Professional Documents
Culture Documents
Fraud'S Ingerprints: Dusting Data
Fraud'S Ingerprints: Dusting Data
DUSTINGyourDATA
for
FRAUD'S
F INGERPRINTS
P. 32
Learn from the acclaimed authority on Benford’s Law
on how numbers can become your best friends.
S TAT U S Q U O I S C H A I N E D TO T H E PA S T.
Status Go ™
U N C O V E R S W H AT ’ S N E X T.
gt.com/statusgo
© 2020 Grant Thornton LLP | All rights reserved | U.S. member firm of Grant Thornton International Ltd. In the U.S., visit gt.com for details
FROM THE PRESIDENT CONNECT WITH US
FM
wrong. The numbers just don’t feel right, but it’s not obvious.
Like Alice going down a rabbit hole, you’re becoming
“curiouser and curiouser” about what you’re inspecting.
Mark Nigrini, Ph.D., a leading Benford’s Law expert, Like the ACFE on
Facebook for the latest
writes the excellent, detailed cover article on six typical num-
news, photos, videos and
ber patterns (including Benford’s) that you can search for dur-
exclusive online content.
ing your cases to possibly find fraud. Most of us use modern
continuous audit techniques and data analytics tools, but it’s
valuable to revisit some rock-solid detection methods.
Benford’s Law tells us the distribution of digits in multi-
digit natural numbers isn’t random but follows a predictable Follow @TheACFE
pattern. Certain digits will show up more than others. For on Twitter and keep
example, you’ll see more 1s than 2s, more 2s than 3s, and so informed on breaking
news and industry trends.
on. Fraudsters either aren’t cognizant of this law and the
other number patterns Nigrini covers, or they don’t know
how to override them. They often manipulate numbers to try to fly under the radar, but their data altera-
tions always tell a story.
I can recall seeing several illegal payments beginning with “9” or many round numbers in several Make connections with
cases I prosecuted. And I remember procurement fraud cases in which government officials knew the ex- fellow fraud fighters in
act authorization limits, but they thought they could avoid detection when they bumped up the amounts. the ACFE Community at
As Nigrini writes, fraudsters “don’t know when to stop.” They might start small and carefully, but Connect.ACFE.com.
after their initial success they often become brazen and greedy. The numbers and frequencies begin to
increase unnaturally, and these established number-pattern tests will catch them. That’s when you can
isolate transactions for further review.
The ACFE Report to the Nations (ACFE.com/RTTN) demonstrates that organizations with anti-fraud View stories and photos
controls discover frauds faster and lose less than their counterparts who don’t. CFEs who are trained on Instagram and never
in fraud detection techniques, including recognizing number patterns, of course, help organizations miss exclusive Fraud
reduce their fraud losses. Magazine content.
Unfortunately, in the ACFE’s recent study on the impact of COVID-19 (ACFE.com/covidreport), more
CFEs are seeing reductions in their anti-fraud budgets. Now isn’t the time to cut controls as financial
pressures mount. We can’t let our guard down, especially in a pandemic. We must remain vigilant in
reducing the opportunities for fraudsters to thrive.
“All fraudsters think they’re unique,” Nigrini writes. But CFEs can prove fraudsters wrong with
CONTRIBUTE
Share your expertise
number-pattern procedures. Though we depend on high-tech, fraud-detection tools, Nigrini shows us
and earn up to 10 CPE
that decades-old discovery methods are still valuable. ■ FM credits annually for your
published work. Visit
Fraud-Magazine.com/
Bruce Dorris, J.D., CFE, CPA, is president and CEO of the ACFE. Reach him at:
getpublished.
President@ACFE.com.
COVER STORY
32
Dusting your data for
fraud’s fingerprints:
Six number patterns
that fraudsters use
By Mark J. Nigrini, Ph.D.
FEATURES
26
‘emotional intelligence’ Anti-Fraud Playbook provides practical,
46
By Mandy Moody, CFE actionable guidance
By Sophia Carlton, CFE; and James Ruotolo, CFE
Subscriptions
INNOVATION UPDATE ACFE members: annual membership dues include
Prevent procurement $45 for a regular one-year subscription; $15 for an
electronic member subscription, and $15 for student
‘leakages’ and save and retired member subscriptions. Non-member sub-
scription rates are $65. Membership information can
precious working capital 68 Priti Amin, CFE be obtained by visiting ACFE.com or by calling (800)
245-3321, or +1 (512) 478-9000. Change of address
By Vincent M. Walden, CFE, CPA 12 notices and subscriptions should be directed to Fraud
Magazine. Although Fraud Magazine may be quoted
I’M A CFE with proper attribution, no portion of this publication
may be reproduced unless written permission has been
TAKING BACK THE ID Priti Amin, CFE obtained from the editor. The views expressed in Fraud
IRS telephone scams, By Dick Carozza, CFE 68
Magazine are those of the authors and might not re-
flect the official policies of the Association of Certified
remote-working risks and Fraud Examiners. The editors assume no responsibility
for unsolicited manuscripts but will consider all submis-
VPNs for tax pros ACFE NEWS 70 sions. Contributors’ guidelines are available at Fraud-
Magazine.com. Fraud Magazine is a double-blind,
By Robert E. Holtfreter, Ph.D., peer-reviewed publication.
CFE 16 CPE QUIZ 72 To order reprints, visit Fraud-Magazine.com/reprint or
email reprints@fraud-magazine.com.
© 2020 Association of Certified Fraud Examiners, Inc. “ACFE,” “CFE,” “Certified
Fraud Examiner,” “CFE Exam Prep Course,” “Fraud Magazine,” “Association of
Certified Fraud Examiners,” “Report to the Nations,” the ACFE Seal, the ACFE
Logo and related trademarks, names and logos are the property of the Association
of Certified Fraud Examiners, Inc., and are registered and/or used in the U.S. and
countries around the world.
A
former dental office employee dry, business-related tasks necessary to Ignorance of financial
I recently met, after hearing operate functioning practices. operations
that I’m a CFE, immediately Physicians in smaller practices, In 2004, Benjamin Perlman, a Boston-
began to fill me in about an embezzle- especially, are likely to trust just one or based dentist, interviewed a young
ment his former workplace suffered. I two individuals to handle every finan- woman, Tina, to fill the business manager
cial aspect of the business — including position at his practice. Tina was smart,
smiled wryly as the narrative unfolded.
receipts, invoices and bookkeeping. Medi- confident and knowledgeable. He hired
This wasn’t the first time a member of
cal practices are ripe for exploitation. her on the spot.
the medical industry shared this kind of
Through my work investigating Perlman had a lot going on in ad-
story with me. Indeed, this reaction is
medical employee fraud and speak- dition to his dental practice. He ran a
almost de rigueur.
ing to victims, I’ve noticed emerging charity dental clinic in the Middle East
Medical establishments are unique- patterns. These case studies, which and held several real estate interests.
ly vulnerable to fraud their employees I’ve collected through my work experi- He didn’t have the time or proclivity to
perpetrate. Doctors, dentists and their ences, exhibit some common red flags manage the tiresome details of running
ilk generally prefer to focus on caring for of fraud-susceptible medical practices. his busy practice. Perlman felt that Tina
their patients rather than attending to I’ve changed names and places. could free him of that responsibility.
CASE IN POINT
10 FRAUD MAGAZINE
Visit ACFE.com/Collared to learn more.
One afternoon, while Steven was chatting with the would’ve struggled to hide his illicit
financial activity.
billing manager, he casually mentioned that the
• Familiarize yourself with the book-
practice was doing poorly. The billing manager gave keeping and business side of your
Steven a quizzical look. “What are you talking about?” practice. Franklin employees know
that, after the Lopez incident, the
she asked. “We’re clearing millions every year.”
chances of getting anything by
management are slim to none. The
Better bored than defrauded • If you run a small practice, don’t en- knowledge that you regularly review
Unfortunately, none of these cases are trust an employee to cut checks. Write the books should be enough to deter
unique. Medical partner fraud is more the checks yourself. It’s too easy for an most ethically challenged employees
employee to take an unauthorized cut from defrauding the practice.
common than most medical profession-
Take control of your books and
als realize. Medical practitioners who of your earnings. Remove that tempta-
protect your practice. Maybe it’s bor-
wish to avoid employee fraud can take tion and avoid defalcation.
ing and tedious. But better bored than
these steps to protect their practices. • Properly segregate duties. Henry and defrauded. ■ FM
• Consider having business mail sent to Debbie Walsh were able to cheat their
your home, a step Perlman adopted. nephew for five years because they Joshua Wiesenfeld, CFE, CPA, is
This will minimize, if not eliminate handled the books and taxes. Had a financial investigator at Labaton
entirely, the opportunity for employ- Steven been responsible for some of Sucharow, LLP. Contact him at Joshua.
ees to tamper with correspondence. the practice’s fiscal tasks, his uncle wiesenfeld@gmail.com.
Are you
winning the fight
against fraud?
SPEND LESS TIME ACQUIRING AND ANALYZING DATA AND
MORE ON STOPPING FRAUD
Goods receipt
• Product substitution: accepting
substandard goods for the same price
as the ones agreed in original contract. Payment Processing
Common • Duplicate payments made to a vendor
without services rendered to justify the
second payment. A vendor colluding with
• Manual/long open POs. Fraud Schemes • Changing the vendor master file so
payments can be routed to parties not
• Unauthorized changes to POs. originally part of the agreement.
• Unjustified terms
(e.g. advance payment).
• Inadequate market research that results in unneces- • Kickbacks often facilitated through accounts payable: A
sary restrictions in competition. company or individual submits an invoice for services that
never occurred or is inflated by the amount of a kickback.
Interrelated activities in the procurement-to-pay process and fraud schemes at each stage
the appendix, Coderre lists hundreds of • Ascertain dormant vendors who’ve • Identify payments made to state-
rules-based tests that fraud examiners had, for example, no activity for more owned entities or organizations with
can deploy on procurement spending. than a year but suddenly receive close relations to government entities.
In collaboration with the Committee of payments.
Sponsoring Organizations (COSO) of the • Discover vendors with missing or Raw material pricing frauds
Treadway Commission, the ACFE also incomplete information such as tax • Check for a supplier charging a differ-
maintains an online library of sample IDs, website addresses and phone ent price for a similar “stock-keeping
analytics, divided by fraud scheme, at numbers. unit,” or SKU.
