Combatting Fraud Security Planning Susan Lincke Security Planning: An Applied Approach | 3/12/2016 | 2 Objectives: The student shall be able to: What are the key elements of fraud, and what techniques can be used to counteract these key elements? What are the three categories of fraud and what crimes do they include? Define skimming, larceny, embezzlement, lapping, shell company, payroll manipulation, ghost employees. What are the legal considerations of fraud? Who commits fraud, and who commits the most expensive fraud? What are some red flags of potential fraud? How does social engineering occur, and how can it be prevented? Define the four roles of segregation of duties. Describe the purpose of the 3 stages of a fraud investigation. Security Planning: An Applied Approach | 3/12/2016 | 3 The Problem Amount recovered following an Incident of fraud Organizations lose 5% of revenue annually due to internal fraud Average scheme lasts 18 months, costs $140,000 20% costs exceed $1M Smaller companies suffer greater average $ losses due to inadequate controls ACFE 2012, 2014 “Report to the Nations on Occupational Fraud and Abuse” Security Planning: An Applied Approach | 3/12/2016 | 4 Internal or Occupational Fraud Definition Violates the employee’s fiduciary responsibility to employer Is done secretly and is concealed Is done to achieve a direct or indirect benefit Costs the organization assets, revenue, or opportunity Security Planning: An Applied Approach | 3/12/2016 | 5 Fraud Categories Categories % of Cases, $ Average Examples Asset Misappropriation 85% $130,000 Theft of checks, cash, money orders, inventory, equipment, supplies, info 37% $200,000 Bribe to accept contractor bid or Kickback, Collusion, Bid rigging. Extortion: threat of harm if demand not met; False Billing: Providing lower quality, overcharging Conflict of interest in power decision Corporate espionage: Sell secrets Bribery & Corruption Financial Statement Fraud 9% $1 million ($4 million in 2010) Revenue Overstatement: False sales Understating Expenses: Delayed or capitalization of expenses Overstating Assets: No write down of uncollectable accounts, obsolete inventory, … Understating Liabilities: Not recording owed amounts Misapplication of Accounting Rules, etc. Security Planning: An Applied Approach | 3/12/2016 | 6 Legal Considerations of Fraud Intentionally false representation Not an error Lying or concealing actions Pattern of unethical behavior Personal material benefit Organizational or victim loss Security Planning: An Applied Approach | 3/12/2016 | 7 Key Elements of Fraud Motivation: Need or perceived need Opportunity: Access to assets, information, computers, people Rationalization: Justification for action Motivation 3 Key Elements Opportunity Rationalization Security Planning: An Applied Approach | 3/12/2016 | 8 How Fraud is Discovered Tips provided by employees 49%, customers 21.6%, anon.14.6%, vendors 9.6%. ACFE “2014 Report to the Nations on Occupational Fraud and Abuse” Security Planning: An Applied Approach | 3/12/2016 | 9 Collusion Collusion: Two or more employees or employee & vendor defraud together 2012 Global Fraud Study Assoc. of Fraud Examiners Security Planning: An Applied Approach | 3/12/2016 | 10 Who Does Fraud? Most $$$ internal frauds committed by longer-tenured, older, and more educated staff Executives commit most expensive fraud: $500K • Median manager fraud: $130K • Median line employee fraud: $75K Most hit: Banks/financial industries: 16.7% • Government/public administration: 10.3 • Manufacturing: 10.1% 95% have no criminal convictions related to fraud To steal a lot of money, you must have a position of power and access: • highly degreed > HS grad • older > younger people 2012, 2014 Global Fraud Study Assoc. of Fraud Examiners Security Planning: An Applied Approach | 3/12/2016 | 11 Discussion Points What types of fraud could computer programmers or system administrators commit? For each type of fraud, what methods may help to prevent such fraud? Security Planning: An Applied Approach | 3/12/2016 | 12 Example 1: Financial Statement Fraud Executives, Wall Street have high expectations: employees needed to meet the standards. To meet these standards, it may be necessary to play the game, and financial statement fraud may be accepted. Methods of such fraud may include: manual adjustments to accounts or improper accounting procedures Security Planning: An Applied Approach | 3/12/2016 | 13 Example 2: Corruption The Director of a subsidiary always purchases goods from 2 large organizations, who provide rebates for large purchase quantities. The director negotiated contracts and pocketed the rebates to an off-shore bank account. Local vendors are upset that their bids are ignored. Security Planning: An Applied Approach | 3/12/2016 | 14 Example 3: Asset Misappropriation A manager took money from one account, and when payment was due, paid via another account. When that was due, she paid via a third account, etc. This lapping went on for years and was finally caught when a sickness resulted in her being absent from work for an extended period. Security Planning: An Applied Approach | 3/12/2016 | 15 Asset Misappropriation Vocabulary Skimming: Taking funds before they are recorded into company records Cash Larceny: Taking funds (e.g., check) that company