Better Business Through Data Analysis & Monitoring My Account

The Best Kept Secrets of Fraud Part I

Elaborate Fraud Scheme Detected in an Unlikely Place

November 4, 2016 - Deep in the heart of a steaming jungle, a ramshackle mining town is full of dangers like mudslides, snakebites, and tropical diseases. Even getting here is an adventure that requires a small plane, a day spent navigating seething rivers, or a hair-raising 4x4 ride over ungraded roads. There are few comforts here and, apart from items in a small camp commissary, almost nothing to buy.

It may seem the most unlikely place on earth to uncover an elaborate fraud scheme. But as Mary Breslin, CIA, CFE, discovered, “The accounting team had this fantastic, controlled, double sign-off process for the miners’ cash. It was placed in envelopes, which were actually sealed with wax, and then hand-delivered to each person, who had to count and sign for it.” Just one problem — the same payroll agent who prepared the miners’ checks was also entrusted with making the bank run to withdraw their cash. It was easy enough to add extra money to each check, pick up the cash, and pocket the difference.

Upon further investigation, Breslin unmasked the same employee as the culprit in a massive, years-long payroll fraud. “It looked like there was this great process,” says Breslin, today an independent audit trainer and consultant. “But they never reconciled the pay register to the actual take-home pay of the miners, and they never reconciled their pay register to their HR roster. If they had done any of those things even one time, they would have found ghost employees who had been there for years.”

No business professional thinks they’re an easy mark. Yet thousands of fraudsters roam today’s organizations, and they’re making off with millions of dollars each year. These conniving crooks are relentless in exploiting our complacency, coming up with inspired twists on the same old cons. Leonard Vona, CPA, CFE, of Fraud Auditing Inc., spells it out: “A lot of fraud scenarios are common to all businesses. The fundamental schemes of 30 years ago are the same schemes occurring today.”

If the schemes are so well known, why do they keep happening? “For decades, the profession has been talking about fraud data analytics as one of the key skills required for auditors,” Vona explains. “Years later, we’re still talking about it.” According to Vona, too many audit teams begin and end their war on fraud by purchasing a detection tool. “We’re comfortable as a profession with compliance and internal controls. But combating fraud is a different animal. It begins with understanding the specifics of your business systems and the scenarios that make you vulnerable to fraud.”

The next step is to build an audit program to search for these scenarios. To help you get started, here are three classic fraud scenarios, along with some savvy approaches to fraud data that real-world CPAs and fraud professionals are using to protect their organizations.

Scenario #1: fictitious employees

Ghost employees may be entirely fictitious, or they may be former employees or contractors who were never purged from the system. As Breslin discovered at the mining company, “The payroll manager had added 19 fictitious employees, in addition to pocketing the extra payday cash. And because there’d been a change in computer systems, we could only go back three years. We’ll never know how long he had been doing it.”

Breslin trains Fortune 500 accountants and auditors on how to combat fraud. “I can’t tell you how many times someone comes back and tells me that they zeroed in on fictitious employees and immediately found fraud. It happens every time. This scheme is very common, yet most organizations don’t look for it.”

“It sounds simple,” Vona concedes. “But the methodology for fraud risk identification is missing from most of the literature. Most auditors need help in paring down a list of fraud scenarios that exist in the business systems they’re auditing.” It helps to break the scenario into its components:

  • WHO is committing the fraud? (in this case, the payroll function)
  • WHAT type of entity is involved? (in this case, fake employees)
  • WHEN and WHERE does the fraud transaction take place? (in this case, the pay register)
  • HOW can an audit step be added? (in this case, what specific tests will find employees who don’t actually exist?)

In other words, take heart—fraud detection doesn’t have to be complicated! After all, real employees do real things—they take vacation and sick time, sign up for benefits for their spouses or children, have their wages garnished for child support, and participate in employee charitable campaigns. They scan their badges in and out, punch time clocks, and log in and out of their computers.

Ghost employees don’t do any of those things. They just get paid like clockwork, with the money being deposited right into the pocket of your friendly neighborhood payroll fraudster. “The details of the ghost employee fraud will vary from one organization to the next,” Breslin says. “Each company has a different culture, with different processes and different systems. The key to uncovering this scheme is looking for what’s not there.”

Vona notes, “What the auditor does is look for patterns and frequencies. There’s no official rulebook on this. It’s somewhat dependent on what the perpetrator thinks they can get away with. With all that said, by working through your scenarios, you start to understand what fraud detection really looks like.”

