910 likes | 2.62k Views
Anti-Fraud Trends and Analytics Integrating anti-bribery & corruption analytics into your compliance monitoring program Meeting with Verizon October 19, 2012. Components of an effective anti-fraud & corruption compliance program. Setting the Proper Tone. Proactive. Reactive.
E N D
Anti-Fraud Trends and AnalyticsIntegrating anti-bribery & corruption analytics into your compliance monitoring programMeeting with VerizonOctober 19, 2012
Components of an effective anti-fraud & corruption compliance program Setting the Proper Tone Proactive Reactive Elements of a successful corporate anti-fraud, bribery and corruptionprogram Code of Ethics Fraud and Corruption Prevention Policies Communication and Training Risk Assessment Controls Monitoringand Analytics Incident Response Plan Management Ownership and Involvement Anti-fraud, bribery and corruption key activities mayinclude • Investigations • Fraud response planning • Forensic data analytics • Discovery and document review • Review of fraud policies and controls • Industry benchmark of anti-fraud programs • Gap analysis • Future state design session • Who owns fraud? • Assess roles and responsibilities • Fraud and risk committee formulation • Customized training • Corporate governance • Corporate anti-fraud road map • FCPA / anti-bribery assessments • Fraud risk assessment • Targeted anti-fraud analytics • Anti-bribery and corruption analytics • M&A Due Diligence • 3rd Party Due Diligence • 3rd Party Risk profiling • Conduct background checks
How FCPA compliance & analytic overlaps with key business processes DOJ’s criteria for an FCPA violation: Who Corrupt Intent Payment (or intent to pay) Recipient Business Purpose EY maintains a library of over 400 anti-fraud tests around each fraud risk area. Source: ACFE 2010 Report to the Nations On Occupational Fraud
Start with the Fraud TreeDifferent tools and methodologies are required to combat corruption Fraud tree Corruption Fraudulent statements Conflicts of interest Bribery and corruption/ FCPA Illegal gratuities Bid-rigging/ procurement Revenue recognition GAAP Reserves Non financial Asset misappropriation Cash larceny Theft of other assets – inventory/ AR/ fixed assets Fake vendor Payroll fraud T&E fraud Theft of data
Corruption is a key risk area ACFE 2012 Report to the Nation EY Global Fraud Survey • 39% of respondents say that bribery & corruption practices occur frequently in their countries • 15% of CFOs surveyed said they would be willing to make cash payments to win business • 20% of CFOs surveyed said that they are willing to makepersonal gifts to win business Median loss was $135,000 per incident. Source: ACFE 2010 Report to the Nations On Occupational Fraud
Top corruption risk areasTelcom company example Vendor / employee conflicts of interest FCPA Travel & entertainment abuses Overpaying local suppliers in other countries (kickback) Kickback from a customer for free service (high frequency, low impact) Source: ACFE 2010 Report to the Nations On Occupational Fraud
How is fraud detected? 50% by tip or accident Source: ACFE 2010 Report to the Nations On Occupational Fraud 2012 ACFE Report to the Nation on Occupational Fraud
Forensic analytics maturity modelBeyond traditional “rules-based queries” – consider all four quadrants Low Detection Rate High Matching, Grouping, Ordering, Joining, Filtering Anomaly Detection, ClusteringRisk Ranking Structured Data “Traditional” Rules-Based Queries & Analytics Statistical-Based Analysis Data visualization, Drill-down into data, Text Mining Keyword Search Unstructured Data Traditional Keyword Searching Data Visualization & Text Mining High Low False Positive Rate
Beyond “rules-based” tests Beyond traditional matching, filtering and sorting algorithms, EY integrates statistical, visual and text mining techniques to identify patterns of high risk or rogue employee activities.
Common anti-fraud tests • Payment stream analysis • Altered invoices, goods not received, duplicate invoices, inflated prices, excess quantities purchased, requestor/approver conflicts • Vendor or subcontractor abuses • Fictitious vendors, employee / vendor conflicts of interests, • Employee expenses and P-card expenditures • Over limits, unusual expenses, miscellaneous/sundry expenses • Payroll • Ghost employees, unusual payments, no deductions/evaluations, direct deposit account analysis • Bribery and corruption • Bid rigging, conflicts of interest, contract compliance, kickbacks, payments to outside consultants
Focus on the payment text descriptionsWhat if you saw these terms used as justification for payments to third parties? Nobody calls it “bribe expense” Government fee Pay on behalf of “<blank>” Special commission Goodwill payment Friend fee One time payment Consulting fee Donation Special payment Team building expense Commission to the customer Volume contract incentive Incentive payment Processing fee
Travel & entertainment – an FCPA risk example “Who entertained whom, where, what for and for how much?”
Anti-Bribery & Corruption Analytics Who said what, where and how much?
Transaction Risk Scoring Filter by selected analytics Review breaches on targeted analytics
Finding hidden money… Duplicative payments to fictitious vendors Exact SameAmount DifferentInvoice # Same Reference /Job Code DifferentVendor ID SameDate Some with same address Similar names
Finding hidden money… Salary & Payroll Abuse Overtime abuse. Test for billing more than a 40 hour work week
Vendor / employee conflicts of interest Vendor Master and Employee Master should not overlap. Analysis of phone numbers and fuzzy address matches.
The Fraud Triangle¹Applying theory to electronic communications 1. Donald R. Cressey's “Fraud Triangle” ; Incentive/Pressure, Opportunity and Rationalization are present when fraud exists. 1. Donald R. Cressey's “Fraud Triangle” ; Incentive/Pressure, Opportunity and Rationalization are present when fraud exists.
EY / ACFE library of ‘keywords’(Over 3,000 terms in a over a dozen languages so far…) Rationalization Incentive/ Pressure Opportunity …I deserve it …nobody will find out …gray area …they owe it to me …everybody does it …fix it later …the company can afford it …not hurting anyone …won’t miss it …don’t get paid enough …make the number …don’t let the auditor find out …don’t leave a trail …not comfortable …why are we doing this …pull out all the stops …do not volunteer information …want no part of this …only a timing difference …not ethical …special fees …client side storage …off the books …cash advance …side commission …backdate …no inspection …no receipt …smooth earnings …pull earnings forward
Fraud Triangle analytics—calculationJoint EY and ACFE Research Project
Fraud Triangle Analytics – ResearchBribery Case Keyword hits as a percentage of total emails Incentive/Pressure Terms Opportunity Terms Rationalization Terms Investigation timeframe, September 2006 to March 2007
Interactive dashboard Fraud Triangle Analytics – Interactive Dashboard
Emotional Tone AnalysisIndentify “Derogatory”, “Surprised”, “Secretive”, “Worried” communications
Emotional Tone Analysis Ken Lay’s emails were “derogatory”, “confused” and “angry”
Rogue employee analytics Risk Scoring Model – peer stratification dashboard review Peer Stratification Dots represent clusters of high risk communications that can be reviewed by clicking. Detail-Level View
Closing thoughts • Consider a pilot program, taking a risk-based approach • Consider developing an “anti-fraud” task force • Maintain and build a library of robust anti-fraud tests • Don’t overlook bribery and corruption—corruption is a hot topic for global companies, especially in telecommunications and global capital projects • This is not SOX testing and the same tools don’t apply! Current global fraud landscape requires more proactive, targeted analytics, beyond traditional “rules-based” tests
Contacts Vincent Walden Ernst & Young LLP Partner, Assurance Services Fraud Investigation & Dispute Services New York, NY (212) 773-3643 vincent.walden@ey.com Bill Henderson Ernst & Young LLP Partner, Assurance Services Fraud Investigation & Dispute Services New York, NY (212) 773-4389 william.henderson@ey.com