ACFE.com/fraudrisktools. I contributed • Examine suppliers’ pricings at differ-
• Review vendor due diligence ques-
to the development of this library. ent purchase locations.
tionnaires for suspicious language, or
Just like enthusiasts collect baseball conduct adverse media or watchlist • Look for purchase-order prices that
cards or rare coins, I’ve been creating scans on high-risk vendors. are different from contracted prices
a library of anti-fraud tests gathered for the same materials.
from my investigative experiences and Conflicts of interest • Check for different payment terms for
networking with fellow fraud fighters at the same suppliers.
• Identify database linkages between
ACFE conferences or at client locations.
the employee and vendor master —
Here are some of my favorite procure- Caution: These lists of anti-fraud tests
addresses, phone numbers (including are only representative and intended
ment fraud risk tests for discovering
spouse emergency contact numbers) to spark ideas. It’s important that you
various fraud schemes, many of which align your final list of tests with your
and bank account information,
are in the procurement-to-pay (P2P) organization’s fraud risk assessment
among others.
cycle. (See the figure on page 13.) results and customize them to your
• Check for unusual preference given to specific industry, business and
vendors, such as pricing or discounts, prevailing risk dynamics.
Cash disbursements
and then examine whether any of
• Find duplicative payments as evi- Use advanced data science
the employees hold any undisclosed
denced by exact match in invoice to look for irregularities
interests in those vendors.
number, invoice date, purchase order/ Aim to have your analysis experts run
reference, amount — among many all tests on an entire population of data
Bribery and kickback schemes
other duplicate combinations. to get maximum results. Don’t apply
• Compare order quantity to optional individual tests or rules to procurement
• Analyze weekend and holiday
reorder quantity. data in isolation because they won’t
payments.
• Check for any vendor with an ir- provide your desired results or return on
• Search payment dates prior to invoice investment. Have them combine differ-
regular share of the business, and
or purchase-order dates. ent tests to see what will be applicable to
then check for any directorship or
• Find payments approved by the same shareholding by any of the company high-risk transactions.
person who created the payment. employees with these vendors. Run all transactions through your
testing algorithms. The analytics will ap-
• Look for invoiced vendor informa- • Conduct text mining of payments for
ply each test on all the transactions and
tion not matching purchase-order kickback-related terms such as “fa-
assign a risk score to each transaction
information. cilitation pay,” “friend fee” and “help
depending on the number of transac-
payment.”
tion matches. “Many of these complex
Vendor management and fake • Find excessive or frequent payments linkages and anti-fraud tests are now
vendor schemes made to charities, luxury retailers scripted and automated, with integrated
• Identify duplicate vendor numbers or (for expensive gifts) or miscellaneous machine learning. A 200- to 300-hour
names in the master vendor file. journal-entry accounts. process now takes 20 to 30 hours to
Learn More
info@niceactimize.com | www.niceactimize.com/blog | @nice_actimize | linkedin.com/company/actimize | facebook.com/NICEActimize
TAKING BACK THE ID Identity theft prevention analysis
com/yc2tmfbo.) can be convincing peal the amount they say you owe.
• Require you to use a specific payment
Ways to identify IRS
because the caller method for your taxes, such as a pre-
telephone scams appears to know a lot paid debit card.
IRS telephone scams have been
around for years. In a 2018 alert, the
about the individuals • Ask for credit or debit card numbers
over the phone.
IRS informed taxpayers about ways to and they even change • Threaten to bring in local police or
spot fraudulent telephone scams by
fraudsters impersonating IRS officials
their caller IDs to other law enforcement groups to ar-
rest you for not paying.
(tinyurl.com/y5m3rc92). appear legitimate. The IRS offers this advice if you
The scam artists’ scripts vary, but
get a phone call supposedly from them
they typically mention that the recipi-
requesting money:
ent of the call has a refund due or might
doesn’t use email, text messages or any • If you know or think you might owe
threaten them by demanding money.
social media to contact taxpayers. taxes, call the IRS at 1-800-829-1040.
Regardless of the script, the main inten-
These spear-phishing IRS telephone • If you know you don’t owe taxes,
tion of the scam is to get individuals to
unload their personally identifiable in- scams can be convincing because the report the incident to the Treasury
formation (PII) so the criminals can use caller appears to know a lot about the Inspector General for Tax Administra-
it for fraudulent purposes. When the IRS individuals and they even change their tion (TIGTA) at 1-800-366-4484 or at
wants to discuss personal tax issues, it caller IDs to appear legitimate. The scam tigta.gov.
pandemic will last at least three more A VPN is extremely important to protect Business Information Security: the
months; 33% predicted it would lin- and secure internet connections. Fundamentals” (PDF) by the National
ger for another six to 12 months. If a tax professional decides to not Institute of Standards and Technology
• 70% said they will make cybersecu- use a VPN, they risk a remote takeover (NIST).
rity the top priority for remote work. by cybercriminals, which gives them the • Publication 5293, “Data Security
opportunity to gain access to the office Resource Guide for Tax Professionals”
Some of the specific goals will be to
network and important client informa- (PDF) provides a compilation of data
meet compliance requirements, man-
tion that they can use for tax refund theft information available on IRS.
age cyberrisk and balance risk with
fraud, among other schemes. gov. Also, tax professionals should
the privacy of employees.
The Department of Homeland Secu- stay connected to the IRS through
rity’s Cybersecurity and Infrastructure subscriptions to “e-News for Tax
Tax practitioners: get your VPN
Security Agency (CISA) also encourages Professionals” and social media or
In conjunction with the Security Sum-
organizations to use VPNs. CISA (March visit Identity Theft Central at IRS.gov/
mit, the IRS recently released important
13 alert, tinyurl.com/yahdtvaz) offers Identity Theft.
security tips for tax professionals to
this advice:
secure remote locations by using VPNs
to help protect them from cybercrimi-
• Update VPNs, network infrastructure Contact me
devices and devices being used to Include these scams and important
nals when considering teleworking. (See
remote into work environments with information to protect your online
tinyurl.com/y5wqk3wq.)
the latest software patches and secu- identity in your outreach programs and
The Security Summit is an aware-
rity configurations. with your family, friends and business
ness initiative comprised of members
• Alert employees to an expected in- associates.
of the IRS, state tax agencies and the tax
crease in phishing attempts. As part of my outreach program,
community, tax preparation firms, soft-
please contact me if you have any ques-
ware developers, payroll and tax finan- • Ensure information technology secu-
tions on identity theft or cyber-related
cial product processors, tax professional rity personnel are prepared to ramp
issues that you need help on or you’d
organizations and financial institutions. up these remote access cybersecurity
like me to research and possibly include
Total membership includes 42 state tasks: log review, attack detection, and
in future columns or as feature articles.
agencies and 20 industry offices in addi- incident response and recovery.
I don’t have all the answers, but I’ll do
tion to the IRS state tax agencies and the • Implement multi-factor authenti- my best to help. I might not get back
private sector tax industry. The mission cation on all VPN connections to to you immediately, but I’ll reply. Stay
is to combat tax refund fraud to protect increase security. If multi-factor is not tuned! n FM
U.S. taxpayers. implemented, require teleworkers to
“For firms expanding telework op- use strong passwords.
Robert E. Holtfreter, Ph.D., CFE, is a
tions during this time, a virtual private • Ensure IT security personnel test VPN
professor of accounting and research at
network is a must have,” according to limitations to prepare for mass usage
a university in the U.S. Northwest. He’s
IRS Commissioner Chuck Rettig. “We and, if possible, implement modifica-
a member of the Accounting Coun-
continue to see tax pros fall victim to tions — such as rate limiting — to pri-
cil for the Gerson Lehrman Group, a
attacks every week. These networks oritize users that will require higher
research consulting organization and
are something you cannot afford to go bandwidths.
is a member of the White Collar Crime
without. The risk is real. Taking steps • To help locate a legitimate VPN ven- Research Consortium Advisory Council.
now can protect your clients and protect dor, search “Best VPNs.” He’s also on the ACFE’s Advisory Council
your businesses.” Tax professionals also can learn and the Editorial Advisory Committee.
A VPN provides an organization about other security measures to secure Holtfreter was the recipient of the Hub-
with an encrypted tunnel to move important data: bard Award for the best Fraud Magazine
important information between the • IRS Publication 4557, “Safeguard- feature article in 2016. Contact him at
internet and an organization’s network. ing Taxpayer Data” (PDF) and “Small doctorh007@gmail.com.
reports
CAN INDICATE
GREATER ETHICAL LAPSES
89%
This is also the time when you take all the
in 2020.
data you’ve collected and ask the employee
I’ll leave you with this thought:
what transpired.
Though internal discipline has risen, is
I’ve had T&E data interview pro-
cesses in which I’ve taken more than an
of perpetrators it enough of a deterrent to keep that em-
ployee from performing the same nefari-
hour to get an employee to admit to their WERE NEVER
ous deeds at another company? FM
CHARGED OR CONVICTED
n
misdeeds. An employee once admitted to
the fraud on my first question of “Do you
know why we are here?” The employee felt and Matt Molchany, CFE, is in a senior
41%
comfortable admitting to the same fraud fraud role with a leading hospitality
they’d committed at another company, but company. He’s president of the ACFE
it never appeared on a background check South Florida Chapter. Contact him at
because the previous employer never re- molchy66@gmail.com.
ported the crime to law enforcement. of frauds
WERE NEVER REPORTED The author’s views and depic-
POST-INTERVIEW ACTIONS TO LAW ENFORCEMENT. tions in this article are those of
the author and not those of his
As a CFE, the steps you and the company
– ACFE 2020 REPORT TO THE NATIONS current or former employers.
take following the interview are probably ACFE.COM/RTTN
‘EMOTIONAL
INTELLIGENCE’
by Mandy Moody, CFE
You might be a brilliant fraud examiner, but if your “emotional
intelligence” is stunted, you’ll be ineffective with those you work with
and investigate. Here’s how to buck the stereotypes of your hard-wired
personality, learn practical ways to change your management style and
be more empathetic in your job and life.
“Neurons that fire together, wire together.” That’s one of the most
insightful, albeit simple, phrases anyone has ever said to me. It
resonates with me professionally, and personally, because it gives
me hope that I really can change my ingrained habits.
