A Analyze this and that FraudBasics: Critical Analytic Techniques

advertisement
Back to Fraud Information Articles
© March/April 2006
Association of Certified Fraud Examiners
Analyze this and that
FraudBasics: Critical Analytic Techniques
From the March/April issue of
Fraud Magazine
B
y
M
a
r
il
y
n
B
.
P
e
t
e
r
s
o
n
,
C
F
E
,
C
C
A
,
A
C
F
E
F
e
ll
o
w
A
s fraudsters become more proficient, CFEs must be able to use equally sophisticated fraud examination skills. Here's
how you can stay on top of your game with criminal analytic techniques.
A young man, who was living with his parents, was cashing legitimate checks for more than $100,000 through a retail
check-cashing company. Criminal analysts reviewing Currency Transaction Reports spotted the checks and investigators
opened a case. Within 90 days, the suspect had pled guilty to investment fraud and first-degree money laundering and
then provided information that led to others receiving similar charges. He was encouraging people to invest in a nonexistent venture. Without the use of analysts, the fraud wouldn't have been found and quickly completed, and many
other investors would have lost their savings.
Fraud examination is a challenging endeavor. Fraudsters use advanced technology and methodologies for planning and
committing sophisticated frauds. Your efforts must be more sophisticated just to match their pace. Therefore, more fraud
examiners are employing analytic techniques to help solve complex cases.
Criminal analytic techniques began developing in the 1970s when the California Department of Justice contracted a
private firm to develop analytic training in conjunction with the development of organized crime and criminal intelligence
units within law enforcement. By the 1980s, it was apparent that crime equals money and analysts were deployed to
fraud, narcotics, money laundering, and corruption units as well. No longer could departments rely solely upon
confidential informants, surveillance, and undercover operations to give them direct evidence of crime; analysts were
needed to trace and show the profits of crime.
Criminal analysis is also taught to private sector analysts, detectives, managers, regulatory professionals, and
prosecuting attorneys. Analytic techniques are an important addition to every fraud examiner's toolbox. Though much of
the material here may be basic, it's often the simplest forgotten procedures that foil a fraud examination.
Financial intelligence units
Over the past decade, financial intelligence units (FIUs) have become part of many bank, credit card, and insurance
company headquarters. Other large companies may use analysts as part of their security divisions, competitive
intelligence sections, or finance departments. But while every firm and company might not have the resources to
organize an FIU or the ability to hire intelligence analysts, all companies and firms can benefit from an analytic approach
to fraud examinations.
An analytic fraud examination approach includes:
1. employing strategic targeting;
2. completing up-front backgrounds on targets;
3. using investigative plans;
4. employing more critical thinking;
5. applying problem-solving methodologies;
6. organizing case data thoroughly;
7. using data analysis techniques; and
8. developing a solid case package for prosecution.
Employing strategic targeting
Strategic targeting involves choosing cases or examinations based on established criteria that allow you to focus your
examination efforts.
You might target cases by monetary thresholds. For example, you might select cases in which the profits of fraud are
known to have exceeded $100,000, $500,000, or $1,000,000. Other organizations target individuals who commit crimes
that have a significant financial impact on those defrauded such as those who prey on elderly victims with fixed incomes.
Some target perpetrators who are in positions of trust such as doctors, lawyers, or bankers. Still others look at the
deterrence value of the examination: will its completion discourage others from committing similar crimes? Some
organizations use combinations of the above and/or other criteria to choose or prioritize their targets. You could construct
a "threat matrix" of targets that would assign a value to each item and choose the target that attains the highest value.
Large organizations might also use data or text mining to choose their examinations. One example would be plumbing
millions of records in a very large database (such as all insurance claims made in the state, or the 180 million plus
records of the database of Currency Transaction Reports, Suspicious Activity Reports, and other Bank Secrecy Act data)
to identify repeat offenders and patterns (for example, same multiple suspicious transactions, similar names, same
companies, or addresses, etc.). After you review those databases and learn the fraud indicators, you can identify,
analyze, and prioritize targets.
