fraud & forensic investigations frank pina, cpa, cff, cfe, cgma joseph galdo, cpa, cfe, cgma

Post on 29-Jan-2016

230 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Fraud & Forensic

Investigations

Frank Pina, CPA, CFF, CFE, CGMAJoseph Galdo, CPA, CFE, CGMA

A Statistical Certainty

“At any given moment, there is a certain percentage of the population that’s up to no good”

-J. Edgar Hoover

2

Fraud Defined

Any intentional or deliberate act to deprive another of property or money by guile, deception or other unfair means (ACFE)

Deception brought about by misrepresentation of material facts, or silence when good faith requires expression, resulting in material damage to one who relies on it and has the right to do so (IRS)

3

Types of Fraud

• Internal Illegal acts of employees, managers and

executives against the organization

• External Illegal acts of outsiders (i.e., non-employees)

against the organization

• On the books versus off the books

4

Execution of Fraud

• The Act Normally a theft or misrepresentation

• The Concealment Once the act is accomplished, efforts must be made to conceal

the fraud to prevent detection

• The Conversion Once the act is concealed, the perpetrator must convert the

asset to his or her own benefit

5

Indicia of Fraud

Some clue or hint that someone has misappropriated something… • No written policies and procedures• Overly complex organizational structure• Key employee never takes time off• Management override of controls• Inadequate internal controls/segregation of duties• Incompetent accounting personnel

• Indicators are not proof, but what is? Intent goes to proof of fraud

6

Recent Fraud Statistics

Typical organizations lose 5% of annual revenues to fraud• Translates to a potential global fraud loss of nearly $3.7 trillion

Primary Categories• Asset misappropriations - $130,000 median loss• Corruption - $200,000 median loss• Financial statement fraud - $1 million

• Frauds lasted a median of 18 months before detection

• Most likely method of detection?• A tip!Source: ACFE 2014 Report to the Nations on OccupationalFraud and Abuse; 2014 Global Fraud Study

7

Fraud Triangle

8

FRAUD

Pressure/Need

Rationalization Opportunity

The Perpetrator

Pressure/Need Usually an immediate financial need

oLiving beyond meansoDrug or gambling addictionoHigh personal debts oJob dissatisfactionoEmotional instabilityoSickness in the familyoChallenge to beat the system

9

The Perpetrator

Opportunity (perceived) Ability to commit AND conceal fraud

– I can do it!– I can conceal it!– I will not get caught!

Manifests itself in weak internal controls Lack of oversight Management override of controls

10

The Perpetrator

Rationalization Perpetrator justifies actions as something other than

fraud, providing a morally acceptable excuse

–“I’m only borrowing the money”–“It’s for a good purpose”–“I deserve it”–“Everyone does it”–“I need it more than they do”

11

The Perpetrator

A recent study of white collar crime by the Association of Certified Fraud Examiners

• College-educated white males

• Men committed nearly three-fourths of the offenses

12

The Perpetrator

• Possible factors / characteristics Greed Financial difficulties Revenge Compulsive / irrational behavior Employee in position of trust Earnings versus lifestyle Does not take vacations

13

Organizational Vulnerability

• Internal controls are weak• Dominated by one or two people• Insufficient working capital• Employees are overworked, poorly paid, with low moral• High turnover rate, especially in accounting group• Poor accounting records / document management• No internal audit function• Poor tone at the top

14

Who should be concerned?

• Government regulators• Management (CEO, CFO, Budget Director)• Counsel to companies (internal and external)• Board of directors/trustees• Audit committee• Auditors (internal and external)• Outside lenders (banks and related parties)• Taxpayers• Business owners, including shareholders

15

Typical Fraud Schemes

Asset Misappropriation Lapping – A/R Skimming – cash receipts Theft of goods - inventory Ghost employees - payroll False/inflated/duplicate invoices – A/P Ponzi schemes - investments

16

Typical Fraud Schemes

Corruption Bribes / Kickbacks

o “Things of value” Conflicts of interest Bid Rigging

Financial Statement Fraud Improper revenue recognition Overstatement of assets Manipulation of liabilities and/or expenses Improper disclosures

17

Indicators of Fraud

• Two sets of books / records

• Use of large amounts of and/or frequent use of cash

• Incomplete, missing or inaccurate records

• Unusual check transactions (multiple endorsements, forgeries, etc.)