SAMANTHA’S STORY
“Samantha is this go-getter. She’s known Because, as I always say to my leaders, you “We hear in the sales world that you
as this person in her organization … [where cannot effectively manage what you’re not buy things from people who you like and
you] give her the hardest task and she is aware of. trust. Well, the same thing happens in the
going to push through that wall and ensure “She had to be willing to ask and an- workplace on a team. We want to collaborate
that they’re getting amazing results,” Walker swer some really tough questions about more with people who we trust. The work
says in the podcast. “The challenge is any herself. As she navigated that and devel- that she did first on self-awareness and on
wall that Samantha comes up against — oped a deeper awareness of herself, then managing herself more effectively, then no-
meaning people and others — she tended she could figure out how she could manage ticing how she was impacting others around
to bulldoze them. more effectively so she’s not bruising, hurt- her, allowed her to build stronger relation-
“Interestingly enough, because she was ing or damaging folks and her team. As she ships that were now founded on trust.
rewarded for the business results year after improved in her self-management, then she “That allowed her work to be more ef-
noticed additional ways she could enhance fective, so not only is she more productive,
year and no one was coaching or paying a
relationships with her peers and stakehold- her team members are more productive. Of
lot of attention to the damage that was being
ers,” Walker says. course, that impacts the bottom line for the
caused to personnel, she continued on that
“Part of how we set this up is that she organization in a positive way. She’s a great
path. As she was now … thinking, ‘I’ve been
was constantly getting feedback from oth- example for me of when somebody takes this
in this place for such a long time. I need to
ers around her. She shared with them the seriously, and leans in and does the work
be further along in the organization.’ She be-
specifics of what she was working on. She around building emotional intelligence,”
gan asking why she wasn’t being promoted.
was working on being less abrasive. She was Walker says in the podcast.
This is when she received answers like, ‘Well,
working on asking questions that were more The emotional intelligence changes
people fall when they’re around you. People
open-ended, inviting and inclusive. She was that Walker shares in Samantha’s story
who work with you report you tend to be aren’t about “being in touch with one’s feel-
working on not cutting folks off in conversa-
abrasive. You tend to be highly competitive, ings” or participating in a human resources
tion. These were all things that folks reported
and you don’t really care much about others’ trend. Psychology Today defines emotional
that they couldn’t stand about Samantha.
feelings.’ When she got this feedback, it was intelligence as “the ability to identify and
They gave her feedback as they observed
crushing,” Walker says. manage one’s own emotions, as well as the
her over time, and even gave her sugges-
“There’s a part of her that doubted emotions of others.” But I like how Walker
tions on what we call ‘feed-forward’ about
whether or not she could learn these people how to continue on this path,” Walker says. initially described the concept to me. She
skills, but then the other side of her that was “Over time, Samantha became an ex- said, quoting psychologist and author Daniel
so competitive made her stand up to the ample to her people of what this work can Goleman, “CEOs are hired for their intellect
challenge. do. There were individuals who I interviewed and business expertise — and fired for a lack
“First, she had to start with understand- on her behalf who didn’t trust her and they of emotional intelligence.”
ing who she is as a person; how she shows wanted her to know that because of how she As we see in Samantha’s story, and as
up. Then, [she needed to] understand the treated them over time. To see her do the we’ve seen with those we work with, our
gaps in how she navigated relationships and work, to build trust with these folks who are emotional intelligence is just as important, if
what she needed to manage in order to show now people who want to collaborate with not more important, than our business acu-
up differently. Samantha buckled down to do her and feel good about being in meetings men. And, for some, that’s a tough lesson
this work, to develop deep self-awareness. with her. to learn.
‘360-DEGREE EVALUATIONS’ between actors. To my dismay, the confi- of research at a virtual event for associa-
dential information I was obligated to keep tion executives on how we can develop
After a brief stint as a newspaper reporter,
to myself didn’t satisfy any of my tabloid three good habits that will help us move
I joined an Austin, Texas, executive coach-
curiosity. us forward in our jobs. This presentation,
ing firm, which quickly trained me to con-
Instead, the interviews yielded com- directed at women, was based on the book,
duct “360-degree evaluations” of clients’
ments upon comments about leadership “How Women Rise: Break the 12 Habits
employees and leaders — comprehensive
styles: bulldozers, dictators, dominators, Holding You Back From Your Next Raise,
views gained via interviews with their di-
appeasers, wallflowers or robots. The Promotion, or Job,” by Sally Helgesen and
rectors, peers and direct reports.
flawed emotional intelligence of each Marshall Goldsmith, but the habits apply
We and the clients would group the
coached employee and leader was, just to everyone.
interviewees’ comments (some recorded like Samantha, a prevalent factor in their We not only shared our ingrained bad
verbatim) by themes and share them with effectiveness. The only substantive way habits we most identified with but how we
the coached employees and leaders. As a for them to change was to acknowledge can overcome them with intention and
young professional, I relished the chance their emotional intelligence challenges, practice. Just like the opening quote to the
to hear what I expected to be juicy gos- value them, and then rewire these default, article explained, to change a default reac-
sip and insider knowledge of some of the learned characteristics that got them to tion we must stop and rewire those firing
world’s top executives. I even worked with where they were but held them back from neurons. And, just as Walker showed us
a talent agency client from Los Angeles, where they needed to be. with Samantha, we must use emotional
and I just knew I’d discover a new movie I recently gave a presentation with intelligence to take us beyond where our
to be released or secret romances forming Andi McNeal, CFE, CPA, the ACFE’s director acumen stops.
As Andi McNeal said in our presentation, “Like any trait, those of us who are perfectionists know we can’t just stop
being that way. And the instinct itself can be powerful and positive. But if we want to make it work for us as we
rise, we need to learn how to harness it and direct it.”
Again, we must rewire and practice things like risk-taking, recognizing failure and mistakes and letting them go,
assessing risks, prioritizing worries and then repeating all of these.
HERE ARE SOME OF HER SUGGESTIONS TO RESET OUR BRAINS DURING DIFFICULT MOMENTS:
Name it to tame it
Walker said we must be able to name the emotions we’re Is it health, safety, process or efficiency? For whom is this a
feeling as they’re happening. “We cannot effectively man- priority? As one attendee wrote in the chat, “If everything
age what we aren’t aware of,” she said. “This will then help is a priority, then nothing can be a priority.”
us figure out how best to respond to it.”
Normalize it
Reframe the situation Walker said once we start to normalize a situation, we then
Instead of looking at a crisis or situation as difficult, Walker have more resources at our disposal. Talk to people who have
encouraged attendees to look at it as a learning opportunity. been through crises before and ask how they dealt with them.
She gave the example of the conversation you need to have Look at your own organization and reflect on a time you’ve
with a peer or employee that could be awkward or hard. She been through a crisis in the past. How did you come out of
said to reframe it as an important conversation that will it? Who did you lean on for support? Who did you support?
help the team and the organization instead of a difficult
situation you’re dreading. Reposition it
Look at the situation from different perspectives. Think
Reorder and prioritize about how: (1) your customers or clients see a situation (2)
Walker posed multiple questions that would be useful to your executives see it (3) people of different backgrounds
ask during times of heightened anxiety. What priority is see it (4) different people within your company see it. “Try-
this for me, my team, my customers or the organization? ing to see from different perspectives of others will help us
When should this be a priority? What kind of priority is this? navigate the crisis more successfully,” Walker said.
Mandy Moody, CFE, is the ACFE’s communications manager. Contact her at mmoody@ACFE.com.
We can identify these patterns with Oct. 29, 2014 3,550.00 petty cash
software, such as spreadsheets, IDEA, Nov. 19, 2014 3,755.00 petty cash
database queries and R (a program). The Dec. 4, 2014 4,730.00 petty cash
fraud types I consider here are asset mis-
Jan. 6, 2015 3,575.25 petty cash
appropriation schemes in which a fraud-
ster (internal or external) uses deception Figure 1: Michelle Higson’s fraudulent checks
to divert resources or assets for their
personal gain, and corruption in which The dollar amounts are at odds with the way that a petty cash imprest sys-
a fraudster gives something valuable to tem works. Under an imprest system a check is drawn every week that equals the
a person in a position of trust to influ- amount of the cash disbursements. The replenishment check brings the balance
ence their judgment or conduct. Asset back up to, say, $500.
misappropriation schemes orchestrated In bygone days a surprise count of petty cash was a routine and required audit
by an outsider have some attributes of procedure. The chances of a round-number replenishment check ($3,000, $1,000,
a cyberattack in that they’re intrusions $3,000 and $3,500) were minimal and would only occur if all the disbursements
into computer systems with the objec- were round amounts or by some rare coincidence.
tive of achieving a monetary gain. The dollar amounts are also way too high for petty cash because these bal-
ances are usually kept low to avoid a large loss in the event of a theft of these
funds. Finally, there were six consecutive checks for $4,730, followed by five other
amounts, followed by a repeat of the familiar $4,730. These number duplications
are anomalies for petty cash because the dollar amounts of the cash disbursements
are unlikely to be equal (and high) period after period.
In September 2017, Higson was sen- This is an example of a round-number then rerun them in iterative processes to
tenced to prison for three months plus bribe, and the case also shows that inter- reduce the number of audit targets.
nine months of home confinement. The mediaries are used to make the payments, With each iteration, fraud examin-
judge allowed her to go to work during and the disbursement is usually disguised ers can eliminate round numbers that
the months of home confinement. An in the financial records of the payee. have an inherently lower risk of being
extract from her court documents notes The court documents related to the a part of a fraud scheme or a bribe. For
that, “Ms. Higson has been working at an parents charged in the recent university example, when searching for bribes, the
event planning company called The Art of admissions scandal (actor Lori Loughlin first query could identify round-dollar
the Event since March 2017. She has pro- payments. The next query could iden-
and many others) show SAT score manipu-
vided undersigned counsel with paychecks tify cases in which the payment date was
lation payments of $2,000, $4,000, $5,000,
verifying her employment. Ms. Higson has within five days of the payment request
$10,000, $13,000, $15,000, $15,600,
told undersigned counsel that her duties date (urgent payments), and the descrip-
$18,000, $20,000, $25,000, $35,000, tion field included high-risk keywords
in this position do not involve any contact
$40,000, $50,000 and $75,000, with many such as “expedite,” “facilitation pay” or
with money, checks, paying vendors, or
amounts used multiple times. “special payment.” The next query could
bookkeeping.”
