Fraud Investigations & Detection George Jordan : Manager – Forensic Accounting Services Tele: 832-320-3441

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Approaches to Fraud Prevention Bill Brown: Partner – Forensic & Litigation Services Tel:
Crimes Against Property. Arson  Willful and malicious burning of another person’s property.  It’s a crime to burn a building, even by the owner.
$ FINANCIAL CRIMES $ for Police Detectives NYC Elder Abuse Training Project.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
THEFT AND EMBEZZLEMENT M. Reid California Criminal Law Concepts Chapter 16 1.
Forgery, Fraud, and Crimes Against the Public Mr. Whitaker.
Financial Exploitation For Court Officials NYC Elder Abuse Training Project.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Crimes Against Property Copyright, 2000 Charles L. Feer.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
 Habitation – something designed to sleep in  Building – any structure or enclosure intended for use  Vehicle – a device used to move people or property.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
4 Jo Anne Bernal El Paso County Attorneywww.epcounty.com/CA/ HOT CHECK SEMINAR.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Elements of Crime and Categories of Punishment
Tampering With A Governmental Document Local Government Seminar January 29, 2015 Presented by: Akilah Mance, Associate.
BELL QUIZ ON CHAPTER 5 What is any agreement that is enforceable by law? There are six elements of a contract. Name TWO. How many promises does a bilateral.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Checks The check is used more than any other instrument of credit as a means of making payment,
Types of Violent Crime:. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. 2 Copyright.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Approaches to Fraud Prevention Bill Brown: Partner – Forensic & Litigation Services Tel:
TYPES OF VIOLENT CRIMES Miscellaneous. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission.
Pre-Learning Question
FINANCIAL ELDER ABUSE IN REAL ESTATE TRANSACTIONS September, 2012 By: Kelly L. Greenwood Burchells LLP Barristers & Solicitors.
Identity Theft Insurance Charles P. Orlowicz November CAS Annual Meeting – Session CS04 A division of the property and casualty subsidiaries.
Winter Conference February 2, Dealing with the Ugly Face of Fraud Holly Frook Graham, CPA, CFE Arizona Office of the Auditor General.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Crime & Malpractice AS Module Heathcote Ch. 10.
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
Chapter 10: Crimes Against Property
CJ 125 UNIT TWO SKIMMING AND LARCENY. REVIEW THREE MAJOR CATEGORIES OF FRAUD WHAT ARE THEY?
Crime Prevention Part I CHECKS & CREDIT CARDS © ©TCLEOSE Course #2101 Crime Prevention Part I Curriculum is the intellectual property of TxSSC-ICJS (2010)
Copyright ©2006 by the Association of Certified Fraud Examiners, Inc. 1.
Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. 2 Copyright © Texas Education.
STATE OF GEORGIA OFFICE OF INSPECTOR GENERAL Fraud Risk Within State Government.
Forensic Science: Fundamentals & Investigations, Chapter 10 1 Introduction Document analysts examine and compare questioned documents with known material.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Cybercrime What is it, what does it cost, & how is it regulated?
Bell Ringer What is fraud? What is an innocent misrepresentation? Did anyone do anything fun over break?
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Unit Five Criminal and Juvenile Justice Unit Five Crimes are made up of certain elements –The conditions that make up a crime ie Robbery –Taking of goods.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Banking and Checking Accounts Instructor: xxxx. Objectives Our objectives are to… Explain the importance of having a bank account. Examine the different.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
Occupational FRAUD in the Governmental Sector Ronny Daigle, PhD, CPA (AL), CFE, CGMA Professor of Accounting
Crimes Against Property Chapter 10. Arson and Vandalism Malicious burning of property Crime whether you own building or not May lead to other more, serious.
Elder Fraud Kaitlyn Flanagan. What Is Fraud? Fraud : A false representation of a matter of fact—whether by words or by conduct, by false or misleading.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Protecting Your Credit Identity
BY: NASUMBA KIZITO KWATUKHA
Connections Abuse Prevention Plan 2018.
Presentation transcript:

