Professional Documents
Culture Documents
Fraud Magazine Jan2021
Fraud Magazine Jan2021
44 EDITOR SAYS
PRINTER INK P. 8 PICTURE p. 24 FRAUD CASES OF 2020 p. 36 FAREWELL p. 50
r e m o t e
but
engaged
Conducting
investigations
from afar
P. 28
Prepare to Pass the CFE Exam
The CFE Exam Prep Course® gives you flexibility to prepare for the CFE Exam on
your schedule. Including study questions and practice exams, the CFE Exam Prep
Course will help you prepare to pass the rigorous CFE Exam.
2
at Fraud-Magazine.com.
COVER STORY
28
Remote but engaged:
Conducting investigations from afar
By Dick Carozza, CFE
FEATURES
24 44
the entire fraud picture oilfield fraud
By Alexis C. Bell, CFE By Rick Roybal, CFE
36 50
fraud cases of 2020 education says farewell
By Hailey Ayres and Mason Wilder, CFE By Emily Primeaux, CFE
PONZI SCHEMER FLEES ON WATER SCOOTER ACROSS AND UNDER LAKE SHYSTERS RENT U.K. PARKING
Bernie Madoff needed an underwater information with conspiracy to com- SPOTS THEY DON’T OWN
scooter! Accused Ponzi schemer Matthew mit fraud.
According to the BBC, Simon
Piercey, 44, tried to escape authorities on According to court documents, from
Gallagher received complaints from
a red submergible Yamaha 350Li scooter about July 2015 through August 2020,
tenants at his London flat that strang-
across, and under, Shasta Lake Nov. 16, Piercey carried out an investment fraud
ers were leaving cars in the dedicated
2020, in California, according to a U.S. scheme that raised a total of approxi-
parking bays. He found that a fraud-
Department of Justice (DOJ) release and mately $35 million in investor funds.
ster was charging eight pounds per
The New York Times. Piercey used his firms, Family Wealth
day via the “Just Park” website for his
Piercey, of Palo Cedro, California, Legacy and Zolla, to solicit funds from
tenants’ parking spaces.
fled in his truck to Shasta Lake when investors using a variety of false and
Other fraudsters were also raking
members of the California Highway Pa- misleading statements, including those
in the pounds at other dedicated park-
trol tried to apprehend him. They arrest- about trading algorithms, the success of
ing spots around London through the
ed him after he emerged from the lake on the companies’ investment strategies
online parking service and app.
the scooter in wet street clothes. A grand and the liquidity of investments.
The Just Park’s company founder
jury had returned an indictment Nov. 12 (See the DOJ release, tinyurl.com/
and CEO apologized for the purloined
after charging him with wire fraud, mail y442vzef, and “Ponzi Scheme Suspect
parking problems. “We do have strin-
fraud, money laundering and witness Uses Underwater Scooter to Flee F.B.I.,”
gent checks in place to prevent spaces
tampering. by John Ismay, The New York Times, Nov.
from being listed fraudulently,” he
Kenneth Winton, 67, of Oroville, 18, 2020, tinyurl.com/y3mgn4rp.)
said. The company said it removed
California, Piercey’s business partner,
the unauthorized advertisements.
was charged separately by criminal
(See “Just Park apologises after
scammers place fake parking space
ads,” by Jon Douglas, BBC News, Nov.
8, 2020, tinyurl.com/y2b9trkm.)
However, simple greed and the high retail prices and Disappearing ink happens
opportunity of easy money often can be
the determining factors at work. Based
ease of resale. more than you think
So, is employee toner theft just a Vegas
on the McCain-Bray story, fraudsters problem because “what happens there
can make a lot of cash by selling stolen only happens there?” Well, it turns out
office supplies. Keeping these motives in toner and ink cartridge theft occurs
mind, let’s focus on why one mundane across the world. Where there’s an ag-
and ubiquitous item — toner — seems others can excuse excessive toner use to grieved employee and weak controls,
to stand out in the supply cabinet as the their organizations by saying, “We just toner theft can follow.
jackpot of office supply theft. use a lot of ink.” A municipal employee from San
Printer toner and ink are also popu- Diego County stole $360,000 in ink
Why toner and ink? lar theft targets because of their high cartridges between 2007 and 2012 and
Not all office supplies are equal in the retail prices and ease of resale. They’re sold them to an online ink and toner
eyes of a person looking to make an easy so expensive because many manufac- marketplace. For his efforts, he received
buck. Printer toner and ink are particu- turers sell their printers at cost or a loss a three-year jail sentence. (See “County
larly prone to theft partially because of with the hope of locking users into buy- worker loses benefits for stealing,” by
their relatively small size. Like all the ing their toner or ink, which is how they Jeff McDonald, The San Diego Union-
other supplies an office consumes, print- make their profit. It’s not uncommon to Tribune, Dec. 5, 2013, tinyurl.com/
ing supplies aren’t always looked after spend more on toner after only a couple yx94js5n.)
with the same level of scrutiny as the refills than on the printer that uses it. A former municipal Philadelphian
actual printers. This doesn’t make much Costly cartridge fun facts: Accord- mail room clerk received two years in
sense when you think about it. After all, ing to PC World, ink can go for $22 per prison for stealing $1,368,091 worth of
what’s easier to stuff in a backpack — a quarter ounce, which is pricier than ink and toner cartridges in six years.
desk printer or a cartridge of ink? Russian caviar; and a New York Times Like McCain-Bray, he managed to use
Also, most employees’ only interac- economist found that printer ink was the city’s UPS account to ship his stolen
tion with the printer and ink world is priced at about $4,731 a gallon. The ink and toner to his co-conspirators.
the five seconds it takes to make a copy price-to-size ratio is great if you’re look- Records show he made $545,412 from the
or retrieve a document. So, fraudulent ing to steal from work. (See “Irate over sales. That means he got just under 40%
office-supply purchasing agents or Ink,” by Tom Spring, PC World, Feb. 5, of retail value for his hot toner and ink.
It seems like a steep discount, but then through tips. That’s, by far, the larg- records might also help you identify un-
again, it was all profit. (See U.S. Depart- est method for discovering workplace usual working patterns if physical access
ment of Justice release, June 9, 2015, frauds. Also, asset misappropriation is records aren’t available.
tinyurl.com/yywpaue8.) the most common workplace fraud — Once you identify a subject em-
Owners of a Florida furniture store representing 86% of frauds. Add those ployee, review their web-browser history
opened two ghost companies that leased up and a fraud hotline will help fight and do a keyword search of their work
Xerox printers. The leases came with toner and ink theft. emails. Look for terms like pre-owned,
seemingly unlimited toner replace- Secondly, ensure your organization used, toner, ink, cartridge, the brand
ment. The fraudsters would order more has adequate separation of duties. All of printer you have, plus the names of
cartridges than the printers needed the cited fraudsters took advantage of ink and toner resellers. Review their
and then resell them. They eventually their authority for ordering and receiv- browser history for resellers and market-
worked themselves up to at least 63 ing of goods. places like eBay, craigslist and Facebook
Xerox machines so they could order and This is so simple, but likely none Marketplace.
of the victimized entities took the time Interview your warehouse staffers
resell toner in bulk.
to compare their toner purchases with if they do the initial delivery intake.
They sold enough to receive about
their paper purchases. Ask if any employees like their pack-
$11 million from one buyer in Miami.
ages handled in particular ways or are
They were prosecuted for stealing ap- Toner, of course, is only used to
extra demanding. Ask about standard
proximately $24 million in toner from print on paper, so anyone spending
practices for receiving and delivering
Xerox in a scheme that lasted from 2008 more money on toner should see a
packages and if anyone has requested
until 2013. If the $11 million is roughly matching increase for paper. Search for
exceptions to those practices. It might
their total gains from the sales, then a period in your purchase records when
even be helpful to ask those employees
these guys got an impressive 46% of toner purchases increased. It’s time to
who receive the most packages.
retail value for their stolen toner. That’s investigate if you don’t see a matching
a solid step up from the Philadelphia pattern in paper purchases.
Don’t cry over spilled ink
employee. (See “Xerox scam nets Haynes Take these next steps if you’ve
Who knew ink and toner could be such
Brothers furniture family members found some evidence of suspicious
fertile soil for fraud? If you take some of
prison time,” by Frank Fernandez, The purchasing. If your potential toner thief the simple steps we’ve shared, it should
Daytona Beach News-Journal, July 29, is as bold as some of those above, they meaningfully reduce the likelihood your
2019, tinyurl.com/y36gbsae.) might be using your entity’s shipping toner will end up for sale somewhere
function to mail toner that was formerly on the internet. And if these steps lead
Guarding against toner yours. Review your shipping records for you to catch a toner fraudster magenta-
and ink theft new addresses and new vendors. handed, don’t feel too cyan. You’re not
How do you prevent your organization If you’re concerned with purchasing alone, and you probably won’t be the last
from being the next toner donor to an records, you might need to start look- to find your ink disappearing. ■ FM
aspiring office supply dealer? We’ve ing into the employee who orders the
identified several things you can do to ink. Review physical entry records like Michael Yamma, CFE, is an investiga-
lessen the chances your toner ends up badge-swipe data. tor for the City of Austin, Texas, Office
on the internet. Employees who are over-purchasing of the City Auditor. Contact him at
We have two general recommenda- and then stealing ink want to avoid at- Michael.yamma@austintexas.gov.
tions before we get to the inky specifics. tention as much as possible when they
First, fight toner and all other types of remove toner from the premises or ship Brian Molloy, J.D., CFE, is chief of in-
fraud with a fraud-reporting hotline. it to their buyers. Look for the suspected vestigations for the City of Austin, Texas,
As detailed in the Report to the Nations, employee arriving at work unusually Office of the City Auditor. Contact him
43% of workplace frauds are discovered early or staying late. Computer log-on at brian.molloy@austintexas.gov.