The bribe payments were $100,000, filter on locations based on a company’s
In November 2018 (one year later),
$125,000, $160,000, $170,000, compliance investigation database (in-
Higson was indicted on fraud charges re-
$200,000, $244,000 (a series of install- cluding whistle-blowing data) so the re-
lating to a fraud scheme that began in Feb-
ruary 2015 while she was the bookkeeper ments), $250,000, $300,000, $400,000, sults are the highest risk transactions.
of “an event planning and design com- $500,000, $950,000 and
pany [The Art of the Event].” That fraud $1,200,000 with many
started one month after the date of the amounts used multiple
January 2015 check. The new indictment times. The only precise
shows that the annual totals for that four- bribe amounts were RAPIDLY RISING NUMBERS
year fraud were $76,368 (2015), $148,992 $24,443.50, $101,272, Rapidly rising numbers refer to transaction totals that
(2016), $146,772 (2017), and $41,735 (2018). $249,420 and $251,249, increase at an abnormally high rate over time. These in-
At publication, Higson was to have been and these were all relat- creases come about because, loosely speaking, fraudsters
sentenced Oct. 13 for her most recent ed to the parents making “don’t know when to stop.”
fraud scheme. (Her sentencing had been (fraudulent) tax-deduct- We revisit the opening scheme of Cynthia Mills who
postponed several times because of the ible charitable contri- diverted $14.8 million for her own use. Her employer,
pandemic.) butions of appreciated Matthews International, filed a form 8-K with the U.S.
Bribes in corruption cases are most stock to William Rick Securities and Exchange Commission on July 30, 2015, in
often round numbers. In 2016, the presi- Singer’s foundation to which it reported her embezzlement scheme that began
dent of the Correction Officers’ Benevolent make the payments tax in 1999. Real vendors are unlikely to have high percentage
Association (COBA) and a manager of a
deductible by the par- increases (losses for 2013, 2014 and 2015 were $1.2 million,
Manhattan hedge fund were charged with
ents. (Singer was the $1.7 million and $2.2 million, respectively) in companies
honest services fraud.
scheme’s organizer.) that are growing in line with the economy’s increases.
The hedge fund manager paid the
Tests that iden- Salvadore Galvan was one of two deputy city treasur-
COBA president, Norman Seabrook, a
tif y round numbers ers for the City of Compton, California. The treasurer’s
kickback of $60,000 in cash in exchange
will generate many office had three window cashiers that collected payments
for Seabrook channeling investment funds
false positives because for water bills, business licenses, building permits and
to the hedge fund. An intermediary paid
round numbers are parking tickets from residents who paid via cash, checks
the kickback, and the hedge fund manager
agreed to reimburse the intermediary for also overused in valid and credit cards.
the disbursement. transactions. Fraud ex- At the end of each day, cashiers reconciled their cash
The hedge fund manager approved an aminers should assess and checks with the receipts that they’d issued. The ac-
invoice for payment that showed the inter- whether they’ve care- counting system prepared a bank deposit slip for the con-
mediary had sold the hedge fund “8 Knicks fully planned and per- tents of their till. The till’s metal boxes were then locked
Games @7500 per game” for two seats. formed their tests and in a safe in the vault of the treasurer’s office until the next
SCHEME
2010 are shown in Figure 2 (at right). $600,000 DISCOVERED
IN 2016
The monthly totals show an amount $500,000
in May that could be blamed on a small ac-
$400,000
counting error. After that, he was cautious.
$300,000
He then took even larger amounts followed
by some caution. That was followed by an $200,000
THRESHOLD NUMBERS for the miles driven for each passenger. In almost every case, CW Transport
Threshold numbers (also called hurdles) are For example, the fixed fee could be $300 billed the agency for 99 miles of transport
numbers that are a level, point or numeric with a rate per mile of $1.50. Prior autho- (exactly one mile under the threshold of
value at which something is true, such as rization from AHCCCS was required for 100 miles) regardless of the actual distance
transaction limits on corporate purchasing all trips that were more than 100 miles in traveled. The indictment lists nine invoices
cards and the per diem rates that can be length. From July 2011 to July 2013, Werito together with the relevant 2012 invoice
reimbursed to federal employees while on billed the agency for false claims for medi- dates, the payment details and amounts.
official travel. Internal-control thresholds cal transports that never occurred. To settle (See Figure 4 at left.)
AHCCCS settled three or four days
after the invoice date, which suggests it
Invoice Payment automatically paid the claims without
Invoice No. Date Payment Date Amount manually reviewing them. This is consis-
A12210 July 28 165926 July 31 $33,956.00 tent with the agency’s website that states
that it uses more than 60,000 service pro-
A12217 Aug. 4 166599 Aug. 7 30,358.00
viders, and in 2012, total payments to pro-
A12231 Aug. 18 168249 Aug. 21 21,208.00 viders amounted to $9.5 billion. AHCCCS’
A12245 Sept. 1 169934 Sept. 5 34,414.00 Office of Inspector General announced in
2016 that it had a special task force devoted
A12273 Sept. 29 173218 Oct. 2 34,527.00
to non-emergency medical transportation
A12287 Oct. 13 174962 Oct. 16 29,587.00 that would, among other things, moni-
A12344 Dec. 8 180576 Dec. 11 24,788.00 tor the use of these services for various
provider types. Fraud examiners could’ve
A12357 Dec. 22 182272 Dec. 26 33,170.00
are values at which additional checks or these claims AHCCCS paid him $1,959,405.
procedures will take place. Thresholds An audit showed that more than 90
have consequences, which give people a percent of Werito’s transportation claims
disposition to act in a certain way. were defective. In many cases CW Trans- Threshold numbers
In June 2011, Cory Werito founded port claimed to have provided medical
CW Transport, which he registered as
transport for patients that received no Prior authorization from
a medical transportation provider with
Arizona Health Care Cost Containment
medical services on that day. The company AHCCCS was required for
made claims for transport on weekends or
System (AHCCCS). AHCCCS is Arizona’s
holidays when the clinic or the doctor’s of-
all trips that were more
Medicaid agency that offers health care
programs to serve Arizona residents. The
fice, where the patient was supposedly get- than 100 MILES in length.
ting treatment, was closed.
agency paid for non-emergency transpor-
tation for indigent residents for scheduled Patients received medical services at
medical and dental appointments. the facilities in fewer than 10 percent of In almost every case,
The first red flag should’ve been that the cases. CW Transport often claimed to
CW Transport was based in a town that have provided transports on a day in which
CW Transport billed the
was in New Mexico — 50 miles from the other transportation companies operated agency for 99 MILES
by Werito and his relatives also claimed to
Arizona border. AHCCCS paid the com- of transport.
pany a fixed fee plus a variable amount have transported the same patients.
Proportion
Fraudulent numbers have the potential
to distort the frequencies of the digits in
0.02
accounting data. Benford’s Law gives us
the expected frequencies of the digits in
accounting and finance-related data sets. 0.01
The first two digits of a number are the
two left-most digits, and we ignore minus
signs, decimal points and leading zeros 0.00
10 20 30 40 50 60 70 80 90
(such as 0.0046).
In 2004, internal auditors, using First two digits
Benford’s Law in an analysis of an elec-
Figure 5: Using Benford’s Law to find a kickback scheme
tric utility’s kilowatt-hour (kWh) debits
and credits, discovered a kickback scheme
perpetrated by the company’s collections
personnel. In the first step of their inves-
tigation, the auditors sought to identify kWh. (A kWh is worth about 10 cents.)
customers with large decreases in the The investigation found that collections
amounts billed. This was essentially the The curved line in personnel were giving customers large
opposite of a rising numbers test because
with revenues the company was concerned
Figure 5 shows the kWh credits (that reduced the amounts
billed to the customers by $3.8 million) in
with decreasing revenues. This test gen- expected first-two- exchange for kickbacks.
erated too many false positives to be of
much practical use. The auditors then digit proportions of A Benford analysis is a useful tech-
nique to identify fraud numbers that are
ran a series of analytics tests on the kWh Benford’s Law. just below control thresholds. In these cas-
numbers credited to customer accounts.
The fact that these credits even existed es, we might see spikes at, say, 99, 49, or 24
was an anomaly. The Benford’s Law graph When a bar protrudes above (perhaps where a receipt is only required
is shown in Figure 5 (at right). the Benford’s Law line it for expenses of $25 and above).
The curved line in Figure 5 shows The follow-up work would drill
means that the actual
the expected first-two-digit proportions down into the data and extract the actual
of Benford’s Law, and the bars show the
proportion for that
first-two-digit combination amounts that were most “responsible” for
actual first-two-digit proportions. When
exceeds the expected the spike or spikes. Auditing journal en-
a bar protrudes above the Benford’s Law
line it means that the actual proportion for tries using Benford would be effective if
Benford’s Law proportion.
that first-two-digit combination exceeds the fraudulent journal entries were a large
the expected Benford’s Law proportion. portion of the population and contained
For the customer credits, the actual some systematic attribute, such as being
proportion for the 99s (the right-most bar) from $2,000 to $5,000. The auditors would
was about twice as large as the Benford examine the attributes of the fraudulent
proportion. The next step identified all the
amounts (such as the dates, the ledger ac-
first two digit 99 credits and then sorted
counts affected, the creators, the approv-
the credits from largest to smallest. There
were eight credits averaging 998,000 kWh ers, the descriptions, etc.) to identify all
and about 200 credits equal to 99,999 the fictitious transactions.
Watch sessions
online or
on-demand.
Earn CPE.
FRAUD-MAGAZINE.COM NOVEMBER/DECEMBER 2020 FRAUD MAGAZINE 39
Learn more at FraudConference.com/Europe.
Predication or not?
Discerning when it’s time to begin a
fraud examination
CFEs discuss how they know The net revenue for a textile plant was significantly lower
when they should devote than projected even though sales had increased. The com-
resources to launch fraud pany couldn’t find evidence of fraud and didn’t detect unusual
examinations or at least trends in financial data, so it attributed the cause to accounting
preliminary investigations. errors. There were some minor inconsistencies in procurement
of plant supplies, but the plant manager enforced strict con-
trols, and validated purchases and requisitions each month. He
hadn’t found any outliers. Though nobody discovered evidence
on the surface, Charles Washington, CFE, wasn’t convinced. His
continued investigation into the small procurement inconsis-
tency led to the identification of a major vendor fraud commit-
ted by the supply supervisor who maintained duplicate ledgers
to conceal his crimes from the plant manager and other execu-
tives. (Washington is now the senior director, global fraud and
asset protection at Pfizer.)
According to the ACFE Fraud Examiners Manual (FEM),
“predication” is the totality of circumstances that would lead
a reasonable, professionally trained and prudent individual
to believe that a fraud has occurred, is occurring or will occur.
(See the FEM, “Act of Predication,” tinyurl.com/y4djjcen.)