Fraud Investigations & Detection George Jordan : Manager – Forensic Accounting Services Tele:

The Smell Test Forensic accounting services generally involve the application of specialized knowledge and investigative skills possessed by CPAs to collect, analyze, and evaluate evidential matter and to interpret and communicate findings in the courtroom, boardroom or other legal/administrative venue. Source: aicpa.org

The “Onion” Theory

Crook(s) use the “Onion” Theory to plan scheme Fraudulent audit evidence is “layered”, like onion As the auditor “peels” off one layer of audit evidence, the crook(s) makes sure another “layer” is readily available

Nature of Fraud Intentional Act vs. Error or Mistake Ingenious schemes, limited only by human imagination Gaining advantage through false suggestions and suppression of truth By using surprise, trick or cunning, or any other unfair means

©2012 Association of Certified Fraud Examiners, Inc.6 The typical organization loses an estimated 5% of its annual revenues to occupational fraud. The Cost of Occupational Fraud

©2012 Association of Certified Fraud Examiners, Inc.8 Initial Detection of Occupational Frauds

Perpetrators ©2012 Association of Certified Fraud Examiners, Inc.9

10 Recovery of Victim Organization’s Losses

Problems Dealing with Fraud

No Accident Fraud is an “intentional” act, often involving detailed planning and concealment Crooks “anticipate” the routine procedures, evidence is often fabricated Exploits weaknesses in routine procedures or internal controls Breach of trust

Fraud Engineering Fraudulent schemes are “engineered” (meticulously designed) to perpetrate and conceal the theft, including an exit strategy complete with “fall guys” and “alibis”

Intent Derived in large part from testimonial evidence/interviewing process Difficult to prove because of the very nature of fraudulent conduct…and bad actors are generally reluctant to admit wrong doing!

Fraud in Public Sector Anticipated funding cuts place added pressure on Public Sector Entities to find and “deter” fraud. Fraud “robs” Public Sector Entities of precious, limited resources. Expect heightened public scrutiny

Detection/Solutions

Goal of an Anti-fraud program Cost vs. Benefit You can’t completely prevent fraud. Anti-fraud program should be aimed at reducing the likelihood that if fraud occurs, it will not go undetected for an unreasonable amount of time.

Things to Look For Lifestyle changes Financial duress Vendor relationships/patterns Smell Test

Lifestyle Changes Spending habits: people generally spend what they steal. The more they steal, the more they spend. Fraud almost always starts small and grows. Behavioral changes: look for signs of drug abuse, gambling or other patterns (dress, work habits, or attitude toward others)

Keep an Eye on Vendors Examine/Monitor Vendors – Identify unusual patterns (ie recurring, even amounts) – Verify physical address (vs. employee addresses) – Examine cancelled checks (counter signatures) – Web search for derogatory information – Verify receipt of goods or services

Smell Test Sometimes “things” just don’t seem right. The Smell Test is based on a hunch, feeling or instinct.

Hotline - Tip The most effective crime detection devise is the Hotline. Expands your view to all the “eyes” in your organization. Cost effective Provides a vehicle for honest employees to contribute to the well being of the school

FRAUD ISSUES Texas crimes are primarily contained in Statutes Texas Statutes Texas Penal Code (Covers most criminal conduct)

Texas Criminal Statutes Criminal Statutes Impacting Government – Theft (31.03) – Misapplication of Fiduciary Property (32.45) – Forgery (32.21) – Tampering with Governmental Record (37.10) – Credit Card or Debit Card Abuse (32.31) – Fraudulent Use or Possession of Identifying Info (32.51) – Engaging in Organized Criminal Activity (71.02)

Punishment Ladder Texas Criminal Statutes Crime LevelMinimumMaximumFineConfinement Class C Misdemeanor$0.00$19.99$500None Class B Misdemeanor$20.00$499.99$2,000Up to 180 Days County Class A Misdemeanor$500.00$1,499.99$4,000Up to 1 Year County State Jail Felony$1,500.00$19,999.99$10, – 2 Years SJF 3 rd Degree Felony$20,000.00$99,999.99$10,0002 Years – 10 Years TDC 2 nd Degree Felony$100,000.00$199,999.99$10,0002 Years – 20 Years TDC 1 st Degree Felony$200, $10,0005 Years – Life TDC

