Fraud & Forensic Investigations Frank Pina, CPA, CFF, CFE, CGMA Joseph Galdo, CPA, CFE, CGMA A Statistical Certainty “At any given moment, there is a certain percentage of the population that’s up to no good” -J. Edgar Hoover 2 Fraud Defined Any intentional or deliberate act to deprive another of property or money by guile, deception or other unfair means (ACFE) Deception brought about by misrepresentation of material facts, or silence when good faith requires expression, resulting in material damage to one who relies on it and has the right to do so (IRS) 3 Types of Fraud • Internal Illegal acts of employees, managers and executives against the organization • External Illegal acts of outsiders (i.e., non-employees) against the organization • On the books versus off the books 4 Execution of Fraud • The Act Normally a theft or misrepresentation • The Concealment Once the act is accomplished, efforts must be made to conceal the fraud to prevent detection • The Conversion Once the act is concealed, the perpetrator must convert the asset to his or her own benefit 5 Indicia of Fraud Some clue or hint that someone has misappropriated something… • No written policies and procedures • Overly complex organizational structure • Key employee never takes time off • Management override of controls • Inadequate internal controls/segregation of duties • Incompetent accounting personnel • Indicators are not proof, but what is? Intent goes to proof of fraud 6 Recent Fraud Statistics Typical organizations lose 5% of annual revenues to fraud • Translates to a potential global fraud loss of nearly $3.7 trillion Primary Categories • Asset misappropriations - $130,000 median loss • Corruption - $200,000 median loss • Financial statement fraud - $1 million • Frauds lasted a median of 18 months before detection • Most likely method of detection? • A tip! Source: ACFE 2014 Report to the Nations on Occupational Fraud and Abuse; 2014 Global Fraud Study 7 Fraud Triangle 8 The Perpetrator Pressure/Need Usually an immediate financial need oLiving beyond means oDrug or gambling addiction oHigh personal debts oJob dissatisfaction oEmotional instability oSickness in the family oChallenge to beat the system 9 The Perpetrator Opportunity (perceived) Ability to commit AND conceal fraud –I can do it! –I can conceal it! –I will not get caught! Manifests itself in weak internal controls Lack of oversight Management override of controls 10 The Perpetrator Rationalization Perpetrator justifies actions as something other than fraud, providing a morally acceptable excuse –“I’m only borrowing the money” –“It’s for a good purpose” –“I deserve it” –“Everyone does it” –“I need it more than they do” 11 The Perpetrator A recent study of white collar crime by the Association of Certified Fraud Examiners • College-educated white males • Men committed nearly three-fourths of the offenses 12 The Perpetrator • Possible factors / characteristics Greed Financial difficulties Revenge Compulsive / irrational behavior Employee in position of trust Earnings versus lifestyle Does not take vacations 13 Organizational Vulnerability • Internal controls are weak • Dominated by one or two people • Insufficient working capital • Employees are overworked, poorly paid, with low moral • High turnover rate, especially in accounting group • Poor accounting records / document management • No internal audit function • Poor tone at the top 14 Who should be concerned? • Government regulators • Management (CEO, CFO, Budget Director) • Counsel to companies (internal and external) • Board of directors/trustees • Audit committee • Auditors (internal and external) • Outside lenders (banks and related parties) • Taxpayers • Business owners, including shareholders 15 Typical Fraud Schemes Asset Misappropriation Lapping – A/R Skimming – cash receipts Theft of goods - inventory Ghost employees - payroll False/inflated/duplicate invoices – A/P Ponzi schemes - investments 16 Typical Fraud Schemes Corruption Bribes / Kickbacks o “Things of value” Conflicts of interest Bid Rigging Financial Statement Fraud Improper revenue recognition Overstatement of assets Manipulation of liabilities and/or expenses Improper disclosures 17 Indicators of Fraud • Two sets of books / records • Use of large amounts of and/or frequent use of cash • Incomplete, missing or inaccurate records • Unusual check transactions (multiple endorsements, forgeries, etc.) • Stale items on bank reconciliations • Frequent / suspicious related-party transactions • Lack of adherence to, or absence of policies/procedures/controls 18 Indicators of Fraud • Use of nominees • Use of foreign or off-shore entities or financial institutions • Destruction of records – prematurely or contrary to retention policy • Altered documents: photocopies rather than originals, apparent alterations, duplicate invoices • Numeric documents out of date order • Expense account abuse 19 FORENSIC 20 Why Investigate? What is your goal? • Termination? • Restitution? • Prosecution? 