Ed Tobias, CISA, CIA May 12, 2010.  Expectations  Background  Why it works  Real-world examples  How do I use it?  Questions.

Slides:



Advertisements
Similar presentations
=Largest divided by second largest Small set of high-risk transactions Relative Size is an error-detecting test Access or Excel Prepared by: Mark J. Nigrini.
Advertisements

VA. ACL USER’S GROUP Functions Intermediate to Advanced April 21, 2009 Kimberly M. Taylor, CPA, CISA Chesterfield County, VA.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Unemployment Insurance Integrity Conference April 19, 2010 Forensic Techniques And Automated Oversight Brett Baker, PhD, CPA, CISA.
Chapter 12 Cash Disbursement Schemes
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Benford’s Law formulas Benford’s Law research The basic digit tests Access steps Prepared by: Mark J. Nigrini Copyright © 2012 by Mark J. Nigrini. All.
Chapter 19, Lesson 3 Saving and Investing.
Purchases & Cash Disbursements Transactions By David N. Ricchiute
Utility Accounting and Auditing MRWA 34 th Annual Conference December 11, 2014.
Chapter 8: Probability: The Mathematics of Chance Lesson Plan
Automating FI Uploads using GLSU
Billing Schemes. O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Roger S. Debreceny Shidler College of Business University of Hawai‘i at Mānoa Glen L. Gray College of Business & Economics California State University,
Chapter 4 Billing Schemes.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
U.S. Bank Payment Analytics Overview. Payment Fraud Trends 2 Reference: Association of Financial Professionals (AFP), 2011 Payments Fraud and Control.
Chapter 6 Data-Driven Fraud Detection. Sampling ISA 240 emphasizes that Fraud is more difficult to detect than unintentional errors Errors- sampling is.
ME 195 A How to Write a Professional Technical Report Dr. Raghu Agarwal ME 195A Presentation: How to Write a Professional Technical Report 1.
Chapter 10 Cash and Financial Investments McGraw-Hill/Irwin
First Things First Log Tables, Random Numbers, and Tax Fraud Ahbel, copyright 2001.
1 Designing Substantive Procedures The auditor “must plan and perform the audit to reduce the audit risk to an acceptably low level that is consistent.
Chapter 16: Audit of Cash Balances
Data Mining Journal Entries for Fraud Detection: A Pilot Study by Roger S. Debreceny & Glen L. Gray Discussed by Severin Grabski.
© EZ-R Stats, LLC Duplicate Payments Slide 1 Auditing for Duplicate Payments A better way … Presentation of
FRAUD Prevention & Detection. Group Members Raven Smith Tommy Harville Kedron Hilario.
Significant Figures Chemistry. Exact vs approximate There are 2 kinds of numbers: 1.Exact: the amount of money in your account. Known with certainty.
ACL Duplicate Invoices Detection Overview Using ACL to detect and report Duplicate Invoices within and between a Rail Entity’s Ariba procurement, Ellipse.
1 Comparison of AD (Active Data) and ACL (Audit Command Language) Comparison of AD (Active Data) and ACL (Audit Command Language) January 27, 2011
BENFORDSlide Number 1 Using Benford on Expense Reports ACL Users Group Wednesday, June 17, 2009 Richmond, Virginia Charles R. Gauntt.
The Scientific Method. Steps of Scientific Method 1.Observation: notice and describe events or processes 2.Make a question 1.Relate to observation 2.Should.
© EZ-R Stats, LLC Duplicate Payments Slide 1 Auditing for Duplicate Payments A better way … Web CAAT.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
Chapter 6 Payroll Schemes.
Chapter 8: Probability: The Mathematics of Chance Lesson Plan Probability Models and Rules Discrete Probability Models Equally Likely Outcomes Continuous.
Detecting Fraud Using Benford’s Law. BENFORD’S LAW
Unit 1 Lesson 2 Scientific Investigations Testing, Testing, 1, 2, 3 What are some parts that make up scientific investigations? Scientists investigate.
Benford’s law of anomalous numbers
BENFORD’S LAW.  History  What is Benford’s Law  Types of Data That Conform  Uses in Fraud Investigations  Examples  Other uses of Benford’s Law.
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
CJ 125 UNIT FOUR PAYROLL SCHEMES. THE MAIN CATEGORIES OF PAYROLL FRAUD Payroll Schemes Occupational frauds in which a person who works for an organization.
Benford’s Law Keyang He Probability & Statistic. History 1881: Simon Newcomb noticed that the early pages of log table books were more grubby than the.
Chapter 9 Audit Sampling – Part a.
Chapter 8: Probability: The Mathematics of Chance Lesson Plan Probability Models and Rules Discrete Probability Models Equally Likely Outcomes Continuous.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Jamie Ralls, CFE, ACDA Ian Green, M.Econ, CGAP Oregon Audits Division Association of Local Government Auditors December 9, 2015.
Jamie Ralls, CFE, ACDA Ian Green, M.Econ, CGAP Wendy Kam, MBA Oregon Audits Division NASACT March 24, 2016.
Significant Figures Chemistry I. Significant Figures The numbers reported in a measurement are limited by the measuring tool Significant figures in a.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
TITLE Subtitle Using Data Analytics in Audits.
Significant Figures & Percent Error Calculation
Detecting the dubious digits: Benford’s law in forensic accounting
Chapter 7: Computer Assisted Analytical Techniques
Chapter 7: Computer Assisted Analytical Techniques
HOW TO SUBMIT A CLAIM This tutorial is designed to give you detailed directions for processing a claim for reimbursable funds. Please note that you can.
Framework for a Forensic Audit and Investigative Capability
Unit-1 Physics Physical World and Measurements
Significant Figures Physical Science Mr. Ramirez.
Chapter 7: Computer Assisted Analytical Techniques
Purchases and disbursements
Group 3: Bok Wen Xuan, Anabella Fong, Goh Jie Sheng
Chapter 5 Benford’s Law formulas Benford’s Law research
Significant Figures Physical Science.
Significant Figures Chemistry.
Accounts Payable Reports & Processes
Chapter 12: Fraud Schemes & Fraud Detection
Significant Figures Physical Science.
Presentation transcript:

Ed Tobias, CISA, CIA May 12, 2010

 Expectations  Background  Why it works  Real-world examples  How do I use it?  Questions

 How many have heard of it? ◦ All over the professional journals  J. of Accountancy – 2003, 2007  J. of Forensic Accounting – 2004  Internal Auditor – 2008  ISACA Journal – 2010  Fraud Magazine

 As of 2004, over 150 articles have been written about Benford’s Law

 1881 – Simon Newcomb, astronomer / mathematician  Noticed that front part of logarithm books was more used  Inferred that scientists were multiplying more #s with lower digits

 1938 – Frank Benford, P hysicist at GE Research labs  Front part of the log book was more worn out than the back  Analyzed 20 sets of “random numbers” – 20,299 #s in all

 Tested random #s and random categories  Areas of rivers  Baseball stats  #s in magazine articles  Street addresses - first 342 people listed in “American Men of Science”  Utility Bills in Solomon Islands

 Benford’s Law: ◦ Random #s are not random ◦ Lower #s (1-3) occur more frequently as a first digit than higher numbers (7-9)  In a sample of random numbers:  #1 occurs 33%  #9 occurs 5%

 What are “random numbers”? ◦ Non-manipulated numbers  Population stats, utility bills,  Areas of rivers ◦ NOT human-selected #s  Zip codes, SSN, Employee ID

 What’s the practical use? ◦ 1990s – Dr. Mark Nigrini, college professor  Tested insurance costs (reim. claims), sales figures  Performed studies detecting under/overstmts of financial figures  Published results in J. of Accountancy (1990) and ACFE’s The White Paper (1994) ◦ Useful for CFEs and auditors

 What about financial txns? ◦ “Random data” = non- manipulated numbers  AP txns, company purchases ◦ NOT human-selected #s  Expense limits (< $25)  Approval limits (No sig < $500)  Hourly wage rates

 How will it help me with non- random data? ◦ Aid in detection of unusual patterns  Circumventing controls  Potential fraud

 You won the lottery – invest $100M in a mutual fund compounding at 10% annually ◦ First digit is “1” ◦ Takes 7.3 yr to double your $ ◦ At $200M, first digit is “2”...

