Upload
martin-jones
View
235
Download
0
Tags:
Embed Size (px)
Citation preview
Fraud & Forensic
Investigations
Frank Pina, CPA, CFF, CFE, CGMAJoseph Galdo, CPA, CFE, CGMA
A Statistical Certainty
“At any given moment, there is a certain percentage of the population that’s up to no good”
-J. Edgar Hoover
2
Fraud Defined
Any intentional or deliberate act to deprive another of property or money by guile, deception or other unfair means (ACFE)
Deception brought about by misrepresentation of material facts, or silence when good faith requires expression, resulting in material damage to one who relies on it and has the right to do so (IRS)
3
Types of Fraud
• Internal Illegal acts of employees, managers and
executives against the organization
• External Illegal acts of outsiders (i.e., non-employees)
against the organization
• On the books versus off the books
4
Execution of Fraud
• The Act Normally a theft or misrepresentation
• The Concealment Once the act is accomplished, efforts must be made to conceal
the fraud to prevent detection
• The Conversion Once the act is concealed, the perpetrator must convert the
asset to his or her own benefit
5
Indicia of Fraud
Some clue or hint that someone has misappropriated something… • No written policies and procedures• Overly complex organizational structure• Key employee never takes time off• Management override of controls• Inadequate internal controls/segregation of duties• Incompetent accounting personnel
• Indicators are not proof, but what is? Intent goes to proof of fraud
6
Recent Fraud Statistics
Typical organizations lose 5% of annual revenues to fraud• Translates to a potential global fraud loss of nearly $3.7 trillion
Primary Categories• Asset misappropriations - $130,000 median loss• Corruption - $200,000 median loss• Financial statement fraud - $1 million
• Frauds lasted a median of 18 months before detection
• Most likely method of detection?• A tip!Source: ACFE 2014 Report to the Nations on OccupationalFraud and Abuse; 2014 Global Fraud Study
7
Fraud Triangle
8
FRAUD
Pressure/Need
Rationalization Opportunity
The Perpetrator
Pressure/Need Usually an immediate financial need
oLiving beyond meansoDrug or gambling addictionoHigh personal debts oJob dissatisfactionoEmotional instabilityoSickness in the familyoChallenge to beat the system
9
The Perpetrator
Opportunity (perceived) Ability to commit AND conceal fraud
– I can do it!– I can conceal it!– I will not get caught!
Manifests itself in weak internal controls Lack of oversight Management override of controls
10
The Perpetrator
Rationalization Perpetrator justifies actions as something other than
fraud, providing a morally acceptable excuse
–“I’m only borrowing the money”–“It’s for a good purpose”–“I deserve it”–“Everyone does it”–“I need it more than they do”
11
The Perpetrator
A recent study of white collar crime by the Association of Certified Fraud Examiners
• College-educated white males
• Men committed nearly three-fourths of the offenses
12
The Perpetrator
• Possible factors / characteristics Greed Financial difficulties Revenge Compulsive / irrational behavior Employee in position of trust Earnings versus lifestyle Does not take vacations
13
Organizational Vulnerability
• Internal controls are weak• Dominated by one or two people• Insufficient working capital• Employees are overworked, poorly paid, with low moral• High turnover rate, especially in accounting group• Poor accounting records / document management• No internal audit function• Poor tone at the top
14
Who should be concerned?
• Government regulators• Management (CEO, CFO, Budget Director)• Counsel to companies (internal and external)• Board of directors/trustees• Audit committee• Auditors (internal and external)• Outside lenders (banks and related parties)• Taxpayers• Business owners, including shareholders
15
Typical Fraud Schemes
Asset Misappropriation Lapping – A/R Skimming – cash receipts Theft of goods - inventory Ghost employees - payroll False/inflated/duplicate invoices – A/P Ponzi schemes - investments
16
Typical Fraud Schemes
Corruption Bribes / Kickbacks
o “Things of value” Conflicts of interest Bid Rigging
Financial Statement Fraud Improper revenue recognition Overstatement of assets Manipulation of liabilities and/or expenses Improper disclosures
17
Indicators of Fraud
• Two sets of books / records
• Use of large amounts of and/or frequent use of cash
• Incomplete, missing or inaccurate records
• Unusual check transactions (multiple endorsements, forgeries, etc.)
