SlideShare une entreprise Scribd logo
1  sur  90
Télécharger pour lire hors ligne
Role of Internal Audit in
Fraud Prevention and Detection
(with fraud investigation
process)
ZEESHAN SHAHID
AUGUST 20, 2021
This Photo by Thoufeeq Ahamed is licensed under CC BY-SA-NC
Zeeshan Shahid
• Chartered Accountant; Certified Fraud Examiner;
>18y experience; served as partner in Deloitte
and Yousuf Adil
• >10y running country’s first dedicated Forensic
practice in Deloitte; Experience of investigating
allegations of fraud, abuse, bribery, corruption
and misconduct in public (federal, provincial and
corporate), private (domestic and MNCs for
FCPA/UKBA), non-profit (foreign government
and NGO)
Overview
• Fraud and internal audit – Relevant
standards
• Fraud awareness
• Roles and responsibilities
• Fraud risk assessments
• Fraud prevention and detection
• Fraud audit / investigation process
• Fraud interviews
• Report writing
• Legal considerations during
investigations
• Nuances of modern fraud investigations
• Selected specific fraud and corruption
scenarios
Photo by John Fowler on Unsplash
“[An auditor] is a
watchdog, not a
bloodhound”
- Lord Justice Lopes, Kingston Cotton Mills
Co. (1896)
Photo by Chris Lynch on Unsplash
A view, arguably no longer valid.
Fraud and
internal audit –
Relevant
standards
1200: Proficiency and Due Professional
Care
• 1210.A2 – Internal Auditors must have
sufficient knowledge to evaluate the
risk of fraud and the manner in which
it is managed by the organization, but
not expected to have the expertise of a
person whose primary responsibility is
detecting and investigating fraud.
1220: Due Professional Care
• 1220.A1 – Internal Auditors must
exercise due professional care by
considering the:
• Extent of work needed to achieve
the engagement’s objectives.
• Related complexity, materiality or
significance of matters to which
assurance procedures are applied.
• Adequacy and effectiveness of
governance, risk management, and
control processes.
• Probability of significant errors,
fraud, or non-compliance.
• Cost of assurance in relation to
potential benefits.
2060: Reporting to Senior Management
and the Board
• The CAE must report periodically to
senior management and the board on
the internal audit activity’s purpose,
authority, responsibility and
performance relative to its plan.
Reporting must also include significant
risk exposures and control issues,
including fraud risks, governance
issues, and other matters needed or
requested by senior management and
the board.
Requirements of various standards
2120: Risk Management
• 2120.A2 – The internal audit
activity must evaluate the
potential for the occurrence of
fraud and how the organization
manages fraud risk.
2210: Engagement Objectives
• 2210.A2 – Internal auditors
must consider the probability
of significant errors, fraud,
noncompliance, and other
exposures when developing the
engagement objectives.
Selected Other Reference
Material
• IIA Practice Advisories
• AICPA and other professional
services regulatory bodies’
literature regarding fraud.
• ACFE and COSO publication
in connection with Fraud Risk
Assessment
• Other ACFE publications and
tools
• Joint papers by IIA and ACFE
with AICPA and other
organizations.
Requirements of various standards (cont’d)
Fraud Awareness
• “Fraud is an intentional or deliberate act to deprive another of property or money by deception or
other unfair means.” – The Association of Certified Fraud Examiners
• “Any illegal acts characterized by deceit, concealment or violation of trust. These acts are not
dependent upon the application of threat of violence or of physical force. Frauds are perpetrated by
parties and organizations to obtain money, property or services; to avoid payment or loss of services;
or to secure personal or business advantage.” – The Institute of Internal Auditors
• Occupational fraud and abuse is “the use of one’s occupation for personal enrichment through
the deliberate misuse or misapplication of the employing organization’s resources or assets”. –
The Association of Certified Fraud Examiners
Definition of fraud
Internal fraud (or
occupational
fraud and abuse)
Corruption
Asset misappropriation
Financial statements fraud
External fraud Customer frauds
Vendor frauds
Security breaches
IP theft
Fraud against
individuals
ID theft
Ponzi schemes; MLM schemes
Phishing scams
Types of frauds
Corruption
Conflicts of
interest
Purchasing /
Sales schemes
Bribery
Invoice
kickbacks / Bid
rigging
Illegal gratuities
Economic
Extortion
Asset
Misappropriation
Cash
Theft of cash
on hand
Theft of cash
receipts (skimming
/ larceny)
Fraudulent
disbursements
Billing schemes / Payroll
schemes / Expense
reimbursement schemes
/ Check and payment
tempering / Register
disbursements
Inventory and
all other assets
Misuse /
Larceny
Financial
Statement Fraud
Net worth/Net
income
overstatement
Net worth/Net
income
understatement
Occupational fraud and abuse classification
system (the Fraud Tree) - Extract
acfe.com/fraudtree
Why does fraud occur?
The best and most widely accepted model for
explaining why people commit fraud is the fraud
triangle. Developed by Dr. Donald Cressey, a
criminologist whose research focused on
embezzlers—people he called “trust violators.
“Trusted persons become trust violators
when they conceive of themselves as
having a financial problem which is non-
shareable, are aware this problem can be
secretly resolved by violation of the
position of financial trust, and are able to
apply to their own conduct in that situation
verbalizations which enable them to adjust
their conceptions of themselves as trusted
persons with their conceptions of
themselves as users of the entrusted funds
or property.
- DONALD R. CRESSEY, Other People's
Money (Montclair: Patterson Smith, 1973)
p. 30
• Motivates crime
• Financial problem (personal /
professional) unable to be solved by
legitimate means
• Examples: Inability to pay bills/debt;
Need to meet earnings / productivity
targets; materialistic desires
Pressure
• Defines the way crime can be
committed
• Control weakness or some other
opportunity allows abusing a position
of trust without perceived risk of
getting caught
Opportunity
• Vast majority of fraudsters are first time
offenders. They perceive themselves as
ordinary, honest people caught in bad
set of circumstances
• Consequently, fraudster must justify the
crime to himself in a way that makes it
an acceptable or justifiable act
• “I was only borrowing money”; “I was
underpaid, my employer cheated me”;
“My employer deserves it.
Rationalization
The fraud triangle
• Cressey’s fraud triangle demonstrates certain characteristics that increase the likelihood for fraud to occur, but it does not
provide perfect guidance.
• Although the fraud triangle helps explain the nature of many occupational offenders, it does not explain the nature of all
occupational offenders.
• Cressey’s study is nearly half a century old, and there has been considerable social change in the interim.
• Now many anti-fraud professionals believe there is a new breed of occupational offender—one who simply lacks a
conscience sufficient to overcome temptation.
• Moreover, some experts believe that the fraud triangle could be enhanced by considering a fourth element.
• In their article “The Fraud Diamond: Considering the Four Elements of Fraud,” David Wolfe and Dana Hermanson
incorporated the element of capability—personal traits and abilities that play a major role in whether fraud will actually
occur—into Cressey’s model, transforming it from a triangle into a diamond
• Source: ACFE
The fraud triangle enhanced
Fraud triangle revisited…
The fraud triangle
The three-pronged
framework
Rationalization
Frame of mind that allows one to justify their dishonesty.
“Opportunity opens the doorway to fraud,
and incentive and rationalization can draw
the person toward it. But the person must
have the capability to recognize the open
doorway as an opportunity and to take
advantage of it by walking through, not just
once, but time and time again. Accordingly,
the critical question is, ‘Who could turn an
opportunity for fraud into reality?’”
- DAVID T. WOLFE AND DANA R.
HERMANSON, “The Fraud Diamond:
Considering the Four Elements of Fraud,”
The CPA Journal 74, December 2004
The fraud
diamond
The three-
pronged
framework
expanded by
capability
• Typical fraud case:
• Lasts 14 months before detection
• Causes a loss of $8300 per month
• Organizations lose an estimate of 5% of revenue to fraud each year
• Median loss per case: $125,000; Average loss per case: $1.5 million
• Corruption most common in every global region
• Asset misappropriation: Most common; least costly (86% cases; $100k median loss)
• Financial statements fraud schemes: Least common; most costly (10% cases; $954k median loss)
• Owners / executives caused only 20% of occupational frauds but with largest losses (median losses by
owner / executive: $600k; Manager: $150k; Employee: $60k)
Facts about fraud – Key findings from ACFE’s
Report to the Nations 2020
• 43% schemes detected by Tip; 50% tips from employees
• Whistleblowers used Telephone hotline and email in 33% of cases
• Organizations with Fraud Awareness Training more likely to gather tips through Formal Reporting
Mechanisms (56% of tips with training; 37% of tips without training)
• Certain fraud risks more likely in small businesses than in large organizations (2x in billing fraud,
payroll, check and payment tempering)
• A lack of internal controls contributed to 1 out of 3 frauds; presence of Anti-fraud controls
associated with lower fraud losses and quicker detections
• Use of targeted Anti-Fraud controls increased (Hotline, Anti-fraud policy, Fraud trainings)
Facts about fraud – Key findings from ACFE’s
Report to the Nations 2020 (continued)
• More than half of all occupational fraud came from four departments: Operations 15%; Accounting
14%; Executive / Upper management: 12%; Sales: 11%
• 80% of fraudsters faced internal discipline from organization; 46% victim organizations declined to
refer cases to law enforcement considering internal discipline as sufficient
• 42% of fraudsters lived beyond means; 26% of fraudsters faced financial difficulties
Facts about fraud – Key findings from ACFE’s
Report to the Nations 2020 (continued)
• Tenure: Occupational fraudsters who had been with their organizations at least 6 years caused TWICE
the loss of less-tenured employees
• Gender: Men caused 72% of all occupational fraud, and also caused larger losses than women.
• Education: 64% of occupational fraudsters had a university degree or higher and caused 2x median
loss compared to non-degree holder fraudsters
• Age: Older fraudsters cause much larger median loss (55+: $425k; 40-54: $150k; <40: $75k)
• Collusion of 3 or more fraudsters triples the median loss.
• 89% of fraudsters are first-time offenders with no criminal conviction; 86% were never
punished or terminated in prior employment
Facts about fraud – Profile of fraudsters from
ACFE’s Report to the Nations 2020 (continued)
• Seven most common behavioral red-flags:
• living beyond means (globally noticed in 42% of
cases;
• financial difficulties;
• unusually close association with a vendor or
customer;
• excessive control issues or unwillingness to
share duties;
• unusual irritability, suspiciousness, or
defensiveness;
• a general “wheeler-dealer” attitude involving
shrewd or unscrupulous behavior; and
• recent divorce or family problems.
• Source: https://www.acfe.com/report-to-the-
nations/2020/
• Red-flags 3-6 are more common in Pakistan
environment.
• Other red-flags less common globally but more
relevant in Pakistan:
• Complained about inadequate pay;
• Refusal to take vacations;
• Excessive pressure from within organization;
• Complained about lack of authority;
Facts about fraud – Profile of fraudsters from
ACFE’s Report to the Nations 2020 (continued)
Roles and
responsibilities
• Primary responsibility for fraud prevention
• Responsible for ensuring appropriate policies and procedures are implemented in the organization.
• Developing and maintaining an adequate system of internal control as well as maintaining accounts,
records, and books that accurately and fairly record and represent company transactions are statutory
obligations.
• COSO principle: The organization considers the potential for fraud in assessing risks to the
achievement of objectives.
Board and management
• ISA 240: ‘The Auditor’s Responsibility To Consider Fraud in an Audit of Financial Statements’, an auditor conducting an
audit in accordance with ISAs is responsible for obtaining reasonable assurance that the financial statements taken as a
whole are free from material misstatement, whether caused by fraud or error.
• In planning and performing the audit to reduce audit risk to an acceptably low level, the auditor should consider the
risks of material misstatements in the financial statements due to fraud; if risk is high; involve expert.
• Only two types of misstatements concern the auditor: misstatements resulting from fraudulent financial reporting
and misstatements resulting from misappropriation of assets.
• Due to significant inherent limitations in case of misstatement from fraud, particularly management fraud, auditor is
responsible for maintaining professional skepticism throughout the audit, considering the potential for management
override of controls. A subsequent discovery of fraud does not necessarily imply non-compliance with ISAs.
• Auditor is expected to identify and assess the risks of material misstatement due to fraud and design procedures to
detect such misstatement.