 At $500M … First digit is “5” ◦ Takes 1.9 yr to increase $100MM  Although time is decreasing, there are more years that start with lower digits ◦ Eventually, we will reach $1B  First digit is “1”

 Seems reasonable that the lower digits (1-3) occur more frequently ◦ These 3 digits make up approx. 60% of naturally-occurring digits

 Scale invariant ◦ 1961-Roger Pinkham ◦ If you multiply the numbers by the same non-zero constant (i.e., or 0.323)  New set of #s still follows Benford’s Law  Works with different currencies

 $2M Check Fraud in AZ  $4.8M Procurement fraud in NC

 Check fraud in AZ ◦ #s appear random to untrained eyes ◦ Suspicious under Benford’s Law ◦ Counter-intuitive to human nature

 Wrote 23 checks (approx. $2M)  Many amts < $100K ◦ Tried to circumvent a control that required a human signature  Mgr tried to conceal fraud  Human choices are not random

 Avoided common indicators: ◦ No duplicate amounts ◦ No round #s – all included cents

 Mistakes: ◦ Repeated some digits / digit combinations ◦ Tended towards higher digits (7-9)  Count of the leading digit showed high tendency toward larger digits (7-9)  Anyone familiar with Benford’s Law would have recognized the larger digit trend as suspicio us

 Benford’s Law can be extended to first 2 digits ◦ Allow examiner to focus on specific areas ◦ High-level test of data authenticity

 Procurement fraud in NC ◦ 660 invoices from a vendor ◦ Years ◦ Total of $4.8M submitted for payment  Run the 660 txns through Benford’s Law …

See any suspicious areas?

Drilling down in the “51” txns

 Over a 3-year period, at least $3.8M in fraudulent invoices for school bus and automobile parts were submitted.  The investigation recovered $4.8M from the vendor and former school employees.

 Data Analytics software ◦ ACL / IDEA  Excel ◦ Add-Ons ◦ Built-in Excel Functions

 Expectations  Background  Why it works  Real-world examples  How do I use it?

 Ed Tobias  ◦ LinkedIn 

 Benford’s Law Overview. n.d. Retrieved March 10, 2010 from  Browne, M. Following Benford’s Law, or Looking Out for No. 1. n.d. Retrieved March 10, 2010 from  Durtschi, C., Hillison, W., and Pacini, C. The Effective Use of Benford’s Law to Assist in Detecting Fraud in Accounting Data Journal of Forensic Accounting. Vol. V. Retrieved March 10, 2010 from  Managing the Business Risk of Fraud. EZ-R Stats, LLC Retrieved March 10, 2010 from  Kyd, C. Use Benford’s Law with Excel to Improve Business Planning Retrieved March 10, 2010 from

 Lehman, M., Weidenmeier, M, and Jones, T. Here’s how to pump up the detective power of Benford’s Law. Journal of Accountancy Retrieved March 10, 2010 from  Lynch, A. and Xiaoyuan, Z. Putting Benford’s Law to Work Internal Auditor. Retrieved March 10, 2010 from  Nigrini, M. Adding Value with Digital Analysis. Internal Auditor Retrieved March 10, 2010 from  Nigrini, M. I’ve Got Your Number. Journal of Accountancy Retrieved March 10, 2010 from  Rose, A. and Rose, J. Turn Excel Into a Financial Sleuth Journal of Accountancy. Retrieved March 10, 2010 from  Simkin, M. Using Spreadsheets and Benford’s Law to Test Accounting Data. ISACA Journal. 2010, Vol. 1. Pp

 Stalcup, K. Benford’s Law. Fraud Magazine. 2010, Jan/Feb. Pp