Back to Fraud Information Articles © September/October 2003 Association of Certified Fraud Examiners Fear Not the Software Proactively Detecting Occupational Fraud Using Computer Audit Reports By Richard B. Lanza, CPA, PMP, ACFE Associate Member While occupational fraud takes various forms, the result is always the same: The numbers generated by fraud cannot hold up to the unfailing logic of the accounting equation. If executives add false sales and accounts receivable to increase the company’s revenue, profits and cash always will be out of kilter. Technology advancements have allowed this “accounting equation” to be systemized into computer logic and applied to company data.1 Results of this logic could take the form of a simple matching of the human resource file to the accounts payable vendor master file or it could be an advanced neural network application focused on detecting money laundering schemes. Whether simple or advanced, data analysis provides many benefits in the prevention, detection, and prosecution of fraud. On one hand, entities and their fraud examiners gain insight on 100 percent of transaction data versus more limited manual methods of selection. Also, this approach generally can be completed in less time than manual procedures because of the automation. Entities also gain improved business intelligence because the generated reports often lead to conclusions beyond just the occurrence of fraud. Though advanced technology simplifies data analysis, few entities robustly use the new software tools to detect fraud. In this article, I would like to relieve the fears of frauds examiners and encourage them to incorporate systems that, I am sure, will become components of their routine audits and fraud examinations. The following information and much more is contained in a longer paper I wrote, in conjunction with the Institute of Internal Auditors (IIA) Foundation, “Proactively Detecting Occupational Fraud Using Computers.” Download the document at www.theiia.org/ecm/iiarf.cfm?doc_id=4248. And beginning with the November/December issue of The White Paper I will write a column on practical ways to use data analysis tools. Overcoming the Obstacles So what is holding back users from implementing these tools to better detect fraud? Following are the top three audit software implementation challenges with proposed solutions for overcoming them: “ I don’t know how to apply software to the prevention and detection of fraud.” The new “Proactively Detecting” document matches the list of potential computer reports to every occupational fraud per the ACFE’s uniform occupational fraud classification system. In the past, fraud examiners used basic tests (i.e., extract P.O. box addresses, match human resource to vendor master file, etc.) but now with nearly 250 reports categorized by fraud type, you can easily apply computerized methods to the prevention and detection of fraud. Although the computer report list is extensive, it is far from finished. In fact, it will never be finished as long as fraudsters can dream up new schemes. Therefore, I plan to periodically update the document. “ I have difficulty in obtaining data.” Getting data is one of the most difficult hurdles to overcome, especially for the “technology uninitiated.” However, all accounting packages now easily export date whether in a digital report format or a spreadsheet. You can ask staffers from your management information services (MIS) department for assistance in downloading data if you give them specific instructions. Fraud examiners need to know what reports to run, which will naturally drive the data elements to request. In the next section, I walk you through the data request process. (The “Proactively Detecting” document on the Web provides the data files to execute the intended reports.) “ I am not very computer literate.” Because applications developers write many of the articles on data analysis in professional publications, it is not surprising that they talk mostly about the benefits, features, and competitive differences of software tools. But these developers miss the point – technology is ubiquitous; know-how is not. Lack of tools is not the problem – even Microsoft Excel, which resides on most PCs, can double as audit software. The software community should focus more on showing users how to choose the necessary reports for the specific frauds versus how to code them into a software package. MIS departments or outside consultants can complete the coding but fraud examiners need to learn how the specific reports will help them in their examinations. How to Get Started “ Proactively Detecting” provides a step-by-step process to analyzing data, as summarized here: Steps One and Two: Assess Risk and Determine Areas Any good audit software assessment begins with risk assessment. Blindly running fraud reports is like playing darts in the dark – it is not very effective and someone usually gets hurt. Therefore, it is best to first start identifying fraud-prone areas and then use ACFE’s uniform fraud classification to pinpoint the precise frauds that are of most concern. Once you have selected a fraud type (i.e., Billing Schemes), flip to that section of “Proactively Detecting” and review the associated reports. There are roughly 20 reports for every fraud type. You may want to use the “piggy-back” brainstorming method in which you and other fraud examiners identify numerous other permutations of a selected report. For example, you may use the report, “Extract customer sales that exceed the 12-month