Stay tuned for part II, which will examine fraud scenario #2: zombie vendors.

Liz Clare is a professional writer focusing on enterprise technology.
As published in Accounting Today.

Print

Number of views (1772)/Comments (0)

Brad Newman

Brad Newman

Other posts by Brad Newman
Contact author

Please login or register to post comments.

Name:
Email:
Subject:
Message:
x
Take a Lean Six Sigma Approach Using Data Analytics
16 October 2018

Take a Lean Six Sigma Approach Using Data Analytics

Read More

Infusing Python into Your Analysis with IDEA
6 October 2018

Infusing Python into Your Analysis with IDEA

IDEA Tech Tip

This Tech Tip we share some examples of how equivalent tasks in IDEAScript can be made much simpler in Python.

Read More

Global Chemical Company Automates Risks Identification with CaseWare IDEA
14 September 2018

Global Chemical Company Automates Risks Identification with CaseWare IDEA

Global corporation used IDEA to standardize & develop an automated process to comply with anti-corruption policy.

Read More

Telecommunications Provider Turns Two Days of Work Into 20 Minutes with CaseWare IDEA®
14 September 2018

Telecommunications Provider Turns Two Days of Work Into 20 Minutes with CaseWare IDEA®

Auditors Analyzing Hundreds of Millions of Records to Track Buying and Usage Patterns

One of the world’s largest telecom companies' internal audit team leverages tech to analyze trends, tendencies & patterns within customer & financial data.

Read More

Exploring IDEA's Built-In Power of Python
20 August 2018

Exploring IDEA's Built-In Power of Python

IDEA Tech Tip

With the release of version 10.3, IDEA created a buzz with its implementation of the Python scripting language, thereby taking a huge step towards having a more robust coding environment.

Read More

Sharing IDEA Data Using IDEA's ODBC Driver
18 July 2018

Sharing IDEA Data Using IDEA's ODBC Driver

IDEA Tech Tip

Read More

Oncor Achieves Operational Efficiencies with CaseWare IDEA
25 June 2018

Oncor Achieves Operational Efficiencies with CaseWare IDEA

Oncor's internal audit team needed to acquire years of data from different environments and formats to help improve processes and efficiency levels.

Read More

Analyzing the Past to Predict the Future with Trend Analysis
18 June 2018

Analyzing the Past to Predict the Future with Trend Analysis

In business, predicting the future is never an easy task. But IDEA can help as long as you have the right data, and Trend Analysis can help.

Read More

2018 IDEA® User of Excellence Award Winner Selected
15 June 2018

2018 IDEA® User of Excellence Award Winner Selected

Jennifer Girard, CIDA with American Red Cross Recognized for Exceptional Use of Data Analytics

Jennifer Girard, Sr Auditor with the American Red Cross is the recipient of the 2018 US IDEA UoE Award. She utilized IDEA to assist Finance Department during a natural disaster.

Read More

The Rules of Nature and Audit
6 June 2018

The Rules of Nature and Audit

What’s missing is often as important as what’s present. The rules of nature apply very well to audit if you consider, “Everyone knows it, but do you test for it?”

Read More

Using IDEA to Import QuickBooks General Ledger Data
4 June 2018

Using IDEA to Import QuickBooks General Ledger Data

The General Ledger is typically the starting point to an expanse of detailed information, see a step-by-step guide on how to get a readable version in idea.

Read More

New Features in IDEA 10.3 Part II
10 May 2018

New Features in IDEA 10.3 Part II

IDEA Tech Tip

In a recent article, we introduced the improvements to Stratified Random Samples and Python integration added in IDEA 10.3. But that’s just a small part...

Read More

Cargo Company Swaps Programming-Intensive Data Analytics Software for CaseWare IDEA
10 May 2018

Cargo Company Swaps Programming-Intensive Data Analytics Software for CaseWare IDEA

Auditors Achieve More Success in First Year with IDEA Than 5+ Years with Other Tool

With the entire audit team up and running using data analytics, they are finding new ways to integrate IDEA into other areas of the business and automate repeatable processes.

Read More

Maximizing Your Environment - Global Variables
8 May 2018

Maximizing Your Environment - Global Variables

Consider scope to be a building in which people work. The tools required to accomplish their tasks will of course be housed in that building, but in scripting it’s important to determine which tools need to be shared among the buildings.

Read More

RSS