Investigative Techniques



Similar documents
Using Data Analytics to Detect Fraud. Other Data Analysis Techniques

Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

Big Data s Big Impact In Financial Investigations

How To Account For School Money

Anti-Money Laundering Facts

THE ABC S OF DATA ANALYTICS

by: Scott Baranowski, CIA

Glossary of Accounting Terms

A guide to business cash flow management

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

Advanced Data Analytics, the Fraudsters Worst Enemy

Audit of Cash Balances

PAYROLL AGENTS. Sector Specific AML/CFT Guidance Notes. August 2015

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

Contents. xiii xv. Case Studies Preface

Audits of Automobile Body and Repair Shops

SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS EXAMINATION PROGRAM

Using Data Analytics to Detect Fraud

SAMPLE AUDIT REPORT. Sample Credit Union. Report on Operations. As of Audit Date

Substantive Tests of Transactions and Balances

Statement of Cash Flows

FINANCIAL CONTROLS POLICIES AND PROCEDURES FOR SMALL NONPROFIT ORGANIZATIONS

Process diagram. Legend of symbols. Functional process. Information flow

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Cash Intensive Businesses Audit Techniques Guide - Chapter 7 - Digital Cash and Electronic Money

SMALL CLAIMS DIVISION INFORMATION

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL

Office of Business and Finance

ARCHDICOESE OF SEATTLE

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Office of Business and Finance

Accounting 408 Test 3b Section Row

Plan and Track Your Finances

CIVIL SERVICE SPORTS COUNCIL (CSSC) QUESTIONS & ANSWERS

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL

Pinpoint Methods to Reduce Exposure of Canadian Firms to U.S. Bankruptcy Preference Actions: The Ultimate Cost of Doing Business in the U.S.

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen?

Performance Audit City s Payment Process

3.90% introductory APR for six months.

Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS

Financial Information Kit

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

CASH FLOW STATEMENT & BALANCE SHEET GUIDE

March 28, 2003 Audit Report No Internal Control Over Receivables from Failed Insured Depository Institutions

Glossary of Accounting Terms Peter Baskerville

Accounts Payable Business Case. The Benefits of Accounts Payable Integration with PayCargo

Managing Cash Flow. A guide to help you broaden your understanding of how to manage cash flow in a small business

I N S T R U C T I O N On Application of the Rules for Providing Loans Under Credit Lines and Loans to Unemployed Demobilized Soldiers

ADMINISTRATIVE DIRECTIVE

Fiscal Procedure Sequence page number

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

716 West Ave Austin, TX USA

Chapter 15: Accounts Payable and Purchases

Law Related to Fraud. Civil Justice System Association of Certified Fraud Examiners, Inc Association of Certified Fraud Examiners, Inc.

TREASURER S DIRECTIONS CASH MANAGEMENT INTRODUCTION Section C1.1 : Overview

AML & Mortgage Fraud Compliance Program v ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM

UNIVERSITY OF CUMBRIA STUDENT FINANCIAL REGULATIONS. Applicable to Student registering in. Academic Year 2015/16

first direct credit card terms

Guide to cash flow management

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

Chapter 3: Scorecard Development Process, Stage 1: Preliminaries and Planning.

A CITIZEN S GUIDE: YOUR RIGHTS AFTER A SMALL CLAIMS JUDGMENT

CHAPTER XII DOUBLE ENTRY ACCOUNTING SYSTEM

Title IV Programs. Notes

TYPOLOGY 13 MONEY LAUNDERING THROUGH CASINOS APPROVED BY THE DECISION OF THE GOVERNOR OF THE CENTRAL BANK OF ARMENIA NO 1/41A FROM JANUARY 24, 2014

Table of Contents: Chapter 9 Receipt of Funds

Understanding our Legal Process. How to get the most out of your Invoice Finance facility

PRIME % - PRIME % based on your creditworthiness

How To Prevent Fraud In The United States

Tips For An Efficient And Effective Fraud Investigation

To the Rector, Wardens and Vestry of (Church Name; Church Address; City and Zip)

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

The Law of First Impressions A Practical Guide to Mortgage Applicants

Share Secured Visa Credit Card Agreement % when you open your accounts, based on your credit worthiness.