40
FRAUD-MAGAZINE.COM NOVEMBER/DECEMBER 2020 FRAUD MAGAZINE 41
Predication
In other words, predication is the ba- Cynthia Hetherington, CFE, says her
What you look for when
sis upon which a fraud examination — and team spends hours reviewing internet
establishing predication companies to discern the real from the fake
each step taken during the examination
— is commenced. The CFE of Professional Your resources are limited. And you surely for clients. Predication, for her, is based on
Standards reads, “Certified Fraud Examin- don’t want to waste them burrowing down years of online and open-source discern-
ers shall establish predication and scope rabbit holes. What do you pursue and what ment. “We see companies propping up
priorities at the outset of a fraud examina- do you leave alone? COVID cures and PPE for sale, investment
“My rule of thumb [for determining opportunities too good to be true and, of
tion and continuously reevaluate them as
predication], most simply put is ‘one of course, the big global business magnate
the examination proceeds.”
these things is not like the other,’ ” says who really is just a guy operating a scam
However, the basis for predication
Regent Bethmara Kessler, CFE. “Whether from his mother’s basement,” Hetherington
can vary. In the opening case, despite no says. (She’s president of the Hetherington
a potential fraud is identified by a tip, proac-
apparent evidence, Washington felt that Group.)
tive data analytics or some other method,
something was amiss. And he was correct. “One client was desperate to believe
it is important to understand the ‘usual’ to
There’s nothing magic about the word the sales pitch of a new investment group,”
be able to spot or identify the ‘unusual.’ ” she says. “New investments are always
“predication”; fraud examiners worldwide
(Kessler is a lecturer and consultant and a promising, yet very risky. We ran a thor-
go through similar processes even if they
member of the ACFE Faculty.) ough background check on the group to
don’t call it that.
“The source of an allegation in estab- include criminal and civil history, concerns
“In Europe, we tend to talk about ‘sus-
picion’ of fraud and ‘justification’ for our lishing predication is very critical,” says about past litigation matters and predict-
actions,” says Regent Victoria Meyer, CFE, Francis Njiru, CFE, CPA. “Allegation sources ability of future engagements. We always
range from media reports, whistleblower ask in risk scenarios if we can predict be-
FCAA, director of financial crime consult-
reports, data analytics, audit reports, man- havior based on our findings of how this
ing at the Swiss International Business
agement review, exception reports, among new investor or partner will behave. We
Academy.
look strongly at a group that overreaches
John Gill, J.D., CFE, ACFE’s vice presi- many others,” he says.
and demonstrates greed.
dent – education, says that when he teach- Njiru says that when we’re tasked with
“The overreach is a predictable tell
es the CFE Exam Review Course, he tells stu- conducting a preliminary investigation to
that you are desperate, hungry or too risk-
dents, “Predication is just a fancy word for offer insights on whether to proceed to a tolerant,” Hetherington says. “It’s okay to
having a justifiable, business reason for full investigation, it’s crucial to first deter- be ‘young and hungry,’ and if you are trans-
doing what you are doing.” mine how close the alleging party is to the parent to the client that you are ready to
Fraud Magazine recently consulted alleged misconduct. “Second, the ability of go for gold, then they understand their
with CFEs who work for diverse organi- the party alleging to corroborate evidence investment. But if you are saying you are
zations — public and private — to under- is critical,” he says. “Anonymous sources, old money, blue chip, with historical value
for example, who may not be willing to at the same time, you are behaving like a
stand how they determine when it’s time
provide more specific information raise 1999 tech stock bubble company,” she says.
to begin fraud examinations or at least
“We see your fraud and raise you more due
preliminary investigations. the level of doubt on the authenticity of
diligence. Or in other words, yes, these
We asked what they normally look their claims. The veracity of data sources
companies are predictably and obviously
for to determine if a fraud “has occurred, used in an allegation or the data integrity
behaving fraudulently.”
is occurring or will occur.” We also asked of data sources analyzed is also important Regent Ken Dieffenbach, CFE, says he
if they sometimes determined predication in establishing predication.” (Njiru is an looks at the scope and scale of an issue,
via informed “gut checks” or methodical anti-fraud and compliance consultant. He the quality of evidence (for example, one
fact finding, about cases in which they had previously worked as a manager – forensic anonymous source versus multiple inde-
to reevaluate predication as they discov- & integrity services at EY.) pendent reports), known areas of risk that
ered more evidence and determining if
cases were prosecutable. Here are their
Depending on the strength of the evidence, tip, etc. that we
answers. Agree or disagree, but please of-
are provided at the outset, our assessment may be a mere
fer your views on Fraud-Magazine.com.
formality, or it may be extensive.” KELLY TODD, CFE, CPA
Chelsea Binns recommends ways to improve investigated had few red flags. And too
many have had lots of red flags and no
forming of predication in financial institutions fraud,” she says. (Couch is founder, CEO
and principal of Acuity Forensics.)
Suzette Stevenson, CFE, says she saw
CHELSEA BINNS, PH.D., CFE, who that showed employees who didn’t
a situation in which gift card transactions
worked as a fraud examiner in the take vacations or data that showed were increasing in a specific location. “Dur-
financial industry from 2007 through employees who accessed their of- ing that same time frame, there was a sales
2014, says she learned that some fices at odd hours,” Binns says. contest going on,” she says. “Although I
institutions were particularly con- Specific indicators included the knew that the sales contest could have at-
cerned about forming predication to known behaviors of past fraud- tributed to the gift cards sales increase, I
determine insider fraud and crime. sters partially gleaned from social also knew the increase in this specific loca-
“In the early 2000s, internal media data, she says. “Social media tion was not because of the contest.” Her
frauds became especially problemat- examinations of employees sus- experienced gut told her that fraud was
ic, which resulted in many instances pected of internal fraud revealed occurring even though red flags weren’t
of fraud that were widely reported in suspicious behavior on social media necessarily flying. (Stevenson is manager
the public domain,” she says. (Binns such as regularly ‘checking in’ to of compliance and ethics at Giant Food.)
is now an assistant professor at John casinos or flaunting photos of cash, “We often start a private-sector inves-
Jay College of Criminal Justice at expensive luxury goods, time spent tigation without knowing exactly what we
The City University of New York.) on luxury vacations and dinners are investigating,” Meyer says. “We keep
Her analysis of some of the at fancy restaurants, among other an open mind as to whether the root cause
cases in the financial industry sug- behaviors.” could be fraud, incompetence or systems
gests the frauds were quite simple in Technology provided endless failure. We’d likely start out calling it a
their design and execution. “In some opportunities for large-scale analy- ‘review’ rather than an investigation. The
cases, there were cues and indica- exact point at which it becomes an inves-
ses, she says, but this organization
tors based on what they knew from tigation is not clear cut because we will be
found it difficult to gain cooperation
the anti-fraud literature,” she says. gathering evidence of any fraud alongside
from other internal departments to
“Had the organization been looking ruling out other causes.”
form predications. “Some depart-
at them proactively and with an anti- Meyer says it’s important to maintain
ments didn’t routinely provide data.
fraud mindset, perhaps these frauds evidence-handling protocols even before
And they typically didn’t receive
could have been thwarted while in you’re sure you’re investigating fraud so
requests very well.
progress.” that a possible prosecution isn’t compro-
“And although social-media
Binns says after one organiza- mised when you’ve ruled out non-fraud
data is technically public, using it for
tion discovered the crimes, it cre- reasons.
anti-fraud purposes was controver-
ated a specialized anti-fraud unit to
sial. Even though an organization
determine the potential of monitor-
might be legally able to inspect
Reevaluating predication
ing fraud indicators with big data
social-media data, it still might not Few fraud examinations are simple en-
and predictive analytics.
think it’s a good idea optics-wise,” deavors. Many are projects complicated
The organization conducted
she says. by conflicting or vague testimonies, and
research to determine the best in-
Binns says the movement to- inconclusive evidence. Sometimes fraud
ternal fraud indicators it could use as
ward the creation of “fusion cen- examiners must change direction mid-
fraud predictors. “Some data points
ters” and similar intelligence centers stream or cease an investigation.
were known to be generally indica-
might assist in opening communi- “We were hired by a municipality to
tive of fraud, while others were
cations channels and prevent- investigate allegations by a bookkeeper
more specific to past inci-
ing siloed organizational that the head of a department was cooking
dents,” she says.
structures from impeding the books,” says Todd. “Numerous hard
“Some of the gen-
establishing predication drives were imaged and held to preserve
eral indicators included
and other anti-fraud goals. evidence while we sought to identify
human resources data
and understand numerous suspicious
X
X X
X
F
raud is happening all the time and at every Why we developed the Playbook
organization. In our experience, many
The ACFE/Committee of Sponsoring Organizations of the
organizations think they’re immune to
Treadway Commission (COSO) Fraud Risk Management
fraud. They might say, “We’ve hired good people
Guide (ACFE.com/fraudrisktools) is a tremendous resource
and have very strong internal controls, so fraud for helping organizations establish a strong fraud risk
isn’t a problem here.” It’s probably not news to framework. The 2016 guide is designed to serve as best-
you, but the fraud problem is normally bigger practice guidance for organizations to follow in address-
than organizations think. One organization ing COSO’s 2013 Internal Control – Integrated Framework
we worked with found this out the hard way. A (tinyurl.com/y7yd9h3h) fraud risk assessment Principle
well-respected senior leader had been caught 8. However, implementing all the best practices in the
embezzling in excess of $1 million over more guide can be daunting.
than 10 years. It started with his perceived need The ACFE and Grant Thornton published the Anti-Fraud
for extra money to pay bills that were piling up, Playbook (also see ACFE.com/fraudrisktools) to provide the
but once he started, he couldn’t stop. Through fraud-fighting community and organizations across the
the investigation, the organization found that globe with practical, actionable guidance. The Playbook
many employees had seen behavioral red flags draws on insights from the Fraud Risk Management Guide
— like living beyond his means — for years but and seeks to clarify and operationalize its concepts.
hadn’t reported it because they believed it was The Anti-Fraud Playbook provides easy-to-use tools
impossible that this well-respected leader was and templates to help your organization no matter your
doing anything nefarious. This example and efforts. Whether your organization is just beginning its
many others like it showcase the bottom line: anti-fraud journey or if you’re looking to enhance your
Good people do bad things, and controls fail. fraud risk management (FRM) practices, the Anti-Fraud
Playbook can help.
Fraud is like the proverbial iceberg. The
bulk of fraud risk is unidentified and lurking
beneath the surface. Organizations can and Phases and Plays
should take steps to proactively reduce their The Anti-Fraud Playbook includes 10 Plays, organized into
risk and minimize the impact when fraud does five phases that align to the ACFE/COSO guide’s five key
slip through the cracks. An effective fraud risk principles, detailed in Figure 1 on page 48. This article
management (FRM) program enables organiza- explores those Plays and how you can use them to improve
tions to know where they are vulnerable and an FRM program. We begin each section with the under-
how to take control. lying principle from the Fraud Risk Management Guide.
