SlideShare une entreprise Scribd logo
1  sur  25
Bank Fraud & Data ForensicsBank Taxation & Risk Management ForumsNovember 16, 2010 – South Portland, MaineNovember 17, 2010 – Concord, New HampshirePresented By:Bill Brown, CPA, CFFA, CFE Eigen Heald, MsIA, CISSP, GCFATodd Desjardins, CPA, CFE
Overview Introduction Fraud Considerations for Banks Computer Fraud and Data Forensics Questions and Discussion
Terms and Definitions Fraud Fraud investigation Forensics Forensic accounting Digital forensics
Reference Statistics in this presentation, unless otherwise noted, are from: The Report to the Nations - 2010 Global Fraud Study  Study of 1,843 cases of occupational fraud published by the Association of Certified Fraud Examiners
Small Businesses are Vulnerable 42.1% $231,000 30.8% $155,000 28.7% 26.1%
Banks Have More than their Fair Share
Other Disturbing Statistics Median Losses Tenure of perpetrator Less than one year – $47,000 10 years of more – $289,000 Education of perpetrator High School Graduate – $100,000 Postgraduate Degree - $300,000
Other Disturbing Statistics Percentage of Cases Reported Department of Perpetrator Accounting – highest – 22.0% Internal Audit – lowest - 0.2% Median Duration of Fraud Schemes Overall – 18 months Check tampering – 24 months Expense reimbursements – 24 months
Risk Factors Financial Misstatement Fraud Complexity Perverse Incentives Highly Subjective Valuation Asset Misappropriation Complexity Inherent Lack of Accountability Personal Trust
Types of Fraud	 External vs. Internal Fraud ,[object Object]
 Internal – fraud is committed by bank personnel,[object Object]
Mortgage fraud (material misrepresentation or omission)
Check fraud (forgery, check kiting, altered checks),[object Object]
Financial Statement Fraud Asset/Revenue overstatement Improper asset valuations Timing differences Concealed liabilities and expenses Improper disclosures
Asset Misappropriation Unauthorized transfers/disbursements Payroll schemes Ghost employees Expense reimbursement schemes Theft of portable fixed assets Others…
Fraud Triangle
Preventing and Deterring Fraud Prevention and Deterrence Perceived opportunity is the aspect of the fraud triangle that is most controlled by employers. ,[object Object],Review access rights on a consistent and periodic basis Limit access to employee accounts (both solely owned or jointly owned) Review employee account activity and teller activity Dual control over wire transfers Review of payroll change reports by someone independent of the payroll function
Preventing and Deterring Fraud (Continued) The list continues… Robust review of suspense/clearing account activity – be certain the reconciliation makes sense and items are clearing timely and properly Implement a fraud reporting mechanism that is anonymous Maintain professional skepticism Attitude and rationalization can be improved within companies by strong “tone at the top” and employee appreciation efforts
Preventing and Deterring Fraud (Continued) Best practice is to have a fraud risk management program in place ,[object Object]
Identify significant risk areas (multiple locations, business segments, etc.)
How is the importance of ethical behavior and appropriate business practices communicated?
What could go wrong?,[object Object]
Common Sources for Accounting & Digital Forensics  Corporate investigations •  Civil litigation •  Attorneys •  State Courts •  Private Investigations •  Individuals
Similar Procedures: Discovery •  Timelines •  Parties involved •  Evidence gathering •  Reporting/testimony Consider: Most fraud is committed with a computer!
Digital Objects Used for Review ,[object Object]

Contenu connexe

Tendances

Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
complianceonline123
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION
Joseph Callahan
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
DecosimoCPAs
 

Tendances (20)

Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Fraud Analytics
Fraud AnalyticsFraud Analytics
Fraud Analytics
 
1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Fraud embezzlement
Fraud embezzlementFraud embezzlement
Fraud embezzlement
 
Bank frauds vk (2)
Bank frauds vk (2)Bank frauds vk (2)
Bank frauds vk (2)
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Show
 
Preventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksPreventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banks
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 

En vedette

Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
M Suburban Train Ticket System
M Suburban Train Ticket SystemM Suburban Train Ticket System
M Suburban Train Ticket System
kalpesh1908
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
Venktesh Venke
 
1 project cash flow
1 project cash flow1 project cash flow
1 project cash flow
Bhumit Patel
 
Purchasing, Receiving, and Storing Food continuation
Purchasing, Receiving, and Storing Food continuationPurchasing, Receiving, and Storing Food continuation
Purchasing, Receiving, and Storing Food continuation
Thannia Sabado
 

En vedette (20)

Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Who's Calling? Recognize and Report Phone Fraud
Who's Calling? Recognize and Report Phone FraudWho's Calling? Recognize and Report Phone Fraud
Who's Calling? Recognize and Report Phone Fraud
 
Gain Confidence: Introduction to Financial Statement Analysis
Gain Confidence: Introduction to Financial Statement AnalysisGain Confidence: Introduction to Financial Statement Analysis
Gain Confidence: Introduction to Financial Statement Analysis
 
M Suburban Train Ticket System
M Suburban Train Ticket SystemM Suburban Train Ticket System
M Suburban Train Ticket System
 
Ipo scam 2005 yes bank
Ipo scam 2005 yes bankIpo scam 2005 yes bank
Ipo scam 2005 yes bank
 
Yes bank IPO scam
Yes bank IPO scamYes bank IPO scam
Yes bank IPO scam
 
Deposit Taking Companies in India- Nidhi Company, REITs, CIS, Multistate Cre...
Deposit Taking Companies in India- Nidhi Company,  REITs, CIS, Multistate Cre...Deposit Taking Companies in India- Nidhi Company,  REITs, CIS, Multistate Cre...
Deposit Taking Companies in India- Nidhi Company, REITs, CIS, Multistate Cre...
 