average sales from that customer by a specified percentage (i.e., 200 percent)” on page 7 of the Reports section of “Proactively Detecting,” to identify fictitious sales entries. A piggy-back report may be the same report but only if the sale was posted in the past month of the year and the customer was newly added during the year. This refinement to the stated report increases the odds of identifying a fraud since sales entered in the last month of the year may be done to fraudulently increase sales immediately prior to year end especially when it relates to a new (and potentially phony) customer. Therefore, through brainstorming, fraud examiners can expand their potential tests while also refining the selected reports to be more specific to particular entities. Do not rush the planning portion of this assignment; use roughly 30 percent to 40 percent of the allotted project time for running these reports. This time spent is so critical because it drives the rest of the process and the ultimate effectiveness of the resulting fraud detection tests. Steps Three and Four: Select Software and Get Data The list of identified reports drives the actual software to complete the exercise. Note that the report list provided in “Pr oactively Detecting” identifies the actual test being completed in the report. The table below in this article is a summary of software tests and proposed products to execute the reports. Once you know your reports and your software tools, you can arrange a data request letter to obtain the actual data files for testing. To jumpstart the process, simply tally up the data files identified in the “Proactively Detecting” document. Within each file (i.e., Paid History file), it is generally wise to identify the specific data fields needed (i.e., vendor number, vendor name, invoice amount, etc.). Once again, the report being executed drives the process to arrive at a final list of files and fields to request. With the final list, a data request letter (a sample is in “Proactively Detecting” below of the Getting Data section) should be issued to the organization with the following key elements: specific data fields/files needed; format of files needed (i.e., text, comma delimited, Excel file, etc.); record layout of the file explaining the fields in each of the provided files; timing of the transfer (i.e., one time, monthly, etc.); method of transfer (CD, email, floppy disk, etc.); arrangements for verification information (see below); a printout of the first 100 rows and match “on screen” to the data file; computed totals for key data fields that are agreed to control totals supplied by the company’s MIS personnel; and agreed account totals to general ledger balances. If you are using an entity’s report writer to execute your tests, you will need to identify the required data elements (i.e., vendor name, employee number, invoice amount, etc.) but will not need to specifically extract data because it will reside within the system. Step Five: Run Reports After receiving the data file, all that is left is to execute the actual report and deliver the answer. Although “Proactively Detecting” does not specifically explain how to run each of these tests, many of them can be completed with minimal training (i.e., horizontal analysis in Excel). With additional training, you can process these reports or your MIS Department can run the tests in the entity’s report writer. Fraud examiners should not be afraid to use the numerous software tools to prevent, detect, and prove fraud. Begin with “Proactively Detecting Occupational Fraud Using Computer Reports” and then find more than 100 free tools at www.auditsoftware.net/community, a site that works to increase organizational benefits from the use of audit software. You cannot be left behind as technological techniques advance. Take that first step and apply these data analysis methods in your next fraud-fighting assignment. Come on in – the water is fine. Rich Lanza, CPA, PMP, is an Associate member of the ACFE, and a manager of internal audit at a Fortune 200 retailer, where he focuses mainly on using computer-assisted audit tools to improve business intelligence, increase efficiencies, and identify bottom-line savings. He is the founder of the nonprofit Web site, www.auditsoftware.net/community and headed the Program Management Office at the American Institute of Certified Public Accountants. He is the recent recipient of the ACFE’s Outstanding Achievement in Commerce Award. His e-mail address is: questions@richlanza.com. The opinions in this article are the author’s and do not necessarily represent the policies or positions of his employer. 1 Foreword by Joseph T. Wells, CFE, CPA, “Proactive Fraud Detection of Occupational Fraud Using Computer Reports,” www.theiia.org/ecm/iiarf.cfm?doc_id=4248 Test Description Software Tool Horizontal Analysis Analyzes the increases and decreases in a given balance – normally financial statement items–over two or more periods. This can be completed for balance sheet, income statement, and/or budget to actual analysis. Excel (Microsoft) Vertical Analysis Examines the elements of a financial statement for a single period whereby each balance sheet item is shown as a percentage of the total assets and every income statement item is shown as a percentage of the net sales. Excel (Microsoft) Ratios One or more balances are compared with one or more other balances Excel (Microsoft) such as the relation of total assets to the net sales of an organization. Ratios can be organized into broad categories