We place a heavy emphasis on con- • The stated and unstated values that • Rate of reporting of misconduct, recipi-
ducting culture assessments because govern daily decision-making. ents of reports and perceptions of the
they help organizations understand how • Tone heard from the top and percep- reporting process.
their current efforts are lacking, identify tions of senior leaders’ integrity. Like most things in FRM, a one-size-
potential vulnerabilities that might lead
• Perception that supervisors set good fits-all model for promoting fraud aware-
to internal pressures to commit fraud and
examples and encourage ethical ness doesn’t exist. Tailor your efforts to
highlight areas where fraud might be slip-
ping through the cracks. Some of the most behavior. be relevant to your organization’s fraud
important areas to explore during a culture • The extent to which peers support each risks and the strategic goals of your FRM
assessment include: other in “doing the right thing.” program.
FRAUD RISK
ASSESSMENT
My supervisor and I both
need fast cash. I will add overtime
hours to my time sheet and we will
split the profits.
motivated fraudster might circumvent or of how the organization was using the in- After we educated stakeholders and
take advantage. formation, which resulted in erroneous facilitated meaningful dialogue on how
Put on your “fraudster hat” to ensure scores. Unfortunately, senior management fraud risks and specific controls and pro-
an effective risk identification process. relied on that misleading data to make its cesses at the organization interrelate, we
(See Figure 3 on page 49.) Brainstorm decisions. conducted in-depth fraud risk workshops.
fraud scenarios that are specific to your The risk scoring and prioritizations ended
processes and controls to identify your up looking very different, including the
key risks, gaps and vulnerabilities. We re- identification of new key risks and a clear
iterate: Good people do bad things, and con- picture on gaps and vulnerabilities in cur-
trols fail. Don’t get stuck focusing only on rent processes.
Interviews
what you’ve seen. Think outside the box. If To achieve an effective risk assess-
someone was motivated to commit fraud, Appropriate for senior ment, develop a mix of quantitative and
how would they do it? What processes or management or when
qualitative risk assessment techniques,
controls would they circumvent? Who’d you need to solicit input
including interviews, surveys and work-
be most likely to perpetrate the fraud and in a targeted session
shops. (See Figure 4 at left.) It’s important
why? Thinking like a fraudster will help
to understand when to use each technique
you in your risk-identification process,
so you can garner the most actionable
which will serve as a key insight in your
information and use stakeholder time
fraud risk assessment. Don’t forget to con-
efficiently.
sider both internal and external fraud, and
Study your documentation and inter-
think beyond just financial losses.
view stakeholders to identify anti-fraud
Discover what you don’t know controls, assess their effectiveness and
Surveys
understand how your organization car-
A fraud risk assessment should be dynamic Appropriate in early stages ries out these controls in practice. You also
and iterative, aimed at identifying and as- of risk assessment and are can look at current and past findings from
sessing fraud risks relevant to an organiza- then followed on by inter- either internal or external audit, or other
tion. A best-in-class fraud risk assessment views or workshops for oversight functions.
is a comprehensive program with a con- deeper analysis You should then map controls iden-
stant pulse on current and emerging risks,
tified to your identified risks. This will
and a clear path to mitigation, monitoring
showcase areas that are well-controlled
and reporting across the enterprise.
and highlight key gaps, which will help
Ineffective risk assessments might
meaningfully determine likelihood, and
rely solely on surveys to assess likelihood
impact scores and inform risk response.
and impact rather than a mix of qualita-
tive risk assessment techniques, which With risk scoring and prioritization, re-
member that understanding what’s rela-
is ineffective and puts the emphasis on Workshops
perceptions tively more likely to occur is more impor-
Appropriate when gathering
TIP of risk. For
example, we
cross-functional groups to
tant than perfecting a numerical score.
If you already have a fraud risk as-
A mature risk assessment break down silos and sessment in place, dive deep to determine
worked with
process should employ discuss how process and where you might be able to improve cur-
multiple techniques. an organiza-
risks interrelate
tion who’d pre- rent processes to increase effectiveness
viously relied and usefulness. If you’re starting from the
solely on surveys to ascertain the likeli- beginning, pick one area to focus on first.
hood and impact of fraud risks. We found Figure 4: Qualitative risk Then leverage best practices and leading
that most people took little time to respond assessment techniques guidance to build a methodology that’s
to the survey and had little understanding tailored for your organization.
a-z
O
Known patterns Unknown patterns Complex patterns Linked patterns Text patterns
insights. However, not all analytic red-flag lists or job aids. Include interactive
FRAUD CONTROL techniques are equal; certain tech- sessions, such as role-playing exercises, to
ACTIVITIES niques are better suited for certain keep participants engaged and help them
objectives or analyses than others. practice thoughts and behaviors demon-
Figure 5 (above) outlines analytic
strated in the training materials. Employees
techniques ranging from simple to
who’ve practiced their fraud prevention and
more advanced. Of course, this isn’t
The organization selects, develops, and detection skills and behaviors in a simulated
a comprehensive listing.
deploys preventive and detective fraud environment will be more likely to use them
Data analytics is critical for
control activities to mitigate the risk
elevating your organization’s FRM effectively in their daily work.
of fraud events occurring or not being Still not convinced that you need this
program. When in doubt, start
detected in a timely manner.
small with a pilot approach to re- type of training? Consistently, one of the
duce initial investment and gain top ways organizations identify fraud is via
Use data to uncover fraud quick wins. tips. The Report to the Nations found that
It’s probably not news to you that data ana- organizations with fraud awareness training
Knowledge is power for employees were more likely to get tips
lytics is a powerful tool. The ACFE’s 2020 Re-
port to the Nations (ACFE.com/RTTN) found Earlier, we covered the need to develop and through formal reporting mechanisms —
that organizations that implemented proac- deploy mandatory enterprisewide anti-fraud 56% compared to 37%. That translates to
tive data monitoring and analysis experi- training. However, training shouldn’t stop more effective hotlines and the potential to
enced a 33% reduction in the median loss there. Implementing targeted role-based
catch fraud sooner, which reduces the loss
and duration of fraud schemes compared training helps employees better connect
and impact to your organization.
to organizations that didn’t. You can easily the message of the training to their daily
Don’t know where to start imple-
implement many anti-fraud analytics tests responsibilities.
menting role-based training? Leverage
with basic spreadsheet software or — on the This type of anti-fraud training also
other end of the spectrum — use robotics, helps your employees identify suspicious the results of your fraud risk assessment.
machine learning and artificial intelligence activity and feel empowered to act against Focus on areas where your risks are higher
to combat fraud. Each of the many analyt- potential fraud. Focus on real-life exam- or where you’ve identified major gaps or
ic techniques brings unique benefits and ples and provide on-the-job tools, such as vulnerabilities.
the board.
Another common pitfall is a lack of
mechanisms to assess investigative perfor-
Communication
mance. As Figure 6 (at right) shows, that’s channels and
one of the key elements in a solid investi- procedures
gation foundation. Without it, your team
won’t understand how investigations are
perceived. If stakeholders feel the organi-
zation isn’t managing their concerns or
not handling their complaints appropri-
ately, they’ll be less likely to report similar Figure 6: Key elements to lay the groundwork for investigations
concerns in the future. They might also
tell colleagues not to share their negative
‘Moneyball’ leadership
Developing leaders from within to help deter fraud
Leadership is part art, part science and perhaps a bit of alchemy.
Selecting individuals to lead companies has become more complex for
boards of directors. CEOs must address the interests of all stakeholders
— not just shareholders. Organizations should consider grooming honest
and proven managers from within to help prevent and deter fraud.
Boards invest time and money recruit- fortune and distrac- problems when they hire outside CEOs
and other C-suite executives without
ing leaders with the hope they can set
visions, increase revenues and boost
tions of the big-league appropriate due diligence.
e
C
championship team,” by Tom Verducci, spending on leadership training because • Teach them your systems.
SI.com., tinyurl.com/y93kw88g.) it’s more cost-effective for organizations • Grow them into leaders who under-
to fill senior positions from within their
stand your people, culture and pro-
Bringing talent up hierarchies rather than hire external
cesses, and then let them shine.
through the ranks resources. (See “Global Corporate
Baseball teams have learned to develop Leadership Training Market 2020-2024,” • Share the why behind the how and
talent by bringing players through tinyurl.com/vvekwnn.) vice-versa to help others receive the
minor league teams. They learn systems, That’s what I call Moneyball leader- clarity of vision for moving forward.
work with teammates and team coaches, ship, which is about building depth,
• Keep asking others, “Are there any
creating engaging relationships at all
improve technical skills and increase obstacles that might prevent you from
levels over time and strengthening posi-
knowledge of the game. achieving your objectives?”
tive influence throughout organizations.
From my lifelong interest in the • Listen and pay attention to the sights
Organizations are quickly recognizing
sport, I’ve found that baseball players
leadership succession training is essen- and sounds that will help prevent and
mature in structured environments. tial to efficient functioning and financial deter threats to the enterprise, such as
Their organizations mentor them to health. (See the figure on page 55.) fraud.
handle fame, fortune and distractions of However, all’s not rosy for succes- Ensure managers understand that
the big-league bright lights. Individual sion planning because organizations
building connections with others takes
players function better as a cohesive might not always find their managers
precedence over claiming authority over
team rather than relying on the one or are willing to move into top positions. In
them. They can’t have faith in your orga-
two home-run sluggers or the pitching 2019, DDI, a global leadership consult-
ing firm, developed its Frontline Leader nization without believing and trusting
ace throwing physics-defying sliders
Project. The endeavor, which surveyed in who you are. Take the time to nurture
and curve balls at helpless hitters.
more than 1,000 leaders and executives, your own Triple-A talent so they can
The baseball analogy parallels
found that only one in 10 wants a seat more easily put together consecutive
what happens when some organiza-
in the C-suite, 34% of managers would winning fiscal seasons rather than using
tions go outside their corporate walls to
like to move up just one level into an the Wall Street scorecard of quarter-by-
reel in superstar C-suite executives by
operational leadership position and 11 quarter (the equivalent of inning-by-
dangling excessive compensation. In percent had no interest in steering the
inning) results.