• Source: https://www.ifac.org/system/files/downloads/2008_Auditing_Handbook_A080_ISA_240.pdf
(please check for updates)
External auditor
• International Standards for the Professional Practice of Internal Auditing (IPPF Standards) require:
• 1210.A2 – Internal auditors must have sufficient knowledge to evaluate the risk of fraud and the manner in
which it is managed by the organization, but are not expected to have the expertise of a person whose
primary responsibility is detecting and investigating fraud.
• 2120.A2 The internal audit activity must evaluate the potential for the occurrence of fraud and how the
organization manages fraud risk.
• 2210.A2 – Internal auditors must consider the probability of significant errors, fraud, noncompliance, and
other exposures when developing the engagement objectives.
• Additionally other IPPF Standards also include fraud, including standards relating to role of internal
audit in evaluating organization’s ethics and values.
• Source: https://na.theiia.org/standards-guidance/public%20documents/ippf-standards-2017.pdf
(please check for updates)
Internal auditor
• Consider fraud risks in the assessment of internal control design and determination of audit steps to perform.
• Not expected to detect fraud; but expected to:
• obtain reasonable assurance that business objectives achieved
• material control deficiencies (intentional or erroneous) are detected
• Have sufficient knowledge of fraud to identify red flags.
• Characteristics; techniques; schemes and scenarios related to audit areas
• Be alert to opportunities that could allow fraud, such as control deficiencies.
• If significant control deficiencies are detected, additional tests should be conducted.
• Evaluate whether fraud risk management program actively and completely implemented.
• Evaluate fraud risk indicators and decide further action or commission investigation
• Recommend investigation when appropriate.
• Refer Handout 1.
Internal auditor: Implementation of standards in
audit engagements
• Do not assume that management or employees are dishonest nor assume unquestioned honesty.
• Inadequate professional skepticism often cited as a significant reason of non-detection of material fraud.
• Only an adequate level of professional skepticism can actually question the implementation of the fraud
risk management program.
• Standards that allow internal auditors to exercise skepticism (please refer original standards for latest text):
• IIA Standard 1111: Direct Interaction with the Board:
• CAE must communicate and interact directly with the Board.
• Standard 1120: Individual Objectivity
• Internal auditors must have an impartial and unbiased attitude.
• Audit Committee’s oversight and support helps the internal auditor maintain independence and objectivity
as well as keep an attitude of skepticism.
Internal auditor: Implementation of standards in
audit engagements (Skepticism)
• Relationship with board includes both reporting and oversight.
• CAE may include following in discussions with Board:
• Fraud audits performed
• Fraud risk assessment process
• Fraud or conflicts of interests and results of monitoring programs concerning compliance with law, code of conduct and/or ethics.
• IA organizational structure to address fraud
• Coordination of fraud audit activity with external audiotrs
• Overall assessment of control environment
• Productivity and budgetary measures of IA’s fraud activities
• Benchmarking comparisons of IA’s fraud activities with other organizations
• Role of IA in fraud investigations.
• Timing of communications of serious issues should be discussed in advance and documented. See next slide for
illustration.
Internal auditor: Implementation of standards in
audit engagements (Communicating with Board)
Internal auditor: Implementation of standards in audit
engagements (Communicating with Board – Cont’d)
• Evaluate risks faced by organizations based on audit plans with appropriate testing.
• Be alert to signs and possibilities of fraud within an organization.
• In comparison with external auditors, internal auditors are in better position to detect the symptoms
that accompany fraud. This leverage is owing to:
• Continual presence in the organization, resulting in better understanding of organization and its controls
• Ability to assist in the deterrence of fraud by examining and evaluating the adequacy and the effectiveness of
internal controls.
• Ability to assist in establishing effective fraud prevention measures and providing consulting expertise.
Internal auditor: Role as per Practice Guide
• If in relation to fraud risk management, internal auditors’ role are assigned the following roles, they
should obtain sufficient skills and competencies, including knowledge of fraud schemes, investigation
techniques and laws:
• Initial or full investigation of suspected fraud
• Root cause analysis and control improvement recommendations
• Monitoring of a reporting/whistleblower hotline
• Providing ethics training sessions
• Internal auditors can perform proactive auditing techniques such as data mining, analytics and other
procedures to find unusual items and perform detailed analyses of high-risk accounts.
• The Practice Guide distinguishes an Internal Auditor from a Fraud Investigator.
Internal auditor: Role as per Practice Guide
(cont’d)
Fraud Risk
Assessment
• A fraud risk assessment (FRA) is often a critical component of an organization’s larger enterprise risk
management program.
• FRA is a tool to assist management and internal auditors to systematically identify where and how
fraud may occur and who may be in a position to commit fraud.
• FRA concentrates on fraud schemes and scenarios to determine presence of internal controls and
whether or not the controls can be circumvented.
• Not all fraud risks may be mitigated or eliminated, the cost vs. benefit equation needs to apply (Refer
bank’s example of utility bill fraud).
Fraud risk assessment
Identify relevant
fraud risk factors
Identify potential
fraud schemes
and prioritize
them based on
risk.
Map controls to
fraud schemes
and identify gaps
Test operating
effectiveness of
fraud prevention
and detection
controls.
Document and
report the fraud
risk assessment
The Fraud Risk Assessment Process
Brainstorming stage Assessment stage
Refer Handouts 2 and 2a.
Fraud
Prevention and
Detection
• Prevention and detection are not the same.
• Fraud prevention entails:
• Implementing policies and procedures
• Employee trainings
• Management communication to educate about fraudulent activities.
• Fraud detection entails:
• Activities and programs designed to identify fraud or misconduct
• See next slide for interrelationship of the two.
Fraud prevention and detection
Fraud prevention and detection (Source: IIA)
• Remember:
• Risk of fraud can never be eliminated.
• It is not cost-effective to try to eliminate all fraud risk.
• Some overarching considerations:
• Strong ethical corporate culture
• Training and education
• Strong policies and procedures to implement and monitor internal controls
• Procedures to detect fraud risk indicators on a timely basis to investigate fraud
• Prosecution when appropriate.
Fraud prevention and detection (cont’d)
Training Fraud reporting mechanism
Tone at the top / Code of
conduct
Internal audit / Surprise audit
Data mining (proactively
looking for anomalies)
Anti-fraud controls
•Segregation of duties
•Safeguard of assets
•Management authorization and review
•Job rotation
•Mandatory vacation
•Background checks / Due diligence
Disciplinary actions
Anti-fraud better practices
Visible and rigorous fraud governance
process
Effective fraud control processes and
procedures
Periodic Fraud Risk Assessment
Swift allegation response and appropriate
action against wrong-doers
Attributes of a deterrence
creating FRM process
Fraud risk management
• Fraud prevention involves those actions taken:
• to discourage the commission of fraud and
• limit fraud exposure when it occurs.
• Instilling a strong ethical culture and setting the correct tone at the top are essential elements in
preventing fraud.
• Strong principal mechanism for preventing fraud is effective and efficient internal controls, including
controls related to screening customers, vendors, and external business relationship partners.
• COSO presented a framework for assessing and improving internal control systems to fight fraud.
Fraud prevention
Control environment
• Code of conduct,
ethics policy, fraud
policy to set tone at
the top.
• Hotline programs
• Hiring and
promotion guidelines
and practices
• Oversight by AC,
Board or other.
Risk assessment
• Establishing a FRA
process that
considers fraud risk
factors and fraud
schemes
• Involving
appropriate
personnel
• Performing FRA
on regular basis.
Control activities
• Policies and
procedures
• Appropriate
authority limits
• Segregation of
incompatible
duties.
Information and
communication
• Promoting FRM
program and
position on fraud
risk both internally
and externally
through corporate
communications
program
• Fraud awareness
training
• Confirmation of
policies and their
compliance.
Monitoring
• Providing periodic
evaluation of anti-
fraud controls.
• Independent
evaluation of fraud
risk management
program by
internal auditors or
experts.
• Implementing tech
to aid in
continuous
monitoring and
detection.
Fraud prevention
• Detective controls are designed to provide warnings or evidence that fraud is occurring or has
occurred.
• Fraud detection methods need to be flexible, adaptable and continuously changing to meet the
changes in the risk environment.
• Detective controls may not be as apparent or readily identifiable as preventive controls.
• Organizations often rely on employees to report suspicious activity through an anonymous
whistleblower hotline. An effective way for an organization to learn about existing fraud is to provide
employees, suppliers, and other stakeholders with a variety of methods for reporting their concerns
about illegal or unethical behaviour.
Fraud detection
• Code of conduct confirmation: Employees can be asked to report known violations as part of sign-
offs
• Whistleblower hotline: Most effective; must allow anonymity option.
• Exit interviews: In addition to helping in identifying fraud schemes, exit interviews of terminated or
resigning employees can highlight management integrity issues which may provide conditions
conducive to fraud.
• Proactive employee survey: to solicit knowledge of fraud and unethical behaviour within the
organization. Again, anonymity should be ensured.
Fraud detection (ways to collect information)
• Surprise audits in high fraud risk areas: Could be by internal auditors, external auditors,
management or external experts.
• Continuous monitoring: of critical data and related trends to identify unusual situations or variances.
• Routine and/or ad hoc matching of public data and/or proprietary data: against relevant
transactions, vendor lists, employee rosters, and other data.
Fraud detection (other methods)
BRAINSTORMING PLANNING COLLECTION
EVIDENCE
GATHERING
THROUGH ANALYSIS
REPORTING AND
CLOSURE
Fraud audit /
Investigation
process
• A fraud investigator needs solid business operations insight as well as accounting expertise.
• In fraud investigations, perpetrator's identity is often suspected / known. The job of the fraud auditor
is to prove that the perpetrator's actions resulted in fraud.
• There usually are no transaction trails for the actual activity perpetrated (no smoking guns) and clues
to fraud cases usually come from small, seemingly insignificant inconsistencies in records, data,
suspect's speech or actions.
Key points
• Fraud investigator needs to gather and analyze necessary evidence required by a management and/or
legal authorities to determine the facts and circumstances surrounding the fraud / suspected fraud.
The investigation may include legal advisors.
• A fraud investigation seeks to answer the following questions:
• Who did it?
• Why did he/she did it?
• How did they gain from the fraud? What assets were taken and how were they converted into benefits?
• How, when and where was the fraud perpetrated and concealed?
• What is the extent of losses?
• Were any laws broken?
Objective of fraud investigation
Brainstorming
• Identify parties,
investigation
parameters and risks as
input to the plan.
Planning:
• Thorough planning
determines focus and
helps manage the
investigation
Collection phase:
• Information gathering
in a forensically sound
manner
Evidence gathering
through analyses:
• issue-tailored analyses
performed to obtain
evidence
Reporting and
closure:
• Reporting of findings
The Fraud Audit / Investigation Process
Problem recognition and definition
Refine and amend
hypothesis
Analyze data;
create and test
hypothesis
• Objective:
• To identify relevant parties,
• Understand and confirm scope, and
• Initiate the investigation based on initial understanding.
• Refer Handout 3 for details
Brainstorming
• Planning is essential to help ensure that the investigation has clear objectives and that the strategy aligns with the objectives. Investigations, by
nature, can grow rapidly and lead an investigation team in many directions - therefore it is important that each step in the investigation process is
properly considered in terms of what is going to be completed and what will be achieved.
• Planning enables the investigation team to answer critical questions:
• What are the engagement’s objectives?
• What are the fraud hypotheses which are to be tested?
• What is the engagement strategy (i.e., what actions must be taken to achieve the objectives)?