of “Liquidity/Debt” (used to measure a company’s ability to pay its vendors or debt obligations in a timely manner) and “Profitability” (indicate the success of the organization in earning a net return on sales or on an investment). Trend Analysis Comparing any of the analytical tests (horizontal, vertical, ratio, etc.) Excel (Microsoft) described above over two or more periods. The use of trend analysis is practically a given in doing any fraud work because fraud tends to create variances over time that would go undetected if only the single year was being analyzed. Performance Measures The identification of critical success factors that lead to measures can Excel (Microsoft) be tracked over time to assess progress made in achieving specific targets linked to an entity’s vision. For example, the following represent a sampling of performance measures that could be used for accounts payable processing: • number of invoices processed; • number of open invoices at period end; and • average invoice dollar amount. Stratification Counts the number and dollar value of records of a population falling ACL within specified intervals. Stratifications also provide a useful view Excel (Microsoft) into the largest, smallest, and average dollar transactions. IDEA Aging Similar to stratification in that it produces aged summaries of data based on established cutoff dates. ACL Excel (Microsoft) IDEA Digital Analysis/ Benford’s Law Audit technology designed to find abnormal duplications of specific digits, digit combinations, specific numbers, and round numbers in corporate data. Since the objective is to find abnormal duplications, Access (Microsoft) ACL Excel (Microsoft) auditors need a benchmark that indicates a normal level of IDEA duplication. Benford’s Law gives auditors the expected frequencies of the digits in tabulated data. The premise is that we would expect authentic and unmanipulated data to exhibit these patterns. If a data set does not follow these patterns, this may be a cause for auditor concern and review. Regression Regression analysis calculates a dependent variable balance (i.e., net Excel (Microsoft) sales) based on various independent variables (i.e., product purchases, inventory levels, number of customers, etc.). Note that this test generally provides the greatest level of precision because an explicit expectation is formed using all relevant data is incorporated into the model. It also provides a specific precision percentage for each test so that the auditor can assess the reliability of the test. For more information on regression analysis, please see the following article: www.auditsoftware.net/community/how/tool/tools/regexce.doc Append/Merge Combines two files with identical fields into a single file. An example would be to merge two years worth of accounts payable history into one file. Access (Microsoft) ACL Excel (Microsoft) IDEA Entity’s report writer Calculated Field/Functions Creates a calculated field (which can use a function such as ABS for the absolute value of the field) using data within the file. For example, the net payroll pay to an employee could be recalculated using the gross pay field and deducting any withholding/taxes. Access (Microsoft) ACL Excel (Microsoft) IDEA Entity’s report writer Duplicates Identifies duplicate items within a specified field in a file. For example, this report could be used to identify duplicate billings if invoices within the sales file. Access (Microsoft) ACL Excel (Microsoft) IDEA Entity’s report writer Extract/Filter Extracts specified items from one file and copies them to another file, Access (Microsoft) normally using an “if” or “where” statement. Examples include ACL extracting all balances over a predefined limit. Excel (Microsoft) IDEA Entity’s report writer Export Creates a file in another software format (e.g., Excel, Word) for testing. An example would be to export customer address information to Word for “Mail Merging” to customer confirmation letters. Access (Microsoft) ACL Excel (Microsoft) IDEA Entity’s report writer Gaps Identifies gaps within a specified field in a file. For example, identify any gaps in check sequence. Access (Microsoft) ACL Excel (Microsoft) IDEA Entity’s report writer Index/Sort Sorts a file in ascending or descending order. An example would be sorting a file on Social Security number to see if any blank or “999999999” numbers exist. Access (Microsoft) ACL Excel (Microsoft) IDEA Entity’s report writer) Join/Relate Combines specified fields from two different files into a single file using key fields. This function is used to create relational databases on key fields. For example, the vendor master file could be related to the invoice file to obtain address information for each invoice. Access (Microsoft) ACL Excel (Microsoft) IDEA Entity’s report writer Sample Creates random or monetary unit samples from a specified population. Access (Microsoft) ACL Excel (Microsoft) IDEA Summarize Accumulates numerical values based on a specified key field. An example would be summarizing travel and entertainment expense amounts by employee to identify unusually high payment amounts. Access (Microsoft) ACL Excel (Microsoft) IDEA Entity’s report writer The Association of Certified Fraud Examiners assumes sole copyright of any article published in Fraud Magazine. Fraud Magazine follows a policy of exclusive publication. Permission of the publisher is required before an article can be copied or reproduced. Requests for reprinting an article in any form must be e-mailed to: FraudMagazine@ACFE.com.