“Moneyball,” author Lewis tells of the ship in a CEO position. (See tinyurl.com/
After all, it doesn’t matter who’s
relationship of insiders versus outsiders qmhspdb.)
ahead at the seventh-inning stretch; what
(organizations pay groomed insiders less Organizations must recognize
than those they hire from outside) and matters is who’s winning and warding off
high-potential managers earlier in their
the ever-increasing capitalist demands leadership development processes, such fraud at the end of the game. n FM
Register now at
FraudConference.com
FRAUD SPOTLIGHT Lesser-known frauds and anti-fraud methods
with internal cultures, so employees find Transparency demonstrates account- appearance or perception of COI. Public
them relevant. ability of governments, agencies and officials can’t be too careful.
This anchoring provides filers with officials. They should make laws and
additional motivation to fill in IAD guidelines publicly available for scrutiny
forms completely, accurately and timely. and ongoing education. A system focused on
Linking an IAD system with an ethics/ Organizations must maintain the identifying and
conduct or criminal code also provides same principles in their IAD systems
parameters to evaluate disclosure through the years so they’re as forceful
preventing potential
documents. and coherent on day 3,000 as they were COI will tend to rely
on day one. And they must clearly com- on a collaborative
Credibility of IAD systems municate the purposes of their systems
Manage expectations to internal parties and citizens.
approach among
The public won’t trust inflated expecta- Most officials, of course, initially the administering
tions of achievements. Exaggerated negatively react to IAD systems. They agencies and the
campaign statements about “wiping often view the processes as cumbersome
out corruption” can extinguish good- and unnecessary. Management’s chal-
declarants.
will because the public seen past failed, lenge, over time, is to persuade public
unsustainable attempts. officials that IAD systems are beneficial
Designs of sanctions need to fit to
for them and their organizations. It can
specific objectives within political and
Leadership emphasize to officials that their lack of
economic contexts of a country. The em-
Politicians’ and legislators’ visionary transparency and accountability can
phasis, for example, might need to be on
leadership must drive the introduction cause non-governmental organizations
guaranteeing that all covered individu-
and development of IAD systems. At a to produce incorrect reports and conclu-
als submit their declarations completely
minimum, they should show account- sions and weaken systems’ reliability.
and on time.
ability, consistency and transparency.
Once an agency has largely verified
So, good tone at the top will increase a Sanctions for IAD violators the content of officials’ declarations, it
system’s credibility. Organizations, in constructing their IAD can expand its IAD system to focus on
Accountability must begin with legal plans, must determine those offenses accuracy and veracity. A country can
frameworks written in organizations’ that warrant punishment. They gener- gradually increase the credibility of its
statutes and bylaws. Organizations must ally impose sanctions to ensure com- system by including sanctions that are
require their officials to demonstrate pliance with requirements to declare enforceable and proportionate.
their accountability by participating in in a timely fashion and veracity of Sanctions might range from fines
all minor and major internal and exter- submissions. to administrative penalties (such as
nal systems without requesting special In practice, offenses are: (1) late fil- reprimands, demotions, suspensions
treatment. Organizations also must en- ing (2) non-filing (3) incomplete declara- from office and dismissal) to criminal
force accountability by swiftly penaliz- tions (4) false declarations. The first two penalties. Those who lie on IAD forms to
ing officials to send the message it won’t are focused on the submission process elude illicit enrichment detection can be
tolerate contravention of standards. while the second two on the content of subject to criminal penalties.
Consistency includes harmoniza- declaration. The unique U.S. Ethics in Govern-
tion with, and no contradictions from, A system focused on identifying ment Act of 1978 (tinyurl.com/y2nedz-
countries’ anti-fraud legislation. IAD and preventing potential COI will tend vb), passed in the wake of Watergate,
documents should reflect all laws and to rely on a collaborative approach created mandatory public disclosure
penalties and not supersede them. And among the administering agencies and of financial and employment history
definitions, such as COI and gifts that the declarants. The individuals subject of public officials and their immedi-
officials can accept, should be consistent to declaration are expected to disclose ate families. (The U.S. Congress passed
within a jurisdiction’s various IADs. anything that could even give the the Ethics Reform Act in 1989, tinyurl.
Narcissistic interviewees
According to “Diagnostic Statistical
Manual of Mental Disorders,” 5th Edition,
approximately .5% to 1 % of the popula-
tion suffer from narcissistic personality
disorder (NPD). Science indicates that Researchers from the Ohio State (See “Leader Emergence: The Case of the
people with strong narcissistic tenden- University and the University of Georgia Narcissistic Leader,” by Amy B. Brunell,
cies are more prevalent in manage- discovered in an experimental study William A. Gentry, W. Keith Campbell
ment positions. (See “The Prevalence of that narcissism predicted emergent and Brian James Hoffman, October
narcissist CEOs,” by Patrick Wright, HR leadership, regardless of whether it was 2008, tinyurl.com/y4jeoa3u.)
magazine, April 13, 2017, tinyurl.com/ self-reported, reported by others in the Further research indicates that
y9fde87r.) group or assessed by expert observers. narcissistic behavior is linked to fraud.
of inferiority they use a psychological show interest by actively listening and Narrative phase
trick. Instead of thinking, “This person nodding in agreement. You’ll probably gather most of the
is better — in any terms — than me” However, avoid asking seemingly interview’s information in the narrative
neutral questions that the narcissistic phase. It’s highly important that you
they’ll think, “This person is bad.” Thus,
interviewee can’t answer, such as, “Wow, give the narcissistic interviewee enough
it’s important, that we don’t go into an
this is an incredible picture here of you time and space to tell their story and
interview with an attitude of “I’ll teach
and the northern lights. Last winter, I avoid interrupting them.
this person a lesson.” took my holiday at Cape Horn. Do you As you ask them to remember inci-
We should keep in mind that a know where that is?” A narcissistic dents or conversations that might have
fraud examination inherently isn’t a person could interpret that as a chal-
happened months or years ago, they’ll
social situation between two equal part- lenge to play the “mine is better than
need to dig into their brain’s long-term
ners but one-sided skewed toward the yours” game and then hold back with
episodic memory. This long process can
interviewee. We usually determine the important information to your substan-
be exhausting for them. Patiently wait
tive questions.
meeting date and location, and the topic during these moments of silence until
of conversation. We ask questions and they answer.
Overview phase
therefore lead the conversation. The narcissist equates their spoken
Interviewees, including narcissists, gen-
erally are more willing to share informa- words as their very essence, value and
Narcissists are usually more tion with us if we’re transparent and
importance. Interrupting them is an
attack on their self-worth. TV political
interested in telling their show our readiness to share information
talk shows exhibit narcissists’ extremely
with them first. However, narcissists
stories instead of listening defensive behavior when they’re inter-
are usually more interested in telling
to us talk about our careers, their stories instead of listening to us
rupted. “Excuse me,” they’ll say. “If you
don’t let me finish speaking, I can leave
the interview processes, talk about our careers, the interview
right know. You invited me to hear my
processes, protocols and so on.
protocols and so on. opinion, didn’t you? So, let me finish.”
In contrast, people with high ac-
centuations of conscientiousness or Specific-detail phase
All of this can make an interviewee vigilance explicitly want to know as
Here are three essential rules when you
feel, especially if they’re narcissis- much as they can about the interviewer interact with narcissists in this phase:
tic, that they’re subordinate, and the in front of them, what the interview Begin with simple questions that
interviewer is superior, even before the will be about, how you’re going to use the narcissist will be able to answer
interview starts. And an interview can their statements, if the interview will instead of tough questions that require
reveal an interviewee’s shameful, sensi- be legally in line with data protection expert knowledge. Any of us feels good
tive information. guidelines, etc. supplying helpful information, but a
Therefore, try to dissuade an inter- By dealing with narcissistic inter- narcissist’s self-esteem will especially
viewee from feeling you’re the enemy by viewees, instead of excessively explain- grow if they can answer your first ques-
first asking them general non-threaten- ing the processes etc., you can use the tions, which could spur them to think
ing questions about their wellbeing, city, overview phase to explicitly state that longer for your eventual more difficult
office, company and family, among other you’re reliant on their help and explain interrogatives. But if you ask the hard
innocuous subjects. how they’re able to support us in this questions first, a narcissist could give
Gaining sympathy is of higher value case: “You’ve worked at this company wrong answers because they might not
than showing that you’re an experienced for 10 years, so you probably have more safe enough to say, “I don’t know. Let me
professional with whom your coun- expertise than most other employees think about it.”
terpart better not mess with. Let the around here, don’t you? Because of this, Generally, don’t begin questions
interviewee lead the small talk as you we’re very happy to have the opportu- with “why,” such as, “Why didn’t you
nity to talk to you today about …” follow the prescriptive rules of your
Statement of Ownership, Management, and Circulation 13. Publication Title 14. Issue Date for Circulation Data Below
(All Periodicals Publications Except Requester Publications) Fraud Magazine Sept/Oct 2020
1. Publication Title 2. Publication Number 3. Filing Date
15. Extent and Nature of Circulation Average No. Copies No. Copies of Single
Fraud Magazine 0 2 2 _ 2 2 2 10/1/2020 Each Issue During Issue Published
Preceding 12 Months Nearest to Filing Date
4. Issue Frequency 5. Number of Issues Published Annually 6. Annual Subscription Price
16. Electronic Copy Circulation Average No. Copies No. Copies of Single
Each Issue During Issue Published
Preceding 12 Months Nearest to Filing Date
11. Known Bondholders, Mortgagees, and Other Security Holders Owning or Holding 1 Percent or More of Total Amount of Bonds, Mortgages, or
Other Securities. If none, check box � None
a. Paid Electronic Copies 19938 22098
Full Name Complete Mailing Address
b. Total Paid Print Copies (Line 15c) + Paid Electronic Copies (Line 16a) 87446 91255
c. Total Print Distribution (Line 15f) + Paid Electronic Copies (Line 16a)
89521 93144
d. Percent Paid (Both Print & Electronic Copies) (16b divided by 16c Í 100) 97.7% 97.9%
� I certify that 50% of all my distributed copies (electronic and print) are paid above a nominal price.
9/18/2020
I certify that all information furnished on this form is true and complete. I understand that anyone who furnishes false or misleading information on this form
or who omits material or information requested on the form may be subject to criminal sanctions (including fines and imprisonment) and/or civil sanctions
(including civil penalties).
Second ACFE COVID-19 report finds 77% have seen overall fraud increase
Of the anti-fraud professionals sur- expected increases, are: (1) cyberfraud • 56% expect their level of anti-fraud
veyed for the ACFE “Fraud in the Wake (2) unemployment fraud (3) payment staffing to remain about the same;
of COVID-19 Benchmarking Report, fraud (4) fraud by vendors and sellers. 30% expect an increase and 14%
September 2020 Edition,” 77% have seen Thirty-eight percent expect an expect staffing reductions.
an increase in the overall level of fraud increase in their overall anti-fraud A majority — 68% to 76% — say
as of August, compared to 68% who’d budgets over the next year, while 14% that preventing, detecting and investi-
observed an increase when the ACFE expect a decrease. Here are notable gating fraud are more difficult now than
published the first COVID-19 report in changes to specific budget areas: before COVID-19.