An example of this type of targeting was included in an article by Juliana Morehead, J.D., in the July/August 2005 issue of
Fraud Magazine. The article describes an investigation involving Medicaid fraud in California in which criminal analysts
uncovered an important lead. Morehead wrote that the California investigation focused on 16 individuals and 13
corporations and netted the largest sentence ever in a Medicaid fraud conviction - 18 years and eightmonths. Some of
the profits of the crime - a check for more than $100,000 and another for $700,000 - landed in a small New Jersey
variety store, which doubled as a check-cashing business. A fraudulent California MediCal agency wrote these checks to
medical labs in that state and sent them to New Jersey to convert them to cash. Criminal analysts uncovered the New
Jersey piece of the investigation by reviewing thousands of Currency Transaction Reports generated by check-cashing
businesses in the state and following the money back to the crime.
Strategic targeting may also be based on indicators of particular types of fraud that have been developed through
experience. For example, fraud "symptoms" can be divided into six types: (1) accounting anomalies, (2) internal control
weaknesses, (3) analytical anomalies, (4) extravagant lifestyles, (5) unusual behaviors, and (6) complaints (Albrecht and
Albrecht, 2004:84).
Completing up-front backgrounds
Compile as much information as possible on the potential targets to focus your examination and ensure your choice of
targets is viable. Today there are more commercial sources than ever to be tapped such as ChoicePoint, Accurint, LexisNexis, real estate indexes, and others. A simple Google.com search on the Internet can give you information about a
person or business including images, addresses, organizations to which they belong, phone numbers, and other personal
data. Some global Web sites will even translate their content into English. In a recent investigation, people involved in an
insurance fraud case on the East Coast of the United States were found to be registered in Central and South America as
financial brokers and non-bank financial institutions.
You can discover information through regulatory files (such as licensing agencies, Department of Labor, Securities
Exchange Commission, the Financial Crimes Enforcement Network, etc.), judicial filings (civil suits), property (mortgages,
deeds, tax assessments), and vehicle records. The compiled data might give you greater evidence of criminal activity
such as using multiple Social Security numbers or engaging in financial transactions beyond their means.
Using an investigative plan
Investigative plans allow you to organize what you need to know to complete your fraud examination. In their simplest
form they should include the examination's objective, potential sources of information, needed investigative resources,
estimated timeline for completing the work, and the likelihood of success.
Investigative plans are fluid to-do lists that change as the fraud examination evolves. New sources may be uncovered or
prospective sources may be dead-ends. The allocated time may expand or shrink as other demands are placed upon the
fraud examiners. Obviously, they help you organize your resources to get the job done.
The objectives in the investigative plan reflect the purpose of the examination. Is a prosecution likely? Is future
deterrence of crime part of the desired outcome? Investigative plans are developed by analysts, investigators,
prosecutors, or a blend of those individuals. Management's support may be dependent upon the logic and workability of
the plan as well as its likelihood of success. When the plan is written, it should anticipate any pitfalls or problems that
might be encountered (such as difficulties in infiltrating a group or in obtaining records from a distant source) and how
those difficulties might be overcome.
Investigative plans are particularly critical when working with other entities. A plan approved by all those involved can
eliminate costly duplication of efforts and wasted hours of examination.
Employing more critical thinking
During fraud examinations, critical thinking means thoroughly looking at what you know and what you need to know; it
requires you to question your assumptions and preliminary conclusions. It can be used at the initial stages of an
examination through its final presentation. Critical thinking causes us to ask "what's missing?" and then leads us to work
toward filling in the critical gaps in knowledge or preparatory work. It requires that we question the information we have
and the facts of the case in a way that allows us to comprehend the questionable actions and actors more accurately.
When we think critically about what we know and what we don't, we generate questions that might help us explore what
we don't know. These questions also might reflect suppositions of possible changes based on our legal theory of the case.
Here are a few of the standard critical questions.
1. Who had a motive to commit the crime?
2. Who had an opportunity to commit the crime?
3. Who benefited from the crime (financially or otherwise)?
4. How was the crime committed?
5. Where was the crime committed?
6. Were businesses used to commit the crime or to invest its profits?
7. Were nominees used? If so, what was their relationship to the perpetrator(s)?
8. How much are the estimated profits of the crime?
9. Was the crime committed by an individual or a group of individuals?
10. Was the crime planned or opportunistic?
11. What is the modus operandi of the crime?
12. Is the modus operandi one used by known criminals? (If so, who?)
13. Who were the victims of the crime?
14. Where did the victims and perpetrators intersect?
15. Did individuals inside an entity commit the crime?
16. Did the crime involve the use of a computer or a specific type of software?
17. What were the internal controls in place that interfered with the crime?
Applying problem-solving methodologies
A seemingly discrete criminal incident examination may be just the tip of the iceberg of a much larger problem. For
example, one detected error on a financial statement may be an indicator of many other deliberate errors that reflect
financial statement fraud. Likewise, embezzlement at a bank most often reflects an environmental condition that provides
opportunity to criminals (such as a weakness in internal controls). Changing the environment may lessen or eliminate the
crime.