Understanding Your Credit Report

ATM/DEBIT CARD APPLICATION

CHAPTER 2 ACCOUNTING FOR TRANSACTIONS

Indicators for Banks to Assist in Identifying Suspicious Transactions

A Municipal Checklist for Internal Control-Part I, Cash Controls

CH 23 STATEMENT OF CASH FLOWS SELF-STUDY QUESTIONS

Learning Objectives: Quick answer key: Question # Multiple Choice True/False Describe the important of accounting and financial information.

MOBILOIL FCU 1810 N Major Dr Beaumont, TX CREDIT CARD AGREEMENT AND DISCLOSURE STATEMENT

MONEY LAUNDERING INDICATORS. 1. Financial professionals must pay especially close attention to the following indicators

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent

tutor2u Cash Management How and Why Businesses Need to Manage their Cash AS & A2 Business Studies PowerPoint Presentations 2005

How To Prevent Fraud On A Credit Card

716 West Ave Austin, TX USA

Financial. Management FOR A SMALL BUSINESS

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

CHAPTER 16 Current Asset Management and Financing

PLEASE CONTACT US IF YOU REQUIRE THESE TERMS OF BUSINESS IN LARGER PRINT. Painters. Version 3: January 2014

This policy applies to all communities and describes the following financial issues:

Transcription:

Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc.

Data Mining v. Data Analysis Data mining is the science of searching large volumes of data for patterns. Data analysis refers to any statistical process used to analyze data and draw conclusions from the findings. Often used interchangeably 2016 Association of Certified Fraud Examiners, Inc. 2 of 27

Data Mining Data mining combines several different techniques essential to detecting fraud, including the streamlining of raw data into understandable patterns. Data mining is an effective way for fraud examiners to develop fraud targets for further investigation. 2016 Association of Certified Fraud Examiners, Inc. 3 of 27

Planning Phase Data Analysis Process Understand the data Articulate examination objectives Build a profile of potential frauds Determine whether predication exists Preparation Phase Identify the relevant data Obtain the data Verify the data Cleanse and normalize the data Testing and Interpretation Phase Post-Analysis Phase 2016 Association of Certified Fraud Examiners, Inc. 4 of 27

Planning Phase Proper planning is essential Must first understand the data Know what data is available and how it is structured Helps to build workable tests to run on the data; also helps to identify additional areas for exploration Important to build a profile of potential frauds 2016 Association of Certified Fraud Examiners, Inc. 5 of 27

Preparation Phase Identify the relevant data Cleansing and normalizing the data ensures that: The data can be analyzed consistently. The data is in a structured, standardized format. Any known errors or inconsistencies in the data are addressed. 2016 Association of Certified Fraud Examiners, Inc. 6 of 27

Data Analysis Software Functions Sorting Joining files Correlation analysis Compliance verification Gap tests Duplicate searches 2016 Association of Certified Fraud Examiners, Inc. 7 of 27

Benford s Law Natural numbers are those numbers that are not ordered in a particular numbering scheme and are not generated from a random number system. Benford s Law provides that the distribution of digits in multi-digit natural numbers is not random; instead, it follows a predictable pattern. 2016 Association of Certified Fraud Examiners, Inc. 8 of 27

Benford s Law 2016 Association of Certified Fraud Examiners, Inc. 9 of 27

Examples of Data Analysis Queries General ledger analysis Accounts payable Asset management Cash disbursement Payroll 2016 Association of Certified Fraud Examiners, Inc. 10 of 27

Textual Analytics Structured data typically found in a database, recognizable and predictable structures. Examples: sales records, payment or expense details, financial reports. Unstructured data data not found in a traditional spreadsheet or database. Typically text-based. Software can categorize data to reveal patterns, sentiments, and relationships indicative of fraud. 2016 Association of Certified Fraud Examiners, Inc. 11 of 27

Textual Analytics Pressure deadline, quota, short, problem, and concern Opportunity override, write off, recognize revenue, adjust, discount, and reserve/provision Rationalization reasonable, deserve, borrow, and temporary 2016 Association of Certified Fraud Examiners, Inc. 12 of 27

Visual Analytics Link Analysis Used to create visual representations (e.g., charts with lines showing connections) of data from multiple data sources to track the movement of money; demonstrate complex networks; and discover communications, patterns, trends, and relationships. 2016 Association of Certified Fraud Examiners, Inc. 13 of 27

2016 Association of Certified Fraud Examiners, Inc. 14 of 27

2016 Association of Certified Fraud Examiners, Inc. 15 of 27

Sample Prep Question 1. Alpha, a fraud examiner, believes that vendors may be submitting invoices twice in the hope that they will be paid multiple times. Which of the following data analysis functions would be the easiest way to identify such invoices? A. Benford s Law analysis B. Textual analysis C. Correlation analysis D. Duplicate search 2016 Association of Certified Fraud Examiners, Inc. 16 of 27

Correct Answer: D Duplicate testing is used to identify transactions with duplicate values in specified fields. A fraud examiner would expect fields such as check numbers, invoice numbers, and government identification numbers (e.g., Social Security numbers) to contain only unique values within a data set; searching for duplicates within these fields can help the fraud examiner find anomalies that merit further examination. 2016 Association of Certified Fraud Examiners, Inc. 17 of 27

Sample Prep Question 2. Black, a fraud examiner, is conducting textual analytics on emails sent to and from specific employees that his client has identified as fraud suspects. He is using the fraud triangle to come up with a list of fraud keywords to use in his search. Which of the following words found in email text might indicate a fraudster is rationalizing his actions? A. Deserve B. Write off C. Override D. Quota 2016 Association of Certified Fraud Examiners, Inc. 18 of 27

Correct Answer: A In conducting a textual analytics examination, the fraud examiner should come up with a list of fraud keywords that are likely to point to suspicious activity. The factors identified in the fraud triangle are helpful when coming up with a fraud keyword list. One of these factors is rationalization. Some keywords that might indicate a fraudster is rationalizing his actions include reasonable, deserve, borrow, and temporary. 2016 Association of Certified Fraud Examiners, Inc. 19 of 27

Sample Prep Question 3. When conducting a data analysis engagement to detect fraud, it is important to build a profile of potential frauds before identifying, obtaining, and analyzing the data. A. True B. False 2016 Association of Certified Fraud Examiners, Inc. 20 of 27

Correct Answer: A To maximize the potential success of detecting fraud through data analysis, the analysis performed should be based on an understanding of the entity s existing fraud risks. To do so, the fraud examiner must first build a profile of potential frauds by identifying the organization s risk areas, the types of frauds possible in those risk areas, and the resulting exposure to those frauds. 2016 Association of Certified Fraud Examiners, Inc. 21 of 27

Investigation Techniques Tracing Illicit Transactions 2016 Association of Certified Fraud Examiners, Inc.

Tracing Funds Tracing search for evidence regarding the identity and disposition of property Examples: A victim of fraud who wants a tracing search to facilitate the recovery of criminal proceeds A potential plaintiff who wants a tracing search to determine if the potential defendant can pay a court-ordered sum if a judgment is ordered A judgment creditor who needs to identify the judgment debtor s assets 2016 Association of Certified Fraud Examiners, Inc. 23 of 27

Methods of Tracing Financial Transactions Direct method analysis of specific financial transactions Indirect employs circumstantial evidence Financial institutions the most important resource 2016 Association of Certified Fraud Examiners, Inc. 24 of 27

Tracing Financial Transactions Banks Personal accounts Usually have person s name, address, identification number, amount of initial deposit, and security data Business accounts Corporation and partnership accounts typically have resolutions/agreements attached that authorize drawers; may have articles of incorporation Negotiated Checks Contain amounts, payees, endorsees Back of check shows account number and bank deposited, names of institutions check traveled through Tells if check was cashed through series of codes Can be used to identify other accounts held by subject 2016 Association of Certified Fraud Examiners, Inc. 25 of 27

Tracing Financial Transactions Banks Wire transfer records (amount, date, name) Electronic payment records (assets and locations, loans, properties owned) Loan records: Credit or loan file The loan application, financial statements (BS, P&L), etc. Unusual loan repayments (odd amounts, accelerated payments, large paydowns) Tracing loan proceeds and payments can identify hidden assets or witnesses 2016 Association of Certified Fraud Examiners, Inc. 26 of 27

Tracing Financial Transactions Credit card records Show movements and habits Document travel and who subject does business with Charges might provide leads to identifying hidden assets (charges related to boats, planes, etc.) 2016 Association of Certified Fraud Examiners, Inc. 27 of 27

Indirect Methods of Tracing Two methods: (1) net-worth and (2) bank deposit Net-worth method Used to prove illicit income circumstantially by showing that a person s assets/expenditures for a given period exceed that which can be accounted for from known sources Net Worth the difference between assets and liabilities at a particular point in time By comparing the subject s net worth at the beginning and end of a period, you can determine the increase or decrease in net worth Useful when assets or liabilities have changed no financial records 2016 Association of Certified Fraud Examiners, Inc. 28 of 27

