BICA-Fraud-Seminar November 25, 2013 Fraud Risk Management Mario Fazekas Exactech N W E S Our Services • Computer Forensics • Mobile Forensics • Tablet Forensics • Network Forensics • Cyber Forensics • Memory Forensics • Incident Response • Cyber Liability Audits • Expert Witness • eDiscovery Digital Forensics • Vulnerability Assessments • Penetration Testing • Wireless & Web Application Security Assessments • IS Management • Incident Response • Technical Audit Assist Free Stuff… • ExactRiskTM • Fraud Risk Reviews • Ethics Surveys • Forensic Analytics • Fraud Awareness • Fraud Investigation • Forensic Acc. • AML Advisory • Forensic Readiness • IP Theft Mitigation Information Security eBook Fraud eBook FCPA eBook Bribery eBook Continuous Monitoring eBook What You Don’t Know Can Hurt You Practical Guide to Managing Fraud Risk Newsletter Fraud Risk Gap Analysis Risk & Advisory Training & Awareness 4 PROGRAM – Fraud Risk Management 1. 2. 3. 4. 5. 6. 7. Fraud and its Impacts In the 2012 Kroll Global Fraud Report, Africa reported the highest incidence of fraud with 85% of respondents falling victim to fraud in the past year. A 2012 study conducted by the Association of Certified Fraud Examiners (ACFE) found that the typical org. loses 5% of its annual revenue to fraud. According to BDO’s “Financial Cost of Fraud Report 2013”, since the start of the recession the global average cost of fraud has increased by almost 20%. According to the SAPS commercial crime statistics, Fraud has increased by 45.5% over the last 9 years (2004-2013). Introduction What is fraud? How big a problem is it & why? Who are the victims? Who are the perpetrators? What motivates the perpetrators? What are the potential Solutions? 5 6 1 BICA-Fraud-Seminar November 25, 2013 7 8 Problem in many organisations Typical adversarial models ignore the insider threat by assuming the organisation/TCB is free of threats Insider threat violates this assumption Firewall/IDS Corporate Network 10 Basically Employee’s Come in 3 Flavours! Engaged Not Engaged Actively Disengaged 11 2 BICA-Fraud-Seminar November 25, 2013 Number 1: Engaged Number 2: Not Engaged Engaged Not Engaged Employees are Work with Passion Feel a Profound Essentially Checked Out! Sleepwalking through their Working Day. Putting in Time, but not Energy or Passion. Connection with Employer Drive Innovation & move the company forward Teen Fired For Complaining About 'Boring' Job Bank Employee Let Go For Posting About Superior's Salary Seven employees fired from retailer for verbal attacks against customers and staff Waitress fired for complaining about clients Doctors, teachers and professors fired for posting about students & patients 15 All had “violated co policy” Number 3: Actively Disengaged Actively Disengaged Employee’s aren't just unhappy they are busy acting out their unhappiness. Every Day These people undermine what their Engaged CoWorkers Accomplish 18 3 BICA-Fraud-Seminar November 25, 2013 Bosses from Hell a visitor asked why half of the offices were empty on the top floor of the company's Manhattan skyscraper. "Those were my enemies," Davis said. "I got rid of them." 19 Bosses from Hell Scroogelike employer who routinely screamed at his staffers and made them all work the Friday after Thanksgiving and other public holidays, when he called many times to make sure they were still at the office. Proclaimed "Greed is healthy" in a 1986 commencement address at UC Berkeley, the inspiration for the Gordon Bosses from Hell Perhaps history's most dictatorial accountant who would publicly humiliate his top 120 executives every month at grueling, four-day, 14-hour-long meetings that made some of them physically ill. Geneen liked to see the pained expressions on their faces as he tore into them. Gekko speech in Wall Street. Bosses from Hell What is the history of Insider Threats? Forced his board members to give him signed resignation letters that he could accept if they ever dared to oppose him. Then promoted himself for the Nobel Peace Prize. Espionage and spying are amongst the oldest political and military trades. There are references to spies in ancient Greek history and ancient Egyptian spies were among the first to develop methods of carrying out acts of internal sabotage. BEREND HOWARD Benedict Arnold Judas ISCARIOT Robert HanSsen 24 4 BICA-Fraud-Seminar November 25, 2013 What kind of Insider Threat profile do these four cases create? Expert Knowledge Disgruntled Employee Wanted Power / Prestige History of Bad Behavior Needed Money Had a Plan Case 1 (Ancient) Yes Yes Yes No ? Yes Case 2 (Colonial) Yes Yes Yes Yes Yes Yes Case 3 (The 80’s) Yes Yes Yes Yes Yes Yes Case 4 (2000’s) Yes Yes Yes No ? Yes 2. What is ‘Fraud’? 25 26 Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes Corruption Perceptions Index (CPI) Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds Misuse It ranks countries in terms of the degree to which corruption is perceived to exist among public officials & politicians. It is a composite index, drawing on 14 different polls and surveys from 7 independent institutions carried out among business people, the general public & country analysts. Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids EFTs 28 The Myth of ‘Culture’ 30 176 29 One way to justify bribery is with the "culturally relativistic" argument. It is often suggested in developed countries that corruption is part of the "culture" of many developing countries. Yet, one could ask why there are laws against corruption in all countries, developed or developing, if, in fact, it is "a part of their culture"? Why, too, one might inquire, have the people of the Philippines, Egypt and Bangladesh mobilized against a well-armed military to bring down corrupt leaders? These events hardly square with a popular acceptance of corruption as "a part of culture." 30 5 BICA-Fraud-Seminar November 25, 2013 China 2008 It’s Our Culture / It’s Their Culture Culture The poorest of the poor – They are the real victims of corruption May 26, 2008. Mothers hold framed photographs of their children that perished in the May 12, 2008 earthquake at the Fuxing Number Two Elementary School, in Wufu town, Mianzhu city, Sichuan province, China. 31 33 Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids 35 EFTs 6 BICA-Fraud-Seminar November 25, 2013 ZZZZ BEST 1982 Barry Minkow started a carpet cleaning company in his parents' garage (16) By 1986 he was worth over $250 million (20) Appeared on Oprah Winfrey show and covers of Newsweek & People Magazine Mayor of LA declared a Barry Minkow day Became involved with the mafia 1987 ZZZZ Best collapsed – worth only $50 000 Served 7 years of a 25-year sentence Minkow - auditors 38 Accounting 537 40 Minkow Movie 41 7 BICA-Fraud-Seminar November 25, 2013 Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids EFTs Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids EFTs How Lapping Works… R/$ Embezzled Jan Vvvvvvvvvvvvvv Feb Mar Payment received from… Payment applied to… 47 8 BICA-Fraud-Seminar November 25, 2013 Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids Shell Company (Accomplice vendor) R32m secret drove mom to suicide - 28 Oct 2001 50 year old Financial Manager, Ronelle Poverello, stole R32m over 3 years Bank admits shared liability on cheques prior to 01 March 2001 (R20m) Company liable for R12m R10m VAT owed to Receiver Segregation of duties Lifestyle EFTs Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Fraudulent Statements State vs. Ferrier Payroll manipulation by the FD resulting in a loss of R3,403,806,00 to the company Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages / Hours Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Convicted on 112 counts of Fraud and sentenced to 10 years imprisonment Register Disbursements - False Refunds, False Voids EFTs Source: Adv Tommy Prins, Phyllis Atkinson & Financial Mail Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids EFTs 54 9 BICA-Fraud-Seminar November 25, 2013 nnnn nnnn 58 59 10 BICA-Fraud-Seminar November 25, 2013 Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids EFTs Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Occupational Fraud & Abuse Fraudulent Statements Corruption Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Asset Misappropriation Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Larceny Misuse -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids Register Disbursements - False Refunds, False Voids EFTs EFTs Primary methods of EFT fraud: A fictitious or alternative vendor is created with the fraudster’s own bank account details The fraudster substitutes his/her own bank account details for an existing vendor then resets the details after the fraudulent transaction. Sharing passwords or unsecure passwords Passwords PassWords Admin01 MgR3-jp2b Oct-2011 65 66 11 BICA-Fraud-Seminar November 25, 2013 Occupational Fraud & Abuse Corruption Asset Misappropriation Economic Illegal Bribery Conflict of interest -Purchase Schemes -Kickbacks Gratuities Extortion -Bid Rigging -Sales Schemes -Other -Other VIDEO - Backup-AVI Fraudulent Statements Financial Non-Financial Improper Asset Valuation -Employment Credentials Improper Disclosures -Internal Documents Fictitious revenues -External Documents Concealed liabilities & Expenses Timing differences Inventory & Other Assets Cash Larceny -Of cash on hand -From deposit -Other Fraudulent Disbursements Skimming -Sales - Unrecorded / Understated -Receivables – Lapping, Write-offs -Refunds & others Misuse Larceny -Asset Req. &Transfers -False Sales & Shipping -Purchasing & Receiving Billing Schemes - Shell Company, Non-Accomplice Vendor, Personal Purchase Payroll Schemes - Ghost Employee, Comm. Schemes, Falsified Wages Expense Reimbursement Schemes -Mischaracterized, Overstated, Fictitious, Multiple Reim. Cheque Tampering - Forgeries and counterfeits Register Disbursements - False Refunds, False Voids EFTs 68 3. How big a problem is fraud ? 