ACFE.COM/CORPORATE
FRAUD EDGE A forum for fraud-fighting faculty in higher ed
cybercriminals have stopped targeting targeted 13 percent of all higher educa- Diverse constituents particu-
select individuals and are pursuing tion institutions. (See “13% Of The larly endanger higher ed
much larger targets, businesses, cities Higher Education Sector Has Been Higher education is highly susceptible
and school systems. They’ve turned it Infected With Ransomware,” by Joel
because hackers use malware that
into a $13 billion-a-year industry. Alcon, BitSight, Oct. 13, 2016, tinyurl.
they typically deliver surreptitiously in
Dozens of large ransomware as- com/y4hxrcyr.)
phishing emails. With the number of
saults happen every month with the Another report by Emsisoft, a
average payout of more than $120,000. cyber research firm, found ransomware students, faculty and staff that all have
South Korean web provider, Nayana, attacks in 2019 impacted 89 universi- access to higher-education learning
paid a ransom of $1 million in 2017. ties, colleges and school districts, with platforms extortionists can easily gain
The cybercriminals hacked into more operations at up to 1,233 individual access when just one person clicks an
than 153 Linux servers and shut down schools potentially affected across the attachment or link in a phishing email,
more than 3,400 websites. The hackers U.S. In some of these cases, schools invade the network with malware
originally demanded $4.4 million, but closed and others couldn’t access data and search for the most valuable data
the company negotiators were able to about students’ medications or aller-
without detection. (See “Study: Higher
convince them that the company didn’t gies, and students’ grades were lost.
education is the top target for ransom-
have the funds to pay that amount. (See The “extreme level” invasions cost
ware attacks,” Axiom Resources, June
“The 5 biggest ransomware pay-outs of thousands of server and device shut-
all time,” by Luke Irwin, IT Governance, downs, and lost data. (See “The State 2020, tinyurl.com/y4ptj2gp.)
Oct. 2, 2019, tinyurl.com/y7k66o4t.) of Ransomware in the U.S.: Report and Chris Ross, senior vice president at
A report from BitSight Insights Statistics 2019, Emsisoft, Dec. 12, 2019, Barracuda Networks, says that univer-
found ransomware attacks in 2016 tinyurl.com/u2pjvbo.) sity servers are becoming increasingly
online exams, the threat facing them (See “Cyberextortion Threat Evolves,” by Finance and Data Analytics Department
has never been higher,” Ross says. “In Lindsay McKenzie, Inside Higher Ed, June in St. George, Utah. Contact him at der-
fact, our recent research found that 46% 11, 2020, tinyurl.com/ybgg87nf.) FM ■ rick.esplin@dixie.edu.
ACHIEVING
EXCELLENCE WITH
A GLOBAL VISION
Our Offerings:
Forensic Investigation Due Diligence
Hard Disk Imaging Background Checks
Brand Protection and IPR Physical Security
Cyber Security Training and Certifications
���
PREVENT OR DETECT FRAUD?
50%
Do not contribute and
have no plans to do so 29%
Currently contribute
21%
Do not currently contribute, but
would be willing to contribute in
the future
Cover and graph from the 2019 ACFE Anti-Fraud Technology Benchmarking Report
consortiums and has facilitated many of data set and with any sort of data collect such a data set, and by then it might
discussions with other business leaders science approach, the more structured be obsolete. Or, perhaps, we can all start
on the topic. data that you have with meaning- to work as part of a cross-company con-
Here’s the interview with Galvin, ful input [e.g., confirmed fraudulent sortium and obtain that data set a whole
shortened and edited for clarity. payments], the better your predictive lot faster.
models get. Prediction to me is like the
FM: As head of ethics, compliance Holy Grail. But to get there you need FM: What information would be
and investigations at AB InBev, why a pretty robust data set as well as a lot shared? And how would it be kept
do you see the need for companies to of instances of what a fraudulent — or sanitized or anonymous?
collaborate and share fraud risk data non-compliant — transaction looks Galvin: We have a number of models
in a consortium-type manner? like. that we’re evaluating. One would be a
Galvin: Well, we’ve been working on I’m happy to report, I guess, that as vendor profile repository [i.e., a black-
BrewRIGHT platform for roughly four a single company, I haven’t had the num- list of high-risk vendors], and another
years now, and one of our stated goals ber of instances of fraud and corruption would be a transactional profiling re-
at the outset was to get to the point of needed to create a data set robust enough pository [i.e., a library of validated risky,
prediction in terms of intercepting for to get to effective prediction. So, where can fraudulent or non-compliant transac-
instances of fraud or corruption before I get that sort of data set? I could track this tions]. Actually, I’m very excited as I’ve
they would occur. Now, with any sort data over time, but it could take years to recently been thinking about how to
put contracts on a distributed ledger. model, you just get feedback on how be captured in payments or sales. For
As background, a distributed ledger is good the recipe is — effectively laying example, most follow generally ac-
a database that is consensually shared the groundwork for distributed ledger cepted accounting principles [GAAP]
and synchronized across multiple sites, technology. and/or international financial reporting
institutions or geographies and acces- standards. I’ve talked to a lot of different
sible by multiple people. For reference, FM: What risks or challenges do you multinational companies in the mar-
blockchain is a type of distributed see that companies need to think ket — across energy, pharma, technol-
ledger. through? Would it be a one-size-fits- ogy and consumer products, to name
Currently, there’s a fascinating legal all consortium, or does it need to be a few — and I don’t believe that every
contract consortium in place now that broken down by industry or com- algorithm I have will work for everyone
I’m partnering with to take [AB In- pany size? everywhere. But I do believe that some
bev’s] higher-risk vendor management Galvin: Two separate questions, right? of my algorithms work for everyone
contracts and put them on a distributed How universal can it be and then how somewhere.
ledger in a way that would allow us to would it actually work? The two are
extract the key aspects of the data for somewhat related. When I look at AB FM: What advice do you have for
each contract. InBev as a company, we’re operating in investigators or compliance profes-
The nice thing about this kind of over 80 countries where roughly 90% sionals for becoming more familiar
distributed ledger technology is it allows of our value chain is local. So as much with this consortium concept?
Galvin: In the short term, where I’ve
seen companies have greater successes
is when faced with the choice between
For the investment price of a data scientist on your building or buying technology, they
compliance or investigations team (which, in the choose to build. For the investment
price of a data scientist on your compli-
current economy, you can get someone decent), you ance or investigations team (which, in
the current economy, you can get some-
can start to understand the challenges that
one decent), you can start to under-
you have and start figuring out things that can stand the challenges that you have and
start figuring out things that can create
create a lot of quick wins for you. a lot of quick wins for you.
Next, I would start looking at what
data sets you have that are going to
be overlapping with other organiza-
you to reliably share information blindly as we’re global, we are also hyper- tions — instead of buying or renting a
(or anonymously), but also only shares local. This creates a virtual laboratory third-party tool that sort of sends your
what you need to. In many respects, of events and risk algorithms to learn own data back at you. That’s not really
like with a lot of our transactional pay- from throughout the supply chain improved by any sort of expertise, nor
ment models, you wouldn’t share any because we’re working with so many is that learning in any sort of important
transaction-specific information at all. people locally in different markets. way. This is where the consortium is go-
What you would be sharing is the for- Now, that doesn’t mean every algo- ing to bring tremendous value — where
mula [or algorithm] generated from the rithm I’ve developed will work for every you can get a lot of quick wins, leverag-
transaction and then get feedback on company everywhere. But it does give ing the collective knowledge of broad,
that formula from other members of the me a high degree of confidence. From an diverse data sets.
consortium. It’s basically like sharing accounting perspective, most compa-
the recipe of a fraud-risk event without nies — regardless of industry — follow FM: So, your advice is, if you’re not
sharing any of the ingredients. In that the same accounting rules of what must doing analytics now internally, you
Budget for travel for anti-fraud staff 22% 16% 40% 16% 6%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Figure 1: Expected change in anti-fraud program budgets and resources over the next 12 months
60%
51% 51%
50%
46%
40%
Preventing fraud
31%
30%
26% 26% Detecting fraud
21% 21%
20% Investigating fraud
20%
10%
3%
2% 2% 1% 1% 1%
0%
Significantly more Slightly more No change Slightly easier Significantly easier
challenging challenging
In March 2020, the EC issued a call Historic Recession,” PYMNTS.com, Sept. These difficulties will likely contin-
for advice on money laundering reforms 28, 2020, tinyurl.com/y6ccqobd.) ue for European anti-fraud professionals
to the European Banking Authority Cybercrime risks continue to rise in 2021. But these difficulties won’t only
(EBA), which responded with its recom- because of the pandemic. Thalien says affect anti-fraud professionals, accord-
mendations in September 2020: organizations need to focus resources ing to Britta Bohlinger, CFE, founding
• Harmonizing the EU’s legal frame- on security awareness to mitigate the director of European risk mitigation
work for customer due diligence risks of social engineering attacks such firm, RisikoKlar, in an interview with
measures and AML/CFT systems. as phishing. Fraud Magazine conducted via email.