Asset method Methods for Performing a Net-Worth Analysis Used when the subject invests illegal funds to accumulate wealth/assets Expenditures method Used when the subject spends illicit income on consumables that would not necessarily cause an increase in net worth 2016 Association of Certified Fraud Examiners, Inc. 29 of 27

Asset Method Estimate funds from legitimate sources generously and expenses conservatively. Establish a starting point, generally the year before the target s illegal activities begin (referred to as Year One). Compute the target s net worth at the end of Year One. Identify all assets held by the target, valued at cost (not fair market value), including assets acquired earlier, and the amount of current liabilities. Calculate the difference between the value of the assets and the liabilities to determine the target s net worth at Year One, or opening net worth. 2016 Association of Certified Fraud Examiners, Inc. 30 of 27

Expenditures Method Comparison is made between suspect s known expenditures and known sources of funds during a given period of time. Establish known expenditures for the relevant year: Loan payments; monthly charges (utilities, telephone, etc.) The difference (or excess) between the amount of the subject s expenditures and known income is the amount attributed to unknown sources. 2016 Association of Certified Fraud Examiners, Inc. 31 of 27

Bank Deposit Analysis Method Based on the theory that if the subject receives money, it is either deposited or spent Recommended if most of the subject s income is deposited and the subject s books and records are unavailable, withheld, incomplete, or maintained on a cash basis 2016 Association of Certified Fraud Examiners, Inc. 32 of 27

Locating Hidden Assets Tend to hide liquid assets more frequently than illiquid assets Characteristics they want: Untraceable or difficult to trace Secure and accessible Liquid Common asset-hiding techniques Hiding in someone else s name Pay down debt Transfer to tax havens Transfer to trusts Insurance products 2016 Association of Certified Fraud Examiners, Inc. 33 of 27

Locating Assets Stored Abroad Letters Rogatory formal requests by one country s court to another country s court Mutual Legal Assistance Treaties (MLATs) Exchange between United States and certain foreign countries of information relating to AML and other financial/narco crimes 2016 Association of Certified Fraud Examiners, Inc. 34 of 27

Sample Prep Question 1. The records of a wire transfer identify the amount of the wire, where it was sent, and the date it was sent, but they do not identify who sent the wire. A. True B. False 2016 Association of Certified Fraud Examiners, Inc. 35 of 27

Correct Answer: B The records of a wire transfer identify the amount of the wire, where it was sent, the date it was sent, the name of the sender, and its amount. 2016 Association of Certified Fraud Examiners, Inc. 36 of 27

Sample Prep Question 2. Which of the following is the most accurate description of the net-worth (or comparative net-worth) method of analysis? A. Proving illicit income by measuring and recording income as earned and recording expenses as incurred. B. Assigning forecasted income and expenses to accounts, which will be compared to actual income and expense for analysis of variances. C. Proving illicit income by showing that a person s assets or expenditures for a given period exceed that which can be accounted for from known or legitimate sources. D. Using a subject s books and records to determine the subject s financial condition and identify the receipt or disposition of funds. 2016 Association of Certified Fraud Examiners, Inc. 37 of 27

Correct Answer: C The net-worth method (or comparative net-worth analysis) is used to prove illicit income circumstantially by showing that a person s assets or expenditures for a given period exceed that which can be accounted for from known or admitted legitimate sources of income. Fraud examiners should use the net-worth method when several of the subject s assets or liabilities have changed during the period under examination and when the target s financial records are not available. 2016 Association of Certified Fraud Examiners, Inc. 38 of 27

Sample Prep Question 3. Which of the following is something that might be revealed by analyzing a subject s electronic payment records? A. Assets the subject has purchased B. The cities and countries in which the subject conducts business C. Assets effectively controlled or held by the subject D. All of the above 2016 Association of Certified Fraud Examiners, Inc. 39 of 27

Correct Answer: D Electronic payments (or e-payments) refer to any type of noncash payment that does not involve a paper check, and electronic payment records can reveal, among other things: Assets the subject has purchased The locations of the subject s assets The locations of the subject s residences and businesses Loans the subject has obtained Payments made to nonexistent employees with direct deposit The cities and countries where the subject conducts business Assets ostensibly owned by family members or close associates but effectively controlled, held, or gifted by the subject 2016 Association of Certified Fraud Examiners, Inc. 40 of 27