recorded as going to someone else Embezzlement: Abusing a business privilege for personal gain Lapping: Theft is covered with another person’s check (and so on) Check Tampering: Forged or altered check for gain Shell Company: Payments made to fake company Payroll Manipulation: Ghost employees, falsified hours, understated leave/vacation time False Shipping Orders or Missing/Defective Receiving Record: Inventory theft Detecting & Preventing Fraud How to Recognize Fraud How to Prevent Fraud Info. Systems Applications Security Planning: An Applied Approach | 3/12/2016 | 17 Fraud & Audit Audits are not designed to detect fraud Goal: Determine whether the financial statement is free from material misstatements. Auditors test only a small fraction of transactions Auditors must: • Be aware of the potential of fraud • Discuss how fraud could occur • Delve into suspicious observations and report them Security Planning: An Applied Approach | 3/12/2016 | 18 Red Flags Significant change in lifestyle: New wealth Addiction: Gambling, drug addiction, infidelity Criminal background Chronic legal problems Dishonest behavior in general Beat the system: Break rules commonly Dissatisfaction with job Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study. ACFE. Security Planning: An Applied Approach | 3/12/2016 | 19 Work Habits of Fraudsters One or more: Justifying poor work habits Desperately trying to meet performance goals Over-protective of certain documents (poor sharing or avoids documentation) Refusal to swap job duties Consistently at work in off-time (early or late) or never absent Essentials of Corporate Fraud, T L Coenen, 2008, John Wiley & Sons Security Planning: An Applied Approach | 3/12/2016 | 20 Potential Transaction Red Flags Unusual transactions: Unusual timing, too frequent or infrequent Unusual amount: too much or too little Unusual participant: involves unknown or closelyrelated party Voided checks or receipts, with no explanation Insufficient supervision Pattern of adjustments to accounts Different addresses for same vendor, or vendors with similar names Security Planning: An Applied Approach | 3/12/2016 | 21 Fraud Control Types After Fraud Corrective Controls: Punishment-> Amend controls Fidelity Insurance Employee Bonding Time of Fraud Detective Controls: Finding fraud when it occurs includes: Anonymous hotline*-> Surprise audits*-> Monitoring activities-> Complaint or fraud investigation Mandatory vacations Before Fraud: ***BEST*** Preventive Controls**: Preventing fraud includes: Segregation of Duties Ethical Culture Internal controls: Physical & data security Authorization (Passwords, etc) Signed Documents Fraud education Employee Support Programs Background checks Security Planning: An Applied Approach | 3/12/2016 | 22 Techniques to Discourage Fraud Realistic job expectations Adequate pay Motivation Training in job duties Key Elements Segregation of duties Opportunity Checks and balances Job rotation Physical security of assets Background checks Mandatory vacations Examination of required documentation Trained in policies and procedures Rationalization Policy enforcement Sr. Mgmt models ethical behavior to customers, vendors, employees, share holders Security Planning: An Applied Approach | 3/12/2016 | 23 Segregation of Duties Authorization Distribution Approves Acts on Origination Double-checks Verification Security Planning: An Applied Approach | 3/12/2016 | 24 Compensating Controls When Segregation of Duties not possible, use: Audit Trails Transaction Logs: Record of all transactions in a batch Reconciliation: Ensure transaction batches are not modified during processing Exception reporting: Track rejected and/or exceptional (nonstandard) transactions Supervisory or Independent Reviews Separation of duties: authorization, distribution, verification Security Planning: An Applied Approach | 3/12/2016 | 25 Software to Detect Fraud Provide reports for customer credits, adjustment accounts, inventory spoilage or loss, fixed-asset write-offs. Detect unusual anomalies such as unusual amounts or patterns Compare vendor addresses and phone numbers with employee data Use Range or Limit Validation to detect fraudulent transactions Logged computer activity, login or password attempts, data access attempts, and geographical location data access. Security Planning: An Applied Approach | 3/12/2016 | 26 Red flags software can detect Out-of-sequence checks Large number of voids or refunds made by employee or customer Manually prepared checks from large company Payments sent to nonstandard (unofficial) address Unexplained changes in vendor activity Vendors with similar names or addresses Unapproved vendor or new vendor with high activity Security Planning: An Applied Approach | 3/12/2016 | 27 Encourage Security in IT Departments Physical security Segregation of duties Employee monitoring Surprise audits Job rotation Examination of Documentation Quality Assurance Programmer Analyst Business Analyst Security Planning: An Applied Approach | 3/12/2016 | 28 Business Application Checks Checks locked up; access restricted Physical inventory of checks at least every quarter New accounts payable vendors’ existence and address doublechecked by management Returned checks sent to PO Box and evaluated by someone independent of Accts Payable Security Planning: An Applied Approach | 3/12/2016 | 29 Question What is the MOST effective means of preventing fraud? 