• What is the progress towards achieving our objectives during the engagement?
• Have we achieved our objectives at the conclusion of the engagement?
• What other service providers may we be working with on this engagement (e.g., Counsel, discovery service providers, etc.) and have we defined the roles
and responsibilities of each party (and evaluated related direct and indirect marketplace business relationships)?
• The work plan needs to be cognizant of specific jurisdictional issues, as well as specific limitations or requirements that are unique to the area.
• Consider Forensic Accounting and Benford Analysis. Forensic accounting is the application of investigative and analytical skills for the purpose of
resolving financial issues in a manner that meets standards required by courts of law.
• Refer Handout 4 for details
Planning
• Establish project management
• Identify and obtain necessary skills and resources
• Use of non-forensic professionals
• Manage data preservation and retention
• Communication
Planning
“A poorly planned
project will take three
times longer than the
original plan. A well-
planned project will only
take twice as long.”
- ANONYMOUS; on
a lighter note!
• Objective: To assemble relevant evidence in order to focus the investigation, and readily identify issues with
respect to information gathering.
• Refer handout for details
Collection phase
Electronic
information
Physical information Human information
• Consider Chain of Custody
• According to ACFE Fraud Examiner’s Manual, the Chain of custody is both a process and a document
that memorializes:
• Who has had possession of an object and
• What they have done with it
It is simply a means of establishing that there has not been a material change or alteration to a piece of
evidence.
Collection phase
Other parties
Investigation
team
Investigation
team main
liaison
Departmental
liaison for
investigation
Archive
custodian
Departmental
custodian
Originator of
information
• Collect third party information
Collection phase
Publicly available information
Government
sources
Social media
Surface web
BASIC EQUIPMENT EXAMPLE OF EVIDENCE
Some forensic lab snapshots
EXAMINATION TOOLS EVIDENCE BAGS
Some forensic lab snapshots
Triangulation of
information
Evaluation for forensic
soundness
Manipulate
information
for
triangulation
Triangulate
information
for analysis
Financial
analysis
Non-
financial
analysis
Evaluate
work
performed
and findings
identified
Information (data)
anlayses
Evidence gathering through analysis
Refer Handout for details
Additional forensic lab snapshots (analysis)
Additional forensic lab snapshots (analysis)
• Consider government, regulator and/or other third party requirements.
• Prepare for potential litigation
• Perform RCA, if required
• Follow project closure protocols
Reporting and closure
• Fraud investigator gather and analyze the necessary evidence required by management and legal
authorities.
• Fraud investigator answers the questions like extent of fraud and monetary value, when & where the
fraud take place along with violation of specific laws.
• Fraud investigations follow a sequence of activities that initiate with brainstorming and planning,
follow through with information collection and analysis and concludes with identification of findings
and giving recommendations.
• The process can be iterative and may lead to additional findings.
• The information collected and used need to be obtained, stored and released based on strict traceable
protocols to ensure the report withstands scrutiny
Investigation process Wrap-up
• After fraud investigation and communication, management and internal audit should step back and
consider lessons learned:
• How did the fraud occur?
• What controls failed?
• What controls were overridden?
• Why wasn’t the fraud detected earlier?
• What red flags were missed by management?
• What red flags did internal audit miss?
• How can future frauds be prevented or more easily detected?
• What controls need strengthening?
• What internal audit plans and audit steps need to be enhanced?
• What additional training is needed?
Analysis of lessons learned (Source: IIA)
Fraud
Interviews
Admission-seeking stage
Interview of suspect
Confirmation phase
Corroborative interviews with withnesses Interviews of co-conspirators
Evidence-gathering phase
Collection and evidence gathering through
anlaysis (excl. human info)
Preliminary observation drafting
Corroborative or information seeking
interviews with neutral persons
Fraud interviews
Types of communications
Chronemic; use of
time to convey
meaning, attitudes and
desires (respondent
late in keeping
appointments or
delaying; potentially
avoiding
Proxemic; use of
interpersonal space to
convey meaning
Paralinguistic; using
volume, pitch and
voice quality to
convey meaning
Kinetic; use of body
movements to convey
meaning
Overarching considerations
Preparation
• Review case files
• Have clear objectives
• Determine order of interviews
• Determine type of information expected to be received
• Select a comfortable and secure venue
• Select members of investigation team as interviewers
• Formulate a brief outline of key points to discuss
Types of questions
• Introductory; used to provide intro, establish rapport, set theme and baselining behaviour; do not use
sensitive questions or emotive words at this stage
• Informational; used to gather unbiased facts; could be open, closed or leading; however, questioning should
be general to specific
• Closing; used to reconfirm facts gathered; see if additional information can be gathered; and to achieve a
pleasant end to the process
• Assessment; used to evaluate credibility
• Admission seeking; only used for individuals whose culpability is reasonably certain; designed to obtain legal
admission of wrongdoing; reasonable certainty is achieved when there is reasonable probability about the
culpability of suspect and reasonable investigation steps already taken; convey absolute confidence with
accusation, do not become a moral judge, be firm with empathy; offer a moral excuse; diffuse defenses.
Mechanics and other considerations
• Do not react to difficult persons or conversations
• Prepare the room appropriately; privacy; door closed but not locked and easily reachable by
interviewee; communicate that they’re free to leave anytime; keep interviewer chairs apart; interviewee
should not be behind any physical barrier
• At least two interviewers in an admission seeking interviews
Things to cover in verbal confessions
• Knowledge of action being wrong; demonstrating intent
• Facts known only to perpetrator
• Motive; may need to dig further
• Facts about offense (timing, continuing or stopped, others involved, evidences, location of any assets
misappropriated)
Things to cover in signed confessions
• Statement that the confession is voluntary
• Intent
• Facts about fraud (dates, amount of loss, instances, etc)
• Willingness to cooperate
• Confessor’s rationalization
• Acknowledgement that confessor has read the statement
• Truthfulness of the statement
• Witness signatures (HR and/or Legal Counsel should be included)
Consult your lawyer for your
jurisdiction’s requirements
with respect to confession
statements.
Report Writing
• Background
• The background section is generally about two paragraphs. It should state very briefly why the fraud
examination was conducted.
• Executive Summary
• In this section the reporter summarizes what actions were performed during the fraud investigation, such as
reviewing documents, interrogating witnesses, conducting analyses or tests, etc. Doing so provides the reader
with an overview of what was done during the examination process. At the end of this section, you should
summarize the outcome of the examination. For example, “PKR 500,000 in checks was deposited into an
account owned by YZ. When confronted with this information, Ya stated that he had only borrowed the money
and meant to pay it back.
Report writing
• Scope
• This section consists of just one paragraph explaining the scope of the fraud examination. For example,
“Determine whether accounts receivables were manipulated in the books record,” or “Determine why cash
inventory recorded is not matching with actual quantity in the warehouse.
• Approach and methodology
• This section gives a brief description of the following items:
• Fraud examination team members
• Procedures performed (generally what documents were reviewed or what tests were conducted)
• Individuals interviewed
• Any limitations
• It provides a handy reference as to who was involved in the fraud examination, what the team reviewed, what
tests or analyses were conducted, and what individuals the team interviewed.
Report writing (cont’d)
• Findings
• This section contains the details of the fraud examination. It will generally consist of several pages. In this
section, you should describe what actions or duties the reporter performed and what was found. Provide enough
detail so that the reader understands what occurred, but not so much detail that the reader begins to lose interest
or becomes bogged down in the details.
• The reader wants to know how many instances occurred, who was involved, how they did it, what proof you
have, etc. If the findings section is long, you might use subheadings for particular topics or individuals to make
it easier for the reader to stay organized. The information can be presented either chronologically or by topic—
whatever makes it easier for the reader to follow.
• Approach
• This section should be one or two paragraphs and should briefly summarize the results of the fraud
investigation. It should be similar to the outcome stated at the end of the Executive Summary section
Report writing (cont’d)
• Impact
• This section consists of how the fraud impacted the overall business. The reporter can provide an estimate amount of
loss or any other tangible or intangible damage suffered by the victim and also which might affect in future.
• Recommendation
• The organizations mainly look for the recommendations as they are willing to implement the changes. However, this
section is optional. There might be instances where fraud investigator wish to discuss remedial measures or specific
recommendations in a separate document. If investigator do wish to include this section, then should state what
follow-up action is necessary or recommended, including remedial measures such as a review of internal controls,
introduction of a whistle blower - hotline, increased security, etc.
• Limitations and caveats
• Standard caveats
• Identify any matter outstanding
Report writing (cont’d)
• Opinions and conclusions:
• Conclusions need to be self-evident, not requiring to be pointed out
• Opinions regarding guilt or innocence are not allowed
• Fraud examiner should not include any statement of opinion as to the integrity or veracity of any witness.
• Refer IIA’s Practice Advisories on expression of opinion on internal control and other
considerations.
Report writing (cont’d)
Legal
considerations
during
investigations
• Collection sensitivities; what can and cannot be examined
• Labor laws sensitivities; will the investigation be challenged subsequently in the court?
• Evidence admissibility; are there any conjecture in the report rather than facts? Are the facts
sufficiently establishing beyond reasonable doubt the culpability of suspect?
• Interviews; what is the admissibility of the interview process?
• Disciplinary options in light of laws
• Any statutory reporting responsibility?
• Consult legal counsel throughout the process
Legal considerations during investigations
Nuances of
modern fraud
investigations
• Mobile devices
• Personal data on official machines
• BYOD
• Cloud and network forensic
• OSINT (external sources, public records, court records, property records, tax records, business filings
with regulators); Social Catfish (or use programming skills to build your own VM)
• WayBackMachine (notable mention!)
• Privacy issues when collecting social media; best practices (screen capture; print; PDF etc.)
• Email headers
Nuances of modern fraud investigations
Selected
specific fraud
and corruption
scenarios
Financial services sector
• Islamic bank private lending scheme
• Large commercial bank trade finance fraud investigation
• Microfinance bank (investigations; methodology; AML/CFT)
• AMC – Fraud against customers
• SWIFT fraud
• Service provider to large commercial bank making improper arrangements
Government and WorldBank
• Review of program with branchless banking nuances
• Pakistan Railways (draft)
Selected investigations
Tech / Startup:
• Investigation of procurement fraud
• Staff’s Anti-Corruption due diligence
Pharma
• Frauds in Hardship cases
• Vaccine fraud
• Compliance audit of distributors
• ABAC DD
• Medical devices company distributor FCPA
NPO
• Forensic of Pakistan operations
• Afghanistan foreign government charity (Head investigation; Ops investigation)
Selected investigations
HNW fraud
• Trading PPP platform scam
Oil and gas
• Foreign company investigation of conflict of interest
FMCG
• ABAC / FCPA DD
• Trust fraud
Hospitality
• Multinational fast-food chain; senior management fraud
Selected investigations
FRAUD INVESTIGATIONS INTERNAL AUDITING AND FRAUD
Suggested supplementary readings
Jul-Sep 2014
Published Oct 2014
Become certified, get
access to leading
resources and part of an
expert community of
fraud fighters around the
globe.
Stay away from
‘Diploma Mills’!
Thank You
LinkedIn
https://www.linkedin.com/in/zeeshan80/
Twitter
@zee_shah
Email
zeeshanshahid@outlook.com
Phone
+92 302 827 3930