• Increasing the powers that AML/CFT “It just takes one phishing e-mail “I don’t see the anti-fraud profes-
supervisors are afforded to ensure fi- to flip a company upside down, so a sion in isolation,” she says. “It’s embed-
nancial institutions’ compliance with continuous phishing simulation is key,” ded in wider shifts and societal changes,
their obligations. she says. “With a continuous simula- whether resulting from COVID, eco-
• Reevaluating the list of entities tion, the reminders of phishing stay at nomic downturn, elections ahead or in
obliged to comply with AML/CFT leg- the forefront of the employees, because some parts of the world an increasing
islation to potentially include virtual people understand phishing, but they willingness to address climate change as
asset service providers, investment don’t practice it in reality,” she says.
a core matter spanning industries and
firms and investment funds. However, the task might prove more dif-
professions.
ficult than it sounds on the surface. “The
• Clarifying legislation to ensure “So, it is hard, some might argue
challenge is having the budget, time and
money laundering risks are addressed — potentially misleading — to single
consistently. resources to be able to conduct a proper
out one biggest question mark for 2021
(See “EBA Report on the Future phishing simulation or campaign within
beyond the certainty that more change
AML/CFT Framework in the EU,” Euro- a company,” Thalien says.
and requirement for agile solutions
pean Banking Authority, Sept. 10, 2020, and cross-discipline collaboration are
tinyurl.com/yy2qqqh6). Fraud conditions increase,
required in order to address the pressing
Even if European countries stan- budgets decrease
issues,” Bohlinger says.
dardize anti-money laundering expec- The ACFE’s COVID-19 benchmarking
tations, organizations will still need report showed that between 14% and
to navigate the implementation of any 38% of respondents anticipate budget
changes during a stubborn pandemic decreases in their organizations for vari- Mason Wilder, CFE, is a senior re-
that could still cause major recessions. ous anti-fraud expenses. (See Figure 1 on search specialist with the ACFE. Contact
(See “European Businesses Could Face page 22.) him at mwilder@ACFE.com.
M
ost organizations that have an Fraud can absolutely occur without
internal fraud risk manage- a loss of money.
Total exposure
This is the complete exposure to a
ment program find them- Not convinced? Let’s take a look
company should an employee commit
selves playing the loss game.
at a misuse fraud scheme: an asset fraud from the first day of their em-
They measure key perfor-
misappropriation scheme under the ployment and with every transaction.
mance indicators based on how much or
subcategory of non-cash: asset misap- This represents the maximum risk for
little they lose to fraud. However, as they
propriation > non-cash > misuse. In this
move up the maturity curve, sophisti- fraud based on the total activity of the
example, an employee with access to a
cated organizations understand fraud employee during their entire tenure.
bulldozer during the workweek uses it
is about more than loss. To illustrate, The total exposure reflects the amount
on the weekends, without permission,
ask yourself: Can there be a fraud com- of money for which their direct supervi-
for the employee’s separate company,
mitted without the presence of a loss? sor is accountable yet typically does not
which they own on the side. No cash is
What about a mortgage fraud where properly manage.
lost. However, there’s wear and tear on
counterfeit documents are submitted to Many times, fraudsters are in a posi-
that asset that wouldn’t have occurred
the lender inflating their assets? What if tion of trust where a common internal
otherwise. This would be more than
the borrower makes all their payments control weakness is a lack of proper
a mere policy violation. It would be a
on time for the life of the loan? There is fraud, and remember: Fraud is a crime. supervision. In the microfinance sector,
no monetary loss, but the borrower re- for example, loans can be as small as
Now that you understand not all
ceived a loan they would not otherwise $20 or $40. A common misconception is
fraud produces a loss, let’s examine the
be entitled to based upon fraudulent the notion that a loan officer distributes
calculations you should report from all
documents. small amounts, and those amounts are
materialized fraud events.
Here, the primary fraud scheme (the not germane to financial statements.
main scheme) is classified as an industry Reporting fraud impact However, a loan officer has access to the
distributions for every loan they ever
specific scheme: Financial institution In the absence of collusion, employees
fraud > lending fraud > loan disburse- made. Over the course of a long period
can only manipulate activity based on
ments > loan origination > overstated of time, that amount can, in aggregate,
the assets, processes and records to
assets. become material to the organization.
which they have access. It is important
The secondary fraud scheme (a to understand the level of risk for fraud Examples of total exposure calcula-
supporting scheme perpetrated so the is based on three factors: total exposure, tions include:
primary fraud scheme can be more fraud amount and known loss. Only •Loan officer — The total exposure for a
successful) is classified as a core fraud amounts substantiated by documented loan officer is equal to the distributions
scheme (those all organizations experi- evidence will be reported in each of the for their loans during their tenure. For
ence risk from, regardless of industry): impact calculations. All three of these example, if a loan officer worked in the
Fraudulent statements > non-financial > calculations are critical in effective fraud company for five years, calculate their
internal documents. risk management. distributions from the date of hire to
either the termination date or the cutoff classifying criminal charges. In some for $500 and then fraudulently reversed
date for the analysis. countries, the classification can be the that entry, did fraud occur? Because
•Chief executive officer (CEO) or chief difference between misdemeanors the person entered the transactions
financial officer (CFO) — The total expo- and felonies where there’s a monetary fraudulently, the answer is yes. In this
sure for a CEO or CFO is equal to the total element to the classification. The clas- example, the fraud amount is $1,000.
assets on the balance sheet. Both In cases of financial statement
executives have access to all the fraud involving revenue recogni-
assets under their control. Take tion, one benefit to the fraudster
into consideration their operat- lies in the shifting of the timing
of the transactions. The core
ing areas of responsibility. If they
are at the international level, use
The amount of the fraud scheme is classified as:
the consolidated balance sheet at Fraudulent statements > financial
the global level. If the executive fraudulent transactions > revenue recognition > timing dif-
is at the subsidiary level, use the ferences (overstatements).
balance sheet for their operating is meaningful in Recognizing revenue before
company. it is earned in one month and
Use the most current date classifying criminal then reversing it the next month
relative to the time frame in is still fraud. This is a common
question. For example, if it is
now February and there are
charges. In some scheme in shifting revenue from
January to the previous month
known fraud amounts commit-
ted in October of last year, and
countries, the of December to meet analyst
projections at year end. This
classification can be
the fraudster was still in the type of fraud affects manage-
company as of the first week of ment bonuses and can manipu-
December, the balance sheet
the difference between
late the stock price for publicly
total assets figure should be as of traded companies.
the end of November.
Another example is:
misdemeanors and (one transaction for $2,468) + (one
Fraud amount transaction for $-3,690) = (fraud
This is the total amount of fraudu- felonies where there’s a amount of $6,158)
lent transactions. Keep in mind Where: |$2,468| + |$-3,690| =
that this is the sum of the abso-
lute value of the transactions.
monetary element to the $6,158.
Fraud can occur without a
For example: (one transaction for
$12,345) + (one reversal of $6,789)
classification. readily identifiable amount. In
cases of a counterfeit document
= (fraud amount of $19,134). such as a fake resume (classified
Getting this number wrong as a core fraud scheme: fraudu-
could significantly understate lent statements > non-financial
the fraud amount. In this exam- > employment credentials), it
ple, one transaction for $12,345 and one sification can also affect the determina- is difficult to assign a number based
reversal of $6,789 calculates as a fraud tion between the amount of mandated on transactions. Therefore, you must
amount of $19,134 because the math- prison terms (jail time), and the calcula- calculate the total salary and benefits
ematical equation would be: |$12,345| + tion of fines and penalties. (typically around 30 percent of sal-
|-$6,789| = $19,134. To better understand this concept, ary) given to the employee as the fraud
The amount of the fraudu- ask the question, if someone entered a amount. This is income, associated
lent transactions is meaningful in fraudulent transaction into the system benefits and any sales commissions,
You’ve organized an interview with a subject whom you suspect has been
embezzling from your company. But he and you won’t be in the same room.
His lawyer and all your team members also will be in separate rooms. All in
front of computer screens. Sound familiar? Is this any way to conduct a fraud
examination?
That’s just one of the questions the speakers pondered during the recent
ACFE “Fraud in the Wake of COVID-19” webinar. They later elaborated for Fraud
Magazine on their webinar comments and discussed other aspects of remote
investigations.
Here we give you some of the insights of Anthony Campanelli, CPA, CFF,
partner at Deloitte Financial Advisory Services LLP; Leah Lane, CFE, director
of Texas Instruments global investigations; and Steven Merrill, chief of the FBI
Financial Crimes Section, to further help you in your investigations.