1. Effective internal controls 2. Fraud training program 3. Fraud hotline 4. Punishment when fraud is discovered Security Planning: An Applied Approach | 3/12/2016 | 30 Question 1. 2. 3. 4. A woman in the accounting department set up a vendor file with her own initials, and was able to steal more than $4 M after 3 years. The auditor should have found that: The vendor was a phony company Purchases from the vendor did not result in inventory received The initials for the vendor matched an employee in the accounting dept. Management did not authorize new vendors with a separate phone call Security Planning: An Applied Approach | 3/12/2016 | 31 Question What is: Origination, Authorization, Distribution, Verification? 1. Four stages of software release 2. Recommended authority allocations for access control 3. Stages for development of a Biometric Identity Management System (BIMS) 4. Categories for Segregation of Duties External Fraud Social Engineering Check & Receipt Fraud A Fraud Investigation Security Planning: An Applied Approach | 3/12/2016 | 33 Red Flags Rule Red Flag Category Suspicious Documents Personal Identifying Information Account Activity Example Red Flag Cases Warnings from a Credit Agency Other Sources Identification or application looks forged or altered. Info is inconsistent btwn ID, what client says, and their records. Picture or signature differs. Info matches other clients Info. looks suspicious: phone number is answering service; SSN is on Death Master File; info. inconsistent with credit report. Incomplete application and client fails to submit additional info Client cannot provide authenticating info beyond name address phone A major change in spending or payment habits. A change in address, followed by unusual requests: e.g., multiple credit cards. Initial use of credit card shows unusual activity: first payment only; purchase of products easily converted to cash: electronics, jewelry. Inactive accounts become suddenly active. Mail is undeliverable but transactions continue. Changes to a credit report, inconsistent with client’s history. Indication of fraud, credit freeze or other abuse. Changes in recent credit transactions: increase in inquiries or new accounts. Tip indicates an account has been opened inappropriately or used fraudulently. Red Flags Rule Security Planning: An Applied Approach | 3/12/2016 | 34 Social Engineering I Email: The first 500 people to register at our Web site will win free tickets to … Please provide company email address and choose a password You received a message from Facebook. Follow this link … log in. Social engineering: Getting people to do something they would not ordinarily do for a stranger Social engineering is nearly 100% effective Security Planning: An Applied Approach | 3/12/2016 | 35 Social Engineering II Telephone call from ‘IT’: Some company computers have been infected with a virus that the anti-virus software cannot fix. Let me walk you through the fix… We need to test a new utility to change your password… Security Planning: An Applied Approach | 3/12/2016 | 36 Social Engineering III Phone call 1: “I had a great experience at your store. Can you tell me manager’s name, address?” Phone call 2: “This is John from X. I got a call from Alice at your site wanting me to fax a sig-card. She left a fax number but I can’t read it can you tell me? What is the code? “You should be telling me the code…” “That’s ok, it can wait. I am leaving but Alice won’t get her information…” “The code is … “ Phone call or fax 3: “I need … Code is …” Security Planning: An Applied Approach | 3/12/2016 | 37 Social Engineering Techniques Learns insider vocabulary and/or personnel names Pretends legit insider: “I am <VP, IT, other branch, other dept>. Can you …?” Pretends real transaction: Helping: I am in trouble <or> you need help due to … • <My,Your> computer is <virused, broke, busy, don’t have one>. Can you <do, tell me> …? Deception: Hides real question among others. Establishes relationship: Uses friendliness to gain trust for future tasks Security Planning: An Applied Approach | 3/12/2016 | 38 Combating Social Engineering Verification Procedure Verify requester is who they claim to be Verify the requester is currently employed in the position claimed. Verify role is authorized for request Record transaction Organization security Data classification defines treatment Policies define guidelines for employee behavior Employees trained in roles, need-to-know, and policies Security Planning: An Applied Approach | 3/12/2016 | 39 Fraud Scams Get a receipt from the trash, ‘return’ a product Copy gift certificate and cash in at multiple locations Markdown sale prices reimbursed with receipt – copied and collected at multiple locations Fake UPC numbers to pay low prices then return at higher price. If receipt total is sufficient, scam may work. Security Planning: An Applied Approach | 3/12/2016 | 40 Preventing Scams Receipts must have security marks on them (e.g., two-colored ink on special paper, or better: thermochromatic ink) Line-item detail on receipts and sales records in company database Garbage bins which may receive receipts should be protected from access (e.g., bank garbage bins) Register gift