Contenu connexe

Tendances

A Brief About Forensic Accounting
A Brief About Forensic AccountingA Brief About Forensic Accounting
A Brief About Forensic AccountingA Wolf Bookkeeping
 
Internal control system
Internal control systemInternal control system
Internal control systemHina Varshney
 
Forensic Accounting
Forensic AccountingForensic Accounting
Forensic AccountingMikeRosten
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 
Fraud investigations session 1 slides
Fraud investigations session 1 slidesFraud investigations session 1 slides
Fraud investigations session 1 slidesZeeshan Shahid
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 
Entire forensic accounting project
Entire forensic accounting projectEntire forensic accounting project
Entire forensic accounting projectavinash mathias
 
forensic accounting india
forensic accounting indiaforensic accounting india
forensic accounting indiaMayank Garg
 
The Role of Internal Audit
The Role of Internal AuditThe Role of Internal Audit
The Role of Internal AuditArmeniaFED
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITEMAC Consulting Group
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensicswhbrown5
 

Tendances (20)

A Brief About Forensic Accounting
A Brief About Forensic AccountingA Brief About Forensic Accounting
A Brief About Forensic Accounting
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Forensic Accounting
Forensic AccountingForensic Accounting
Forensic Accounting
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Fraud investigations session 1 slides
Fraud investigations session 1 slidesFraud investigations session 1 slides
Fraud investigations session 1 slides
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Fraud & corruption
Fraud & corruptionFraud & corruption
Fraud & corruption
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Entire forensic accounting project
Entire forensic accounting projectEntire forensic accounting project
Entire forensic accounting project
 
Role of Audit for detection of fraud.
Role of Audit  for  detection of fraud.Role of Audit  for  detection of fraud.
Role of Audit for detection of fraud.
 
forensic accounting india
forensic accounting indiaforensic accounting india
forensic accounting india
 
The Role of Internal Audit
The Role of Internal AuditThe Role of Internal Audit
The Role of Internal Audit
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 
FRAUD - AUDITING STUDY NOTES
FRAUD - AUDITING STUDY NOTES FRAUD - AUDITING STUDY NOTES
FRAUD - AUDITING STUDY NOTES
 
Understanding Financial Statement fraud- Forensic Accounting Perspective
Understanding Financial Statement fraud- Forensic Accounting PerspectiveUnderstanding Financial Statement fraud- Forensic Accounting Perspective
Understanding Financial Statement fraud- Forensic Accounting Perspective
 
Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensics
 

Similaire à Role of Internal Audit in fraud prevention and detection

2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The FraudRaffa Learning Community
 
Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012Hermerding
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskSantosh Pande
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Managing Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsManaging Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsPLAcademy
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
New age of risk for contractors slide presentation
New age of risk for contractors slide presentationNew age of risk for contractors slide presentation
New age of risk for contractors slide presentation1paramount
 
Ff&f lafayette september 18, 2012 a
Ff&f   lafayette september 18, 2012 aFf&f   lafayette september 18, 2012 a
Ff&f lafayette september 18, 2012 aMiriam Robeson
 
Ff&f lafayette september 18, 2012 a
Ff&f   lafayette september 18, 2012 aFf&f   lafayette september 18, 2012 a
Ff&f lafayette september 18, 2012 aMiriam Robeson
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Accounting_Whitepapers
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 

Similaire à Role of Internal Audit in fraud prevention and detection (20)