May. An inability to travel is still the
• 42% expect a decrease in budget for
Ninety-two percent of the survey No. 1 challenge in combating fraud.
travel for anti-fraud staff; 23% expect
participants expect the overall level of But more people are citing conducting
fraud to continue increasing over the a significant decrease. remote interviews as a current top chal-
next 12 months. Forty-eight percent • 33% expect an increase in budget for lenge for them, moving this up to the
expect this increase to be significant. training/professional development No. 2 spot.
Participants said the top fraud for anti-fraud staff. However, 28% Download the report at ACFE.com/
risks, based on current observations and expect a decrease in this budget item. covidreport.
IN MEMORIAM
Timothy Alan Pearson
Timothy Alan Pearson, a former Virginia University. “When I arrived at WVU as a newly mint-
executive director of the Institute for ed Ph.D. and WVU faculty member, and became frustrated
Fraud Prevention, and a colleague and with my dissertation, Tim jumped in to help get it published,”
friend of many ACFE members, passed Dr. Riley said. “It’s hard to imagine that I’ll never be able to
away July 28 in Savannah, Georgia, talk with him again.”
from complications of COVID-19. He “Tim was a very special person,” said Patricia Johnson,
was 63. MBA, CFE, CPA, visiting assistant professor at Daemen Col-
Dr. Pearson was born on June 13, lege. “He was kind, knowledgeable, a true professional who
1957, in Madison, Wisconsin. A lifelong always had time to talk. His quiet sense of humor and genuine
academic and educator, he earned his Bachelor of Science,
concern for people stand out in my memory. It was a privilege
Master of Professional Accountancy and doctorate from the
to know him. I will miss him.”
University of Wisconsin-Madison.
“Tim Pearson was charitable and kind in his interactions
He worked as a professor of accounting and in college ad-
with everyone, and an unassuming, self-effacing leader,” said
ministration for more than 30 years — first at the University
Dr. Sridhar Ramamoorti, CFE, CPA, CIA, associate professor of
of Wisconsin-Eau Claire, then at West Virginia University and
accounting at the University of Dayton. “A quintessential fam-
finally at Georgia Southern University.
ily man, we need more ‘gentle giants’ like him in this world. I
At the time of his death, Dr. Pearson was director of
the School of Accountancy and Professor of Accounting at was fortunate and blessed to know him.”
Georgia Southern University. He was an expert in forensic ac- “Tim was a friend to everyone,” said Dr. George R. Young,
counting and served as editor for multiple academic journals, CFE, CPA, director of the Florida Atlantic University School of
published numerous peer-reviewed articles and secured mil- Accounting. “He had an easygoing manner that made all who
lions in grant funding, according to his colleagues. encountered him feel very fortunate. I will miss him.”
“Tim was a dear friend, gentle as a teddy bear, always Dr. Pearson is survived by his wife of 35 years, Lori; and
positive, hard to rattle, a person who never said ‘no,’ ” said a his four children, Nathan, Joshua, Skylar and Samuel; plus his
former colleague, Dr. Richard A. Riley Jr., CFE, CPA, Louis F. granddaughter Violette; Samuel’s partner, Cassidy; his broth-
Tanner Distinguished Professor of Public Accounting at West ers, Dave and Bill; and his sisters, Pegge and Judith.
The Fraud Magazine CPE quizzes are now available 6. According to the article, “Dusting your data for fraud’s
online only. Please visit ACFE.com/FMQuiz or view fingerprints,” fraudsters with accounting authority can
use intentional duplicate payments in occupational fraud
the CPE Quiz form on the next page for more schemes.
information on how to earn your 10 CPE. A. True.
B. False.
1. According to the opening case in the article, “Fraudulent 7. According to the article, “Predication or not?” Regent
T&E reports can indicate greater ethical lapses,” the author: Victoria Meyer, CFE, FCCA, said:
A. Was investigating a manager’s hotel receipts only. A. “Predication is just a fancy word for having a justifiable,
business reason for doing what you are doing.”
B. Noticed a trend that all figures in the manager’s meal re-
ceipts were round numbers. B. “The source of an allegation in establishing predication is
very critical,”
C. The author determined that the manager had forged the taxi
receipts to the tune of a couple thousand dollars. C. “Most of the huge fraud cases I’ve investigated had few
red flags.”
D. Recommended that the manager be given a reprimand only.
D. “In Europe, we tend to talk about ‘suspicion’ of fraud and
2. According to the article, “Fraudulent T&E reports can ‘justification’ for our actions.”
indicate greater ethical lapses, be sure to flag”:
A. Expenses that are submitted as out of pocket. 8. According to the article, “Predication or not?” Kelly Todd,
B. Spending that’s right above the receipt threshold. CFE, CPA, said:
C. Expense reports approved within a long time of submission. A. “We begin each engagement as an assessment.”
D. Expenses with Disapproved Merchant Codes. B. “The decision to investigate is not an all-or-nothing
endeavor.”
3. According to the section, “Samantha’s story,” in the article, C. “We often start a private-sector investigation without
“Set fire to your ‘emotional intelligence,’ ” Samantha: knowing exactly what we are investigating.”
A. Worked graciously with her coworkers without any friction. D. “If there is predication, I believe that we have the respon-
sibility to follow the threads wherever they lead.”
B. Rejected critiques from her colleagues and quit.
C. Had to be willing to ask and answer some really tough
questions about herself. 9. According to the article, “Best defense is a good offense”:
D. Over time, ultimately didn’t change and became a bad A. The Anti-Fraud Playbook includes 20 Plays, organized into
example to her people. 10 phases.
B. The vital backbone of an effective FRM program is a matu-
4. According to the article, “Set fire to your ‘emotional intel-
rity assessment.
ligence,” perfectionism can be our biggest strength, but, in
the blink of an eye, can become our biggest weakness. C. The bulk of fraud risk is unidentified and lurking beneath
the surface.
A. True.
D. Identify all the suspicious employees in your organizations.
B. False.
10. According to the article, “Best defense is a good offense,”
5. According to the article, “Dusting your data for fraud’s like most things in FRM, a one-size-fits-all model for pro-
fingerprints”: moting fraud awareness doesn’t exist.
A. Fraudsters tend to steal in dissimilar ways. A. True.
B. All of the fraud types considered in the article are B. False.
financial statement frauds.
C. One of the six common number patterns considered is
“Odd and even numbers.”
D. Rapidly rising numbers refer to transaction totals that
increase at an abnormally high rate over time.
DO NOT SUBMIT THIS FORM. Log in to your My Transactions page after purchasing the Fraud Magazine Quiz
! set to submit your answers or record your answers on the answer sheet and submit online when you are ready.
NIGRINI, CONTINUED FROM PG. 71 4. Access your quiz set by logging into your ACFE.com
count) between the observed (actual) and those ex- account, clicking on the “My Transactions” tab and
pected (advocated by principle of Benford’s Law) and clicking on the quiz set you purchased.
correspondingly worked out the degrees of freedom
at 1% and 5% level of statistical significance for the 5. Pass 5 of 6 quizzes with a score of 70% or higher and
acceptance or otherwise of the null hypothesis,” Pillai receive your CPE certificate instantly via email.
says. “I contend there is no real difference between
count and frequencies. So long as the percentages
total to 100, mathematically, it should not matter. It is For more information, please review the “CPE Info”
bound to give the same eventual results.” See Pillai’s
and “FAQs” tabs or contact a representative:
further Excel chi-square test calculations in response
to Nigrini’s contentions in the online version of this MemberServices@ACFE.com
article at Fraud-Magazine.com. n FM
(800) 245-3321 / +1 (512) 478-9000
Secure online chat service
PACIFIC NW, CONTINUED FROM PG. 71
The Fraud Examiners Manual is now available online. With online access,
the Fraud Examiners Manual is more accessible and useful than ever.
Benefits of Online Access Include:
• Real-Time, Ongoing Content Updates — Access the most up-to-date
anti-fraud information available.
• Exclusive Supplemental Information — Access an expanding collection of country- and region-specific information.
• Optimized for Multiple Devices — Access the Fraud Examiners Manual on all your internet-connected devices.
$ 119.20 - $ 239.20
$149-$299 Non-Members
NEW!
Fraud Risk Management Guide Crisis of Conscience: Cybercrime Investigators
Research commissioned by the Committee of Whistleblowing in an Age of Fraud Handbook
Sponsoring Organizations of the Treadway Com- By Tom Mueller By Graeme Edwards
mission (COSO) and Co-Sponsored by the ACFE Hardcover, 608 pages Paperback, 160 pages
Paperback, 130 pages In this book by 2020 ACFE Global Fraud Con- In this book, you will learn how to locate, lawfully
The Fraud Risk Management Guide details ference keynote speaker Tom Mueller, you will seize, preserve, examine, interpret and manage
how to create a comprehensive fraud risk learn about the rise of whistleblowing through the technical evidence that is vital for effective
management program for your organization that a series of riveting cases from the worlds of cybercrime investigation from the perspective of
establishes a visible and rigorous fraud gover- health care and other businesses, Wall Street a field practitioner.
/$65 Non-Members
nance process, creates a transparent and sound and Washington.
anti-fraud culture and more.
$ 20. 00 /$25 Non-Members $ 52.00
$ 59.20 /$74 Non-Members
ACFE.com/books
SELF-STUDY COURSES
Expand your anti-fraud knowledge with our comprehensive,
NASBA-compliant self-study CPE courses. Visit ACFE.com/selfstudy.
BEST SELLER!
Fighting Fraud in the Inside the Fraudster’s Making Crime Pay: How to
Government Mind Locate Hidden Assets
Government entities fall victim In this course, you will gain insight to In this course, you will learn how to
to every conceivable kind of the fraudster’s mind, exploring psy- locate hidden assets and how to
scheme, and everyone pays, chological information that is key to identify and trace hidden payments
directly or indirectly. This course the successful development of a fraud and sources of income. You will
focuses on strategies to prevent, prevention and detection program. hear from fraudsters about how
CPE CPE CPE
detect and investigate govern- to hide assets and from anti-fraud
20 8 20
ment fraud schemes. $ 151. 20 experts on how to find them.