• Stale items on bank reconciliations

• Frequent / suspicious related-party transactions

• Lack of adherence to, or absence of policies/procedures/controls

18

Indicators of Fraud

• Use of nominees

• Use of foreign or off-shore entities or financial institutions

• Destruction of records – prematurely or contrary to retention policy

• Altered documents: photocopies rather than originals, apparent

alterations, duplicate invoices

• Numeric documents out of date order

• Expense account abuse

19

FORENSIC

20

Why Investigate?

What is your goal?

• Termination?

• Restitution?

• Prosecution?

21

Investigative Challenges

• Developing effective and efficient investigative strategies

oWhat documents are relevant?

oWho to interview?

oHow to present findings?

• Identifying investigative constraints

• Determining appropriate resolutions

• Improving internal controls (prevention, detection, deterrence)

22

Investigative Scope

• Tailor investigative scope / procedures to address:oWhat happened and during what time period?oWho was involved?oWere they authorized?oHow and why did it happen?oWhat was the impact?oWho needs to know?

• Perform the investigation efficiently (cost & time)

• Develop remedial actions

23

Investigative Scope

• Respond to interested parties (e.g., government agencies, regulators, counsel, etc.)

• Also consider: Internal auditor authority Outside forensic assistance Scope limitations Attorney-client privilege

24

Attorney-Client Privilege

• The attorney-client privilege exists when a client seeks or receives legal advice from an attorney in confidence.

• The communications may be protected forever. The underlying facts, on which the communications are based, are not protected.

• The burden of proving the existence of the privilege rests on the party asserting it.

25

Accountant-Client Communications

• Federal courts generally do not recognize an accountant-client privilege.

• There are various state statutes that do speak to the issue of CPA-client communications/production of documents and afford varying degrees of protection in state courts.

26

Investigative Planning

• Understand probative valueoKnow your investigative goals–Determine what evidence is useful»Know importance/relevance of

information obtained

• Evaluate evidence at hand

• Be nimble and flexible

27

Document Analysis

• What do you want to know?• How do you obtain the information?

oVoluntary complianceoRegulatory authorityoCompulsory process

• Public record information can make a case!o Internet and subscriber databases

• Electronic communicationsoEmailsoComputer drives

• Interview testimony can be critical!

28

Document Analysis

• Financial records and source documentsoInvoicesoCancelled checksoLedgers and journalsoPayroll recordsoPurchase orders

• Financial statementsoInternal/external

29

Document Analysis

• Forecasts/projections

• Tax returns

• Confirmation Transactions will be disguised and concealed All records should be suspect! Third-party confirmation to pierce disguise

30

Document Analysis

• Transaction tests Fraudsters usually leave a trail

oTrail starts with financial records and source documents

Detailed and thorough document review necessary

o Invoices: authentic/altered or fictitious?

oChecks: information on checks can tell the real story

oPayroll: false payroll is an easy way to divert funds

oEmails: modern-day wire taps!

31

32

ForensicInterviews

Why Interview?

“ I can solve ANY case…..no matter how oldno matter how complicatedno matter how difficult………

If I can get someone to tell me who did it!”~FBI Instructor, FBI Academy, Quantico, VA, May 10, 1976

33

Why Interview?

• Spoken word is the most important source of investigative information

• No investigation is complete unless witnesses are interviewed

• How do you know if you don’t ask?

34

What are the most important elements of an effective interview?

• Preparation!

• Preparation!

• Preparation!

35

Interviewing

• Master all evidence; have it at your fingertips

• Draw from previous interviews• Secure, review, integrate and understand the probative

value of all available documents:

oEmailsoFinancial recordsoData analysisoAll other relevant documents including

correspondence, contracts, bid documents, etc.

36

Interviewing

• Probe

• Conduct interviews to obtain sufficient detail

• Do not accept incomplete or unresponsive answers

• Ask all questions necessary for required informationoAsk until you’re satisfied!

37

Interviewing

• Feel free to challenge: Inconsistencies Answers that do not make sense Non-responsive answers Demeanor changes Blatant lies

*Fraudsters try to tell 50% of the truth, 100% of the time!

38

Reporting

• What is the best way to report your findings? Written report Oral presentation

• To whom should you discuss the results?

39

Case Examples

QUESTIONS?

41

Frank Pina, CPA, CFF, CFE, CGMAfpina@Mercadien.com

Joseph Galdo, CPA, CFE, CGMAjgaldo@Mercadien.com

609-689-970042

Contact Information

top related