Red Flags Fraud
Red Flags FraudRed Flags Fraud
Red Flags Fraud
 
2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud
 
Red flags fraud
Red flags fraudRed flags fraud
Red flags fraud
 
Fraud motivation Triangle.pptx
Fraud motivation Triangle.pptxFraud motivation Triangle.pptx
Fraud motivation Triangle.pptx
 
Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
2013-10-31 Nonprofit Fraud Part 1
2013-10-31 Nonprofit Fraud Part 12013-10-31 Nonprofit Fraud Part 1
2013-10-31 Nonprofit Fraud Part 1
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Auditing for Internal Fraud
Auditing for Internal FraudAuditing for Internal Fraud
Auditing for Internal Fraud
 
2013-04-04 Nonprofit Fraud: Part I
2013-04-04 Nonprofit Fraud: Part I2013-04-04 Nonprofit Fraud: Part I
2013-04-04 Nonprofit Fraud: Part I
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Managing Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsManaging Fraud and Corruption in Projects
Managing Fraud and Corruption in Projects
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
New age of risk for contractors slide presentation
New age of risk for contractors slide presentationNew age of risk for contractors slide presentation
New age of risk for contractors slide presentation
 
Ff&f lafayette september 18, 2012 a
Ff&f   lafayette september 18, 2012 aFf&f   lafayette september 18, 2012 a
Ff&f lafayette september 18, 2012 a
 
Ff&f lafayette september 18, 2012 a
Ff&f   lafayette september 18, 2012 aFf&f   lafayette september 18, 2012 a
Ff&f lafayette september 18, 2012 a
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 

Plus de Zeeshan Shahid

Fraud Risk Management: High-Level Perspectives for Directors and Investors
Fraud Risk Management: High-Level Perspectives for Directors and InvestorsFraud Risk Management: High-Level Perspectives for Directors and Investors
Fraud Risk Management: High-Level Perspectives for Directors and InvestorsZeeshan Shahid
 
Fraud investigations session 2 slides
Fraud investigations session 2 slidesFraud investigations session 2 slides
Fraud investigations session 2 slidesZeeshan Shahid
 
Fraud Risk Management - High Level Perspective for the Board of Directors
Fraud Risk Management - High Level Perspective for the Board of DirectorsFraud Risk Management - High Level Perspective for the Board of Directors
Fraud Risk Management - High Level Perspective for the Board of DirectorsZeeshan Shahid
 
SBEP Financial Management manual
SBEP Financial Management manualSBEP Financial Management manual
SBEP Financial Management manualZeeshan Shahid
 
SBEP Monitoring & Evaluation Manual
SBEP Monitoring & Evaluation ManualSBEP Monitoring & Evaluation Manual
SBEP Monitoring & Evaluation ManualZeeshan Shahid
 
SBEP Human Resources Manual
SBEP Human Resources ManualSBEP Human Resources Manual
SBEP Human Resources ManualZeeshan Shahid
 
SBEP Procurement Manual
SBEP Procurement ManualSBEP Procurement Manual
SBEP Procurement ManualZeeshan Shahid
 
Evaluations and feedback
Evaluations and feedbackEvaluations and feedback
Evaluations and feedbackZeeshan Shahid
 
Workshop on Fraud Investigation
Workshop on Fraud InvestigationWorkshop on Fraud Investigation
Workshop on Fraud InvestigationZeeshan Shahid
 
Foreign direct investment in Pakistan - Opportunities and Challenges
Foreign direct investment in Pakistan - Opportunities and ChallengesForeign direct investment in Pakistan - Opportunities and Challenges
Foreign direct investment in Pakistan - Opportunities and ChallengesZeeshan Shahid
 

Plus de Zeeshan Shahid (11)

Fraud Risk Management: High-Level Perspectives for Directors and Investors
Fraud Risk Management: High-Level Perspectives for Directors and InvestorsFraud Risk Management: High-Level Perspectives for Directors and Investors
Fraud Risk Management: High-Level Perspectives for Directors and Investors
 
Fraud investigations session 2 slides
Fraud investigations session 2 slidesFraud investigations session 2 slides
Fraud investigations session 2 slides
 
Fraud Risk Management - High Level Perspective for the Board of Directors
Fraud Risk Management - High Level Perspective for the Board of DirectorsFraud Risk Management - High Level Perspective for the Board of Directors
Fraud Risk Management - High Level Perspective for the Board of Directors
 
SBEP Financial Management manual
SBEP Financial Management manualSBEP Financial Management manual
SBEP Financial Management manual
 
SBEP Monitoring & Evaluation Manual
SBEP Monitoring & Evaluation ManualSBEP Monitoring & Evaluation Manual
SBEP Monitoring & Evaluation Manual
 
SBEP Human Resources Manual
SBEP Human Resources ManualSBEP Human Resources Manual
SBEP Human Resources Manual
 
SBEP Procurement Manual
SBEP Procurement ManualSBEP Procurement Manual
SBEP Procurement Manual
 
Evaluations and feedback
Evaluations and feedbackEvaluations and feedback
Evaluations and feedback
 
Modes of Learning
Modes of LearningModes of Learning
Modes of Learning
 
Workshop on Fraud Investigation
Workshop on Fraud InvestigationWorkshop on Fraud Investigation
Workshop on Fraud Investigation
 
Foreign direct investment in Pakistan - Opportunities and Challenges
Foreign direct investment in Pakistan - Opportunities and ChallengesForeign direct investment in Pakistan - Opportunities and Challenges
Foreign direct investment in Pakistan - Opportunities and Challenges
 

Dernier

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Dernier (20)