69 70 71 “While Botswana continues to enjoy the status of being the least corrupt African country, according to Transparency International, fraud is likely to become Botswana's next 'crisis' with losses due to fraud likely to run into millions of Pula per annum, creating untold damage to the country's economy, and leading to business closure due to loss of revenue, the result of which will be consequent loss of employment.” 72 12 BICA-Fraud-Seminar November 25, 2013 Fraud Theory: Tip of the Iceberg 20% Group 1 Fraud (Exposed & in the Public Domain) Prosecution Considered 40% Group 2 Fraud (Known by a few & not made public) 1st sign of Fraud 40% Group 3 Fraud (Undetected) 80% Grey Unknown 74 TI Report says areas prone to Corruption in Botswana include: “Corruption in Botswana is becoming increasingly complex and challenging. The biggest challenge this year has been in the area of procurement, followed by land dealings and cheque fraud. There is also a growing trend of cheating in examinations.” Acquisition of fraudulent driver’s licences, Illicit land deals particularly in main land boards, Self Help Housing Agency and in urban and peri-urban areas, Tendering and Procurement, ID Theft, Fake Degrees & Diplomas, Nepotism in recruitment and Bribery. - DCEC (Directorate on Corruption and Economic Crime) Director, Rose Seretse 75 76 The 2013 WEF global risks lists cyber crime, entrenched organised crime and data fraud/theft as some of the current top risks 77 78 13 BICA-Fraud-Seminar November 25, 2013 The Impact of fraud Monetary loss 4. Who are the victims? • Investigative costs • Productivity reduction • Increased business risks • Security & control costs • Public relations expenses • Lost Customers • Less money for salary increases & bonuses • Lost jobs 80 Fraud Threats Fraud Threats Private Co Government NGOs Shoplifting False refunds False credit cards Hot cheques False advertising Short shipments Defective products Price fixing Customers Fraudulent F/S Shoplifting False refunds False credit cards Hot cheques Competitors Theft of trade secrets Employee bribery Vendors Suppliers Consultants Short shipment Double billing False invoices Employee bribery Insider trading Related party transactions Stockholders Creditors Customers Public Co Owners Managers Public Co Private Co Government NGOs Government Vendors Suppliers Consultants Employees Expense account padding Embezzlement Theft of cash and property Short shipment Double billing False invoices Employee bribery Kickbacks Manipulation of data False benefit claims Padded payroll Tax evasion Contract cost padding False benefit claims Employees Expense account padding Embezzlement Theft of cash and property Kickbacks Manipulation of data False benefit claims Padded payroll Insurers False loss claims Who commits fraud? 5. Who are the perpetrators? E&Y Global Fraud Survey Ernst & Young Fraud Survey 83 14 BICA-Fraud-Seminar November 25, 2013 Fraudsters in the workplace Fraudsters in the workplace 100 90 80 70 60 50 40 30 20 10 0 Honest Corrupt Source: Hibis Source: Hibis Fraud Triangle (1963) 6. What motivates them? Dr Donald Cressey ISA-240 Appendix-1 Rationalisation Pressure Opportunity 87 88 7. SOLUTIONS? 89 90 15 BICA-Fraud-Seminar November 25, 2013 Answering some common questions… 1. Petro-chemical case study Fraud is not “high risk” for us. “No fraud here” mentality Fraud losses are called something else Accounting Management Excuse Operational losses Evaporative losses from storage Rebranding Losses due to the volume of product in the pipeline during rebranding process Unallocated losses Maintenance related over-ride of retail dispensing system for servicing Contraction losses Volume differences due to temperature related contraction (hot to cold) Source: Preventing Fraud: Assessing the Fraud Risk Management Capabilities of Today’s Largest Organizations by Protiviti 91 Source: KPMG Answering some common questions… Petro-chemical case study 2. Accounting Management Excuse Actual Reason Operational losses Evaporative losses from storage Theft from storage (sealed tanks reduce evaporation) Rebranding Losses due to the volume of product in the pipeline during rebranding process Unallocated losses Maintenance related over-ride of retail dispensing system for servicing Theft from retail site (maintenance override should be minimal) Contraction losses Volume differences due to temperature related contraction (hot to cold) Theft from storage and in transit (sealed tanks have temp control) WHO IS RESPONSIBLE FOR PREVENTING FRAUD? According to both the National Commission of Fraudulent Financial Reporting(1987) and ISA 240 (Consideration of Fraud in a Financial Statement Audit): "It is management's responsibility to design & implement controls to prevent and detect fraud”: Theft from storage and in transit (rebranding should be low volume) "Management... should set the proper tone... and establish controls to prevent, deter, and detect fraud“ The internal & external auditors are NOT responsible for fraud prevention! Source: KPMG ATTENDANCE LIST HOW TO DETECT & PREVENT OCCUPATIONAL FRAUD 6-9 DECEMBER 2011 CORP CONFERENCE CENTRE 94 COMPANY DELEGATE NAME JOB TITLE Hollard Total SA Todini Mangwanda Xolani Malinga Nicole Coetzee Jeanette Bester Carla Lems M Mtimkulu Petrus Mokoena Mogalanyane Makola Nelisiwe Pule Evodia Malebo Martin Mae Lorato Modise Forensic Auditor Snr Auditor Internal Auditor Buyer Financial Clerk Buyer Inventory Admin Hilma Nangolo Katrina Nakashona Daniel Keramin M Mathibela Amos Mkhatswa Vusi Makhubu Nomfundo Dlamini Sindile Mcanyana Dudu Ncongwane Johan Hattingh Snr Internal Auditor Snr Investigator Manager: Internal Audit Internal Auditor Manager: Internal Audit Director: Finance Ass Director: Marketing Human Resource Manger Internal Auditor HOD Rand Water Dept of Rural Development RIPCO Roads Authority Mvelaserve Swaziland Railway SPTC Ned Hervormde Kerk ATTENDANCE LIST HOW TO DETECT & PREVENT OCCUPATIONAL FRAUD 6-9 DECEMBER 2011 CORP CONFERENCE CENTRE Director Director Chief Director Director Snr Internal Auditor COMPANY DELEGATE NAME JOB TITLE Hollard Total SA Todini Mangwanda Xolani Malinga Nicole Coetzee Jeanette Bester Carla Lems M Mtimkulu Petrus Mokoena Mogalanyane Makola Nelisiwe Pule Evodia Malebo Martin Mae Lorato Modise Forensic Auditor Snr Auditor Internal Auditor Buyer Financial Clerk Buyer Inventory Admin Hilma Nangolo Katrina Nakashona Daniel Keramin M Mathibela Amos Mkhatswa Vusi Makhubu Nomfundo Dlamini Sindile Mcanyana Dudu Ncongwane Johan Hattingh Snr Internal Auditor Snr Investigator Manager: Internal Audit Internal Auditor Manager: Internal Audit Director: Finance Ass Director: Marketing Human Resource Manger Internal Auditor HOD Rand Water Dept of Rural Development RIPCO Roads Authority Mvelaserve Swaziland Railway SPTC Ned Hervormde Kerk 95 Director Director Chief Director Director Snr Internal Auditor 96 16 BICA-Fraud-Seminar November 25, 2013 Answering some common questions… Fighting Fraud is a Shared Responsibility 97 98 Management & Directors: Executives Abandon Enron Fraud Exposure Rectangle Management & Directors 2 1 The Organization & Its Industry Company’s Relationship with Other Entities Financial Results & Operating Characteristics 4 3 November 25, 2013 99 2 Relationships with Others Buffalo Sabres Hockey Interior Design Shop Family-owned Farm Money to the Rigases Transaction Account from Adelphia Communications 1 Rebecca Mark-Jusbasche, formerly CEO of Azurix, Enron’s troubled water-services company left in August, 2000 Joseph Sutton, Vice Chairman of Enron, left November, 2000. Jay Baxter, Enron Vice Chairman committed suicide May 2001 Thomas White, Jr., Vice Chairman, left in May, 2001. Lou Pai, Chairman of Enron Accelerator, departed May 2001. Kenneth Rice, CEO of Enron’s Broadband services, departed in August 2001. Jeffrey Skilling, Enron CEO, left on August 14, 2001 November 25, 2013 Leased Vehicles to Adelphia The most common auditor failings were: failure to assess and respond to fraud risks lack of competence and diligence lack of professional scepticism Money to the Rigases Furniture/Design Services to Adelphia Money to the Rigases Landscaping, Maintenance to Adelphia Money to the Rigases The American Institute of Certified Public Accountants Financial Executives International Institute of Management Accountants Information Systems Audit & Control Association Institute of Internal Auditors Association of Certified Fraud Examiners Society for Human Resource Management Tickets to Adelphia 3. “WE HAVE EXTERNAL AUDITORS!" A 2013 study shows that auditors are making simple mistakes, like overlooking suspicious documents and missing blatant accounting scams. The long-term analysis of frauds from 1998 through 2010 found that auditors sometimes did not question documents that appeared to be fabricated or that they overlooked discrepancies between real inventory & amounts on the books. 100 Organization & Industry Company is doing extremely well yet competitors are not Unduly Complex Organizations Lack of Internal Audit Weak Audit Ccommittees Board of Directors with Few Outsiders 3 Private Car Dealership Rigas’ Family Entities November 25, 2013 101 November 25, 2013 102 17 BICA-Fraud-Seminar November 25, 2013 Examining financial statements Examining financial statements 4 Enron's 1999 annual report: Enron's 1998 annual report: The company's strategy gets murky: "Enron is moving so fast that sometimes others have trouble defining us. But we know who we are, we are clearly a knowledge-based company, & the skills & resources we used to transform the energy business are proving to be equally valuable in other businesses." The company describes itself as a "global energy franchise,” and goes on to say that its "unparalleled ability to deliver on these three words will propel Enron to become THE 'blue chip' Electricity & gas company of the 21st century." November 25, 2013 103 Examining financial statements Enron's 2000 annual report: The report summary says, "Enron hardly resembles the company we were in the early days… we have metamorphosed from an asset-based pipeline & power generating company to a marketing & logistics company whose biggest assets are its well-established business approach & its innovative people." November 25, 2013 November 25, 2013 104 Answering some common questions… 4. "BUT WHAT ABOUT OUR INTERNAL CONTROLS?" “If you were to ask a group of typical accountants what deters fraud, they would respond in unison: ‘Internal control!’ Using this logic, companies with adequate controls would not have fraud. But they do, time & again.” – Joe Wells, founder of the ACFE Internal Controls ≠ Fraud Prevention! Every organisation has ‘internal controls’ but they don’t all have ‘fraud prevention’! 105 “We Need to Deprogram Ourselves & Come up with a Different Approach” Controls are important, but not the whole answer We need to know more about fraud prevention Research has shown that the ideal solution is a Model Organizational Fraud Deterrence Program / Framework… 106 Implement this leading practice Anti Fraud Program… Source: Ron Warmington, GE Money PREVENTION is best… Rapid DETECTION is good… But once detected… INVESTIGATE, RECOVER THE MONEY and then CORRECT the Processes 18 BICA-Fraud-Seminar November 25, 2013 Implementing the Anti Fraud Programme (AFP): 16 Liaise with Other Banks / Police / Regulators & Build Partnerships to fight Crime 17 Issue Fraud Alerts / Continuously Refresh Methods 18 Engage with Ombuds Process 15 R&D to find / test / select / roll out Fraud Management Technology Start here 1. Establish Fraud Strategy, Accounting / Reserving Policies 19 Revise the Strategy / Update Policies / Re-set Imperatives (Risk-based / Proportionate / Practical) 2. Establish Controllership / Fraud Committee 3. Appoint FRM (Risk) and ISM (Ops) Maximise Collections & Recovery Results 4. Adopt Global Fraud Definitions Use Root Cause / Trend Analysis to drive Process Correction 5. Implement Spectrum and Garrison Fraud Reporting / Case Management Systems All Cases > USD 10,000 (plus ALL Employee Fraud Cases) loaded in Garrison… Automatic Reports to Senior Mgmt / Regulators 6. Measure Current Fraud Losses & Benchmark Key Ratios 7. Set Fraud Loss ‘Red Lines’: • % of Sales (Bpts) 14 Monitor Business Fraud Performance against Plan (Spectrum / Fraud PQRs) (Portfolio Quality Reports) By • % of Credit Losses P roduct • % of Net Income 13 CRP / NPI Processes ensure all New Product Initiatives are Fraud Repellent (Credit review point) 10 Raise Professionalism of FRMs & ISMs to meet GE Global Standards 12 Run Fraud Awareness Training Courses for ALL Staff Data Analytics - Review prior Credit Writeoffs to isolate / analyse / learn from previously undetected fraud 11 Share Best Practices & Fraud Case Studies with other GE Businesses Type 8. Determine ‘Sweet Spot’ on Fraud Management Cost v Return (ROI > 7:1 or better) Fraud Prevention Building Blocks “Most accountants think ‘internal control’ is the answer, yet organisations with controls still have fraud. Controls are only part of the answer but not the whole solution.” - Joe Wells ACFE Founder ROI on an effective AFP Recruitment Fraud Risk Assessment Policy Training & Awareness Data Analytics Internal Controls ACFE Fraud Prevention Check-up 2002 TOTAL Fraud, Prevented, Recoveries & ROI 2002 ($MM) Median Loss Based on Presence of Anti-Fraud Controls % of Cases Implemented Yes No Control Value System Accountability - Ethics Whistle blowing System 9. Adopt GE’s Global Minimum Standards / Fraud Imperatives incl. KYC / KYI / Pre-employment screening / etc. Reward Employees for Prevention / Detection Achievements 1 Tone at the Top 150.0 % Reduction Total Fraud Exposure (Incl. failed fraud attempts) 108.4 Surprise audits 25.5% $70,000 $207,000 66.2% Job rotation/mandatory vacation 12.3% $64,000 $164,000 61.0% Hotline 43.5% $100,000 $250,000 60.0% Employee support programs 52.9% $110,000 $250,000 56.0% Return on Investment = 27:1 Fraud training for managers/execs 41.3% $100,000 $227,000 55.9% (108.4+10.2)/4.4 Internal audit/fraud examination dept 55.8% $118,000 $250,000 52.8% Fraud training for employees 38.6% $100,000 $208,000 51.9% Anti-fraud policy 36.2% $100,000 $197,000 49.2% External audit of ICOFR 53.6% $121,000 $232,000 47.8% Code of conduct 61.5% $126,000 $232,000 45.7% Mgmt review of internal controls 41.4% $110,000 $200,000 10.2 Recoveries 45.0% 31.4 Net Fraud Losses External audit of financial statements 69.6% $150,000 $250,000 40.0% Independent audit committee 49.9% $137,000 $200,000 31.5% Mgmt certification of financial statements 51.6% $141,000 $200,000 29.5% 5.4% $107,000 $150,000 28.7% Rewards for whistleblowers 41.6 Gross Fraud Losses Detected / Averted / Prevented 140 72% of all Fraud Attempts Prevented / Detected / Averted 24% of Remaining Gross Fraud Losses then Recovered Net Fraud Losses were just 21% of Total Fraud Attempts $MM 4.4 Fraud Management Costs Impressive 2002 Fraud Prevention / Detection Performance… Recoveries boosted by USD 6.5 million from Czech IT Fraud Case 2003 TOTAL Fraud, Prevented, Recoveries & ROI ($MM) 2003 334.5 Total Fraud Exposure (Incl. failed fraud attempts) 282.3 Detected / Averted / Prevented 140 84% of all Fraud Attempts Prevented / Detected / Averted Return on Investment = 29:1 (282.3+10.2)/10.0 52.2 Gross Fraud Losses 20% of Remaining Gross Fraud Losses then Recovered 10.0 10.2 Recoveries 42.0 Net Fraud Losses Net Fraud Losses were just 13% of Total Fraud Attempts Fraud Management Costs Fantastic 2003 Fraud Prevention/Detection Performance… But Recoveries Need Further Attention through More/Better Investigations Source: Shannon Grayer, Microsoft 114 19 BICA-Fraud-Seminar November 25, 2013 ANTI-FRAUD PROGRAM REVIEW GAO Summary Report Graphic Performed by Exactech for Eskom Forensic Strategy Review • Review of Forensic Manual • Fraud Response Plan & Fraud Prevention Plan updates and expansion Review of Hotline Calls • All call reports for past 12 months reviewd in terms of process, trends, outcomes, root cause analysis, etc. Fraud Awareness training for managers at P/S • Employees were then trainined as a phase two in 2010 after we had trained the trainer Fraud Risk Assessment • Rotek (2009) • Roshcon (2011) Fraud Awareness Newsletter • Integrity in the Spotlight • Also usedcartoonist for general newsletter Data Analytics • Results were used to confirm findings from fraud risk assessments (2009 & 2011) US General Accounting Office COSO 1992 Cube COSO 1992 and 2004 Cubes } } 2 Entity Structure Components Philosophical Change COSO organizing frameworks: COSO 1992 – Internal Control COSO 2004 – Enterprise risk management COSO 1992 and 2004 Cubes • What’s different? The change is an explicit recognition of the limitations of internal control in preventing many high-profile corporate frauds Internal Environment Objective Setting Event Identification Risk Assessment Risk Response Control Activities Information and Communication Monitoring 1992 Framework 2004 Framework Slide 120 20 BICA-Fraud-Seminar November 25, 2013 Who is a Framework For? Management Models COSO 2013 Cube Frameworks Management by Objectives Balanced Scorecards Six Sigma Management by walking around Management Etc. Summary of Updates A changing business environment... Drives updates to the Framework... Expectations for governance oversight Internal COSO COCO Controls Globalization of markets and operations Changes in business models Demands and complexity of rules, regulations and standards Expectations for competencies and accountabilities Controls Use and reliance on evolving technology Auditors need some way to evaluate controls in the many different management models we see – that’s a framework! Updated COSO Cube Expectations for preventing and detecting fraud 121 Summary of Updates Two Cubes… Codification of 17 principles embedded in the original Framework Control Environment 1. Demonstrates commitment to integrity and ethical values 2. Exercises oversight responsibility 3. Establishes structure, authority and responsibility 4. Demonstrates commitment to competence Tone at the Top 5. Enforces accountability Risk Assessment 6. Specifies relevant objectives 7. Identifies and analyzes risk Value System Accountability - Ethics 8. Assesses fraud risk Whistle blowing System 9. Identifies and analyzes significant change Control Activities Information & Communication Monitoring Activities 10. Selects and develops control activities 11. Selects and develops controls over technology 12. Deploys through policies and procedures 13. Uses relevant information 14. Communicates internally 15. Communicates externally 16. Conducts ongoing and/or separate evaluations 17. Evaluates and communicates deficiencies I/C Framework Recruitment Fraud Risk Assessment Policy Training & Awareness Data Analytics Internal Controls COSO I/C Framework Data Analytics Training & Awareness Internal Controls Fraud Risk Assessment Creating a Control Environment Tone at the Top, Accountability, Polices, Hiring, Hotline, Code of Ethics (All contributing to the Company Culture) • Gained wide acceptance following financial control failures of early 2000’s • Most widely used • The ACFE’s 10 building blocks correspond nicely Monitoring Activities Sharing Information and Communication Performing Fraud Risk Assessments AFP Designing and Implementing Antifraud Control Activities framework around the world with COSOs internal control framework. 125 126 21 BICA-Fraud-Seminar November 25, 2013 Keep the Strategy but Change Your Tactics Where you are… Tone at the Top Value System Accountability - Ethics Whistle blowing System Recruitment Fraud Risk Assessment Policy Training & Awareness Data Analytics Internal Controls 127 What is your state of readiness? • Ready to fight • Unaware / Not alert Red Orange White Yellow • Heightened state of alertness • Relaxed / General alertness 128 A COSO-based Anti-Fraud Program 1. Establishing appropriate “tone at the top” and organizational culture 2. Documenting antifraud policies & procedures & Code of Ethics. 