certificates – unique numbers Shredders should be used for any sensitive information Protect against shoulder surfing or device attachment for card readers Security Planning: An Applied Approach | 3/12/2016 | 41 Check Fraud Examples Altered Checks: Chemicals are used to erase the payee or amount, then reprinted OR check is appended to. • An Argentinian modified a ticket-overpayment refund check from Miami, changing a $2 check to $1.45 Million Counterfeit Checks or Identity Assumption • Someone in your checkout line views your check, or does yard work for you • Fishes in a business’s in-mailbox or home’s out-mail for a check • Checks can be purchased on-line or mail order Telemarketing Fraud: • “You’ve won a prize” or “Would you like to open a VISA?” “Now give me your account information.” Hot Check: “Insufficient Funds” 90% of ‘insufficient funds’ checks are numbered between 101 and 200 Account opening year may be printed on check Security Planning: An Applied Approach | 3/12/2016 | 42 Be Careful Printing Checks! Paychecks & Accounts Payable should not be printed on blank check paper Laser printer is non-impact (ink does not go into paper but sits on top) • Easy to remove printing • ‘Laser Lock’ or ‘Toner Lock’ seals laser printing Matrix printer puts ink into the paper • Chemical ‘washing’ removes the print Good Practices • • • • Use larger printing: 12 font Reverse toner in software: white on black Control check stock and guard checks Check your bank statements – you have 30 days Security Planning: An Applied Approach | 3/12/2016 | 43 Check Security Features Watermark: Subtle design viewable at 45-degree angle toward light. Cannot be photo-copied Void Pantograph: Background pattern of checks. When photo-copied, the background patter disappears or prints ‘VOID’ Chemical Voids: When check is treated with eradicator chemical, the word VOID appears Microprinting: When magnified, the signature or check border appears to be written words. The resolution is too fine for a photo-copier 3-Dim. Reflective Holostripe: Metallic stripe contains at least one hologram, similar to credit card. Security ink: React to eradication chemicals, distorting check Thermochromic Ink: Ink reacts to heat and moisture by fading and reappearing Security Planning: An Applied Approach | 3/12/2016 | 44 Processing Money Orders Money order information provides info on a ready checking account Non-negotiable incoming wire account prevents out-going checks I would like to send you a money order. What is your account number? THANK YOU SO MUCH!!! Security Planning: An Applied Approach | 3/12/2016 | 45 A Fraud Investigation Step 1: Initial Inquiry Investigate what is happening: • What is happening from a financial and/or operational aspect? • Do security controls exist and are they always practiced? • Does the employee show any of the red flags of fraud? Data mining analyzes financial transactions to find suspicious patterns or transactions • e.g., match employee and accounts payable contact information. Initial Inquiry: Investigate processes, suspicious transactions Develop & Confirm Hypothesis: Determine methods & personnel involved Collect Evidence: Prepare for trial; Answer all questions Security Planning: An Applied Approach | 3/12/2016 | 46 A Fraud Investigation (Cont’d) Step 2: Develop and confirm hypothesis Step 3: Collect evidence. Collect evidence for trial. Analyze the evidence. Hypothesize on possible methods of fraud and who is Prove the three requirements of fraud: evidence of organizational loss, involved. personal gain, and deception. The goal is to develop an accurate Establish answers to full set of story of what happened. Develop: questions: • timeline of what happened when, • Who decided to make the unethical • pictures of evidence, or illicit changes? • a diagram showing evidence • Did affected personnel know the relationships: which evidence is correct methods? associated with which people and • How far up the management chain other evidence did this knowledge go, and could auditors have been complicit? Security Planning: An Applied Approach | 3/12/2016 | 47 Forensic Tools for Fraud Computer forensic tools can • uncovering secret files • decoding encrypted files • investigating external media and deleted and retained email • E.g., find images of checks in computer or printer memory. Look at different versions of documents, transactions or emails: • Analyze emails from both sender and receiver side; is there a difference in emails purged? • Fraudsters change dates, amounts and/or names of transactions or checks; when are changes introduced? These tools may also be used during earlier stages of the investigation. Security Planning: An Applied Approach | 3/12/2016 | 48 Summary Fraud on average takes 5% of all income but can bankrupt organizations. 3 Key Elements: Motivation, Opportunity, Rationalization Internal Fraud = Employee Fraud • Asset misappropriation, corruption, financial statement fraud • Controls: Preventive, Detective, Corrective • Key: Segregation of Duties External Fraud = Outsider Fraud Red Flags Rule applies to any organization that provides credit • Specifies suspicious transactions to be wary of Social engineering fraud: fraudster pretends to be an insider • Multiple calls build information Other frauds: Receipt scams, checks, money orders, etc.