Merrill says investigators have to contend with the risk
that witnesses will record interviews. “As such, each
interviewer should be appropriately cautious”
steven merrill
BIGGEST HURDLES
“The inability to meet face-to-face with — and structured data — such as account- Merrill says distracting external stim-
witnesses, subjects, and custodians of re- ing and financial information,” he says. uli during online interviews and conversa-
cords are difficult hurdles for investigators Campanelli says hurdles can include: tions — gadgets, family members, pets,
that they must overcome while investigat- • Discerning the matters that require noises — interrupt the connections and
ing fraud remotely,” Merrill says. “Focus is immediate investigation. rapport investigators need to maximize
a vital factor necessary to develop rapport • Accessing personnel across different the results.
and a personal connection. When meeting time zones when the investigation “It is also more difficult during a re-
in person, the investigator creates a private team would’ve been onsite. mote interview for an investigator to detect
environment and minimizes interruptions truthful and untruthful non-verbal behav-
• Identifying signs of verbal or non-
so both the investigator and the witness iors,” Merrill says. “Moreover, interviewers
verbal deception in interviews.
can focus on the interview or other tasks at in private face-to-face settings have the
• Exchanging key documents during an
hand,” he says. “Unfortunately, the inves- luxury of time to let relationships organi-
interview.
tigator cannot ensure or even control the cally develop.
environment during remote interactions, • Executing certain forensic collections “They are not concerned that technol-
hindering productive developments.” of laptops and mobile devices without ogy issues will interrupt, or even prevent
Lane concurs. “I think interviews warning. the meeting if the witnesses aren’t tech-
are definitely the most challenging to ex- • Obtaining relevant accounting savvy, experience connection issues or
ecute remotely because we are not able and financial data relevant to the spontaneously terminate internet calls,
to travel and perform those interviews in investigation. which leaves investigators little or no abil-
person like we’ve done in the past,” she • Relying on scanned documents in- ity to return focus to critical interactions,”
says. “In-person or face-to-face interviews stead of original. he says.
allow us to observe the interviewee and • Waiting on court re-openings to view Merrill says investigators have to con-
their behavior a great deal more than in- residing physical files. tend with the risk that witnesses will re-
terviews through technology.” (See more cord interviews. “As such, each interviewer
• Working without the ability to “walk
on the aspects of remote interviewing in the halls” and have impromptu con- should be appropriately cautious,” he says.
the sidebar, “Crucial parts of the interview versations with company personnel. “The interviewer’s strategic decision re-
process,” on page 32.) Lane says one of the biggest hurdles garding when to conduct the interview
Campanelli says as the COVID-19 pan- to investigating in a remote environment within the scope of the overall investiga-
demic continues, virtual work and social- is technology. “I think we all have to rely tion becomes perhaps even more impor-
distancing orders have made investigat- on technology in a way that we’ve not had tant, knowing any comment may become
ing fraud in a remote environment more to do in the past,” she says. “We have to public thereafter.”
complex. not only utilize technology to do inter- The inability to meet face-to-face
“But many of the challenging hurdles views but we also have to use it to collect with clients, coworkers and subjects can
can be overcome with proper planning and evidence that we might have collected affect key investigative procedures, Cam-
the deployment of technology designed to in person prior to COVID-19, and to have panelli says. “For instance, conducting in-
identify and analyze relevant unstructured meetings with executives, subject matter terviews with key personnel, exchanging
data — such as email and text messages experts and HR.” of confidential documents, and device/
Best practices
pandemic and the • Assess what could go wrong and how
you’d react.
“The FBI has successfully investigated even
our most sophisticated cases throughout
new remote-work • Prepare your steps if your subject
confesses during a guilt-confession or
the pandemic,” Merrill says. “To the extent environment, it’s admission-seeking interview.
possible, the FBI has continued to conduct
field operations while taking the utmost more important
precautions to ensure everyone has proper
personal protective equipment (PPE), and than ever for eDiscovery collections’
that our personnel have enough PPE for
our witnesses and subjects.” investigators to challenges
Lane says that best practices for get- In normal times, discovering and gathering
ting the most out of remote interviews are, apply increased electronic evidence can be daunting. Lay a
of course, evolving. “The first best practice pandemic on top of that process, and your
is preparation,” she says. “You have to al- levels of challenges grow exponentially.
most be over-prepared for remote inter- “Data collection should run in a near-
views. You have to prepare how you are professional normal state since enterprise collections,
going to present evidence virtually and such as email, are typically done remotely,”
still be able to observe the interviewee.
skepticism Campanelli says. “Custodian devices —
which can be imaged remotely or physi-
“Ensure the interviewee has video and throughout cally shipped in — present a larger, yet
audio capabilities. Have a backup plan in
place in case that technology fails,” Lane investigations’ solvable logistical challenge. After iden-
says. “Review the backup plan with the tifying relevant data sources, discovery
interviewee at the beginning of your inter- lifecycles. specialists can coordinate with IT teams to
view in case any disconnections or inter- access and download enterprise or cloud
ruptions occur. If it is possible arrange to data sources.
Watch sessions
online or
on-demand.
Earn CPE.
Learn more at FraudConference.com/Europe.
05
most
SCANDALOUS
fraud cases
of 2 0 2 0
5 m o s t s c a n d a l o u s f r a u d c a s e s of 2 0 2 0
5 most scandalous fraud cases of 2020
Stolen PII has also been the catalyst for frauds that originate
through contact tracing text message scams. Fraudsters devised
schemes to masquerade as contract tracers, sending fake text
messages, which contained links that installed malware onto
their victims’ phones thus allowing the fraudsters to access bank- 02/ Wirecard’s
missing $2 billion
ing information and SSNs. (See tinyurl.com/y9qdgp9u, FTC.)
While identity theft and types of financial fraud dominated
the fallout of the pandemic, the coronavirus also exposed the
medical and public health industries to a range of scams. In May,
the city attorney of Los Angeles sued Wellness Matrix Group for
selling coronavirus testing kits they claimed had been approved When the German financial technology
by the FDA and a “virucide” that purportedly killed the virus. company Wirecard delayed the public release
City attorney Mike Feuer said the company “attached false gov- of its 2019 financial results in June 2020 after
ernment registration numbers to these products and fabricated revealing it couldn’t account for more than
phony scientific studies and white papers to substantiate their $2 billion in cash assets, the news reduced
false claims.” (See “LA Sues California Company, Alleging ‘So- the company’s stock price by more than 90
phisticated’ COVID-19 Fraud,” by Tom Dreisbach, May 27, 2020, percent and prompted the resignation of CEO
NPR, tinyurl.com/ydbvaxhe.) Markus Braun. Soon after, Braun and several
A majority of coronavirus-related scams feature fraudsters other executives were arrested on accounting
preying on those who are dependent on government aid or sim- fraud and market manipulation charges.
ply trying to keep themselves safe and healthy. However, some Founded in 1999, Wirecard, which
business owners committed another brand of coronavirus fraud processes payments and sells data analytics
to scam the U.S. government.
services, was at one point considered to be
After the Small Business Administration (SBA) rolled out
one of Europe’s foremost technology firms.
the Payroll Protection Program, valued around $650 billion in
Between 2013 and 2018, the company’s
loans to small businesses, a moving company owner in Florida
reported revenues quadrupled, coming in at
received nearly $4 million in loans, which he’d declared would
nearly $2.2 billion in 2018. With nearly 6,000
cover his company’s monthly payroll. However, an investigation
employees spread over 26 countries and a
revealed that his company’s monthly expenses averaged around
place on Germany’s list of top 30 companies,
$200,000. The man was arrested, and charged with fraud, after
the fintech behemoth must have thought itself
he was involved in a hit-and-run while driving a luxury Lambo-
too large to fail. (See “Wirecard CEO quits after
rghini, which he’d bought with money from his loan. (See “He
$2 billion goes missing and fraud accusations
bought a Lamborghini after getting a $4 million PPP loan. Now
fly,” by Charles Riley and Eoin McSweeney,
he faces a fraud charge,” by Jay Weaver, Miami Herald in Tampa
CNN Business, June 19, 2020, tinyurl.com/
Bay News, tinyurl.com/y66uk9gp.)
yxlssj9v.)
Assistant U.S. Attorney Michael Berger noted that SBA loan
After a series of fraud allegations and
scammers had become increasingly common because the agency
investigations into its accounting practices
was so overrun with applications that it had stopped checking
over the course of 2019, Wirecard confessed
the accuracy of applicants’ claims. The Florida man’s criminal
to the disappearance of more than $2 billion
affidavit recounts, “In the ordinary course of providing the loan
from its assets. Shortly before the explosive
guaranty, neither the SBA nor any other government agency
announcement, Wirecard was worth more
checked IRS records to confirm that the applicant had paid the
than $26.9 billion but plummeted to less than
payroll taxes represented in the PPP applications.”
$3.6 billion by the end of June 2020.