Theft (32.03) Elements – Unlawfully appropriates property with intent to deprive owner of property – Unlawfully appropriates means: Without owner's consent; OR Property is stolen AND actor appropriates knowing it was stolen; OR Police represents as stolen AND actor appropriates believing it was stolen. – Intent to Deprive means to: Withhold permanently, OR Withhold for so long major value/enjoyment is lost; OR Restore property only upon reward/compensation; OR Dispose of property making recovery unlikely. Punishment – – Value Ladder – Increased if Public Servant or Non-Profit – 2 nd Degree Felony if under $200,000 AND from an ATM – Other increases for Copper, Livestock, etc. Texas Criminal Statutes

Punishment Ladder (Public Servant/Non-Profit) Texas Criminal Statutes Crime LevelMinimumMaximumFineConfinement Class B Misdemeanor$0.00$19.99$2,000Up to 180 Days County Class A Misdemeanor$20.00$499.99$4,000Up to 1 Year County State Jail Felony$500.00$1,499.99$10, – 2 Years SJF 3 rd Degree Felony$1,500.00$19,999.99$10,0002 Years – 10 Years TDC 2 nd Degree Felony$20,000.00$99,999.99$10,0002 Years – 20 Years TDC 1 st Degree Felony$100, $10,0005 Years – Life TDC

Misapplication Fiduciary Property /Financial Instit.(32.45) Elements – Intentionally, knowingly, OR recklessly, – Misapplies Property, – That he/she holds as a fiduciary OR property of a financial institution, – In a manner that involves substantial risk of loss, – Either to owner, OR to a person for whose benefit the property is held. Texas Criminal Statutes

Misapplication Fiduciary Property /Financial Instit.(32.45) Elements – Intentionally, knowingly, OR recklessly, – Misapplies Property (aka deal with property contrary to), an agreement concerning the property, OR a law prescribing custody/disposition of the property. – That he/she holds as a fiduciary OR property of a financial institution, – In a manner that involves substantial risk of loss, – Either to owner, OR to whose benefit property is held. Texas Criminal Statutes

Misapplication Fiduciary Property /Financial Instit.(32.45) Elements – Intentionally, knowingly, OR recklessly, – Misapplies Property (aka deal with property contrary to), an agreement concerning the property, OR a law prescribing custody/disposition of the property. – That he/she holds as a fiduciary OR property of a financial institution, Trustee/guardian/executor/conservator/receiver Attorney/agent under durable power of attorney Person acting as fiduciary - NO commercial bailee Agent acting on behalf of fiduciary – In a manner that involves substantial risk of loss, – Either to owner, OR to whose benefit property is held. Punishment - Value Ladder Texas Criminal Statutes

Forgery (32.21) Elements – Forges – A Writing – With intent to Defraud or Harm Another Texas Criminal Statutes

Forgery (32.21) Elements – Forges Alter, make, execute, or authenticate any writing so that it purports, OR – Act of another who did not authorize, OR – Executed at time/place or in sequence other than the case, OR – Copy of original when no original existed Issue, publish, or otherwise utter writing that is forged, OR Possess writing that is forged with intent to utter – A Writing Printing or any other method of recording information; OR money, coin, token, stamp, seal, credit card, badge, & trademark; OR symbols of value, right, privilege, or identification. – With intent to Defraud or Harm Another Texas Criminal Statutes

Forgery (32.21) (Continued) Punishment – Class A Misdemeanor – State Jail Felony (Credit Card, Check, Security Agreement, Mortgage, etc) – 3 rd Degree Felony (Stock, Bonds) – Increased again if against Elderly Person Texas Criminal Statutes