3. Hiring & promotion standards 4. Establishing, complementing, or evaluating Internal Audit functions 5. Responding to allegations or suspicions of fraud 6. Enforcing accountability 7. Implementing & maintaining a fraud and ethics hotline and whistleblower program Creating a Control Environment Monitoring Activities Performing Fraud Risk Assessments AFP Sharing Information and Communication Designing and Implementing Antifraud Control Activities Source: Deloitte Source: http://en.wikipedia.org/wiki/Jeff_Cooper#Combat_Mindset_-_The_Cooper_Color_Code Tone at the top Goldfields Sun International Nedbank ‘Slap & Smile’ Management Style Brad Sadler 132 22 BICA-Fraud-Seminar November 25, 2013 Are all these people “bad apples”? Page 111… WorldCom “We’ve received a tender and there are only 3 companies in the country competent to tender because of the specs, so we’ve decided to have a pre-opening tender so that whichever way it goes we’re going to make a lot of money”. Everyone applauded. They asked how much they would make and he confided “even if we don’t get the job we’ll make a million!” I raised my hand. “Excuse my ignorance, what is a pre-opening tender?”… …I was amazed, “Is that allowed?” I asked. “Of course not!” “Isn’t that fraud?” “Of course, but everyone does it!” Enron Bernie Ebbers Ken Lay Scott Sullivan Health South Adelphia Andy Fastow Tyco Richard Scrushy Dennis Kozlowski John Regis Source: Dr. Tony Dimnik and Dr. Pamela Murphy, Queen’s School of Business 133 Types of Shareholder Leakage Jeff Skilling Why The Wealthy Feel Poor! Excessive salaries (year totals) Executive/Company Base Salary Incentive Pay Exercised Remaining Options Equity Holdings Bernie Ebbers, WorldCom $4.8 million $41.6 million $24 million $389 million Kenneth Lay, Enron $6 million $16.1 million $182 million $545 million Dennis Kozlowski, Tyco $6.9 million $15 million $281 million $786 million John Regis, Adelphia $12 million $ $ $ Richard Scrushy, Healthsouth $15.4 million $93 million $300 million $16.5 million We’ve always thought that feeling wealthy was subjective. But we never knew how subjective: 3 recent studies indicate that the wealthiest among us don’t think they’re loaded enough. A Gallup study – 3 in 10 people making more than $250,000 annually don’t realize that they are “upperincome.” A Fidelity Investments survey - four out of ten American millionaires do not feel wealthy. A Boston College study - the majority of those who have more than $25 million do not consider themselves financially secure. 1. 2. 3. 136 http://www.learnvest.com/living-frugally/psychology-of-money/why-the-wealthy-feel-poor-133/ Martha: The Company The charges • Four core magazines. Emmy award-winning domestic arts television program. Weekly segment on CBS “This Morning.” Stewart sells nearly 4,000 shares of Imclone stock worth $229,000 the day before it plummeted (due to FDA’s non-approval of Imclone’s new cancer drug) do to insider knowledge • Stewart went so far as to delete a computer log of the incriminating phone call and went on to lie to investigators • “Stewart holds a Series 7 license. As a licensed stockbroker, she knows her actions may have well been illegal. She's not just some innocent who made a mistake or wanted to save her investment.” 34 books, sold over 10 million copies $80.00 $60.00 $40.00 12/31/01: $46.46 at closing. $20.00 $0.00 Dec-03-01 Jan-02-02 Jan-31-02 23 BICA-Fraud-Seminar The Economic Cost$ of the Scandal • Stewart’s television network holiday special was cancelled resulting in TV revenues dropping from $9.6m a year ago to $6.4m • Shares have fallen from $19 to just over $9 • In 2003 Stewart reported that legal fees, lost business, & lost opportunities due to the Imclone insider trading scandal had cost her over $700m • She has lost her position as Chair of the Board & CEO • Martha was sentenced in July 2004 to five months in prison for obstructing a federal securities investigation. November 25, 2013 There are Some Things Money Can’t Buy… Amount realized from selling ImClone stock on December 27, 2001: $229,002. Amount Martha would have received if she sold after the news was public: $189,495 Overall savings: $39,507 Being able to continue life as an icon… PRICELESS Nokia 808 Pureview 41 MegaPixel camera! 24 BICA-Fraud-Seminar November 25, 2013 Lots of people are upset about a recent policy change at Google whereby the search giant announced it will start using the names and photos of people who use Google+ in advertisements. Seth Godin – Marketing Guru “To satisfy Wall Street, companies hire a new kind of employee -- the kind who can and will do whatever it takes to keep making those profit numbers go ‘up and to the right’… …even if it means doing things that are bad for customers and run counter to the company’s core values. 147 The ability to rationalize is The Fraud Triangle… 148 Which one/s should be fired? influenced by the “tone at the top” and perceptions the employee has regarding management’s commitment to the “rules.” 1. Boeing CEO has affair with female Boeing executive 2. Game stores director steals packet of razor blades 3. The CEO is caught speeding at 186 kms p/h in a 120 km zone. Rationalisation Pressure Opportunity Will laws & controls help here? 149 150 25 BICA-Fraud-Seminar November 25, 2013 Boeing CEO Game Stores Director Boeing fires CEO over relationship (www.cnn.com, 7 March 2005) Boeing has ordered its CEO Harry Stonecipher to step down because of what the U.S. aircraft giant said was an improper relationship with a female executive. The company said that Debra Peabody did not report directly to Harry & that the relationship was consensual & had no effect on the conduct of the company's business. But it said the relationship violated Boeing's code of conduct… "the board concluded that the facts reflected poorly on Harry's judgment & would impair his ability to lead the company,” However, the CEO must set the standard for unimpeachable professional & personal behavior, & the board determined this was the right & necessary decision under the circumstances. Game CEO holds a disciplinary hearing, finds the accused director guilty and fires him. A few weeks earlier one of the cleaning staff had tried to steal some stationery and she was dismissed on the spot. Source: Brand Pretorius 151 152 CEO of… Policies, Plans, Codes, Guidelines Beginning of August 2006 caught speeding in Jhb End of August 2006 he resigns as CEO of Pick ‘n Pay. Fraud Policy Fraud prevention plan Code of ethics Code of conduct Social Media Whistle blower policy Reward policy Corruption policy Fraud response plan 153 What’s the Most Important thing You could ever have? Money Happiness Love Values Health 154 The most controversial lottery winner that comes to mind is Jason Canterbury who won R6.7 million in a 2003 lottery at the tender age of 18. The Cape Flats resident turned to drugs and crime to support his extravagant lifestyle after he blew his fortune, and he landed up in jail with a 28 year sentence after being charged for murder. The moral of the story is this: If you're lucky enough to win millions in the South African lottery, get yourself a good financial advisor and save at least half for a rainy day! Freedom Security Career ? By the way, Gidani offers free counseling to anyone who has won R50,000 or 155 over! 156 26 BICA-Fraud-Seminar November 25, 2013 4 factors that affect ethical decisions Zimbabwean Broke after winning SA lotto The first mega-million lottery winner in SA's history, Batsirayi Mupfawi, made headlines in 2000 after he won R14 million through a R5 lottery ticket. Mupfawi is now bankrupt with a string of debts. However, Mupfawi insists that, compared to other lottery winners in history, he is in a good position and that “I'm fortunate that nothing happened to me.” Mupfawi was referring to some of the more infamous lottery winners who obviously couldn't handle the pressures and went astray… 4 Social Pressures 3 Tension <> personal values & organizational needs 2 Professional Standards William Post, who won more than R780-million in a US draw in 1998, only to end up living on a social grant after relatives siphoned away his windfall, hired a hit man to kill him and then sued him; and Jeffrey Dampier, who died after his 1986 US win of R134- million. His sister-in-law, who had hoped to inherit his windfall, was sentenced to life in prison for his murder. 1 The Law 157 Your future workforce… (cheating in college) 11% reported cheating in 1963 49% reported cheating in 1993 75% reported cheating in 2007 159 http://www.engin.umich.edu/research/e3/ CHEATING & CRIME DAN ARIELY BEHAVIORAL ECONOMIST, Massachusetts Institute of Technology , AUTHOR OF “PREDICTABLY IRRATIONAL”, Video clip links: http://fora.tv/2008/03/04/Dan_Ariely_Predictably_Irrational http://www.ted.com/index.php/talks/dan_ariely_on_our_buggy_moral_code.html 160 Lessons… of people cheat – just a little bit! When people were reminded about morality (10 commandments) they did not cheat. A lot 162 27 BICA-Fraud-Seminar November 25, 2013 Religion isn’t about only worship and ritual; it teaches believers how to live. Thus, the holy books of every major religion are filled with precepts and principles about honesty, justice, fidelity, compassion, and charity that leave no doubt about the role ethics and personal virtue should play in our daily lives at home and at work. In his fine book The Business Bible: 10 New Commandments for Bringing Spirituality & Ethical Values into the Workplace, Rabbi Wayne Dosick tells of a soapmaker who challenged a rabbi: “What good is religion? It teaches honesty, but most people are dishonest.” (How does the Rabbi Answer…?) - Michael Josephson, The Application of Religion to Business 163 164 Letter that a principal sent to his teachers at the beginning of each new school year… Why is Ethics / Honesty Decreasing? Modeling (example) Labeling Dear Teacher, I am a survivor of a concentration camp. My eyes saw what no man should witness: Gas chambers built by learned engineers. (teaching & training) Children poisoned by educated physicians. Infants killed by trained nurses. Women and babies shot and burned by high school and college graduates. So I am suspicious of education. My request is: Help your students become human. Your efforts must never produce learned monsters, skilled psychopaths, educated Eichmanns. Reading, writing, arithmetic are important only if they serve to make our children more human. Ethics / Honesty Source: W. Steve Albrecht, Associate Dean Marriott School of Management Brigham Young University 166 How Important is Integrity? In a survey of 54,000 people Integrity was by far the #1attribute desired in a leader 1 Illustrations drawn by Jack Chick in David Daniel’s book ‘Did the Catholic Church give us the Bible?’ www.chick.com 1 (Quoted in Stephen R. Covey’s preface to Business with Integrity, p. xx) 168 28 BICA-Fraud-Seminar November 25, 2013 Modes of managing ethics Most people do mostly right things most of the time It’s the difference between ‘most’ and ‘all’ where the challenge of doing right is found – and where the greatest opportunity for ethical enhancement exists. To be sure, none of us is perfect. And that needs to be seen for exactly what it is: A FACT…A CONDITION, NOT AN EXCUSE. Compensating for our imperfections and overcoming temptations we face require commitment and self-discipline. REACTIVE COMPLIANCE INTEGRITY TOTALLY ALIGNED Aware of ethics risk Prevent unethical behaviour Promote ethical behaviour Ethics integrated with corporate purpose and strategy Rules & external enforcement Values & internal commitment Ethics entrenched in corporate culture Ethics standards created, but not enforced Behaving ethically – being people of integrity – isn’t always easy, but it is always RIGHT! It is a requirement for long-term success. Letter of the Law Spirit of the Law 169 Hitachi strives to conduct its corporate activities in a fair and open manner, which requires us to practice… Organisations expect all employees to share their commitment to a value system that adheres to high moral, ethical and legal standards and a culture of achievement.” “Basics and Ethics” & “right and wrong, not loss and gain”. 171 172 Ethical Choices Legal Illegal Ethical Un ethical 174 29 BICA-Fraud-Seminar November 25, 2013 Comment on Policies Hiring Must Be Written Annual Written Acknowledgement & Agreement by Employees Communicate to Employees, Customers, Vendors 176 Kroll % Criminal DMV Record Info. Credit Drug Employment Education Workers' History Testing Verification Verification Comp History Client Average 9.5 47.5 42.9 3.3 48.1 22.6 6.8 Automotive 13.9 53.5 56.3 4.7 Construction 15.4 55.4 44.4 2.1 32.6 * 5.4 51.1 27.6 6.1 Education 3.6 39.1 29.9 Food Services 13.4 51.7 37.5 8.5 46.3 16.8 8.4 3.3 49.7 25.9 Hospitality 10.1 53.8 8.5 48.1 5.8 47.3 * Manufacturing 12.6 * 47.4 39.0 2.3 51.4 29.2 8.7 Non-Profit Professional Services 9.7 46.3 33.0 4.1 55.8 26.0 * 10.7 50.0 47.4 6.0 46.3 24.3 6.8 Real Estate Retail 10.0 49.7 51.2 2.6 46.9 24.7 * 13.7 52.8 43.4 2.4 46.3 20.0 6.4 Staffing 8.1 47.0 50.4 3.1 51.6 21.0 4.6 Technology 6.9 42.8 34.7 2.2 51.4 22.4 1.1 Transportation 11.2 50.5 40.1 2.7 59.9 16.0 5.9177 Annual Assessment of Problems Education Anomalies at all-time High Exaggeration and falsification of academic qualifications rife. 63% of all screenings undertaken in EMEA in September 2013 contain an inaccuracy or lie http://www.hireright.co.uk/blog/2013/10/education -anomalies-at-an-all-time-high/ 178 Apples & Barrels Good Apple Good Barrel Bad Barrel Bad Apple Change Leave Change Leave Source: Prof. G J (Deon) Rossouw, University of Pretoria 30 BICA-Fraud-Seminar November 25, 2013 Staff Vetting Exit Interviews Pre-employment screening Continuous in-service screening Recruit Career Criminal Resign vs. Situational Criminal 184 I’ll Take that – survey shows it’s common for staff to take confidential company info when they resign 185 186 31 BICA-Fraud-Seminar November 25, 2013 Internal Audit 187 Perception of the enterprise risk profile by role Issue Timing Auditing Recurring Audits are conducted on a regular, recurring basis Fraud Examination / Forensic Auditing Non-Recurring Fraud examinations are non-recurring. They are conducted only with sufficient predication. Scope General The scope of the audit is a general examination of financial data. Opinion An audit is generally conducted for the purpose of expressing an opinion on the financial statements. Non-Adversarial The external audit process is nonadversarial in nature. Specific The fraud examination is conducted to resolve specific allegations. Affix Blame The fraud examination’s goal is to determine whether fraud has occurred, is occurring or will occur, and to determine who is responsible. Adversarial Fraud examinations, because they involve efforts to affix blame, are adversarial in nature. Methodology Audit Techniques Audits are conducted primarily by examining financial data. Presumption Professional Scepticism Auditors are required to approach audits with professional scepticism. Fraud Examination Techniques Fraud examinations are conducted by (1) document examination; (2) review of outside data such as public records; & (3) interviews. Proof Fraud examiners approach the resolution of a fraud by attempting to establish sufficient proof to support or refute an allegation of fraud. Objective Relationship 189 190 IIA Standard 1200: Proficiency & Due Professional Care 1210.A2 – Internal auditors must have sufficient knowledge to evaluate the risk of fraud and the manner in which it is managed by the organization, but are not expected to have the expertise of a person whose primary responsibility is detecting and investigating fraud. IIA Standard 1220: Due Professional Care 1220.A1 – Internal auditors must exercise due professional care by considering the Probability of significant errors, fraud, or noncompliance. There are 3 questions that I recommend all auditors ask every client they interview during an audit. If they start out by saying, "Part of my job as an auditor is to deter fraud," it will give them license to ask some direct, but polite questions: IIA Standard 2120: Risk Management 2120.A2 – The internal audit activity must evaluate the potential for the occurrence of fraud and how the organization manages fraud risk. IIA Standard 2210: Engagement Objectives 2210.A2 – Internal auditors must consider the probability of significant errors, fraud, noncompliance, & other exposures when developing engagement objectives. 191 "Do you think this organization has any problems with fraud? Why or why not?" "Has anyone ever asked you to do something you thought was illegal or unethical?" "What would you do if someone asked you to do something like that?" Asking these questions also helps send the right message to the people being audited: We're actively looking for frauds, so be careful. 192 32 BICA-Fraud-Seminar November 25, 2013 Auditor asks “Could fraud happen in your department?” Tata ma chance - Gidani Eyes left = memory Eyes right = Imagination You will be able to spot these movements Watch politicians Definitely not Not at all Never Not internally 193 194 Fraud Tolerance Own / Manage Risks Oversees Risks Actions against offenders… Independent Assurance 196 The Accident Triangle The Accident Triangle 1 Serious Injury Enron 1 Serious Injury 10 Minor Injuries Fraudulent 10 Minor Injuries 30 Damage Accidents Aggressive 30 Damage Accidents 600 Near-miss Accidents . Practical Loss Control Leadership, F E Bird and G L Germain, 1969 Creative 600 Near-miss Accidents . Practical Loss Control Leadership, F E Bird and G L Germain, 1969 33 BICA-Fraud-Seminar November 25, 2013 Dan Ariely’s controlled experiment Accountability 34 BICA-Fraud-Seminar November 25, 2013 Video Clip: Michael Franzese History franzese.mov 205 206 26 U.S. Mafia families since 1920 16 minor & 10 major families... 1 2 3 4 5 6 7 8 9 10 Boston Buffalo Chicago New York Detroit John Gotti Tampa ‘Lucky’ Luciano 207 “Accountability is the whole key here and if the directors of companies have a good system of accountability from all stakeholders, I think most of these frauds could be prevented” 208 RESPONSIBILITY: authority, the ability to act independently & make decisions. ACCOUNTABILITY: required to account for one’s conduct - Michael Franzese 209 210 35 BICA-Fraud-Seminar November 25, 2013 Jeffrey Dahmer… C=P-A Jeffrey Lionel Dahmer (1960 – 1994) was an American serial killer and sex offender. Dahmer murdered 17 men & boys & his murders were particularly gruesome, involving rape, torture, dismemberment, necrophilia & cannibalism. “If a person doesn’t think there is a God to be accountable to, then what’s the point of trying to modify your behavior to keep it within acceptable ranges?” I always believed the theory of evolution as truth, that we all just came from the slime. When we died, you know, that was it, there is nothing…” - Jeffrey Dahmer, in an interview with Stone Phillips, Dateline, NBC, Nov. 29, 1994. Corruption = Power – Accountability Power without accountability breeds corruption The Circle of Morality© 3. Ethics 4. Actions The Circle of Morality™ 5. Consequences 2. Values 1. Beliefs (Beliefs are KEY to an Ethical Foundation) For a shift to higher Ethics, there must be meaningful enough Consequences to the Actions of individuals to cause a shift in the Beliefs of a majority of society that is significant enough to change individual Values. Source: CA Crawford & Associates, P.C. 213 Accountability – some examples 212 Link the fraud prevention plan (FPP) to the activities of managers, which is then used as a tool for performance management. The Balanced Score Card (BSC) approach can be used to form the link between management activity & output to the FPP. Every senior leader in the company is asked to find an example of exemplary ethical behavior in his business unit and recommend the responsible employee for the Chairman’s Award. If he fails to do this, he receives a negative evaluation. Internal Climate Surveys – Each year ask your people to assess leadership, whether we behave in accordance to those values. To talk is easy, to live the values is a different thing. Do we “walk the talk?” Leaders scoring less than the passing mark are penalised. 214 Three Monkeys Mizaru, Kikazaru & Iwazaru Corruption Fraud Ethics Shizaru 216 36 BICA-Fraud-Seminar November 25, 2013 Staff Members… Hotline & Whistle-blower Program …it’s your duty to do the right thing & report any signs of fraud or corruption 217 Concept started after Challenger disaster in January 1986 2010/12 Global Fraud Surveys “Whistle-blower Protection Act of 1989” Prohibits an employer from taking adverse action against an employee who acted in good faith to report the waste of public funds, property, manpower or a violation or suspected violation of legally adopted rule or law 220 Hotline basics External Anonymous Confidential Toll-free Easily accessible Available 24/7 ‘Live’ Callback code Language capability Regular communications Hotline…supportive leadership 222 37 BICA-Fraud-Seminar November 25, 2013 223 224 A COSO-based Anti-Fraud Program Creating a Control Environment Monitoring Activities Performing Fraud Risk Assessments AFP Sharing Information and Communication Designing and Implementing Antifraud Control Activities 1. Establishing a fraud risk assessment process that considers fraud risk factors and fraud schemes Involving appropriate personnel in the fraud risk assessment process Performing fraud risk assessment on a regular basis Source: Deloitte 225 What Is Fraud Risk? What Is a Fraud Risk Assessment? The vulnerability that an organisation has to those capable of overcoming all three elements of the fraud triangle is fraud risk. Fraud risk can come from sources both internal and external to the organisation. Why Should an Organisation Be Concerned About Fraud Risk? Every organisation is vulnerable to fraud; there is no organisation that has immunity to that risk. The key to reducing that vulnerability is to be consciously aware and realistic about what the organisation’s weaknesses are. Only then can management ensure that it can establish mechanisms that effectively prevent or detect fraudulent activities. 227 FRA is a process aimed at proactively identifying and addressing an organisation’s vulnerabilities to internal & external fraud. As every organisation is different, the FRA process is often more an art than a science. What gets evaluated and how it gets assessed should be tailored to the organisation—there is no one-size-fits-all approach. Additionally, organisational fraud risks continually change. It is therefore important to think about a fraud risk assessment as an ongoing, continuous process, rather than just an activity. A FRA starts with an identification & prioritisation of fraud risks that exist in the business. The process evolves as the results of the identification & prioritisation begin to drive education, communication, organisational alignment, and action around effectively managing fraud risk and identifying new fraud risks as they emerge. 228 38 BICA-Fraud-Seminar November 25, 2013 What makes a good FRA? A good FRA is one that fits within the culture of the organisation, is sponsored and supported by the right people, encourages everyone to be open in their participation, and is generally embraced throughout the business as an important and valuable process. Preparing the Company for a Fraud Risk Assessment Preparing the company for the fraud risk assessment is a critical element to ensuring its success. The culture of the organisation should play a large role in influencing the approach taken to prepare the company for the fraud risk assessment. The goals of the preparation should be to: Assemble the right team to lead and conduct the FRA. Determine the best techniques to use in conducting the FRA – interviews, surveys, focus groups, anonymous feedback Obtain the sponsor’s agreement on the work to be performed – scope, methods, individuals & form of output Educate the organisation and openly promote the process. Collaborative Effort of Management and Auditors The Right Sponsor Independence/Objectivity of the People Leading & Conducting the work A Good Working Knowledge of the Business Access to People at All Levels of the Organisation Engendered Trust The Ability to Think the Unthinkable A Plan to Keep It Alive and Relevant 229 230 Executing the Fraud Risk Assessment Choosing a Framework When conducting a FRA, it is helpful to use a framework for performing, evaluating, and reporting on the results of the work. Fraud risk can be analyzed and reported both qualitatively and quantitatively using a consistent framework. The following sample FRA frameworks illustrate how the elements of FRA are applied under different approaches. Sample Fraud Risk Assessment Framework #1 Using this framework, the FRA team incorporates the following 8 steps into the FRA strategy: 231 232 233 234 Sample Fraud Risk Assessment Framework Pervasiveness Velocity 39 BICA-Fraud-Seminar November 25, 2013 Theft of autoreclosers, panels & circuit breakers… 235 236 Sample Fraud Risk Assessment Framework Suspect’s brother’s farm! Pervasiveness Velocity 237 Is this the Image You Want for Your Employer? 238 What about this? 40 BICA-Fraud-Seminar November 25, 2013 So What? Domino’s, in an effort to not draw attention to the video, waited days to respond, and did not bring on additional resources to help. Eventually they started a Twitter account and published an apology video on YouTube, but the damage was already done. Domino’s eventually was able to get the videos removed from YouTube, but did not realize that a majority of the dialogue related to the story was actually happening on Twitter. Outcome - Domino’s stock price dropped 10% over the week costing shareholders millions. 241 242 Sample Fraud Risk Assessment Framework #2— Fraud Risk Index Sample Fraud Risk Assessment Framework #2— Fraud Risk Index 2. THE CULTURE QUOTIENT The Culture Quotient is an assessment of how the organisation and its people behave or are perceived to behave. The Culture Quotient includes: The Fraud Risk Index is the overall assessment of fraud risk for the organisation based on three components: 1. 2. 3. The Environmental Risk Index The Culture Quotient The Prevent/Detect Index - Tolerance Index - an assessment of the organisation’s tolerance for bad behaviour. An organisation that has a high tolerance for bad behaviour can significantly increase the company’s vulnerability to fraud risk. - Entitlement Index - an assessment that helps determine whether people in the company display or promote a sense of entitlement. An organisation that sustains a strong sense of entitlement from its employees or leaders can have a higher risk of fraud. - Notification Index - an assessment of how likely it is that employees will come forward when they suspect something is wrong. An organisation where there is a low probability that employees will come forward is at significantly greater risk of fraud than an organisation where it is likely that employees will come forward. 1. THE ENVIRONMENTAL RISK INDEX The Environmental Risk Index is an assessment of macro-level fraud risk indicators that can affect the organisation’s vulnerability to fraud. These include factors such as pressures on the business, the organisation’s system of internal controls, the tone at the top, and the overall quality of the mechanisms that the company has in place to prevent and detect fraud. Both the Environmental Risk Index and Culture Quotient are elements of the Fraud Risk Index that are aimed at identifying and evaluating macro-level indicators of fraud risk that the company may be exposed to. 243 244 Sample Fraud Risk Assessment Framework #2— Fraud Risk Index Sample FRA Framework #2—Fraud Risk Index 3. THE PREVENT/DETECT INDEX The Prevent/Detect Index assesses the quality of the specific mechanisms that the organisation has in place to prevent or detect potential fraud, particularly those fraud schemes for which the company is at the greatest risk. This component of the assessment can be used to identify the company’s greatest fraud risks by pinpointing areas and methods that provide opportunities for potential fraudsters to get something— of either real or perceived value—out of the business. To calculate the Prevent/Detect Index, a standard, comprehensive population of fraud schemes, such as the ACFE Occupational Fraud Classification System, is used to evaluate each scheme that applies to the business and determine which schemes are the high-risk schemes that the organisation should focus on. For those fraud schemes that apply to the company, an evaluation of each scheme should be performed to ID: The likelihood that the scheme could be perpetrated The significance of the fraud risk to the company Whether there are preventive or detective internal controls in place to moderate the risk to a sufficient level Leadership Risk Profile The Leadership Risk Profile is developed to provide a macro-level organisational view of which business leaders, if any, increase the organisation’s vulnerability to fraud through their: 245 Leadership style / Operating behaviours / Decision-making practices The FRA team should develop or obtain an organisational chart that shows the organisational structure of the business and identifies its leaders. The team should then develop a profile of each of the leaders and evaluate the fraud risk associated with their leadership styles, operating behaviours (including how they interact with their team and partners across the business), and decision-making practices. As part of this evaluation, the team should consider any information that indicates unique pressures on or incentives for each leader that could increase the organisation’s fraud risk such as: A significant amount of personal net worth invested in the company A large portion of compensation tied to activities that the leader can manipulate (e.g., sales volumes or other business performance measures) A pending divorce Recent organisational changes that have either greatly expanded or reduced/eliminated the leader’s span of control Living larger than life Vices - Dependence on drugs or alcohol or Gambling problems 246 41 BICA-Fraud-Seminar November 25, 2013 Reporting the Results of the Fraud Risk Assessment Responding to Residual Fraud Risks High High Risk Medium Risk I M P A C T Avoid Transfer Low Risk Medium Risk Assume Low Mitigate PROBABILITY High The success of the fraud risk assessment process hinges on how effectively the results are reported and what the organisation then does with those results. A poorly communicated report can undermine the entire process and bring all momentum established to a screeching halt. The report should be delivered in a style most suited to the language of the business. If management prefers short, punchy PowerPoint presentations, the fraud risk assessment team should not give them a 50page Word document. 