21 Investigative Challenges • Developing effective and efficient investigative strategies o What documents are relevant? o Who to interview? o How to present findings? • Identifying investigative constraints • Determining appropriate resolutions • Improving internal controls (prevention, detection, deterrence) 22 Investigative Scope • Tailor investigative scope / procedures to address: o What happened and during what time period? o Who was involved? o Were they authorized? o How and why did it happen? o What was the impact? o Who needs to know? • Perform the investigation efficiently (cost & time) • Develop remedial actions 23 Investigative Scope • Respond to interested parties (e.g., government agencies, regulators, counsel, etc.) • Also consider: Internal auditor authority Outside forensic assistance Scope limitations Attorney-client privilege 24 Attorney-Client Privilege • The attorney-client privilege exists when a client seeks or receives legal advice from an attorney in confidence. • The communications may be protected forever. The underlying facts, on which the communications are based, are not protected. • The burden of proving the existence of the privilege rests on the party asserting it. 25 Accountant-Client Communications • Federal courts generally do not recognize an accountant-client privilege. • There are various state statutes that do speak to the issue of CPA-client communications/production of documents and afford varying degrees of protection in state courts. 26 Investigative Planning • Understand probative value oKnow your investigative goals –Determine what evidence is useful »Know importance/relevance of information obtained • Evaluate evidence at hand • Be nimble and flexible 27 Document Analysis • What do you want to know? • How do you obtain the information? oVoluntary compliance oRegulatory authority oCompulsory process • Public record information can make a case! oInternet and subscriber databases • Electronic communications oEmails oComputer drives • Interview testimony can be critical! 28 Document Analysis • Financial records and source documents oInvoices oCancelled checks oLedgers and journals oPayroll records oPurchase orders • Financial statements oInternal/external 29 Document Analysis • Forecasts/projections • Tax returns • Confirmation Transactions will be disguised and concealed All records should be suspect! Third-party confirmation to pierce disguise 30 Document Analysis • Transaction tests Fraudsters usually leave a trail o Trail starts with financial records and source documents Detailed and thorough document review necessary o Invoices: authentic/altered or fictitious? o Checks: information on checks can tell the real story o Payroll: false payroll is an easy way to divert funds o Emails: modern-day wire taps! 31 32 Why Interview? “ I can solve ANY case….. no matter how old no matter how complicated no matter how difficult……… If I can get someone to tell me who did it!” ~FBI Instructor, FBI Academy, Quantico, VA, May 10, 1976 33 Why Interview? • Spoken word is the most important source of investigative information • No investigation is complete unless witnesses are interviewed • How do you know if you don’t ask? 34 What are the most important elements of an effective interview? •Preparation! •Preparation! •Preparation! 35 Interviewing • Master all evidence; have it at your fingertips • Draw from previous interviews • Secure, review, integrate and understand the probative value of all available documents: oEmails oFinancial records oData analysis oAll other relevant documents including correspondence, contracts, bid documents, etc. 36 Interviewing • Probe • Conduct interviews to obtain sufficient detail • Do not accept incomplete or unresponsive answers • Ask all questions necessary for required information oAsk until you’re satisfied! 37 Interviewing • Feel free to challenge: Inconsistencies Answers that do not make sense Non-responsive answers Demeanor changes Blatant lies *Fraudsters try to tell 50% of the truth, 100% of the time! 38 Reporting • What is the best way to report your findings? Written report Oral presentation • To whom should you discuss the results? 39 Case Examples QUESTIONS? 41 Contact Information Frank Pina, CPA, CFF, CFE, CGMA fpina@Mercadien.com Joseph Galdo, CPA, CFE, CGMA jgaldo@Mercadien.com 609-689-9700 42