Tampering with Governmental Record (37.10) Elements – Knowingly makes false entry in / false alteration of GR (GR) – Makes, presents, or uses any record, document, or thing with knowledge of its falsity and with intent that it be taken as a genuine GR – Intentionally destroys, conceals, removes, or otherwise impairs the verity, legibility, or availability of a GR; – Possesses, sells, or offers to sell a GR or a blank GR form with intent that it be used unlawfully; – Makes, presents, or uses a GR with knowledge of its falsity; or – Possesses, sells, or offers to sell a GR or a blank GR form with knowledge that it was obtained unlawfully. Punishment – – Value Ladder Texas Criminal Statutes

Tampering with Governmental Record (37.10) Punishment – Generally a Class A Misdemeanor, but – If Intent is to defraud or harm another is a State Jail Felony, but – Public School Record or Assessment Instrument under Chapter 39 Educ Code 3 rd Degree Felony, but If Intent is to defraud or harm another is a 2 nd Degree Felony, but Class C misdemeanor if GR that is required for enrollment of a student in a school district and was used by the actor to establish the residency of the student. Intent – Is presumed to intend to defraud or harm another if the person: acts with respect to two or more of the same type, or blank GR forms, and if each GR or blank GR form is a license, certificate, permit, seal, title, or similar document issued by government. Texas Criminal Statutes

Credit Card or Debit Card Abuse (32.31) Elements – Presents Uses a Credit Card or Debit Card (CC/DB) Not Issued to him AND Not with Consent of Owner, OR CC/DB is Expired/Revoked/Cancelled AND Knows it – Steals CC/DB OR Receives CC/DB if knows it is stolen and plans to use it – Sells CC/DB if not Issuer – Buys CC/DB from person knows is not Issuer – Possesses CC/DB (Not his & No Consent & Intends to Use) – Possesses 2+ incomplete CCs/DBs (Not his & No Consent & Intends to Use) – Provides Goods/Services if knows CC/DB Stolen – Lies about Providing Goods/Services in writing Punishment – State Jail Felony OR – 3 rd Degree if Elderly Person Texas Criminal Statutes

Fraudulent Use or Possession of Identifying Info.(32.51) Elements – With the intent to harm or defraud another, – Obtains, possesses, transfers, or uses an item of identifying information of another without other person's consent, OR identifying information of deceased, if obtained w/o legal authorization, OR identifying information of a child younger than 18 years of age. Texas Criminal Statutes

Fraudulent Use or Possession of Identifying Info.(32.51) (Continued) Other Points – Intent to Harm is presumed if possess three or more Does not apply to business doing legal business activity – Identifying Information identifies a person either by itself or with other info: Name and date of birth, OR Unique biometric data (fingerprint, voice print, or retina/iris image), OR Unique electronic ident #, address, routing code, or financial account #, OR Telecommunication identifying information or access device, OR SSN or other government-issued ID # – Telecommunication Access Device (TAD) means: Card, code, account #, personal ID #, electronic serial #, mobile ID#, or means of account access that alone or in conjunction with another TAD may be used to: – Obtain money, goods, services, or other thing of value, OR – Initiate transfer of funds (without paper) Texas Criminal Statutes

Fraudulent Use or Possession of Identifying Info.(32.51) (Continued) Punishment – State Jail Felony(Less than 5) – 3 rd Degree Felony(5, but less than 10) – 2 nd Degree Felony(10, but less than 50) – 1 st Degree Felony(50 or more) – Next Higher Level if victim is Elderly Person – Restitution can include Lost income Other expenses incurred (no atty fees) Texas Criminal Statutes

Involving Law Enforcement Make sure Case is Well Documented Written summary w/ all names & contact info If any evidence is available, Obtain & Preserve – Personnel File, Snapshot of Server/ s – Computer – TURN OFF, Unplug, Secure – Do not alter original evidence (notes, highlight, etc) Try to avoid interviewing Target /other witnesses – Ask witnesses to write down what they remember

Fraud Detection The Smell Test George Jordan : Manager – Forensic Accounting Services Tele: