loss of employee morale • Loss of productivity due to internal investigation
Industries most victimized IndustryFrequency Median Loss Banking 19.8% $110,000 Manufacturing 11.8% $240,000 Government 10.8% $125,000 Health Care 8.7% $100,000 Retail 6.0% $50,000 Source: 2018 ACFE Report to the Nations
Industries With largest lossES IndustryMedian Loss Communications & Publishing $525,000 Energy $300,000 Prof. Services $258,000 Manufacturing $240,000 Construction $227,000 Source: 2018 ACFE Report to the Nations
Most common schemes #2 #4 #1 #4 #5 #3 #4 Source: 2018 ACFE Report to the Nations
Most effective controls Source: 2018 ACFE Report to the Nations
RECOVERING FUNDS IS THE EXCEPTION • In53%of the reported frauds, there was NO recovery • For the 15% of reported frauds in which there was full recovery, the source of recovery was usually an insurance policy
Insights on fidelity bonds • Likely only chance at meaningful recovery as money is usually gone • Lavish lifestyle • Compulsive shopping • Gambling • Other addiction • Civil litigation to recover losses often fruitless • Criminal verdict - restitution often goes unpaid • Watch your internal controls if you expect your insurance to pay…
REPLY FROM INSURANCE COMPANY AFTER FIDELITY BOND CLAIM FILED
Almost no prior criminal history 89% have no criminal history Reminder:Background checks are good, but don’t depend on them to evaluate someone’s likelihood to commit fraud after hiring them Source: 2018 ACFE Report to the Nations
WHICH ONE LOOKS SUSPICIOUS? $3 million $1.0 million $4.6 million $31 million $1.1 million $20 million
Profile of Fraud Perpetrator • More likely to be male than female (69%/31%) • 36 to 45 years old • College educated • Works in accounting/financefunction or related role • Holds asenior management position • Employed by the company for 1-5 years • No prior fraud charges or convictions Source: 2018 ACFE Report to the Nations
TIPS ARE THE TOP METHOD OF DETECTION • For organizations with hotlines, 46% of frauds were detected by tips • Compared to only 30% of frauds for organizations without a hotline • 4th most prevalent method is BY ACCIDENT
The medians • Median loss across industries: $130,000 • Median loss for large businesses: $104,000 • Median loss for small businesses: $200,000 • Median fraud duration: 16 months • “18 month rule”
Most common fraud schemes #1 Corruption #2 Billing Schemes #3 Non Cash Schemes #4 Cash Schemes #5 Expense Reimbursement/P-Card Schemes
Corruption • Anemployee misuses his or her influence in a business transaction in a way that violates his or her duty to the employerin order to gain a direct or indirect benefit • In most businesses, the most common form of corruption is the payment of kickbacks related to purchases
Red flags & anti-fraud controls for corruption • Off-book fraud, so very hard to detect • Payments often do not go through the organization’s accounting records • Payments often paid in cash • Look for “behavioral” red flags • Rapidly increasing purchases from one vendor • Excessive purchases of goods and services • Too close of a relationship with a vendor
ANTI-FRAUD CONTROLS FOR CORRUPTION • Publicize your fraud/ethics hotline • Implement a strong ethics and conflicts of interest policy • Require reporting of potential conflicts of interest • Limit gifts from vendors and contractors • Develop/follow a well defined procurement process • Rotate buyers • Conduct contract audits
DATA ANALYTICS FOR CORRUPTION • Overpaid purchase orders • Invoices greater than goods receipt • Compare quantities ordered and received • Compare order quantity to optimal reorder quantity • Compare purchase volumes/prices from like vendors • Split transactions
BILLING SCHEMES • Fraudstercreates false support for a fraudulent purchase, causing the company to pay for goods or services that are nonexistent, overpriced or unnecessary • Invoicing via shell company • Invoicing via an existing vendor • False invoicing for non-accomplice vendors • Pay-and-return schemes • Personal purchases with company’s funds
red flags for billing fraud schemes • Invoices for unspecified consulting or other service • Unfamiliarvendors • Vendors with PO boxes • Vendor name consisting of initials • Rapid increases in purchases • Employee/vendor address match • Consecutively numbered invoices from a vendor • Repeated requests to expedite payments to particular vendors • Invoice forround dollar amounts
ANTI-FRAUD CONTROLS FOR BILLING SCHEMES • Prior to authorizing payment,verify validity of vendor, receiptof goods/services, and accuracyof pricing • Prior to processing payment, check invoice for proper authorization • Strictlycontrol access to the Vendor Master file • Implement a mandatory approved vendor lists • Control over selection of new vendors • Who can select them? How are they selected? • Due diligence performed on new vendors • Is vendor real? Is pricing reasonable? Periodically reassess vendor relationships • Minimize or eliminate conflicts of interest • Is vendor related to an employee?
