Advanced Data Analytics, the Fraudsters Worst Enemy



Similar documents
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

THE ABC S OF DATA ANALYTICS

DATA ANALYTICS & VISUALIZATION FOR MITIGATING FRAUD RISKS

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

Leveraging Big Data to Mitigate Health Care Fraud Risk

FRAUD RISK ASSESSMENT

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

An Auditor s Guide to Data Analytics

Role is Broader and More Strategic

Contents. xiii xv. Case Studies Preface

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

Microsoft Confidential

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

The need for optimization: Getting the most from Microsoft Dynamics GP

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent

by: Scott Baranowski, CIA

FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM

Procurement Fraud Identification & Role of Data Mining

New CFPB mortgage servicing rules present significant challenges for mortgage servicers

Worldwide Anti-Corruption Policy

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics

5 Important Controls to Mitigate Employee Fraud

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE

Great Expectations : How to Detect and Prevent Fraud using Data Analysis

Evaluating time and expense systems: Choosing the right platform for your organization

Fraud Awareness and Prevention Program Report

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A

SEC auditor independence considerations

Fraud: Real Stories, Real People, Real Impact

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation

Impact of New Internal Control Frameworks

SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY

Leveraging Your ERP System to Enhance Internal Controls

Financial Transactions and Fraud Schemes

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

Data Analytics For the Restaurant Industry

Investigative Techniques

Forensic Audit Building a World Class Program

GLOBAL PORTS INVESTMENTS PLC

INTRODUCTION TO FRAUD EXAMINATION

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

Fraud and internal controls, Part 3: Internal fraud schemes

Automating the Audit July 2010

Driving business performance Using data analytics

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

ANTI-CORRUPTION POLICY AND PROCEDURES

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming GASBO Conference. Thomas Buckhoff, Ph.D.

Fraud Awareness Training

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Introduction to Fraud Examination. World Headquarters the gregor building 716 West Ave Austin, TX USA

Centre for Corporate Governance. Sample listing of fraud schemes

Chapter 15: Accounts Payable and Purchases

The following figures summarize ways in which dut:es could be segregated with two, three and four people.

Antifraud program and controls assessment grid*

Health care internal audit: Identifying prevalent risks within your organization

Fraud Workshop Finding the truth in the transactions

White Paper - Travel & Entertainment Spend Analytics Best Practices

Accounts Payable Best Practices

Segregation of Duties

Issues in Negotiating Cash-Free Debt-Free Deals

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS

How To Understand And Understand Forensic Accounting

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Preventing Misuse and Abuse in Your Program

Data & Analytics in Internal Audit. January 13, 2015

Fraud Prevention and Detection in a Manufacturing Environment

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY

Managing FCPA (Foreign Corrupt Practices Act) Risks

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP

Process Control Optimisation with SAP

Internal Controls, Fraud Detection and ERP

Fraud-Related Compliance

Supplier Anti-Corruption and Anti- Bribery Policy

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015

{Governmental Client Training} June 20, 2016

Moving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director

B Resource Guide: Implementing Financial Controls

How to Leverage Data Analytics in Healthcare Auditing

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer

GENERAL PAYROLL CONTROLS Dates in scope:

Fraud in the Church What the Survey Tells Us

The Affordable Care Act: What s next for employers?

Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com

Revenue cycle measurement strategies

SCOPE OF WORK FOR PERFORMING INTERNAL CONTROL AND STATUTORY/REGULATORY COMPLIANCE AUDITS FOR RECIPIENTS OF SPECIAL MUNICIPAL AID

Platform Specialty Products Corporation Foreign Corrupt Practices Act/Anti-Corruption Policy

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations

Using Data Analytics to Detect Fraud

Transcription:

Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud

Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability limitations of traditional data analytics methods and how to overcome The power of combining publicly available information and data visualization technology Real world examples of indications of fraud identified using advanced data analytics, public information and visualization technology 1

Overview of data analytics in the anti-fraud and fraud investigation context

Data Analytics in an Investigative Context What is Data Analytics? How is it employed in investigations? What are the advantages of the use of data analytics versus traditional forensic investigative techniques? How can it be used as a tool in an investigation? Proactive versus reactive data analytics 3

Fraud s Increasing Trajectory Typically starts out small Increases in complexity and aggressiveness Often grows in magnitude and in number of participants Will rarely cease on its own 4

What are we looking for? What might we find with data analytics? Fraud or fraud risks Control gaps / failures Errors and inefficiencies Proactive/detective data analytic purposes: Generally looking for previously unknown patterns indicative of fraud or loss Identification of high risk areas to enhance controls or concentrate further investigative efforts/action What is different with an investigations context? [Often] you know where to begin your focus - Process(es), patterns, specific accounts/vendors, etc. May analyze more detailed information, such as meta data Heavier review of results, including comparing results to social media and/or other publically available information 5

Fraud Risks/Schemes in Common Processes Vendors / Accounts Payable (AP) Conflict of interest / kickbacks Embezzlement/Theft - Fictitious/Ghost vendor - False invoicing scheme Bid rigging Anti-corruption Corporate Expenses/Purchase Card Embezzlement/Theft (personal expenses) Anti-corruption (entertaining or making payments to government officials) Employees / Payroll Embezzlement/Theft - Ghost employee (never or was previously employed) - Unauthorized or improper payroll payments - Falsified or inflated hours or overtime Anti-corruption (in addition to Ghost employee risks) - Hiring unauthorized/illegal employees (incl. government) 6

Fraud Risks/Schemes in Common Processes Customers / Accounts Receivable Embezzlement/Theft - Lapping / Re-directing deposits Conflict of interest / kickbacks Earnings management (inflating assets / revenue) Manual Journal Entries (GL) Earnings management, most typically: - Increase assets, revenue - Decrease liabilities, expense - Balance sheet gross-up Concealment of improper cash disbursements 7

Broad Category of Routine Groups/Objectives Master record matches (ex. Vendor/Customer to Employee) Segregation of duties / user access Invalid/Missing/Unusual/Hi gh-risk record characteristics, including Benford s Analysis, rounded dollar transactions, etc Numeric sequencing and structure (ex. Invoice references) Duplicate records Unusual days/times External record comparisons Change log analysis High-level analysis - Top X summaries - Stratifications 8

Methodology Business Environment Business & concerns Processes & systems Scope Processes to analyze Data to collect (tables, time frame) Number and types of routines Tool Selection and Determination of Risk Factors What tools will you use How will you determine high-risk records 9

Methodology Load Data Process Data Forensic Review and Reporting of Risk Areas Import tables Quality checks Run routines Quality check results Review findings Report to stakeholders 10

Data Analysis Flow User Interface (Risk Scoring and Test Results) Repository of Forensic Procedures (Classified by Business Process) Rules Engine Data Aggregator Data Loader Examples of Client Data (Multiple Sources such as SAP, Oracle, In-House, etc) Vendor Master List Employee Master List Payments, Invoices, etc. Public Information External Data Sources 11

Focus on High Risk and High Value Transactions Frequency Anomalies Relevant Data Sets Invoice Anomalies High Risk & Value Inconsistency in Data Sets 12

Capability limitations of traditional data analytics methods and how to overcome

Current Challenges Increasingly Complex Regulatory Environment: Foreign Corrupt Practices Act (FCPA) Sarbanes and Oxley Dodd-Frank Whistleblower Provision Business processes and controls don t operate perfectly Collusion is difficult to prove Compliance resources must be allocated efficiently Improper behavior of certain employees may be unavoidable Performance pressures may create unintended incentives to achieve metrics 14

Ongoing Benefits Include Identify compliance failures on a timely basis Continually evaluate control environment effectiveness Mitigate control weaknesses Objective basis for quantifying system-wide risk Allocate limited resources efficiently Reduce cost by correcting errors Eliminate inefficiency and waste in the supply chain Uncover high risk relationships Improve existing internal audit protocols Assess compliance with FCPA books & records Monitor compliance and risk of newly acquired businesses 15

Other Limitations and How to Overcome Quality assurance - Import issues - Complete population - All fields necessary Sampling vs. complete population - Test 100% of population Use of trends rather than transaction-level - Frequencies - Time lines - Various other visualization Time consuming to repeat - Scripts - Normalization 16

The power of combining publicly available information and data visualization technology

Examples of Public Information Utilizing public information can tell you: - If an address is invalid or high risk - A phone number is invalid or tied to a temporary address - An employee address or phone ties to a business - Employee SSN belongs to a deceased person - Address is a check cashing store 18

Potential Ghost Employee: Address is a Hotel, SSN Pattern or Other IDs are invalid, for Active Payroll Employee 19

Potential Ghost Vendor: Mail Delivery Address, Temporary Office Location, Mobile Phone and the Vendor Received Payments 20

Visualization Tools Benefits of visualizing results: Compelling way to tell a story not just numbers - A picture is worth a million words Useful to risk management Dashboards add immediate understanding of data world working with Conflict results can be simplified 21

Example of Risk Management Dashboard 22

Example of Vendor Risk Dashboard 23

Examples of Social Network Diagram to Visualize Shared Data Elements 24

Real world examples of indications of fraud identified using advanced data analytics, public information and visualization technology

Case Studies Conflict of Interest: Test identified an employee with the same address as a contractor, but different phone number and last name Upon investigation, it was determined the contractor was the son of the employee, and the employee not only supervised the work, but also determined how much the contractor was paid Over $20,000 was paid to the contractor and the relationship was not disclosed on the vendor conflict forms ( no relationships was checked by the employee) Employee Fraud: Tests Identified vendor bank account numbers that matched an employee's bank account numbers An Accounts Payable clerk used the vendor master change function to change the payable information to his own name during the check run and change it back once the run was completed The employee had collected several hundreds of thousands in diverted payments 26

Case Studies Employee Expense Fraud: Whistleblower indicated suspect expense reimbursement requests from a senior executive Data analysis routines, coupled with timeline visualization, helped identify over $50,000 in inappropriate spend, including falsified receipts Employee Fraud: Ghost Employees - Identified 21 terminated employees that received over $1 million in payroll payments Identified an employee whose SSN, according to public records, was issued prior to birth and belonged to a deceased individual. The employee was an active employee on payroll.

Victor Padilla, CFE Litigation and Investigation Consulting Services Al Kohl, CFE Litigation and Investigation Consulting Services McGladrey LLP 13355 Noel Road, Suite 800, Dallas, TX 75240 D 972.764.7128 F 972.764.7102 E victor.padilla@mcgladrey.com http://www.mcgladrey.com/litigation McGladrey LLP 4801 Main Street, Suite 400, Kansas City, MO 64112 D 816.751.4015 F 816.751.1890 E al.kohl@mcgladrey.com http://www.mcgladrey.com/litigation Experience the power of being understood. SM

This document contains general information, may be based on authorities that are subject to change, and is not a substitute for professional advice or services. This document does not constitute assurance, tax, consulting, business, financial, investment, legal or other professional advice, and you should consult a qualified professional advisor before taking any action based on the information herein. McGladrey LLP, its affiliates and related entities are not responsible for any loss resulting from or relating to reliance on this document by any person. McGladrey LLP is an Iowa limited liability partnership and the U.S. member firm of RSM International, a global network of independent accounting, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. McGladrey, the McGladrey logo, the McGladrey Classic logo, The power of being understood, Power comes from being understood, and Experience the power of being understood are registered trademarks of McGladrey LLP.