From benefits fraud, loan fraud, identity theft and non-
Though the announcement of the missing
delivery scams, to counterfeit products, telemedicine fraud,
$2 billion sank Wirecard’s value drastically
insurance fraud, contact tracing scams and supply-chain fraud,
and nearly immediately, the company’s
fraudsters exploited the global COVID-19 pandemic like no other
downfall began in January 2019, when the
crisis in recent memory. /01
absolve themselves of Financial Times’ claims. (See “Wirecard’s PYMENTS.com, July 1, 2020, tinyurl.com/yx8m7sgn.)
suspect accounting practices revealed,” by Dan McCrum, EY auditors faced significant criticism for signing off on
Financial Times, Oct. 14, 2019, tinyurl.com/y4zdub7z.) Wirecard financial statements for 2016 through 2018 without
Following the disappearance of $2 billion in cash, Wirecard independently confirming the existence of cash assets. (See
claimed the money had been held in bank accounts in the “Critics’ Ire Turns On Auditor EY After Wirecard Collapse,” by
Philippines, but these banks refuted the claim. (See “Wirecard Jean-Philippe Lacour, Barron’s, June 28, 2020, tinyurl.com/
stock plummets 37% after the payments firms says $2 billion in y223934h.) This oversight has now become the subject of a
missing cash likely doesn’t exist,” by Shalini Nagarajan, Markets German lawsuit that alleges EY overlooked $1.1 billion worth of
Insider, June 22, 2020, tinyurl.com/y3kzgzbz.) assets that had been incorrectly processed. (See “Ernst & Young
Braun even attempted to suggest that Wirecard had been Sued Over Wirecard as Accounting Woes Add Up,” by Karin
the victim of fraud: “It cannot be ruled out that Wirecard has Matussek, Bloomberg, June 8, 2020, tinyurl.com/y4el4bzx.)
become the aggrieved party in a case of fraud of considerable Apparently, Wirecard’s story will continue throughout
proportions,” he said in a video statement that has since been 2021. /02
added a half hour here or maybe an hour page that piqued his interest. The instruc-
there, it would still be allowed. He even tions were fairly easy, and after a few tries,
On a Sunday afternoon, six months after he
brazenly invoiced Desert Rose for the work he had it. He pulled out the retirement card
had left Desert Rose, he saw the handwrit-
he couldn’t get to. He was very selective in his former employees gave him and suc-
ing on the wall. He’d have to make some
what he chose to falsely invoice them for. cessfully forged many of their signatures.
tough decisions, which included letting
He made sure it would be work that really The next day, bleary-eyed but hum-
some of his excellent performers go. Over
could wait or could be considered simply ming along with massive amounts of caf-
the next couple of weeks, he’d hand out
busy work. feine, Jerry submitted a false invoice for
pink slips to half of his labor force. It hurt
“Invoice 23654. Three hours and a $2,275. Because this invoice was over the
because he’d made some solid friends with
two-man crew to spray the weeds and automatic-approval amount, he had to
his crew members. But the greater pain
spread caliche around the well pad. That’s include a forged signature of one of his
was the draining personal and company
reasonable,” he said to himself. former colleagues. Before he’d left Desert
bank accounts.
The names on the invoice were ficti- Rose, he’d forwarded several of his work
For solace, and to stir the creative
tious. The work description was very much emails to his home email. One of those
juices, Jerry returned to his notebook and
busy work. The total for Invoice 23654 was contained a list of unique identification
began to jot down some questions: How
$360. He reasoned that this was an invoice numbers for all the Desert Rose foremen.
can I bring in more to offset my debt? Can I
that wouldn’t even get a second glance, Typically, employees don’t share this
offer more services without having to take
and he was right. type of information among themselves,
out additional loans? How can I cut a few
corners to squeeze out more margin? In the previous year, Desert Rose’s ac- but Jerry and his former colleagues col-
If anyone had been watching his face counting department had built in a new lected and distributed the list in case
as he finished writing down the last ques- process that would automatically approve they had to approve each other’s invoices
tion, they would’ve seen his face relax. The invoices below a $1,000 threshold. When if someone were out sick or on vacation.
proverbial lightbulb had turned on. Jerry Jerry worked for them, he thought it was a With the forged signatures and the
saw some opportunities for committing solid idea to free up foremen like him from unique identifiers, Desert Rose would pro-
fraud. He began to outline his mental some of the time-consuming process of cess these invoices without much fuss or
checklist. invoice review. Now, he thought that the further review. The invoicing system raised
His first task was to text all the Desert procedure was brilliant and would help some red flags, but the company didn’t
Rose foremen: “Send me more jobs, I’m further his scheme. have an official process to review or vali-
taking on more crews. Diamond is grow- He smiled as he submitted the last in- date those flags, so the invoices were ap-
ing. ” This text was the first lie but cer- voice into Desert Rose’s online invoicing proved. Twelve hours later, Jerry received
tainly not the last. system and entered the total on his 10-key the automated email with “Invoice Ap-
The next day, his Pusher’s phone was pad. All of today’s invoices totaled $15,750, proved” in the subject line.
blowing up with texts, emails and calls a 45% increase from his previous largest “Genius, Jerry. This is too easy, espe-
from Desert Rose clamoring with new daily amount. He could feel his tension cially when you have the keys to the king-
orders. drain away. dom,” he said to himself.
“I’ve got too many jobs,” the Pusher
told Jerry. “I don’t have enough crews,”
he said. Two years later, on a chilly Saturday after-
“Not a problem. Take on what you can, Over the next few weeks, he’d open the noon as he sipped his beer and watched his
but send me all the details of the jobs you emails he’d received from Desert Rose’s beloved Texas Tech Red Raiders play, he
can’t do. I’ll sub it out.” Lie No. 2. Jerry had online invoicing system and read that suddenly had this feeling come over him.
no intention of subbing out the work. they’d been approved. One night after his The dream that he’d played out in his mind
That evening, he invoiced Desert family had gone to bed, he wondered if so many times years earlier had become a
Rose for the work the Pusher’s crews had there was a way to bring in even more. First, reality. His wallet wasn’t strained, his wife
completed. The service hours were pretty he Googled the phrase “best way + forge continued to seek out the latest beauty
much in line with what Desert Rose’s ap- + signature.” He scrolled down the search treatments and undergo new cosmetic sur-
provers expected, but Jerry knew that if he results page and opened the “WikiHow” geries, and the now 18-year-old daughter
Career
Ca eer Use the members-only Job
Board, online career center
Support
pport and free career webinars.
• Provide ongoing conflict-of-interest and ethics training to ensure employees receive critical guidance on
recognizing and handling conflicts.
• Ensure your new vendor due diligence policy addresses former employees who want to work as contrac-
tors for your organization.
• Perform periodic due diligence on current vendors to review vendor financial health.
• When your company has implemented automated-invoicing approval processes, perform periodic in-
voice reviews of random invoices to ensure reasonableness and validate that the controls are operating
effectively.
• Develop a policy and process by which alerts from invoicing systems are investigated, reviewed and
cleared.
• Perform a vendor audit risk assessment to identify potential audits. Ensure the risk assessment consid-
ers both financial and operational risks.
• Conduct ongoing vendor audits to ensure goods and services have been received and validate invoice
amounts.
was a freshman in her posh condo, just there might be something more than
a mile from where his Red Raiders were just some contractor back-office issue. Almost four years to the date of leav-
playing. Life was certainly good. The auditors’ hunch and keen data ing Desert Rose, Jerry found himself
However, Jerry didn’t know that analysis paid off. When they made an dressed in a suit seated behind a long
Desert Rose’s internal audit depart- unannounced visit to Diamond’s Pecos wooden table. The table hid his tapping
ment had recently commenced several office, Jerry’s wife, Helen, quickly texted feet and his sweaty hands. Resting his
contractor audits. Audit wouldn’t have him “ASAP … come to office; auditors.” hands on the wool cloth, his fingers ner-
normally selected Diamond Machine Less than 30 minutes later, Jerry was vously strummed the material. The judge
Works because its annual expenditures in the office. The auditors asked him calmly read out the charges, which in-
cluded multiple counts of identity theft,
didn’t meet the dollar-risk threshold. to provide payroll and other employee
one count of wire fraud and one count
However, this year the audit department records for the field employees. Jerry
of money laundering. Jerry’s attorney
had begun to flag numbers of invoices also downloaded and gave the auditors
could proffer little. He reasoned that
and analyze keywords in invoices’ de- GPS data records for their trucks for the
Jerry should serve three years. However,
scription fields. This latter area moved previous two years.
the judge ordered Jerry to serve 10 years
Diamond to the audit shortlist. As the auditors inquired about and to pay back around $2 million in
Desert Rose’s auditors had identified Diamond’s operations, Jerry would fre- restitution. Desert Rose and the courts
certain repetitive keywords that al- quently interject, “You know, you guys had taken away the keys and changed
ways appeared in the same order. For owe me for the last two months. I have the locks. (See the case that this article is
example, 25 invoices with service de- a number of invoices that you haven’t based on at tinyurl.com/yaszgauh.) ■ FM
scriptions for the same group of leases paid yet.” His plea for money fell on
for the same crew read, “Cleaned sight deaf ears. It was true, he hadn’t been
Rick Roybal, CFE, is project manager at
glasses, tightened valvs, and picked up paid. But once the auditors identified Martindale Consultants Inc. in Roanoke,
trash.” The same three keywords in the numerous anomalies, Desert Rose’s Texas, and president of the Oil and Gas
same order with the same misspelled controller had placed Diamond on Vendor Roundtable. Contact him at
word “valve” had the auditors thinking “Payment Hold.” rick@vendoraudit.org.
NEW!
In this course, you will learn what constitutes insider trading and the ways
that inside traders rationalize their criminal behavior. Additionally, you will
discover methods used by insider traders to avoid detection and ways to
identify and prevent insider trading.
fraud wasn’t necessarily on their roster of issue of The White Paper in its refur- The White Paper became Fraud Maga-
duties. But when they did discover fraud, bished form. Carozza and Dick Reeves, zine in May/June 2004 after the Enron and
they often didn’t know how to report it, a GRAMMY award-winning freelance WorldCom scandals. Carozza says that the
investigate it or — most importantly — designer in Austin, comprised the en- Sarbanes-Oxley Act of 2002 — which was
how to prevent and deter it. tire editorial staff until Carozza hired created in the wake of these massive corpo-
“That’s always been Joe and Jim’s in- an assistant editor a few years later. rate frauds to help protect investors from
tent,” Carozza says. “It makes more sense fraudulent financial reporting by corpora-
to prevent and deter fraud than it does tions — was a boon for the ACFE because
to find it, investigate it and get rid of it.