DATA ANALYTICS FOR BILLING SCHEMES • Vendor attribute analysis • Trending of vendor payments • Identification of high risk payments
TRENDING OF VENDOR PAYMENTS Vendor: JLM Plumbing Authorized: Janice L. McPhearson Getting Greedy Acceleration as confidence builds Test phase
VENDOR PAYMENTS- TIME SERIES ANALYSIS TIME SERIES ANALYSIS Possible fictitious vendor Possible abuse of dormant legitimate vendor Possible abuse of active legitimate vendor
IDENTIFICATION OF HIGH RISK PAYMENTS – MAIL DROPS Mail Drop – an address used only to receive letters and packages to be picked up later
IDENTIFICATION OF HIGH RISK PAYMENTS – PROXIMITY ANALYSIS Vendor (A) Shauna’s Design Company, 123 5th Street Anytown, MO (Total Payments = $84,337) Employee (B) Shauna Woody, 4300 Oak Street Anytown, MO
Non-cash fraud schemes • Any scheme in which an employee steals or misuses non-cash assets of the victim organization • Employee steal inventoryfrom a warehouse or storeroom • Employee extracts customer’s personal and account information from a database and then sells that data – identity theft • Employee steals employer’s competitive data and supplies it to a competitor • Common when employees change employers • Inappropriate usage (borrowing) of organization assets • Often computers or software • Conflict of interest resulting in personal benefit
Red flags for non-cash schemes • Shrinkagein inventory/supplies • Employees who frequently visit the office after hours • Missing/borrowedtools, equipment, office supplies, etc. • Missing, altered, or unmatched supporting documents
ANTI-FRAUD CONTROLS FOR NON-CASH SCHEMES • Restrict access to sensitive information, inventory and supplies • Automated monitoring of: • The date, time and source of online access, especially if the system can be accessed from a WAN or the Internet • Report generation and downloading, including operational and custom reports or queries, especially those containing account information • E-mails sent and received and attachment sizes
ANTI-FRAUD CONTROLS FOR NON-CASH SCHEMES • Segregation of duties involving requisition of inventory, receipt of inventory, disbursement of inventory, and conversion of inventory to scrap • Physical inventory count/observation should be done by someone knowledgeable of the inventory, but independent of the purchasing or warehousing function • Assets that do not meet the threshold of capitalization should be tracked and accounted for. Smaller dollar assets are more likely to be stolen (think tablets), especially if they are not inventoried
DATA ANALYTICS FOR NON-CASH SCHEMES • If tracked electronically, will often leave evidence of access by: • Unauthorized users • User who have no relevant business purpose for the information/assets • Users accessing the information /assets on non-standard days or at non-standard times • Usersdownloading or copying information for which they have no relevant business purpose
Skimming the revenue cycle • Employeepockets the payment from a customer and does not record the charge • Stealing payments on accounts receivable and covering them up withadjustments or write-offs • Lapping • Customer A pays on account and employee pockets the payment. Customer B pays on account and employee records the payment by Customer B on Customer A’s account. This goes on until the employee caught or covers up the fraud, usually through an adjustment or write-off • Alteringbank deposits
Red flags for skimming schemes • Employees who do not take vacation • Employees who do not like others to perform their duties • Missingregister tapes or other records • Consistent differences in register or cash receipts to cash on hand • Complaints from customers that they are receiving billing for invoices that have already been paid
ANTI-FRAUD CONTROLS FOR THE RECEIPTS CYCLE • Use of cameras in cash handling areas • Segregation of cash receipt and accounting duties • Issuereceipts, trackthem in the accounting system and reconciletimely • Rotation of duties (preferably without notice) • Review of old deposits in transit or late deposits • Reconcile depositsper accounting and AR records with depositsper bank • Review of AR aging andpast due balances • Surprisecash counts • Follow-up on customer complaintsabout billing
Expense reimb./credit cards/p-cards • Any scheme in which an employee makes a claim for reimbursement for fictitious or inflated business expenses • Employee files fraudulent expense report, claiming personal travel, nonexistent meals, etc. • Employee purchases personal items and submits and invoice to employer for payment
RED FLAGS FOR EXPENSE REIMB./P-CARD SCHEMES • Photocopies of the receipts are provided instead of originals • Overall expenses for the organization areconsiderably over budgetcompared to other years • Expense reimbursement amounts are regularlyjust below the threshold for review • Excessive or unusual reimbursements to one employee compared to other employees in the organization • A lack of supporting documents
RED FLAGS FOR EXPENSE REIMB./P-CARD SCHEMES • Employee/managerbecomes defensive when asked to provide supporting documents • Purchases appear to be for non-businessproducts or services • Parts of the dates or amounts on receipts appear to be altered or missing • Submitted receipts are consecutively numbered • Expenses in round dollar amounts • Expensive business lunch/dinner expenses without names/organizations of attendees and business purposenoted