248 Considerations When Reporting the Assessment Results To maximise the effectiveness of the process, the team should consider the following points when developing the report of the results. Report Objective—Not Subjective—Results A lot of instinct and judgment goes into performing the fraud risk assessment. When reporting the results of the assessment, the team must stick to the facts and keep all opinions and biases out of the report. A report that is peppered with the assessment team’s subjective perspective will dilute and potentially undermine the results of the work. Considerations When Reporting the Assessment Results Focus On What Really Matters Less is often more when it comes to reporting the results of the fraud risk assessment. The team should take care not to turn the report into a laundry list of things that management will have to sort through and prioritise. Instead, the report should be presented in a way that focuses on what really matters, clearly highlighting those things that are most important and that will make the most impact on the organisation’s fraud risk management efforts. Identify Actions That Are Clear and Measurable to Drive Results The report should include some key recommendations for action that are clear, measurable, and will drive results. The actions should be presented in a way that makes it apparent what exactly needs to be done. The report should not include recommendations that are vague or that wouldn’t reduce the risk of fraud. Additionally, the actions reflected in the report should have already been vetted with and agreed to by the recommended action owners. Keep It Simple The assessment results should be reported in a way that is easy to understand and that resonates with management. The reader of the report should be able to quickly look at and comprehend the results. A simple one page visual can sometimes make the most impact. 249 Sample Report Formats Below are two examples of simple formats that can be used or adapted to report on the results of a fraud risk assessment based on the Fraud Risk Index framework discussed earlier. Executive Summary Report Format The following report format is a simple one-page executive-summary-type report. It gives the reader a snapshot view of the results of the work, along with insight into what is driving the results and what actions can be taken to reduce the fraud risk. Using a simple format like this forces the assessment team to focus on what really matters and what will make the most impact. Fraud Risk Index Graphic Report Format Environmental Risk Index Environmental RiskCritical Index High (Danger) Culture Quotient Culture Quotient Severity of Impact This sample report format would work well in an organisation that uses dashboards or tends to be visually oriented. The gauges can be substituted with any type of visual representation that the organisation uses in the normal course of business. This report should be accompanied by a one- or two-page action plan. Low (Safe) 250 Prevent/Detect Index FRAUD RISK INDEX Tolerance Index High Entitlement Index H Moderate Notification Index Prevent/Detect Low Index Overall Assessment Key Risk Drivers Tolerance Index Entitlement Index Notification Index Key Risk Reduction Actions 251 Probability of Occurrence 252 42 BICA-Fraud-Seminar November 25, 2013 xxxxxxx xxxxx Reporting the Leadership Risk Assessment Results The results of the Leadership Risk Profile should be treated with great sensitivity. The fraud risk assessment team should discuss with the sponsor what the best method would be for conveying the results of that work. If a formal report is requested, a color-coded organisation chart can be used as quick visual to convey the fraud risk associated with each leadership area across the business. 253 Making an Impact with the Fraud Risk Assessment 254 The FRA and the Audit Process To make the most of the fraud risk assessment process, management should use the results to: Begin a dialogue across the company. Look for fraud in high-risk areas. Hold action owners accountable for progress. Keep the assessment process alive and relevant. 255 The FRA should play a significant role in informing and influencing the audit process. In addition to being used in the annual audit planning process, the fraud risk assessment should drive thinking and awareness in the development of audit programs for areas that have been identified as having a moderate to high risk of fraud. Although auditors should always be on guard for things that might be indicators of fraud risk, the results of the fraud risk assessment can help them design audit procedures in a way that enables them to look for fraud in known areas of high risk. 256 It’s about bringing to surface what can wreck your ship The following template can be used by auditors to evaluate how effectively the moderate to high fraud risks are being managed by the business: 257 43 BICA-Fraud-Seminar November 25, 2013 The Fraud Triangle is the Problem, so any Solution must address all 3 parts Free Fraud Health Check 12 Questions Training & Awareness Rationalisation Pressure Control Environment Opportunity Fraud Risk Assessment Data Analytics Internal Controls No Cost & No Obligation 259 A COSO-based Anti-Fraud Program Monitoring Activities Performing Fraud Risk Assessments AFP Designing and Implementing Antifraud Control Activities Sharing Information and Communication Controls 1. Defining and documenting mitigating controls and linking them to identified fraud risks 2. Modifying existing controls, designing and implementing new preventative and detective controls as necessary; and implementing supporting technologies Creating a Control Environment Source: Deloitte 260 – Standard policies & procedures – Segregation of duties – Authorization levels/approvals – Exception reports (‘was-is’) – Reconciliations – Periodic audits – Monitoring visits – Process redesign Undesirable Events, like Fraud Preventive Preventive Detective Corrective November 25, 2013 Preventive Detective Corrective Preventive Detective Corrective Preventive Detective Corrective 262 Segregation of Duties Matrix Employee 1 Process 1 custody authorization recording execution Process 2 custody authorization recording execution Process 3 custody authorization recording execution Etc. Employee Employee 2 3 X Employee 4 Employee 5 QUALITY? X Employee 6 Etc . Utterly Trusted X X X X X X Her Trusted status X X X Her Unshakeable trustworthiness X X X X 263 44 BICA-Fraud-Seminar November 25, 2013 Payment The purpose of testing internal controls is to provide Direct evidence that internal controls are in place and operating as intended by management and Indirect evidence that fraud has not occurred. Purchase order Invoice X Audit Evidence However, in terms of the fraud audit plan, audit procedure are designed to detect the fraud schemes and are designed to provide: Direct evidence concerning the existence of a specific fraud scheme and Indirect evidence that controls are in place and "Trust but verify" - triangulate in order to acquire organizational knowledge that you can rely on. operating as intended by management. 265 266 Fraud Awareness & Training A COSO-based Anti-Fraud Program Training on evidence collection, case management, witness statements, etc. 1. Promoting the importance of antifraud programs and controls and the organization’s position on antifraud programs and controls both internally and externally through communications programs 2. Designing and delivering fraud awareness training Creating a Control Environment Monitoring Activities Specialist Forensic Staff Training Performing Fraud Risk Assessments AFP Designing and Implementing Antifraud Control Activities Sharing Information and Communication Source: Deloitte The goal of these 3 courses is the same – to ensure you are ready to write and pass the CFE exam. Each one is aimed at a different level of learner knowledge. Exactech offers option 2: the ACFE EXAM REVIEW Course as a public (US$1500,00) or in-house (US$1400,00) course run over 10 days in 2, 5-day block sessions. LEARNERSHIP The ACFE learnership is a 27-day program done over 2 years. It costs about $4 000,00 p/p and is for people who have little or no fraud/forensic knowledge. NO KNOWLEDGE 01 ACFE LEARNERSHIP REVIEW The CFE Review course is a 10-day course over 2 weeks. It costs $1 500,00 p/p & is for people who have a basic knowledge of fraud such as auditors, accountants, risk managers etc. BASE KNOWLEDGE More detailed fraud info for high risk areas like ID theft, IT fraud In areas of specific responsibilities – procurement, finance Training for Staff Buy-In & Responsibilities Rights & Responsibilities Management Awareness Client & supplier Awareness New Staff Induction Existing staff Refresher Staff Awareness Fraud Awareness Workshops PREP The CFE Prep course is a downloadable selfstudy course that you do in your own time and costs about US$945,00. It is for people who are knowledgeable about fraud. HIGH KNOWLEDGE & SELF-DISCIPLINED 02 03 CFE EXAM REVIEW COURSE CFE EXAM PREP COURSE 45 BICA-Fraud-Seminar November 25, 2013 Outdoors / Warehouses… Industrial Theatre TONY KGOROGE HAMILTON DHLAMINI Sustainability - Newsletters “This is undoubtedly the right way to go. It is going to make a huge difference in the company. The hotline has come alive! The newsletter is definitely a very good idea - informative and transparent. The content of the newsletter is excellent - short, sharp and to the point. It is also interesting” Free Newsletter 275 276 46 BICA-Fraud-Seminar November 25, 2013 SARB Fraud Awareness Program Look Feel Tilt 277 278 279 280 281 282 47 BICA-Fraud-Seminar November 25, 2013 Delegate Comments “It was well worth the time spent on this topic and look forward to having this awareness campaign annually”. “I loved the practical association where information was linked to real life scenarios”. “I thoroughly enjoyed this Fraud Awareness session. It was very informative and I learnt a lot. It was well presented & I don’t think anyone in the room fell asleep!” “This kind of training is well overdue, well done IAD”. “I found that the awareness presentation very informative” “It brings forth the core values of the bank”. “It not only addresses the issues pertaining to the organisation but to the individual staff member as well” “This is something that we need to have annually!” 