A fraud examination

advertisement
Internal Audit &
Corporate Forensic Services
Florida Government Finance Officers Association
2013 Annual Conference
Agenda


















Our View of Fraud Risk
Irregularities & Defalcations
Fraud Statistics
Fraud in Most Organizations
Frauds & Allegations in the News
Key Principles to Manage Fraud
Internal Reviews and Fraud Examinations
Common Red Flags
Red Flags and Red Herrings
Fraud Theory
The Good Person Test
Our Approach to Fraud Investigations
Why Assess Control Maturity?
Data Analytics
Business Cycle Fraud Areas
Fraud Red Flags & Cases
P2P Frauds & Controls
Reporting Results
Our View of Fraud Risk
Our View of Fraud Risk
Fraud Occurs Primarily Because…
 Unseen fraud risk – blindsided
 Unmanaged fraud risk
 Anti-fraud controls being relied upon, failed
Note that fraud most often occurs without the aid of collusion and could
have been prevented by looking at a couple key areas.
Irregularities & Defalcations
…are just fancy words for lying and stealing
 There are operational risks involved in any business which includes the risk
of loss due to fraud.
 A typical organization loses 5% of its revenues to fraud each year1.
 Applied to the 2011 Gross World Product, this figure translates to a potential
projected annual fraud loss of more than $3.5 trillion1.
1 According to the 2012 Report to the Nations published by the Association of Certified Fraud Examiners
(ACFE). See the ACFE's website for a copy at http://www.acfe.com/fraud-resources.aspx
Fraud Statistics
 Asset misappropriation comprises 87% of frauds with a median loss of
$120,000 of frauds reported.
 Corruption schemes have median losses of $250,000.
 Financial statement fraud schemes make up 8% with a median loss of $1
million.
Note that our experience is consistent with these statistics1.
1 According to the 2012 Report to the Nations published by the Association of Certified Fraud Examiners
(ACFE). See the ACFE's website for a copy at http://www.acfe.com/fraud-resources.aspx
Fraud in Most Organizations
The vast majority of fraud occurs along the procurement cycle:
 Asset misappropriation
 Inventory
 Fraudulent disbursements (there are a host of schemes)
 Corruption
 Conflicts of Interest (purchasing schemes)
 Bribery
 Illegal gratuities
 Economic extortion
 We focus much of our expertise on embezzlements. We leverage our
industry expertize, internal control specialists, technology, forensic
accountants and fraud examiners to bring value and insights to our clients.
Fraud & Allegations in the News
 Mint Hill, NC – The former Fire Chief of the Mint Hill Volunteer Fire
Department pleaded guilty to embezzling more than $225,000 from the
Town of Mint Hill and the Fire Department, according to the U.S. Attorney's
Office. The former Fire Chief carried out the embezzlement from May 2010
to April 2012, primarily by setting up a sham corporation.1
 Durham, NC – Two former North Carolina Central University administrators
were indicted Wednesday on charges of embezzlement – a year after a
state audit (June 2011) found they allegedly used an unauthorized bank
account to divert more than $1 million from a state program.2
1 wbtv.com 11/27/2012 - Former Mint Hill Fire Chief pleads guilty to embezzlement
2 WRAL 8/6/2012 - Ex-NCCU administrators indicted on embezzlement charges
Fraud & Allegations in the News
 Kinston, NC – July 17, 2012, Stephen LaRoque, a sharp-tongued former
state lawmaker who often railed against wasteful government spending, had
little to say Monday as he sat in a defendant’s chair for his first court
appearance on charges of stealing federal funds.
 LaRoque, 48, of Kinston, was named in an eight-count federal indictment
last month, accused of money laundering and embezzling hundreds of
thousands of dollars from two economic development non-profits, the East
Carolina Development Company and Piedmont Development Company.1
1 NC Policy Watch 8/6/2012 - A more subdued LaRoque in court on embezzlement charges
Key Principles to Manage Fraud
 The 5 Key Principles to proactively Manage Risk1:
1.
Written policies
2.
Fraud risk assessment
3.
Prevention controls
4.
Detection controls
5.
A reporting process, and a coordinated approach to
investigation / corrective action
1Managing the Business - Risk of Fraud: A Practical Guide Joint Study conducted by The Institute
of Internal Auditors, the American Institute of CPAs and the Association of Certified Fraud
Examiners. Published July 2008
Internal Reviews & Examinations
 An internal review is used to determine if sufficient predication exists to
commence a fraud examination.
 Predication is defined by the Association of Certified Fraud Examiners
as, “the totality of circumstances that would lead a reasonable,
professionally trained and prudent individual to believe a fraud has
occurred, is occurring and/or will occur.”
 A fraud examination is an extension of a internal review to prove or
disprove a suspected loss:
 Determine whether a loss due to fraud has occurred
 Determine the extent of loss (calculate estimated damages)
 Determine whether sufficient evidence exist to:
‒ Obtain a court order for further investigation e.g., off site search warrant of
suspect’s property
‒ Obtain a court order to seize or freeze assets
‒ File criminal charges
‒ File civil charges
Common “Red Flags”
 Attempt to Limit Access to Records, Personnel or Facilities
 Missing Documents
 Dominating Management
 Ineffective Accounting Systems (Segregation of Duties) or Inadequate Monitoring
Activities
 Highly Complex Transactions Often Recorded Near Year-End
 History of Internal Control Issues Not Resolved Satisfactorily or Timely
 Poorly Communicated Code of Code or Lax Enforcement
 Aggressive Use of Accounting Principles
 Secretiveness by Employee(s)
 Appearance of Living “Beyond One’s Means”
 Failure to Take Vacation (or extended vacations without pay)
Red Flags and Red Herrings
 Conducting interviews and spotting deception
 The cast of characters - parsing out relevant facts from equivocations
(or a/k/a “bunny trails”)
 The two types of deception
 Omission
 Falsification
 Understanding internal controls and the business cycle
 Key is defining the fraud(s) and related potential allegations
 Collecting facts (who, where, what, when and how)
 Often the hardest things is to find the proverbial “smoking gun” or “dead
body”.
Fraud Theory
 Determine if “Fraud Triangle” factors are present
 Need (whether actual or perceived)
 Opportunity
 Rationalization
PERCEIVED
NEED
(pressure)
or
(lifestyle)
PERCEIVED
OPPORTUNITY
FRAUD
–Cressey, “the Fraud
Triangle”
RATIONALIZATION
(overcoming the conscience)
(control weakness)
or
(temptation)
Why Assess Control Maturity?
L
e
v
Re
er
ga
ug
el
a
t
Si
ot
nr
e
s
s
The Good Person
 Do you think most people would consider themselves to be a good person?
 Try conducting this scientific test (scientific means the test can be repeated) –
Ask a sample of people (10 – 1,000) that you come in contact with this one
“yes” or “no” question: “Would you consider yourself to be a good person?”
 How do you think most people will respond? Yes or No?
 Our hypothesis is that people that commit fraud, must first rationalize it, so that
they suppress the alarm of their conscience. “Con” – “Science” or “With” –
“Knowledge” of right and wrong. The Conscience must be overcome in order to
maintain the self image of being good person.
 It is important to understand that every person’s behavior is logical to them.
Otherwise, it is hard, if not impossible for an individual to justify their behavior.
The Approach to Fraud Investigation
 Working through an Attorney (work product doctrine)
