By examining the context of the crime you might determine if it's connected to other criminal activities or environments
and discover an underlying problem rather than respond solely to a symptom - the criminal incident.
For example, an increase in insurance claims due to alleged auto thefts might be the symptom of a problem that may
actually reflect the lack of secure parking at a train station. Focusing on improving secure parking may significantly lessen
the number of auto thefts in the community. Likewise, at the other end of the "supply chain" is a "wholesaler" who's
shipping the cars to other locations or breaking them down for parts to re-sell. Identifying and shutting down the resale
end of the operation would also reduce car thefts because it would leave the thieves without a nearby outlet for their
stolen property.
Organizing case data thoroughly
Obviously, organize all paper and electronic files with indexes so you can later easily extract evidence that could prove
innocence or guilt. Taking inventory of files early in this process will ensure that you'll have time to correct omissions
before possible prosecution and have copies ready for other investigators and prosecutors.
Many entities use Access, in-house, or other proprietary software to organize databases. Design these investigative
databases to accept all critical information that can be easily extracted and sorted for examinations.
Using data analysis techniques
With some training, fraud examiners can develop analytic devices. Vendors often provide one- or two-week analytic
training courses and may allow private-sector examiners and analysts to attend. (Law enforcement agencies sponsor
classes lasting from one to several weeks for their analysts; attendance in these generally is limited to government
employees.) Analytic software companies (such as i2, which sells Analyst's Notebook) also provide training for using their
technology.
Additionally, there are simpler devices that you can create using readily available software and limited training. For
example, an examination of staged accidents could be easily depicted using a map that shows the locations of those
accidents along with the persons involved, dates, and times. This graphic might help uncover patterns to the acts that
could show their fraudulent nature.
You can enter criminal profits into a simple Excel spreadsheet to show how they were placed into a bank account and
trace where they went. Or you might use Excel to create timelines or translate financial information into bar or line
graphs. With the drawing toolbox in Excel or a charting tool like Visio you can produce simple link charts of association,
telephone records, and commodity and event flow. Of course, chart summaries, conclusions, and recommendations
should accompany each graphic.
For example, the chart on this page illustrates the example of Medicaid fraud in Morehead's Fraud Magazine article. It
shows the general scheme used by the fraudsters to gain profits in California and launder them through a check casher in
New Jersey.
Developing case packages for management/prosecution
A case package with solid analysis of the facts and strong visuals can sway managers and prosecutors. A case
presentation package might include:




a graphic that explains the case;
a summary of the case and all the major players;
a listing of the proofs currently held and further needed evidence; and
an inventory of case documents.
The graphics might include a timeline plus charts of association, commodity flow, and event flow created in a visualization
software package.
Power of analysis
An analytic approach to fraud examination is methodical, logical, generates clear products, and provides a wellconstructed package. It allows fraud examiners to use the power of analysis without having the resource of analysts in
their organizations. Simple critical thinking isn't simplistic but can be the impetus for case resolution.
Sources
Albrecht, C. and Albrecht, W.S. (2004). Fraud Examination & Prevention. Thompson.
Morehead, J. (2004). "Medicaid Fraud: An Unhealthy Prescription." Fraud Magazine, 19(4), pp. 20-23, 50-52.
Marilyn B. Peterson, CFE, CCA, ACFE Fellow, recently retired from government after 25 years of service. She's a member of the Board of the
ACFE Foundation and the Fraud Magazine Editorial Review Board. She's now teaching, writing, consulting, and providing expert witness
testimony. Her e-mail address is:
mailto:marilynbp@comcast.net
The Association of Certified Fraud Examiners assumes sole copyright of any article
published in Fraud Magazine. Fraud Magazine follows a policy of exclusive publication.
Permission of the publisher is required before an article can be copied or reproduced.
Requests for reprinting an article in any form must be e-mailed to:
FraudMagazine@ACFE.com.
Download