283 284 285 286 FAW - 2013 – WCC Seminar - Utah Delivering messages across different channels ‘Awareness’ doesn’t = Behavior Working sessions, 1:1s, conversations, coaching Action STAGE 2 I KNOW BUT I DON’T DO STAGE 3 I KNOW & I DO The next challenge is not to stop at “Awareness” but migrate the “awareness” to good anti-fraud practices… Level of change STAGE 1 I DON’T KNOW Focus groups, working parties, consultations, Surveys Acceptance booklets, videos, presentations Understan -ding Awareness newsletters, emails, intranet, letters, memos Tell Source: HIMIS / First Legion Consulting 287 Sell Consult Collaborate Level of Involvement 48 BICA-Fraud-Seminar November 25, 2013 Pre & Post Questionnaires Pre & Post Questionnaires How prevalent do you consider theft, fraud & corruption to be within your organisation? How prevalent do you consider theft, fraud & corruption to be within your organisation? 10% 3% 28% Extremely prevalent Extremely prevalent Fairly prevalent 53% 37% Fairly prevalent 69% Not at all prevalent Not at all prevalent Pre Post 289 Pre & Post Questionnaires 290 Pre & Post Questionnaires 291 292 3 Data States… A COSO-based Anti-Fraud Program 1. Providing periodic evaluation of the effectiveness of the AFP 2. Utilizing independent evaluations of AFP by Internal Audit or other groups 3. Implementing technology to aid in the continuous monitoring and detection activities Sensitive Sensitive Regulatory Data Corporate Data Creating a Control Environment Monitoring Activities Performing Fraud Risk Assessments AFP Sharing Information and Communication Designing and Implementing Antifraud Control Activities Intellectual property Credit card data Financial information Privacy data Trade secrets Health care information Data-at-Rest Data-in-Motion Data-in-Use Source: Deloitte 49 BICA-Fraud-Seminar November 25, 2013 Proactive Fraud Risk Management People Analytical Steps Technology Steps Investigative Steps Step1: Understand the Business Step 4: Use Technology to gather Data about symptoms Step 6: Investigate Symptoms Step 2: Understand Possible Frauds that Exist Step 5: Analyse Results Follow-Up Step 3: Catalogue Possible Fraud Symptoms Automate Detection Procedures Technolog y YOU Process Data http://www.gsaig.gov/assets/File/other-documents/Background-SixStepApproach.pptx.pdf Computerised Methods TechnologyBased Discovery Sampling Financial Stmt Analysis Behaviour Analysis People Focussed Bad Guy List Re-engineered ‘new’ methods FRAUD DETECTION Transaction Focussed NonTechnology Based Inductive Analysis Deductive Analysis Chance Detection Data Mining Software Digital Analysis ‘Benford’s Law’ Strategic Fraud Detection Hotline Based Tip Received Fortuitous Tip Information-Insight-Intelligence Finding Duplicates Inform ation Insight Intellig ence 50 BICA-Fraud-Seminar November 25, 2013 We choose the information we wish to see about each duplicated invoice number. We wish to search for duplicate transactions using the invoice number field. (It is possible to search for duplicates using a combination of fields.) Finding Missing Items This is a list of the duplicated invoice numbers. We could also print out the result, send it to a new ACL table or export it to another program, such as Excel. Eleven invoices in this range have not been captured. If we examine the other values in the table, we see even more invoices are unaccounted for. To find out if any transactions have not been captured, we look for missing invoice numbers. Ghost Employees 51 BICA-Fraud-Seminar November 25, 2013 We compare the Employee master file with the Payroll table (see below) to identify any ghost employees We choose fields from the Payroll table that will give us additional information about each employee. Both ghost employees “work” for department E21. Finding Fictitious Suppliers & COI D & B and Chile Co are the same supplier trading under two different names; the same applies to Samgo and Clean Drain. (This test could be run using phone numbers, addresses or any other relevant field.) We will check if any suppliers that have different names have the same bank account numbers. We compare the Supplier master file with the Employee master file (see below) to identify any employees whose bank account numbers correspond to supplier bank account numbers. We choose fields from the Employee master file that will give us additional information about each employee posing as a supplier. We choose fields from the Supplier master file that will give us additional information about the applicable fictitious suppliers. Potential COI. Notice their bank account details are the same as those of two of the employees. (We could compare addresses, phone numbers or any other relevant information of the employees and the suppliers.) 52 BICA-Fraud-Seminar November 25, 2013 Stolen Inventory This table contains the quantity on hand of different stock items as per the Accounting system. We link these two tables as each contains information needed for our analysis. This table contains the quantity on hand of different stock items as per a physical stock count. Improperly authorised transactions We now compare the physical quantities on hand with the quantities as per the Accounting system. In our example, we decided that any discrepancy greater than 5% would be problematic. We thus ran a filter to identify such discrepancies. This table contains a This table contains list of authorised a list of managers This table contains a transactions. list of authorisation & their respective levels and the authority levels We link these three maximum permitted e.g. level A but tables as each transaction value for without any contains information amounts listed for each level e.g. Level needed for our A, maximum = 20 000 each level. analysis. We run a filter to identify those authorised amounts that exceed the maximum allowable amount. The result is a list of improperly authorised transactions and the persons who authorised these. 53 BICA-Fraud-Seminar November 25, 2013 Manage: Dashboard Visualisation Manage: Dashboard Visualisation Achieving Higher Coverage Audit Analytic Capability Model Lower Cost and Business Process Improvement Level 5 Monitoring Solution 1 Data Analysis # Tests Level 4 Solution 2 Applied Analytics Automated Solution 5 Continuous Monitoring Level 3 Managed Automated Manual Level 2 Applied Level 1 Basic Solution 3 Managed Analytics Solution 4 Continuous Auditing Maturity Level 1 Assurance Automated Automated Manual Manual Maturity Level 2 Maturity Level 3 Cost Time 54 BICA-Fraud-Seminar November 25, 2013 3 Data States… Inadequate use of Data Analytics Sensitive Sensitive Regulatory Data Corporate Data Intellectual property Credit card data Financial information Privacy data Trade secrets Health care information Data-at-Rest Data-in-Motion Data-in-Use Source: PwC 2013, State of Internal Audit Profession Study Network Forensics - Data in Motion USING THE DEVIANT BEHAVIORS OF OTHERS TO FIND FRAUD – ‘UDBOFF’ Analyst Workstation Presented by RYAN HUBBS, CFE, CIA, PHR, CCSA Senior Manager, Database Matson, Driscoll & Damico (MD&D), Forensic Accountants, Houston, TX at the 22nd Annual ACFE Fraud Conference Loader Money, Sex, and Power are strongly rooted in human behavior and history. In many instances they have played significant roles in deviant behavior especially when human beings can not obtain them through normal societal means or under societal norms. Collectors Network A Network B Network C 328 The 3 Drivers in the Workplace The UDBOFF Hypothesis in Action Sex - Viewing, Transmitting, or Downloading Pornography - Sexual Harassment, Sexual Jokes and Innuendo, Voyeurism - Office Affairs Power Money Sex - Bullying - Intimidation - Retaliation Power - General Harassment - Vulgarity, Profanity, and Abusive Language to People Money - Fraud, Theft and Corruption 329 Do we have workplace deviant behavior? - Inter-office affairs, false accusations, pornography, bullying/intimidation, sexual harassment, profanity, etc UDBOFF Test - Selected last 6 months of expense account documentation as a quick test to see if there were any anomalies. Was there fraud? - Yes! Over $20,000 in expense account and P-card fraud spanning 2+ years plus conflicts of interest, contractor fraud, and bid rigging. 330 55 BICA-Fraud-Seminar November 25, 2013 Where to Now? 331 332 Where to Now? Basically each organisation has 4 choices open to them: Do nothing (not a good choice, obviously!) 2. In-source 3. Outsource 4. Co-source 1. Which option is best for you depends on whether you currently have a forensic function, if you have the necessary skills and if they are available. Each option has its potential pros and cons. A. Do Nothing… 1. Lack of management buy-in / endorsement 2. Lack of Budget (We’ll do something ‘next year’) “How much money do you think you will lose between now and ‘next year’?” 334 “A good plan executed today is better than a perfect plan executed at some indefinite point in the future.” - General George S. Patton Top Ten Take-Aways 1. 2. CONTROL CO-SOURCE IN-SOURCE 3. 4. 5. 6. 7. DO NOTHING OUT-SOURCE 8. 9. 10. Strategy remains the same but your Tactics must change: Use Surveys to find out what’s up in your org! Do regular awareness training (incl personal interest) Use Pre & Post Questionnaires in Training Co-source with a Transfer-of-Skills Run DA and the FRA together Automate processes (e.g. CCM) Have ‘Zero Tolerance’ - don’t tolerate the small things Report Fraud – but remain anonymous Still need the right combination of People, Process, Data AND Technology COST 56 BICA-Fraud-Seminar November 25, 2013 Questions? http://www.exactech.co/ David Mogapi david.mogapi@exactech.co.za +267 74303410 Mario Fazekas mario.fazekas@exactech.co +27 (0)83 611 0161 Antonio Pooe antonio.pooe@exactech.co 337 57