SEBI with Subrato Roy Case
SEBI with Subrato Roy CaseSEBI with Subrato Roy Case
SEBI with Subrato Roy Case
 
Managing Cash Flows On Construction Projects
Managing Cash Flows On Construction ProjectsManaging Cash Flows On Construction Projects
Managing Cash Flows On Construction Projects
 
Registration of MicroFinance Institutions in india
Registration of MicroFinance Institutions in indiaRegistration of MicroFinance Institutions in india
Registration of MicroFinance Institutions in india
 
PM Unit III - Project Cash Flows
PM   Unit III - Project Cash FlowsPM   Unit III - Project Cash Flows
PM Unit III - Project Cash Flows
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Project cash flow
Project cash flowProject cash flow
Project cash flow
 
1 project cash flow
1 project cash flow1 project cash flow
1 project cash flow
 
Budgetary Procedures
Budgetary ProceduresBudgetary Procedures
Budgetary Procedures
 
Budget planning and management
Budget planning and managementBudget planning and management
Budget planning and management
 
Estimation of Cash Flow
Estimation of Cash FlowEstimation of Cash Flow
Estimation of Cash Flow
 
Purchasing, Receiving, and Storing Food continuation
Purchasing, Receiving, and Storing Food continuationPurchasing, Receiving, and Storing Food continuation
Purchasing, Receiving, and Storing Food continuation
 
The philippine budgetary process
The philippine budgetary processThe philippine budgetary process
The philippine budgetary process
 

Similaire à Bank Fraud & Data Forensics

Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
mherr_riskconsult
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Vivastream
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Vivastream
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Vivastream
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 

Similaire à Bank Fraud & Data Forensics (20)

Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
Kenya AMC Presentation 1
Kenya AMC Presentation 1Kenya AMC Presentation 1
Kenya AMC Presentation 1
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Money Laundering
Money Laundering Money Laundering
Money Laundering
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Best practices in conducting Financial Investigations
Best practices in conducting Financial InvestigationsBest practices in conducting Financial Investigations
Best practices in conducting Financial Investigations
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 

Bank Fraud & Data Forensics

  • 1. Bank Fraud & Data ForensicsBank Taxation & Risk Management ForumsNovember 16, 2010 – South Portland, MaineNovember 17, 2010 – Concord, New HampshirePresented By:Bill Brown, CPA, CFFA, CFE Eigen Heald, MsIA, CISSP, GCFATodd Desjardins, CPA, CFE
  • 2. Overview Introduction Fraud Considerations for Banks Computer Fraud and Data Forensics Questions and Discussion
  • 3. Terms and Definitions Fraud Fraud investigation Forensics Forensic accounting Digital forensics
  • 4. Reference Statistics in this presentation, unless otherwise noted, are from: The Report to the Nations - 2010 Global Fraud Study Study of 1,843 cases of occupational fraud published by the Association of Certified Fraud Examiners
  • 5. Small Businesses are Vulnerable 42.1% $231,000 30.8% $155,000 28.7% 26.1%
  • 6. Banks Have More than their Fair Share
  • 7. Other Disturbing Statistics Median Losses Tenure of perpetrator Less than one year – $47,000 10 years of more – $289,000 Education of perpetrator High School Graduate – $100,000 Postgraduate Degree - $300,000
  • 8. Other Disturbing Statistics Percentage of Cases Reported Department of Perpetrator Accounting – highest – 22.0% Internal Audit – lowest - 0.2% Median Duration of Fraud Schemes Overall – 18 months Check tampering – 24 months Expense reimbursements – 24 months
  • 9. Risk Factors Financial Misstatement Fraud Complexity Perverse Incentives Highly Subjective Valuation Asset Misappropriation Complexity Inherent Lack of Accountability Personal Trust
  • 10.
  • 11.
  • 12. Mortgage fraud (material misrepresentation or omission)
  • 13.
  • 14. Financial Statement Fraud Asset/Revenue overstatement Improper asset valuations Timing differences Concealed liabilities and expenses Improper disclosures
  • 15. Asset Misappropriation Unauthorized transfers/disbursements Payroll schemes Ghost employees Expense reimbursement schemes Theft of portable fixed assets Others…
  • 17.
  • 18. Preventing and Deterring Fraud (Continued) The list continues… Robust review of suspense/clearing account activity – be certain the reconciliation makes sense and items are clearing timely and properly Implement a fraud reporting mechanism that is anonymous Maintain professional skepticism Attitude and rationalization can be improved within companies by strong “tone at the top” and employee appreciation efforts
  • 19.
  • 20. Identify significant risk areas (multiple locations, business segments, etc.)
  • 21. How is the importance of ethical behavior and appropriate business practices communicated?
  • 22.
  • 23. Common Sources for Accounting & Digital Forensics Corporate investigations • Civil litigation • Attorneys • State Courts • Private Investigations • Individuals
  • 24. Similar Procedures: Discovery • Timelines • Parties involved • Evidence gathering • Reporting/testimony Consider: Most fraud is committed with a computer!
  • 25.
  • 26.
  • 31.
  • 33. Transfer of files to storage devices
  • 34. Links to documents on the networkExamining user profiles Malware identification
  • 35. How Did Digital Discovery Help? Identifying network activities Email Review Internet activities Identifying collaborators Ruling out other avenues of fraud Identifying motivations for fraud
  • 36. Contact Information Bill Brown bbrown@bdmp.com Eigen Heald eheald@bdmp.com Todd Desjardins tdesjardins@bdmp.com