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 

Role of Internal Audit in fraud prevention and detection

  • 1. Role of Internal Audit in Fraud Prevention and Detection (with fraud investigation process) ZEESHAN SHAHID AUGUST 20, 2021 This Photo by Thoufeeq Ahamed is licensed under CC BY-SA-NC
  • 2. Zeeshan Shahid • Chartered Accountant; Certified Fraud Examiner; >18y experience; served as partner in Deloitte and Yousuf Adil • >10y running country’s first dedicated Forensic practice in Deloitte; Experience of investigating allegations of fraud, abuse, bribery, corruption and misconduct in public (federal, provincial and corporate), private (domestic and MNCs for FCPA/UKBA), non-profit (foreign government and NGO)
  • 3. Overview • Fraud and internal audit – Relevant standards • Fraud awareness • Roles and responsibilities • Fraud risk assessments • Fraud prevention and detection • Fraud audit / investigation process • Fraud interviews • Report writing • Legal considerations during investigations • Nuances of modern fraud investigations • Selected specific fraud and corruption scenarios Photo by John Fowler on Unsplash
  • 4. “[An auditor] is a watchdog, not a bloodhound” - Lord Justice Lopes, Kingston Cotton Mills Co. (1896) Photo by Chris Lynch on Unsplash A view, arguably no longer valid.
  • 5. Fraud and internal audit – Relevant standards
  • 6. 1200: Proficiency and Due Professional Care • 1210.A2 – Internal Auditors must have sufficient knowledge to evaluate the risk of fraud and the manner in which it is managed by the organization, but not expected to have the expertise of a person whose primary responsibility is detecting and investigating fraud. 1220: Due Professional Care • 1220.A1 – Internal Auditors must exercise due professional care by considering the: • Extent of work needed to achieve the engagement’s objectives. • Related complexity, materiality or significance of matters to which assurance procedures are applied. • Adequacy and effectiveness of governance, risk management, and control processes. • Probability of significant errors, fraud, or non-compliance. • Cost of assurance in relation to potential benefits. 2060: Reporting to Senior Management and the Board • The CAE must report periodically to senior management and the board on the internal audit activity’s purpose, authority, responsibility and performance relative to its plan. Reporting must also include significant risk exposures and control issues, including fraud risks, governance issues, and other matters needed or requested by senior management and the board. Requirements of various standards
  • 7. 2120: Risk Management • 2120.A2 – The internal audit activity must evaluate the potential for the occurrence of fraud and how the organization manages fraud risk. 2210: Engagement Objectives • 2210.A2 – Internal auditors must consider the probability of significant errors, fraud, noncompliance, and other exposures when developing the engagement objectives. Selected Other Reference Material • IIA Practice Advisories • AICPA and other professional services regulatory bodies’ literature regarding fraud. • ACFE and COSO publication in connection with Fraud Risk Assessment • Other ACFE publications and tools • Joint papers by IIA and ACFE with AICPA and other organizations. Requirements of various standards (cont’d)
  • 9. • “Fraud is an intentional or deliberate act to deprive another of property or money by deception or other unfair means.” – The Association of Certified Fraud Examiners • “Any illegal acts characterized by deceit, concealment or violation of trust. These acts are not dependent upon the application of threat of violence or of physical force. Frauds are perpetrated by parties and organizations to obtain money, property or services; to avoid payment or loss of services; or to secure personal or business advantage.” – The Institute of Internal Auditors • Occupational fraud and abuse is “the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s resources or assets”. – The Association of Certified Fraud Examiners Definition of fraud
  • 10. Internal fraud (or occupational fraud and abuse) Corruption Asset misappropriation Financial statements fraud External fraud Customer frauds Vendor frauds Security breaches IP theft Fraud against individuals ID theft Ponzi schemes; MLM schemes Phishing scams Types of frauds
  • 11. Corruption Conflicts of interest Purchasing / Sales schemes Bribery Invoice kickbacks / Bid rigging Illegal gratuities Economic Extortion Asset Misappropriation Cash Theft of cash on hand Theft of cash receipts (skimming / larceny) Fraudulent disbursements Billing schemes / Payroll schemes / Expense reimbursement schemes / Check and payment tempering / Register disbursements Inventory and all other assets Misuse / Larceny Financial Statement Fraud Net worth/Net income overstatement Net worth/Net income understatement Occupational fraud and abuse classification system (the Fraud Tree) - Extract acfe.com/fraudtree
  • 12. Why does fraud occur? The best and most widely accepted model for explaining why people commit fraud is the fraud triangle. Developed by Dr. Donald Cressey, a criminologist whose research focused on embezzlers—people he called “trust violators.
  • 13. “Trusted persons become trust violators when they conceive of themselves as having a financial problem which is non- shareable, are aware this problem can be secretly resolved by violation of the position of financial trust, and are able to apply to their own conduct in that situation verbalizations which enable them to adjust their conceptions of themselves as trusted persons with their conceptions of themselves as users of the entrusted funds or property. - DONALD R. CRESSEY, Other People's Money (Montclair: Patterson Smith, 1973) p. 30
  • 14. • Motivates crime • Financial problem (personal / professional) unable to be solved by legitimate means • Examples: Inability to pay bills/debt; Need to meet earnings / productivity targets; materialistic desires Pressure • Defines the way crime can be committed • Control weakness or some other opportunity allows abusing a position of trust without perceived risk of getting caught Opportunity • Vast majority of fraudsters are first time offenders. They perceive themselves as ordinary, honest people caught in bad set of circumstances • Consequently, fraudster must justify the crime to himself in a way that makes it an acceptable or justifiable act • “I was only borrowing money”; “I was underpaid, my employer cheated me”; “My employer deserves it. Rationalization The fraud triangle
  • 15. • Cressey’s fraud triangle demonstrates certain characteristics that increase the likelihood for fraud to occur, but it does not provide perfect guidance. • Although the fraud triangle helps explain the nature of many occupational offenders, it does not explain the nature of all occupational offenders. • Cressey’s study is nearly half a century old, and there has been considerable social change in the interim. • Now many anti-fraud professionals believe there is a new breed of occupational offender—one who simply lacks a conscience sufficient to overcome temptation. • Moreover, some experts believe that the fraud triangle could be enhanced by considering a fourth element. • In their article “The Fraud Diamond: Considering the Four Elements of Fraud,” David Wolfe and Dana Hermanson incorporated the element of capability—personal traits and abilities that play a major role in whether fraud will actually occur—into Cressey’s model, transforming it from a triangle into a diamond • Source: ACFE The fraud triangle enhanced
  • 16. Fraud triangle revisited… The fraud triangle The three-pronged framework Rationalization Frame of mind that allows one to justify their dishonesty.
  • 17. “Opportunity opens the doorway to fraud, and incentive and rationalization can draw the person toward it. But the person must have the capability to recognize the open doorway as an opportunity and to take advantage of it by walking through, not just once, but time and time again. Accordingly, the critical question is, ‘Who could turn an opportunity for fraud into reality?’” - DAVID T. WOLFE AND DANA R. HERMANSON, “The Fraud Diamond: Considering the Four Elements of Fraud,” The CPA Journal 74, December 2004 The fraud diamond The three- pronged framework expanded by capability
  • 18. • Typical fraud case: • Lasts 14 months before detection • Causes a loss of $8300 per month • Organizations lose an estimate of 5% of revenue to fraud each year • Median loss per case: $125,000; Average loss per case: $1.5 million • Corruption most common in every global region • Asset misappropriation: Most common; least costly (86% cases; $100k median loss) • Financial statements fraud schemes: Least common; most costly (10% cases; $954k median loss) • Owners / executives caused only 20% of occupational frauds but with largest losses (median losses by owner / executive: $600k; Manager: $150k; Employee: $60k) Facts about fraud – Key findings from ACFE’s Report to the Nations 2020
  • 19. • 43% schemes detected by Tip; 50% tips from employees • Whistleblowers used Telephone hotline and email in 33% of cases • Organizations with Fraud Awareness Training more likely to gather tips through Formal Reporting Mechanisms (56% of tips with training; 37% of tips without training) • Certain fraud risks more likely in small businesses than in large organizations (2x in billing fraud, payroll, check and payment tempering) • A lack of internal controls contributed to 1 out of 3 frauds; presence of Anti-fraud controls associated with lower fraud losses and quicker detections • Use of targeted Anti-Fraud controls increased (Hotline, Anti-fraud policy, Fraud trainings) Facts about fraud – Key findings from ACFE’s Report to the Nations 2020 (continued)
  • 20. • More than half of all occupational fraud came from four departments: Operations 15%; Accounting 14%; Executive / Upper management: 12%; Sales: 11% • 80% of fraudsters faced internal discipline from organization; 46% victim organizations declined to refer cases to law enforcement considering internal discipline as sufficient • 42% of fraudsters lived beyond means; 26% of fraudsters faced financial difficulties Facts about fraud – Key findings from ACFE’s Report to the Nations 2020 (continued)
  • 21. • Tenure: Occupational fraudsters who had been with their organizations at least 6 years caused TWICE the loss of less-tenured employees • Gender: Men caused 72% of all occupational fraud, and also caused larger losses than women. • Education: 64% of occupational fraudsters had a university degree or higher and caused 2x median loss compared to non-degree holder fraudsters • Age: Older fraudsters cause much larger median loss (55+: $425k; 40-54: $150k; <40: $75k) • Collusion of 3 or more fraudsters triples the median loss. • 89% of fraudsters are first-time offenders with no criminal conviction; 86% were never punished or terminated in prior employment Facts about fraud – Profile of fraudsters from ACFE’s Report to the Nations 2020 (continued)
  • 22. • Seven most common behavioral red-flags: • living beyond means (globally noticed in 42% of cases; • financial difficulties; • unusually close association with a vendor or customer; • excessive control issues or unwillingness to share duties; • unusual irritability, suspiciousness, or defensiveness; • a general “wheeler-dealer” attitude involving shrewd or unscrupulous behavior; and • recent divorce or family problems. • Source: https://www.acfe.com/report-to-the- nations/2020/ • Red-flags 3-6 are more common in Pakistan environment. • Other red-flags less common globally but more relevant in Pakistan: • Complained about inadequate pay; • Refusal to take vacations; • Excessive pressure from within organization; • Complained about lack of authority; Facts about fraud – Profile of fraudsters from ACFE’s Report to the Nations 2020 (continued)
  • 24. • Primary responsibility for fraud prevention • Responsible for ensuring appropriate policies and procedures are implemented in the organization. • Developing and maintaining an adequate system of internal control as well as maintaining accounts, records, and books that accurately and fairly record and represent company transactions are statutory obligations. • COSO principle: The organization considers the potential for fraud in assessing risks to the achievement of objectives. Board and management
  • 25. • ISA 240: ‘The Auditor’s Responsibility To Consider Fraud in an Audit of Financial Statements’, an auditor conducting an audit in accordance with ISAs is responsible for obtaining reasonable assurance that the financial statements taken as a whole are free from material misstatement, whether caused by fraud or error. • In planning and performing the audit to reduce audit risk to an acceptably low level, the auditor should consider the risks of material misstatements in the financial statements due to fraud; if risk is high; involve expert. • Only two types of misstatements concern the auditor: misstatements resulting from fraudulent financial reporting and misstatements resulting from misappropriation of assets. • Due to significant inherent limitations in case of misstatement from fraud, particularly management fraud, auditor is responsible for maintaining professional skepticism throughout the audit, considering the potential for management override of controls. A subsequent discovery of fraud does not necessarily imply non-compliance with ISAs. • Auditor is expected to identify and assess the risks of material misstatement due to fraud and design procedures to detect such misstatement. • Source: https://www.ifac.org/system/files/downloads/2008_Auditing_Handbook_A080_ISA_240.pdf (please check for updates) External auditor