Initial interviews and setting expectations
Determining the fraud area(s) and avoiding the wild goose chase
Policy and statute review
Working with/without law enforcement
Digital forensics
Assessing control maturity
Data Analytics
Fraud investigation (Fraud Red Flags)
Forensic accounting and estimating losses
Reporting results
Pre and post litigation support
Assessing control maturity
Data Analytics
Business Cycle Fraud Areas
Fraud Red Flags – Cases
Reporting
Data Analytics
 We use Computer Aided Auditing Techniques (CAATs) to run tests
for most likely red flags and to narrow the focus when investigating
fraud and estimating losses.
 Revenue cycle (Financial Fraud)
 Procurement cycle (Corruption & Embezzlement)
• Vendor management
• Purchasing & Receiving
• Inventory consumption & reclamation
• Invoice processing
• Cash disbursements
 Inventory cycle (Shrinkage)
 Payroll cycle (Fraudulent disbursements)
Business Cycle Fraud Areas
 Procurement cycle (P2P)
 Inventory
 Payroll, compensation, and benefits
P2P Frauds
Corruption Activities




Conflicts of interest
Bribery
Illegal gratuities
Economic extortion
P2P Frauds
Fraudulent Disbursements
 Billing Schemes
• Shell companies
• Non-accomplice vendors
• Personal purchases
 Check Tampering
• Maker – forged or authorized
• Forged endorsement
• Altered payee or altered amount
P2P Frauds
Fraudulent Disbursements
 Expense Reimbursement Schemes
•
•
•
•
Mischaracterized expenses
Overstated expenses
Fictitious expenses
Multiple reimbursements
What is the cheapest and best control to reduce
exposure to the risks?
P2P Control Areas
 Procurement cycle (purchasing & vendor schemes)










Vendor authorization & set up
Vendor credentials
Related parties and potential conflicts of interest
Competitive bidding
Vendor change management
Vendor inactivity
Vendor record maintenance (archives)
Purchase commitments
Gifts
Reporting improper/suspicious activities
P2P SOD Controls
Best practice is to separate these duties per the
ACFE:




Purchasing Goods and Services
Authorizing the purchase
Receiving goods and services
Making payments
What control area is missing from this
separation of duties (SOD)?
P2P – Inherent Business Risks
 Inherent Business Risks:
‒
‒
‒
‒
‒
‒
‒
‒
‒
‒
‒
Lost invoices,
Late vendor payments
Missed vendor credits,
Duplicate invoice payments,
Missed early payment discounts,
Ineffective payment push-outs and pull-ins (cash mgmt)
Over-controlled back-end authorization activities
Higher employee turnover creates exposure to change
High cost of training
Non-scalable and unsustainable business processes
Impacts manufacturing execution and service delivery risk
P2P - Opportunities
Significant value can be gained by maturing internal controls and can
save mid-sized companies ($$$K - $M+) annually:











Reduce AP headcount or create bandwidth for future growth
Eliminate lost invoices
Reduce risk of duplicate invoice payments
Reduce invoices approval time (routing paper invoices)
Reduce document retention costs
Take advantage of early payment discounts
Take advantage of electronic credit card payments
Reduce cost of payment via electronic payments
Reduce time for check voucher and payment authorizations
Significantly reduce the risk of fraud
Significant process efficiencies - save manager review time
and allow monitoring using simple, effective metrics
 Lowers manufacturing and service delivery execution risk
Measuring Success in Shared Services
 Establish key metrics
 Focus on vendor management & invoice matching (preventive)
 Effective outsourcing (invoice entry & payments)
 Create paperless shared service environment
 Vendor discounts & electronic payments
 Saves real $$$ and creates more bandwidth
Fraud Red Flags - Cases
Inventory (shrinkage)
 Controls over raw consumption
• Do cycle counts really work as an anti-fraud control?
• Material issues to production
 Controls over reclamation (waste streams)
• Data analytics and expected relationships
 Controls over finished goods
• Cycle counts again
• Accepted levels of shrinkage
Fraud Red Flags - Cases
Payroll, compensation, and benefits






Controls over new hires and terminations
Controls over salary and wages
Controls over manual check processing & payouts
Controls over stock based compensation
Controls over childcare benefits
Controls over medical benefits processing
Reporting Results
The 4 elements of effective fraud reporting:
 Brief clear statement of the issue(s)
 Relevant policies, rules, standards, laws and regs
 Analysis of evidence and impressions
 Conclusions, i.e., findings and recommendations
Our Services
 We focus on embezzlement in the form of asset misappropriations, financial
statement fraud schemes, and corruption activities.
 Our Firm provides the following services:
 Fraud examination services
 Computer examinations
 Data Analysis
 Forensic accounting and economic damage computation
 Pre and post litigation support
 Fraud risk assessment and advisory services
 Anti-fraud control design and implementation
 Targeted fraud awareness training
Note: For suspected international corruption type activities, we work with global business
partners with the regional expertise in foreign operations, law enforcement and legal
systems.
Scott McKay – Brief BIO
 Partner & Practice Leader – Risk Advisory Services, CPA, CFE, CIA, CCSA
 Director Corporate Audit and Corporate Controller – Cree, Inc. (NASDAQ “CREE”) $1.2B MNC in
Semiconductor Industry with operations in 18 countries. LED lighting technology leader.
 Audit and Risk Advisory Mgr.- McGladrey. Large public and private clients in manufacturing,
distribution, construction, gaming (Casinos), along with government and university experience.
 Fraud investigation experience: purchasing schemes, conflicts of interest, credit card fraud,
check tampering, embezzlements of inventory, financial fraud, ponzi and stock option schemes
 Select speaking engagements:
American Institute of Certified Public Accountants (AICPA)
*AICPA Internal Control Task Force member - 2012 COSO Internal Control External Financial Reporting Exposure Draft
*Member - AICPA Business and Industry - Risk Management and Internal Control Advisory Panel conference speaker
*AICPA National CFO Conference (2010 Los Angeles);
*AICPA Corporate Directors Conference (2010 New York)
*AICPA task force member - Good Practice Guidance for Evaluating and Improving Internal Control in Organization published by
International Federation of Accountants
*Institute of Internal Auditors (IIA) Raleigh Chapter
*Speaker continuing professional education classes on risk management for the local IIA Raleigh Chapter
North Carolina State University (NCSU)
*NCSU lecturer - Forensic Accounting, Internal Audit undergraduate classes
Information Systems Audit and Control Association (ISACA)
*Speaker for continuing professional education classes on risk management for the local Raleigh Chapter
QUESTIONS
Contact.
Scott McKay | Partner, Forensic and Advisory Services
smckay@cbh.com | 919.782.1040
Bruce Yasukochi | Senior Manager, Forensic and Advisory Services
byasukochi@cbh.com | 954.556.1720
Cherry Bekaert LLP
www.cbh.com
Download