• Stale items on bank reconciliations
• Frequent / suspicious related-party transactions
• Lack of adherence to, or absence of policies/procedures/controls
18
Indicators of Fraud
• Use of nominees
• Use of foreign or off-shore entities or financial institutions
• Destruction of records – prematurely or contrary to retention policy
• Altered documents: photocopies rather than originals, apparent
alterations, duplicate invoices
• Numeric documents out of date order
• Expense account abuse
19
FORENSIC
20
Why Investigate?
What is your goal?
• Termination?
• Restitution?
• Prosecution?
21
Investigative Challenges
• Developing effective and efficient investigative strategies
oWhat documents are relevant?
oWho to interview?
oHow to present findings?
• Identifying investigative constraints
• Determining appropriate resolutions
• Improving internal controls (prevention, detection, deterrence)
22
Investigative Scope
• Tailor investigative scope / procedures to address:oWhat happened and during what time period?oWho was involved?oWere they authorized?oHow and why did it happen?oWhat was the impact?oWho needs to know?
• Perform the investigation efficiently (cost & time)
• Develop remedial actions
23
Investigative Scope
• Respond to interested parties (e.g., government agencies, regulators, counsel, etc.)
• Also consider: Internal auditor authority Outside forensic assistance Scope limitations Attorney-client privilege
24
Attorney-Client Privilege
• The attorney-client privilege exists when a client seeks or receives legal advice from an attorney in confidence.
• The communications may be protected forever. The underlying facts, on which the communications are based, are not protected.
• The burden of proving the existence of the privilege rests on the party asserting it.
25
Accountant-Client Communications
• Federal courts generally do not recognize an accountant-client privilege.
• There are various state statutes that do speak to the issue of CPA-client communications/production of documents and afford varying degrees of protection in state courts.
26
Investigative Planning
• Understand probative valueoKnow your investigative goals–Determine what evidence is useful»Know importance/relevance of
information obtained
• Evaluate evidence at hand
• Be nimble and flexible
27
Document Analysis
• What do you want to know?• How do you obtain the information?
oVoluntary complianceoRegulatory authorityoCompulsory process
• Public record information can make a case!o Internet and subscriber databases
• Electronic communicationsoEmailsoComputer drives
• Interview testimony can be critical!
28
Document Analysis
• Financial records and source documentsoInvoicesoCancelled checksoLedgers and journalsoPayroll recordsoPurchase orders
• Financial statementsoInternal/external
29
Document Analysis
• Forecasts/projections
• Tax returns
• Confirmation Transactions will be disguised and concealed All records should be suspect! Third-party confirmation to pierce disguise
30
Document Analysis
• Transaction tests Fraudsters usually leave a trail
oTrail starts with financial records and source documents
Detailed and thorough document review necessary
o Invoices: authentic/altered or fictitious?
oChecks: information on checks can tell the real story
oPayroll: false payroll is an easy way to divert funds
oEmails: modern-day wire taps!
31
32
ForensicInterviews
Why Interview?
“ I can solve ANY case…..no matter how oldno matter how complicatedno matter how difficult………
If I can get someone to tell me who did it!”~FBI Instructor, FBI Academy, Quantico, VA, May 10, 1976
33
Why Interview?
• Spoken word is the most important source of investigative information
• No investigation is complete unless witnesses are interviewed
• How do you know if you don’t ask?
34
What are the most important elements of an effective interview?
• Preparation!
• Preparation!
• Preparation!
35
Interviewing
• Master all evidence; have it at your fingertips
• Draw from previous interviews• Secure, review, integrate and understand the probative
value of all available documents:
oEmailsoFinancial recordsoData analysisoAll other relevant documents including
correspondence, contracts, bid documents, etc.
36
Interviewing
• Probe
• Conduct interviews to obtain sufficient detail
• Do not accept incomplete or unresponsive answers
• Ask all questions necessary for required informationoAsk until you’re satisfied!
37
Interviewing
• Feel free to challenge: Inconsistencies Answers that do not make sense Non-responsive answers Demeanor changes Blatant lies
*Fraudsters try to tell 50% of the truth, 100% of the time!
38
Reporting
• What is the best way to report your findings? Written report Oral presentation
• To whom should you discuss the results?
39
Case Examples
QUESTIONS?
41
Frank Pina, CPA, CFF, CFE, [email protected]
Joseph Galdo, CPA, CFE, [email protected]
609-689-970042
Contact Information