  • 26. • International Standards for the Professional Practice of Internal Auditing (IPPF Standards) require: • 1210.A2 – Internal auditors must have sufficient knowledge to evaluate the risk of fraud and the manner in which it is managed by the organization, but are not expected to have the expertise of a person whose primary responsibility is detecting and investigating fraud. • 2120.A2 The internal audit activity must evaluate the potential for the occurrence of fraud and how the organization manages fraud risk. • 2210.A2 – Internal auditors must consider the probability of significant errors, fraud, noncompliance, and other exposures when developing the engagement objectives. • Additionally other IPPF Standards also include fraud, including standards relating to role of internal audit in evaluating organization’s ethics and values. • Source: https://na.theiia.org/standards-guidance/public%20documents/ippf-standards-2017.pdf (please check for updates) Internal auditor
  • 27. • Consider fraud risks in the assessment of internal control design and determination of audit steps to perform. • Not expected to detect fraud; but expected to: • obtain reasonable assurance that business objectives achieved • material control deficiencies (intentional or erroneous) are detected • Have sufficient knowledge of fraud to identify red flags. • Characteristics; techniques; schemes and scenarios related to audit areas • Be alert to opportunities that could allow fraud, such as control deficiencies. • If significant control deficiencies are detected, additional tests should be conducted. • Evaluate whether fraud risk management program actively and completely implemented. • Evaluate fraud risk indicators and decide further action or commission investigation • Recommend investigation when appropriate. • Refer Handout 1. Internal auditor: Implementation of standards in audit engagements
  • 28. • Do not assume that management or employees are dishonest nor assume unquestioned honesty. • Inadequate professional skepticism often cited as a significant reason of non-detection of material fraud. • Only an adequate level of professional skepticism can actually question the implementation of the fraud risk management program. • Standards that allow internal auditors to exercise skepticism (please refer original standards for latest text): • IIA Standard 1111: Direct Interaction with the Board: • CAE must communicate and interact directly with the Board. • Standard 1120: Individual Objectivity • Internal auditors must have an impartial and unbiased attitude. • Audit Committee’s oversight and support helps the internal auditor maintain independence and objectivity as well as keep an attitude of skepticism. Internal auditor: Implementation of standards in audit engagements (Skepticism)
  • 29. • Relationship with board includes both reporting and oversight. • CAE may include following in discussions with Board: • Fraud audits performed • Fraud risk assessment process • Fraud or conflicts of interests and results of monitoring programs concerning compliance with law, code of conduct and/or ethics. • IA organizational structure to address fraud • Coordination of fraud audit activity with external audiotrs • Overall assessment of control environment • Productivity and budgetary measures of IA’s fraud activities • Benchmarking comparisons of IA’s fraud activities with other organizations • Role of IA in fraud investigations. • Timing of communications of serious issues should be discussed in advance and documented. See next slide for illustration. Internal auditor: Implementation of standards in audit engagements (Communicating with Board)
  • 30. Internal auditor: Implementation of standards in audit engagements (Communicating with Board – Cont’d)
  • 31. • Evaluate risks faced by organizations based on audit plans with appropriate testing. • Be alert to signs and possibilities of fraud within an organization. • In comparison with external auditors, internal auditors are in better position to detect the symptoms that accompany fraud. This leverage is owing to: • Continual presence in the organization, resulting in better understanding of organization and its controls • Ability to assist in the deterrence of fraud by examining and evaluating the adequacy and the effectiveness of internal controls. • Ability to assist in establishing effective fraud prevention measures and providing consulting expertise. Internal auditor: Role as per Practice Guide
  • 32. • If in relation to fraud risk management, internal auditors’ role are assigned the following roles, they should obtain sufficient skills and competencies, including knowledge of fraud schemes, investigation techniques and laws: • Initial or full investigation of suspected fraud • Root cause analysis and control improvement recommendations • Monitoring of a reporting/whistleblower hotline • Providing ethics training sessions • Internal auditors can perform proactive auditing techniques such as data mining, analytics and other procedures to find unusual items and perform detailed analyses of high-risk accounts. • The Practice Guide distinguishes an Internal Auditor from a Fraud Investigator. Internal auditor: Role as per Practice Guide (cont’d)
  • 34. • A fraud risk assessment (FRA) is often a critical component of an organization’s larger enterprise risk management program. • FRA is a tool to assist management and internal auditors to systematically identify where and how fraud may occur and who may be in a position to commit fraud. • FRA concentrates on fraud schemes and scenarios to determine presence of internal controls and whether or not the controls can be circumvented. • Not all fraud risks may be mitigated or eliminated, the cost vs. benefit equation needs to apply (Refer bank’s example of utility bill fraud). Fraud risk assessment
  • 35. Identify relevant fraud risk factors Identify potential fraud schemes and prioritize them based on risk. Map controls to fraud schemes and identify gaps Test operating effectiveness of fraud prevention and detection controls. Document and report the fraud risk assessment The Fraud Risk Assessment Process Brainstorming stage Assessment stage Refer Handouts 2 and 2a.
  • 37. • Prevention and detection are not the same. • Fraud prevention entails: • Implementing policies and procedures • Employee trainings • Management communication to educate about fraudulent activities. • Fraud detection entails: • Activities and programs designed to identify fraud or misconduct • See next slide for interrelationship of the two. Fraud prevention and detection
  • 38. Fraud prevention and detection (Source: IIA)
  • 39. • Remember: • Risk of fraud can never be eliminated. • It is not cost-effective to try to eliminate all fraud risk. • Some overarching considerations: • Strong ethical corporate culture • Training and education • Strong policies and procedures to implement and monitor internal controls • Procedures to detect fraud risk indicators on a timely basis to investigate fraud • Prosecution when appropriate. Fraud prevention and detection (cont’d)
  • 40. Training Fraud reporting mechanism Tone at the top / Code of conduct Internal audit / Surprise audit Data mining (proactively looking for anomalies) Anti-fraud controls •Segregation of duties •Safeguard of assets •Management authorization and review •Job rotation •Mandatory vacation •Background checks / Due diligence Disciplinary actions Anti-fraud better practices
  • 41. Visible and rigorous fraud governance process Effective fraud control processes and procedures Periodic Fraud Risk Assessment Swift allegation response and appropriate action against wrong-doers Attributes of a deterrence creating FRM process Fraud risk management
  • 42. • Fraud prevention involves those actions taken: • to discourage the commission of fraud and • limit fraud exposure when it occurs. • Instilling a strong ethical culture and setting the correct tone at the top are essential elements in preventing fraud. • Strong principal mechanism for preventing fraud is effective and efficient internal controls, including controls related to screening customers, vendors, and external business relationship partners. • COSO presented a framework for assessing and improving internal control systems to fight fraud. Fraud prevention
  • 43. Control environment • Code of conduct, ethics policy, fraud policy to set tone at the top. • Hotline programs • Hiring and promotion guidelines and practices • Oversight by AC, Board or other. Risk assessment • Establishing a FRA process that considers fraud risk factors and fraud schemes • Involving appropriate personnel • Performing FRA on regular basis. Control activities • Policies and procedures • Appropriate authority limits • Segregation of incompatible duties. Information and communication • Promoting FRM program and position on fraud risk both internally and externally through corporate communications program • Fraud awareness training • Confirmation of policies and their compliance. Monitoring • Providing periodic evaluation of anti- fraud controls. • Independent evaluation of fraud risk management program by internal auditors or experts. • Implementing tech to aid in continuous monitoring and detection. Fraud prevention
  • 44. • Detective controls are designed to provide warnings or evidence that fraud is occurring or has occurred. • Fraud detection methods need to be flexible, adaptable and continuously changing to meet the changes in the risk environment. • Detective controls may not be as apparent or readily identifiable as preventive controls. • Organizations often rely on employees to report suspicious activity through an anonymous whistleblower hotline. An effective way for an organization to learn about existing fraud is to provide employees, suppliers, and other stakeholders with a variety of methods for reporting their concerns about illegal or unethical behaviour. Fraud detection
  • 45. • Code of conduct confirmation: Employees can be asked to report known violations as part of sign- offs • Whistleblower hotline: Most effective; must allow anonymity option. • Exit interviews: In addition to helping in identifying fraud schemes, exit interviews of terminated or resigning employees can highlight management integrity issues which may provide conditions conducive to fraud. • Proactive employee survey: to solicit knowledge of fraud and unethical behaviour within the organization. Again, anonymity should be ensured. Fraud detection (ways to collect information)
  • 46. • Surprise audits in high fraud risk areas: Could be by internal auditors, external auditors, management or external experts. • Continuous monitoring: of critical data and related trends to identify unusual situations or variances. • Routine and/or ad hoc matching of public data and/or proprietary data: against relevant transactions, vendor lists, employee rosters, and other data. Fraud detection (other methods)
  • 47. BRAINSTORMING PLANNING COLLECTION EVIDENCE GATHERING THROUGH ANALYSIS REPORTING AND CLOSURE Fraud audit / Investigation process
  • 48. • A fraud investigator needs solid business operations insight as well as accounting expertise. • In fraud investigations, perpetrator's identity is often suspected / known. The job of the fraud auditor is to prove that the perpetrator's actions resulted in fraud. • There usually are no transaction trails for the actual activity perpetrated (no smoking guns) and clues to fraud cases usually come from small, seemingly insignificant inconsistencies in records, data, suspect's speech or actions. Key points
  • 49. • Fraud investigator needs to gather and analyze necessary evidence required by a management and/or legal authorities to determine the facts and circumstances surrounding the fraud / suspected fraud. The investigation may include legal advisors. • A fraud investigation seeks to answer the following questions: • Who did it? • Why did he/she did it? • How did they gain from the fraud? What assets were taken and how were they converted into benefits? • How, when and where was the fraud perpetrated and concealed? • What is the extent of losses? • Were any laws broken? Objective of fraud investigation
  • 50. Brainstorming • Identify parties, investigation parameters and risks as input to the plan. Planning: • Thorough planning determines focus and helps manage the investigation Collection phase: • Information gathering in a forensically sound manner Evidence gathering through analyses: • issue-tailored analyses performed to obtain evidence Reporting and closure: • Reporting of findings The Fraud Audit / Investigation Process Problem recognition and definition Refine and amend hypothesis Analyze data; create and test hypothesis
  • 51. • Objective: • To identify relevant parties, • Understand and confirm scope, and • Initiate the investigation based on initial understanding. • Refer Handout 3 for details Brainstorming