Revamped Fraud Magazine
it had a tremendous emphasis on anti-
It’s much more economical — you save
highlights newsmakers, fraud efforts within organizations. The
tremendous amounts of money that you
whistleblowers ACFE’s president at the time, Toby Bishop,
would lose to fraud, and there’s less repu- Carozza says he was excited to use a bi- used the momentum to help take the as-
tational damage. And those are really im- monthly publication to give anti-fraud sociation more global, and the magazine
portant reasons, especially for large firms. professionals who were hungry for some changed names.
“Back then, and even now to a certain practical, down-in-the-trenches informa- In 2008 and 2009, the recession and
extent, many corporations didn’t want tion. “And not necessarily to catch the bad sub-prime mortgage crisis created anoth-
to use the ‘f’ word, ‘fraud.’ That was the guys,” he says. “Information to find the er boost for anti-fraud efforts and Fraud
beauty of the ACFE at this point — they evidence, the hard evidence, that shows Magazine expanded to 72 pages. “Accoun-
gave tools to people who were fraud exam- that there is or isn’t fraud. That this per- tants had to play catch up in their anti-
iners or who wanted to be fraud examiners son is culpable or not culpable. … If fraud fraud education,” Carozza says. “I’ve seen
but saw no clear way of doing that in their examiners don’t have the tools, then they the membership grow exponentially, so
jobs,” he says. can’t find the evidence of fraud. If they our scope has changed quite a bit in the
In January/ February 1996, the aren’t trained in the ACFE Fraud Tree, then magazine since 2004.”
ACFE published the first 56-page they don’t know what to look for.” Carozza says the May/June 2004 Fraud
Magazine featured its first “newsmaker,”
Douglas R. Carmichael, CFE, the initial
chief auditor and director of professional
standards of the Public Company Account-
ing Oversight Board. And the first of many
“Looking back on my career in editorial, I can point to two cover whistleblower profiles was of Marta
individuals who stood out as much more than bosses; they Andreasen, the European Commission’s
were mentors and role models for me. Dick was one of former chief accounting officer, in the
those individuals. I learned a great deal from Dick simply September/October 2004 issue.
by watching the way he approached his responsibilities “The most gratifying part of my job is
interviewing whistleblowers through the
and treated the people around him. Integrity is woven years,” Carozza says. “I admire them so
into everything he does, but he doesn’t take himself too much. I ask myself often, ‘Could I do what
seriously. Dick has a great sense of humor and emanates they’re doing?’ I’ve never met a whistle-
a personable warmth. I never doubted that he really cared blower that has not paid for their truth, for
about my well-being and respected my opinions. I feel very their honesty — professionally, financially
fortunate to have worked for him early on in my career. He and personally.”
absolutely helped to shape the way I choose to show up for Carozza says his interview with Bun-
myself and others as a leader.” natine “Bunny” Greenhouse in the July/
August 2006 issue (Bunny was the U.S.
Army Corps of Engineers whistleblower)
— Katie Ford, executive director at Truth Be Told (truth-be-told.org)
was the first interview that really created
and a former Fraud Magazine assistant editor
his passion for telling whistleblower sto-
ries. “Against all odds, she pushed,” he
says. “Once I interviewed her and then
met her at the annual conference, I started
Fraud Magazine gained more notori- within the boundaries of the Fraud Exam- fraud schemes and criminology; and pre-
ety when Carozza nabbed interviews with iners Manual. But we’ve tried to push the venting and deterring fraud.
whistleblowers Cynthia Cooper, CFE, and envelope.” “I’m glad to have been a small part
Sherron Watkins. Cooper formerly served When Sue joined the faculty at Texas of that,” he says. “I’ve wanted to be able
as the vice president of internal audit at A&M University and they moved to Col- to challenge fraud examiners to think a
WorldCom where her team exposed the lege Station, Carozza agreed to stay on as little broader than where they are, or to
largest accounting fraud in U.S. history. editor-in-chief as a contractor at the behest give them something they want more edu-
Watkins is the former vice president of cor- of Dr. Wells. They now live in Corvallis, cation on that they haven’t been getting.
porate development at Enron. She alerted
Oregon, where Sue has been faculty at With my leaving, there’ll be a chance for
then-Enron CEO Kenneth Lay of account-
Oregon State University in the College someone to expand tremendously in areas
ing irregularities in financial reports and
of Public Health and Human Sciences I hadn’t considered.”
was called to testify before committees of
since 2009. Carozza has continued to Carozza also has enjoyed working with
the U.S. House of Representatives and Sen-
ate about her warnings to Lay. Each woman run the magazine and travel to the an- the many authors who have contributed
was named as one of three “People of the nual conferences, and occasionally to their work to the magazine, plus the edito-
Year” by Time magazine in 2002. Austin, ever since. rial staffers that have come and gone during
Carozza says the work has allowed his tenure. “I want to thank the editors that
him to meet many other fascinating peo- I’ve collaborated with: Stephanie Dodds,
ple. He mentions George J. Mitchell, the re-
New expansion for
Katie Ford, Suzanne Mahadeo, Amy Logan,
nowned mediator for the Northern Ireland Fraud Magazine Cora Bullock — who’s still a contributing
peace process; U.S. Sen. Paul Sarbanes and “The ACFE has been able to give CFEs not editor — and Emily Primeaux — now a
U.S. Rep. Michael G. Oxley (the Sarbanes- just a platform, but the bona fides, the pro- contributing writer,” he says. “And our in-
Oxley Act); U.S. Sen. Chris Dodd (the Dodd- fessional support and reputation that they ventive art directors, from Dick Reeves to
Frank Wall Street Reform and Consumer didn’t have before,” Carozza says. “There are Helen Elliott to Becky Plante, really made
Protection Act); Preet Bharara, former U.S. a lot more CFEs in the governments around the magazine sing. Designers Tracy Pac-
attorney for the Southern District of New
the world, and it really holds a lot of weight cone and Jennifer Rother also contribute
York; and actor Richard Dreyfuss.
because they deliver results.” their talent. It’s one thing to have a good
“In the magazine, we’ve tried to em-
Carozza expands, saying that these article; it’s another to have the art direction
phasize areas of anti-fraud principles that
maybe the rest of the association isn’t,” days when CFEs approach fraud exami- to attract people to read it.
he says. “We overlap a lot with ACFE ma- nations, they know how to investigate for “My thanks also go to our longtime
terials, and we don’t include things that fraud and interview subjects; about law re- talented contributing writers, Bob Tie,
are outside the canon — we still exist lated to fraud; about financial transactions, CFE, and Donn LeVie Jr., CFE; contributing
“I wouldn’t be the writer, editor or Emily Primeaux, CFE, is a contributing writer at Fraud
employee I am today without Dick’s Magazine. Contact her at emprimeaux@gmail.com.
tutelage. I’m forever grateful for the
skills and teachings he’s instilled
in me these past 6½ years. I left
the ACFE knowing I would forever
have a mentor and a friend in Dick
Carozza. He was always patient with
me, but firm in his expectations of
my work. When I expressed a desire
to write more, he encouraged my
passion and let me ‘steal’ some of
the more enticing stories from him.
After his years of service to the ACFE
and the anti-fraud industry, I can’t
think of anyone more deserving of a
peaceful and enjoyable retirement.”
Register now at
FraudConference.com
FRAUD BASICS Fundamentals for all
T
he 2019 movie, “Bad Educa-
tion,” chronicles the discovery in
2004 by Rebekah Rombom, an
earnest high-school newspaper
reporter, of a $250,000 embezzlement
that eventually snowballed into the
exposure of two senior school district of-
ficials who’d perpetrated a $11.2 million
fraud scheme. (See “Roslyn HS reporter
who broke ‘Bad Education’ story speaks
out 16 years later,” by Rose Weldon, the
island now, April 21, 2020, tinyurl.com/
y5t4n8jx.)
The fraudsters, for many years,
misused school credit cards and created
bogus purchase orders supposedly for
school supplies and equipment, but the
administrators directed the funds into how the school was specifically spend- Property Tax Refund Fraud Scheme
their pockets. ing money. Sentenced to 17½ Years,” June 30, 2009,
My favorite scenes in the movie in- The scheme that Rombom uncov-
U.S. Attorney’s Office, tinyurl.com/yx-
clude the actress playing Rombom shar- ered has some basic elements shared by
ing a purchase order with a chemistry wpxfsk); or Channing Smack, who stole
other fraud cases, like Rita Crundwell’s
teacher who shakes his head and says, $53.7 million theft over 20 years from $370,000 from the Girl Scouts of Greater
“No, I never received those glass beakers the city of Dixon, Illinois [see “Former Los Angeles by facilitating checks to a
…” and when Rombom ventures into Dixon Comptroller Rita Crundwell sham landscaping business he owned
New York City she discovers a school Sentenced To Nearly 20 Years In Federal that provided no actual services to the
“vendor” is located in the superinten- Prison For $53.7 Million Theft From
charity. (See “Westside Man Arrested
dent’s apartment. City,” Feb. 14, 2013, U.S. Department of
On Money Laundering Charges Related
Rombom’s efforts to follow up on Justice (DOJ), tinyurl.com/y8hjtyp8];
school vendors and specific purchases Harriette Walters’ $48 million theft To Alleged Embezzlement Of Nearly
were significantly hampered by her over 18 years from the Washington, $370,000 From Girl Scouts,” Dec. 18,
inability to gain access to records about D.C., government (see “Leader of D.C. 2013, DOJ, tinyurl.com/y2yqa7qg.)
Publicly traded and privately held download every banking transaction for
companies have similar challenges. But our checking, savings and credit card
COLUMNIST
I’ll only address nonprofits and govern- REGENT KEN accounts. I do a bit of data cleaning,
ment entities in this column because DIEFFENBACH, CFE standardization, and cutting and pasting
their spending of taxpayer funds is SPECIAL AGENT until I have one nice spreadsheet with
U.S. DEPARTMENT
clearly a matter of public interest. (Pri- OF JUSTICE
the date of each transaction, the payee,
vate entities have a plethora of reasons the amount and the category. (My bank
for maintaining privacy about how they automatically categorizes each transac-
of internal controls to help ensure
spend their monies.) tion based on the vendor, and I’ve found
transactions are legitimate, supported
by adequate documentation and are that I rarely need to correct them.)
The problem recorded accurately in the ledger. Now, with that information all
Governmental units and nonprofits What if we made more and perhaps in one place, I can do pivot tables and
worldwide properly manage the vast all this spending data publicly available? charts and graphs and see what it costs
amount of public dollars as intended. Perhaps as a “Report to the taxpayer” to be “us.” My first insight every year
However, some will always find creative or “Report to our donors”? This infor- is always, “Holy cow, the cats cost how
ways to redirect these dollars for per- mation would explain exactly how the much?!” After I calm down, I’m amazed
sonal gain or other improper purposes. government or nonprofits use public at the instantaneous insights I can
While most entities have several layers funds and donations. gain about who we send our money to,
of oversight to help ensure managers Imagine if citizens, journalists, the purpose areas and the percentage
use funds appropriately, one primary oversight agencies, and internal and of overall spending for each type of
and persistent problem exists: Trans- external auditors were able to view this transaction.
action-level spending transparency is level of detail without having to rely on These types of insights are only
often nonexistent. Taxpayers and other audits, data collection efforts, Freedom available with analysis of transaction-
stakeholders shouldn’t be burdened by of Information Act requests, lawsuits, level spending details — if I only relied
having to determine exactly how their subpoenas or site visits. Imagine on my monthly bank statements and
government and nonprofits spend their the power of crowdsourcing all this tax returns, I’d never gain most of these
public dollars. information. insights. Nonprofit board members,
Imagine that a fraud examiner audit-report readers and city council
A solution could quickly determine a school vendor members are at a disadvantage when
I have a solution! Of course, every gov- and its superintendent share an address they rely exclusively on high-level sum-
ernmental and nonprofit entity main- — the first time that superintendent mary analysis without details. Proper
tains an internal accounting system executes a corrupt purchase order not due diligence and oversight requires
that tracks each financial transaction to years into the scheme. more than just the dollar totals.
include the date, payee, amount, fund or And, most of all, imagine the deter- I know what you might be thinking:
program, and other data. rence and prevention effect that would Bad actors will just lie in their account-
For example, let’s say, on Jan. 1, nudge people toward good behavior. ing records. True, that could and likely
2020, a $50,000 bonus was paid to a I have a bit of personal experience is happening at this very moment. But
John Jones, or a $15,000 rent check went here — with spending data, not com- our identification of clear evidence of
to ABC Enterprises. Accounting systems mitting fraud! Once a year, I spend a few falsified records, which can only happen
must also have an accompanying system hours to log on to my bank’s website and with release of all financial information,
will only enhance organizations’ and unfeasible, I offer a model: the U.S. Fed- The details
governments’ abilities to remediate is- eral Election Commission (FEC, fec.gov). Governments and other organizations,
sues swiftly and efficiently. Campaign finance laws require that the of course, need to work on many details.
We’d be able to say to suspected FEC collect, maintain and make publicly How would they handle “public avail-
fraudsters, “You clearly claimed to have available detailed transaction-level data ability”? Would entities simply post data
spent the money on X, but, in reality, you on certain political candidates’ revenues to their existing websites? Would a neu-
did this other thing and intentionally and expenditures. tral entity or a large tech company create
tried to cover your tracks.” Additionally, This data allows anyone to deter- a way to easily host data and perhaps
if a person claims to have sent funds to mine those political candidates who even create simple analysis dashboards?
a vendor, but the hard data shows they prefer Dominos versus Pizza Hut or how How would they handle salary and other
kept the funds for themselves, vendors much a campaign paid a particular ven- sensitive information?
will more readily notice their names dor and when. Some states have similar I propose we start with the pre-
were used falsely. A fraudster working campaign finance disclosure laws and sumption that the public deserves to see
at a high school who creates a sham databases. how every taxpayer dollar and charitable
purchase order stating they purchased The U.S. state of Ohio offers another contribution is used and then work out
“chemistry supplies” runs the risk that a similar model. The Ohio Checkbook, the necessary exceptions.
chemistry teacher or the chemistry club launched in 2014, provides transaction-
The why
The best part of this concept is that it’ll
go a long way to fulfill fraud examiners’
To see how every fire department, school, town
highest calling: fraud prevention and
hall, homeowners’ association, animal shelter deterrence. Would-be fraudsters might
refrain from committing crimes if they
and economic development authority spends the know their credit card transactions,
checks, transfers and contract payments
people’s money would serve to make them more will be shared with the world.
effective and accountable. Crundwell was only caught when
she took a vacation and a co-worker no-
ticed unusual transactions. Walters was
identified when a bank challenged her
will flag the transaction and demand level spending details for every dollar niece’s attempt to negotiate a six-figure
answers. spent by the Ohio state government, check.
Additionally, transparency of public schools systems and units of Would Crundwell have been able
spending data would allow analysis — local government, including credit card to do as much damage if the Dixon
on a level not previously possible — to transactions. (See checkbook.ohio.gov.) taxpayers, mayor or city hall employees
flag suspicious contract-award patterns For example, did you know that on Nov. had earlier access to all her transac-
and other illogical and anomalous 27, 2019, the Ohio Board of Cosmetol- tions? Could Walters’ scheme have been
transactions. Organizations often don’t ogy paid Fusion Technologies East LLC flagged sooner if Washington, D.C., had
appreciate that ensuring procurement $6,785 for “IT & Network Services”? a spending data-sharing program? What
systems are free from price fixing, col- I have no idea what that means, but I if they’d each stopped their schemes
lusive bidding and other unfair prac- discovered this after about 10 minutes at the $45 million mark? Would their
tices is critical to prevention of corrupt of exploring how the board spent $2.8 thefts have ever been identified? Could
contracting practices. million in 2019. someone have flagged Smack before he
Other states have sunshine and collected his 23rd unearned check?
Two models other open-records laws, but I am Disclosure of transaction-level
For those thinking this would be too unaware of any that have this advanced spending details by all publicly funded
cumbersome, complex and generally data-sharing system. and nonprofit entities could usher in a
• Don’t share financial information • Do consider using a third-party utility • Don’t click on links in an email or text
and beware if they offer more than company, message.
$2,500. • Do say “no” to anyone claiming to be
• Do tell the FTC at ftc.gov/complaint.
• Do check the National Institutes of from a government agency asking for
Health and the National Library of cash, gift cards, wire transfer, crypto-
Medicine. They maintain ClinicalTri- currency or PII.
als.Gov databases.
individuals to help the economy and a message from someone claiming contact you by phone, text, email or
keep people working. But individuals to be from a government agency even showing up at your door. Don’t
and businesses need to be vigilant to through social media, it’s a scam. share any of your PII with them.
avoid being scammed because there Report it to the FTC at ftc.gov/com- On the same website, the Consumer
are a lot of imposters in the shadows plaint. If you’re eligible and haven’t Financial Protection Bureau also warns
waiting to pounce on uninformed and yet gotten your EIP, visit IRS.gov for individuals of the following more com-
impulsive victims. They might get in information. mon COVID-19 scams:
touch by phone, email, postal mail, text • Visit government websites directly for • Vaccine, cure, air filter systems and
or social media. So, beware! trustworthy information. Don’t click testing scams. Of course, a cure or
The Consumer Financial Protection on links in an email or text message. vaccine doesn’t exist for this virus
Bureau provides this advice to avoid (You never should anyway!) Instead, yet. If you receive any type of com-
being scammed out of your money and open a new window and search for munication via phone call, email, text
PII from government imposter scams the name of the government agency. message or letter with claims to sell
(tinyurl.com/y42x3djf): Visit coronavirus.gov for continually you any of these products, it’s a scam.
• Know that the government will never updated pandemic information. • Fake coronavirus-related charity
call, text or contact you on social • Say “no” to anyone claiming to be scams. Beware of any telephone call
media saying you owe money or offer from a government agency asking where the caller asks you to make a
help getting your Economic Impact for cash, gift cards, wire transfer, donation to a COVID-19 charity or if
Payment (EIP) faster. If you receive cryptocurrency or PII, whether they you’re contacted with a “follow-up”
Are you
winning the fight
against fraud?
SPEND LESS TIME ACQUIRING AND ANALYZING DATA AND
MORE ON STOPPING FRAUD
listen a lot. And measure your evidence fraud examination body of knowl-
edge for hundreds of hours. The
twice, but record it only once. ACFE then requires extensive hours
of continuing education to maintain
your credential. Combined with the
experience from applying the prin-
internal audits and reviews; assign- as mailing addresses, were making ciples and practices of the profes-
ing organizational and functional thousands of dollars in furniture sion, you’re ultimately qualified to
activities to ensure that various repairs. work in the field.
control objectives are met; identify- I determined that company Organizations that truly seek to
ing areas of fraud, waste and abuse; checks were being authorized in protect the assets of their opera-
developing a risk-based methodol- the check ledger with what ap- tions often rely on professionals
ogy to identify and select appropri- peared to be authorized signature with the CFE credential to assist
ate university activities for audit; authority. I determined that the them in preventing and detecting
preparing audit plans; and manag- signatures on the canceled checks fraud.
ing all misconduct, fraud, waste and didn’t match the authorized sig-
abuse investigations, and training nature, although there was a very My career advice is to talk a little
programs. close resemblance. The accounts and listen a lot. And measure your
payable manager admitted to forg- evidence twice but record it only
Throughout my career I have had
ing signatures on the checks to the once.
the opportunity to be integrated
unauthorized vendors and setting
and employed into many indus- My greatest personal achieve-
up the post office boxes. He would
tries. I attribute the success of my ment is having raised, with a very
receive the checks and place them
investigative skills that I learned dedicated and loving wife, children
in his personal bank accounts. Sub-
along the way to an enriched ability who have achieved great things
sequently, the company fired the
to use my interviewing and probing personally and professionally. My
employee and prosecuted him.
skills. most cherished business-related
The top fraud examination les- achievement is obtaining a recog-
At one of my jobs, the comptrol-
son I have learned is to challenge nized and respected worthy reputa-
ler assigned me to a furniture
responses to answered inquiries.
retail operation to determine tion among my peers.
Learn how to ask one question five
how the business operated. The
ways to verify the creditability of the I love to attend Ravens and Orioles
comptroller believed expenses
information you are seeking. games with my grandchildren and
were higher than what an operation
their dads. I collect law enforce-
of that size should be experiencing. I first heard of the ACFE through
ment agency coins with my peers,
After several months, I did indeed other law-enforcement peers.
and volunteer in civic and religious
notice that furniture repair expenses Learning that the FBI acknowl-
organizations.
were inconsistent with what a busi- edged the CFE as a professional
ness like this should have. credential for recruiting encour- I am the most-recent past president,
When I examined the invoices, aged me to earn it. 2017-2019, of the ACFE Maryland
I noticed that within a short period The CFE credential has benefit- Chapter and was a member of the
new vendors were added to the ted my career by adding profes- ACFE Advisory Board. n FM
accounts payable journal that the sional recognition to the authority
purchasing department hadn’t ap- I have been given to perform my
Dick Carozza, CFE, is editor-in-chief of
proved. I discovered the vendors, work. A substantial amount of work- Fraud Magazine. Contact him at
which had post office box numbers ing knowledge of the profession dcarozza@ACFE.com.
The Fraud Examiners Manual is now available online. With online access,
the Fraud Examiners Manual is more accessible and useful than ever.
$ 119.20 - $ 239.20
$149-$299 Non-Members
NEW!
Fraud Risk Management Guide Crisis of Conscience: Cybercrime Investigators
Research commissioned by the Committee of Whistleblowing in an Age of Fraud Handbook
Sponsoring Organizations of the Treadway Com- By Tom Mueller By Graeme Edwards
mission (COSO) and Co-Sponsored by the ACFE Hardcover, 608 pages Hardcover, 320 pages
Paperback, 130 pages In this book by 2020 ACFE Global Fraud Con- In this book, you will learn how to locate, lawfully
The Fraud Risk Management Guide details ference keynote speaker Tom Mueller, you will seize, preserve, examine, interpret and manage
how to create a comprehensive fraud risk learn about the rise of whistleblowing through the technical evidence that is vital for effective
management program for your organization that a series of riveting cases from the worlds of cybercrime investigation from the perspective of
establishes a visible and rigorous fraud gover- health care and other businesses, Wall Street a field practitioner.
/$65 Non-Members
nance process, creates a transparent and sound and Washington.
anti-fraud culture and more.
$ 20. 00 /$25 Non-Members $ 52.00
$ 59.20 /$74 Non-Members
ACFE.com/books
SELF-STUDY COURSES
Expand your anti-fraud knowledge with our comprehensive,
NASBA-compliant self-study CPE courses. Visit ACFE.com/selfstudy.
BEST SELLER!
Fighting Fraud in the Finding the Truth: Effective Making Crime Pay: How to
Government Techniques for Interview Locate Hidden Assets
Government entities fall victim and Communication In this course, you will learn how to
to every conceivable kind of In this course, you will gain insight to locate hidden assets and how to
scheme, and everyone pays, In this course, you will discover the identify and trace hidden payments
directly or indirectly. This course skills necessary to become a better and sources of income. You will
focuses on strategies to prevent, communicator and a more effective hear from fraudsters about how
CPE CPE CPE
detect and investigate govern- to hide assets and from anti-fraud
20 ment fraud schemes. 16 interviewer.
20 experts on how to find them.
NEW!
Health Care Provider Fraud Behavioral and Lifestyle Red Flags COVID-19 and Consumer Fraud
In this course, you will learn about common prac- of a Fraudster Schemes
tices used by health care providers that cause In this course, you will discover behaviors that This course will address some of the COVID-19
unnecessary costs to health care programs or individuals who engage in fraudulent activity often consumer fraud schemes that have been report-
patients. exhibit that can serve as red flags that something ed and provide you with guidance to help pre-
could be amiss and warrants investigation. vent yourself and others from becoming victims.
$ 8.80 /$11 Non-Members 8.80 /$11 Non-Members
$ $ 8.80 /$11 Non-Members
= This course fulfills the annual ethics CPE requirement for CFEs. For more information on ACFE self-study courses including refund and ordering policies,
fields of study, learning objectives and course levels visit ACFE.com/selfstudy.
CPE QUIZ No. 154 (January/February 2021, Vol. 36, No. 1)
The Fraud Magazine CPE quizzes are now available 5. According to the article, “5 most scandalous fraud cases of
online only. Please visit ACFE.com/FMQuiz or view 2020”:
the CPE Quiz form on the next page for more A. Wirecard hasn’t confessed to the disappearance of more
than $2 billion from its assets.
information on how to earn your 10 CPE.
B. The ICIJ’s reporting involved analyzing more than 3,500 sus-
picious activity reports.
C. Stolen PII has also been the catalyst for frauds that originate
1. According to the article, “Developing the entire fraud through contact tracing text message scams.
picture”: D. The U.S. Department of Justice arrested three Airbus C-suite
A. All fraud produces a loss. executives in January 2020.
B. Fraud can absolutely occur without a loss of money.
C. The level of risk for fraud is based on three factors: partial 6. According to the article, “5 most scandalous fraud cases of
exposure, fraud amount and known loss. 2020,” Luckin Coffee Inc. ceased operations after an internal
D. If someone entered a fraudulent transaction into the system audit revealed allegations of fabricated sales figures.
for $500 and then fraudulently reversed that entry, fraud did A. True
not occur.
B. False.
DO NOT SUBMIT THIS FORM. Log in to your My Transactions page after purchasing the Fraud Magazine Quiz
! set to submit your answers or record your answers on the answer sheet and submit online when you are ready.
I don’t know what the rest of my jour- 5. Pass 5 of 6 quizzes with a score of 70% or higher and
ney will include, but I’m approaching it with receive your CPE certificate instantly via email.
personal and community-focused fulfillment
in mind.
Remembering back to the first conversa-
tion I had with a fraud investigator at the bank
For more information, please review the “CPE Info”
in Hawaii, I find I enjoy this reflection on my and “FAQs” tabs or contact a representative:
path. We never know what impact we have
MemberServices@ACFE.com
on those around us, so I encourage you to talk
to others about what we do and why we do it. (800) 245-3321 / +1 (512) 478-9000
Find your ikigai and share it widely. n FM Secure online chat service
Please Note: The Fraud Magazine CPE Service CPE credits apply only to the CFE status and
not to any other professional designations. Fraud Magazine CPE is not registered with the
National Association of State Board of Accountancy (NASBA).
The ACFE collects and stores your personal data in the U.S. to provide member services and
fulfill transactions requested by you. For a full explanation of your rights regarding how we
store and use your data, visit ACFE.com/privacy-policy.aspx.
Calendar of Virtual Events
MARCH 2021
JANUARY 2021 MAR 2021 ACFE WOMEN’S SUMMIT
JAN BRIBERY AND CORRUPTION 4 Virtual Conference
6 Virtual Seminar March 4, 2021 | CPE: 7
January 6-7, 2021 | CPE: 16
We now offer a wide selection of different types of online events. Below you’ll find a guide for choosing
which type of online event best suits your training needs.
474-99-3743 673-99-6204
pei_zhang@burnstech.com
(324) 641-9142
Ron J.
2894 Victoria Dr
10.255.255.255
ron.johnson@bmail2.com