  • 52. • Planning is essential to help ensure that the investigation has clear objectives and that the strategy aligns with the objectives. Investigations, by nature, can grow rapidly and lead an investigation team in many directions - therefore it is important that each step in the investigation process is properly considered in terms of what is going to be completed and what will be achieved. • Planning enables the investigation team to answer critical questions: • What are the engagement’s objectives? • What are the fraud hypotheses which are to be tested? • What is the engagement strategy (i.e., what actions must be taken to achieve the objectives)? • What is the progress towards achieving our objectives during the engagement? • Have we achieved our objectives at the conclusion of the engagement? • What other service providers may we be working with on this engagement (e.g., Counsel, discovery service providers, etc.) and have we defined the roles and responsibilities of each party (and evaluated related direct and indirect marketplace business relationships)? • The work plan needs to be cognizant of specific jurisdictional issues, as well as specific limitations or requirements that are unique to the area. • Consider Forensic Accounting and Benford Analysis. Forensic accounting is the application of investigative and analytical skills for the purpose of resolving financial issues in a manner that meets standards required by courts of law. • Refer Handout 4 for details Planning
  • 53. • Establish project management • Identify and obtain necessary skills and resources • Use of non-forensic professionals • Manage data preservation and retention • Communication Planning
  • 54. “A poorly planned project will take three times longer than the original plan. A well- planned project will only take twice as long.” - ANONYMOUS; on a lighter note!
  • 55. • Objective: To assemble relevant evidence in order to focus the investigation, and readily identify issues with respect to information gathering. • Refer handout for details Collection phase Electronic information Physical information Human information
  • 56. • Consider Chain of Custody • According to ACFE Fraud Examiner’s Manual, the Chain of custody is both a process and a document that memorializes: • Who has had possession of an object and • What they have done with it It is simply a means of establishing that there has not been a material change or alteration to a piece of evidence. Collection phase Other parties Investigation team Investigation team main liaison Departmental liaison for investigation Archive custodian Departmental custodian Originator of information
  • 57. • Collect third party information Collection phase Publicly available information Government sources Social media Surface web
  • 58. BASIC EQUIPMENT EXAMPLE OF EVIDENCE Some forensic lab snapshots
  • 59. EXAMINATION TOOLS EVIDENCE BAGS Some forensic lab snapshots
  • 60. Triangulation of information Evaluation for forensic soundness Manipulate information for triangulation Triangulate information for analysis Financial analysis Non- financial analysis Evaluate work performed and findings identified Information (data) anlayses Evidence gathering through analysis Refer Handout for details
  • 61. Additional forensic lab snapshots (analysis)
  • 62. Additional forensic lab snapshots (analysis)
  • 63. • Consider government, regulator and/or other third party requirements. • Prepare for potential litigation • Perform RCA, if required • Follow project closure protocols Reporting and closure
  • 64. • Fraud investigator gather and analyze the necessary evidence required by management and legal authorities. • Fraud investigator answers the questions like extent of fraud and monetary value, when & where the fraud take place along with violation of specific laws. • Fraud investigations follow a sequence of activities that initiate with brainstorming and planning, follow through with information collection and analysis and concludes with identification of findings and giving recommendations. • The process can be iterative and may lead to additional findings. • The information collected and used need to be obtained, stored and released based on strict traceable protocols to ensure the report withstands scrutiny Investigation process Wrap-up
  • 65. • After fraud investigation and communication, management and internal audit should step back and consider lessons learned: • How did the fraud occur? • What controls failed? • What controls were overridden? • Why wasn’t the fraud detected earlier? • What red flags were missed by management? • What red flags did internal audit miss? • How can future frauds be prevented or more easily detected? • What controls need strengthening? • What internal audit plans and audit steps need to be enhanced? • What additional training is needed? Analysis of lessons learned (Source: IIA)
  • 67. Admission-seeking stage Interview of suspect Confirmation phase Corroborative interviews with withnesses Interviews of co-conspirators Evidence-gathering phase Collection and evidence gathering through anlaysis (excl. human info) Preliminary observation drafting Corroborative or information seeking interviews with neutral persons Fraud interviews
  • 68. Types of communications Chronemic; use of time to convey meaning, attitudes and desires (respondent late in keeping appointments or delaying; potentially avoiding Proxemic; use of interpersonal space to convey meaning Paralinguistic; using volume, pitch and voice quality to convey meaning Kinetic; use of body movements to convey meaning Overarching considerations
  • 69. Preparation • Review case files • Have clear objectives • Determine order of interviews • Determine type of information expected to be received • Select a comfortable and secure venue • Select members of investigation team as interviewers • Formulate a brief outline of key points to discuss
  • 70. Types of questions • Introductory; used to provide intro, establish rapport, set theme and baselining behaviour; do not use sensitive questions or emotive words at this stage • Informational; used to gather unbiased facts; could be open, closed or leading; however, questioning should be general to specific • Closing; used to reconfirm facts gathered; see if additional information can be gathered; and to achieve a pleasant end to the process • Assessment; used to evaluate credibility • Admission seeking; only used for individuals whose culpability is reasonably certain; designed to obtain legal admission of wrongdoing; reasonable certainty is achieved when there is reasonable probability about the culpability of suspect and reasonable investigation steps already taken; convey absolute confidence with accusation, do not become a moral judge, be firm with empathy; offer a moral excuse; diffuse defenses.
  • 71. Mechanics and other considerations • Do not react to difficult persons or conversations • Prepare the room appropriately; privacy; door closed but not locked and easily reachable by interviewee; communicate that they’re free to leave anytime; keep interviewer chairs apart; interviewee should not be behind any physical barrier • At least two interviewers in an admission seeking interviews
  • 72. Things to cover in verbal confessions • Knowledge of action being wrong; demonstrating intent • Facts known only to perpetrator • Motive; may need to dig further • Facts about offense (timing, continuing or stopped, others involved, evidences, location of any assets misappropriated)
  • 73. Things to cover in signed confessions • Statement that the confession is voluntary • Intent • Facts about fraud (dates, amount of loss, instances, etc) • Willingness to cooperate • Confessor’s rationalization • Acknowledgement that confessor has read the statement • Truthfulness of the statement • Witness signatures (HR and/or Legal Counsel should be included) Consult your lawyer for your jurisdiction’s requirements with respect to confession statements.
  • 75. • Background • The background section is generally about two paragraphs. It should state very briefly why the fraud examination was conducted. • Executive Summary • In this section the reporter summarizes what actions were performed during the fraud investigation, such as reviewing documents, interrogating witnesses, conducting analyses or tests, etc. Doing so provides the reader with an overview of what was done during the examination process. At the end of this section, you should summarize the outcome of the examination. For example, “PKR 500,000 in checks was deposited into an account owned by YZ. When confronted with this information, Ya stated that he had only borrowed the money and meant to pay it back. Report writing
  • 76. • Scope • This section consists of just one paragraph explaining the scope of the fraud examination. For example, “Determine whether accounts receivables were manipulated in the books record,” or “Determine why cash inventory recorded is not matching with actual quantity in the warehouse. • Approach and methodology • This section gives a brief description of the following items: • Fraud examination team members • Procedures performed (generally what documents were reviewed or what tests were conducted) • Individuals interviewed • Any limitations • It provides a handy reference as to who was involved in the fraud examination, what the team reviewed, what tests or analyses were conducted, and what individuals the team interviewed. Report writing (cont’d)
  • 77. • Findings • This section contains the details of the fraud examination. It will generally consist of several pages. In this section, you should describe what actions or duties the reporter performed and what was found. Provide enough detail so that the reader understands what occurred, but not so much detail that the reader begins to lose interest or becomes bogged down in the details. • The reader wants to know how many instances occurred, who was involved, how they did it, what proof you have, etc. If the findings section is long, you might use subheadings for particular topics or individuals to make it easier for the reader to stay organized. The information can be presented either chronologically or by topic— whatever makes it easier for the reader to follow. • Approach • This section should be one or two paragraphs and should briefly summarize the results of the fraud investigation. It should be similar to the outcome stated at the end of the Executive Summary section Report writing (cont’d)
  • 78. • Impact • This section consists of how the fraud impacted the overall business. The reporter can provide an estimate amount of loss or any other tangible or intangible damage suffered by the victim and also which might affect in future. • Recommendation • The organizations mainly look for the recommendations as they are willing to implement the changes. However, this section is optional. There might be instances where fraud investigator wish to discuss remedial measures or specific recommendations in a separate document. If investigator do wish to include this section, then should state what follow-up action is necessary or recommended, including remedial measures such as a review of internal controls, introduction of a whistle blower - hotline, increased security, etc. • Limitations and caveats • Standard caveats • Identify any matter outstanding Report writing (cont’d)
  • 79. • Opinions and conclusions: • Conclusions need to be self-evident, not requiring to be pointed out • Opinions regarding guilt or innocence are not allowed • Fraud examiner should not include any statement of opinion as to the integrity or veracity of any witness. • Refer IIA’s Practice Advisories on expression of opinion on internal control and other considerations. Report writing (cont’d)
  • 81. • Collection sensitivities; what can and cannot be examined • Labor laws sensitivities; will the investigation be challenged subsequently in the court? • Evidence admissibility; are there any conjecture in the report rather than facts? Are the facts sufficiently establishing beyond reasonable doubt the culpability of suspect? • Interviews; what is the admissibility of the interview process? • Disciplinary options in light of laws • Any statutory reporting responsibility? • Consult legal counsel throughout the process Legal considerations during investigations
  • 83. • Mobile devices • Personal data on official machines • BYOD • Cloud and network forensic • OSINT (external sources, public records, court records, property records, tax records, business filings with regulators); Social Catfish (or use programming skills to build your own VM) • WayBackMachine (notable mention!) • Privacy issues when collecting social media; best practices (screen capture; print; PDF etc.) • Email headers Nuances of modern fraud investigations
  • 85. Financial services sector • Islamic bank private lending scheme • Large commercial bank trade finance fraud investigation • Microfinance bank (investigations; methodology; AML/CFT) • AMC – Fraud against customers • SWIFT fraud • Service provider to large commercial bank making improper arrangements Government and WorldBank • Review of program with branchless banking nuances • Pakistan Railways (draft) Selected investigations
  • 86. Tech / Startup: • Investigation of procurement fraud • Staff’s Anti-Corruption due diligence Pharma • Frauds in Hardship cases • Vaccine fraud • Compliance audit of distributors • ABAC DD • Medical devices company distributor FCPA NPO • Forensic of Pakistan operations • Afghanistan foreign government charity (Head investigation; Ops investigation) Selected investigations
  • 87. HNW fraud • Trading PPP platform scam Oil and gas • Foreign company investigation of conflict of interest FMCG • ABAC / FCPA DD • Trust fraud Hospitality • Multinational fast-food chain; senior management fraud Selected investigations
  • 88. FRAUD INVESTIGATIONS INTERNAL AUDITING AND FRAUD Suggested supplementary readings Jul-Sep 2014 Published Oct 2014
  • 89. Become certified, get access to leading resources and part of an expert community of fraud fighters around the globe. Stay away from ‘Diploma Mills’!