Anda di halaman 1dari 8

WHITE-COLLAR CR ME FIGHTER www.wccfighter.

com
VOLUME 12 NO.12
YOUR SECRET WEAPON IN THE WAR ON FRAUD DECEMBER 2010

IN THE NEWS
Zabihollah Rezaee, PhD, University of Memphis and
Big Four Firm in the Richard Riley, PhD, West Virginia University
Crosshairs of the Law in
Alleged Lehman Financial
Reporting Fraud
The Role of the Internal Auditor in
T he Wall Street Journal calls it
“the most sweeping allega-
tions against an accounting firm
Detection and Investigation of
in nearly a decade.”
New York State Attorney
General Andrew Cuomo is accus-
Financial Statement Fraud
ing accounting giant Ernst &
Young of helping defunct Lehman
Brothers to falsify its financial he role of internal auditors in But what are the specific best prac-
reporting through use of the so-
called Repo 105 financial transac-
tions that generated widespread
media coverage in early 2010.
T detecting, preventing and investi- tices for internal audit in these key areas
gating financial statement fraud that support the organization’s fraud-risk
has been—and continues to be—a topic mitigation efforts? Here is a listing of
of contention among accounting profes- such practices:
While it collected more than sionals, anti-fraud professionals, manage- •Schedule meetings between the
$150 million in audit fees from ment and legal staff. However, the over- chief internal auditor and the audit
Lehman between 2001 and the
all trend is toward increased responsibil- committee regarding the financial
time it collapsed in September
ity on the part of internal reporting process.
2008, E&Y advised Lehman on the
use of Repo 105s to remove some auditors for detecting The IIA document did lay out •Organize close
$50 billion from Lehman’s balance fraud and supporting clear measures that internal cooperation and
sheet in order to falsely embellish management in enhanc- auditors must take to assist coordination of
the financial performance of the ing anti-fraud controls. management in mitigating its the work of exter-
firm while it was rapidly slipping The most clear-cut indi- risk of being a victim of fraud. nal auditors with
toward collapse. cation of this came with internal auditors
New York’s lawsuit: “E&Y the publication in 2009 by the Institute of through an integrated audit planning
‘directly facilitated’ an accounting Internal Auditors (IIA) of its Practice process consisting of the exchange of
sleight of hand that burnished the Guide entitled Internal Auditing and audit plans, programs, findings and
securities firm’s balance sheet.” Fraud. Though it did not focus specifical- reports.
Ernst & Young said in a state- ly on the issue of financial statement •Require that internal auditors
ment that there was “no factual or fraud, the IIA document did lay out clear report their audit findings related to
legal basis” to bring a claim measures that internal auditors must take financial statement preparation to
against the firm, and that it would to assist management in mitigating its risk the board and the audit committee—
vigorously defend against the of being a victim of fraud. especially when there are red flags of
claims in Cuomo’s lawsuit. Only fraud.
time will tell. TARGETING REPORTING FRAUD •Regularly assess the adequacy
White-Collar Crime Fighter The Practice Guide is largely the prod- and effectiveness of the organiza-
source: The Wall Street Journal.
uct of virtually uniform concurrence tion’s internal controls over financial
IN THIS ISSUE within the profession with the notion reporting (ICFR).
•INTERNAL CONTROLS that the internal audit function involves •Evaluate the quality of the finan-
Are you still neglecting the assisting management with critical cial reporting process—including a
basic anti-fraud controls? ......3 issues pertaining to financial reporting, review of annual and quarterly state-
•REPORTING MATTERS and internal controls that impact finan- ments— with a specific focus on finding
Accounting restatements are cial reporting. Key examples... fraud indicators.
flying under the radar............ 4 •Risk management process •Participate with the audit com-
•OPERATIONAL FRAUD •Internal control systems mittee and the organization’s exter-
Essentials for prevention....... 5 •Financial reporting process nal auditors in reviewing manage-
•THE CON’S LATEST PLOY •Anti-fraud programs and practices ment’s discretionary decisions, judg-
Law-enforcement successes aimed at ensuring the integrity of finan- ment, selection and accounting princi-
from around the country........ 7 cial reporting. ples related to preparing financial state-
WHITE-COLLAR CRIME FIGHTER

ments. Helpful: SAIS 3 clearly states that


•Perform risk assessments of the internal auditors have three key respon-
White-CollarCrime
financial reporting process by exam- sibilities regarding fraud investigation: FIGHTER
•Determine whether adequate and Editor
ining specific risks and anti-fraud Peter Goldmann, MSc, CFE
controls meant to mitigate the risks. effective internal controls are in place Consulting Editor
Note: This duty is spelled out in the to discover fraud. Jane Y. Kusic
IIA’s 2009 Practice Guide which goes a •Design audit procedures to discover Managing Editor
step further to state that internal audi- similar occurrence of prior-occurring Juliann Lutinski
tors “may assist manage- financial statement Senior Contributing Editor
ment in establishing The Standard includes precise frauds in the future. David Simpson
effective fraud preven- language on what the internal •Obtain adequate Associate Editor
Barbara Wohler
tion measures by know- auditor’s responsibilities should knowledge of investi-
Design & Art Direction
ing the organization’s be for detecting fraud. gating similar fraud. Ray Holland, Holland Design & Publishing
strengths and weakness- But SAIS 3 doesn’t
es and providing consult- stop there. The Panel of Advisers
ing expertise.” Standard includes precise language on Credit Card Fraud
what the internal auditor’s responsibili- Tom Mahoney, Merchant 911.org
LONG-STANDING STANDARD ties should be for detecting fraud: Forensic Accounting
Important: One of the clearest sets of •Obtain sufficient knowledge and Stephen A. Pedneault, Forensic
guidelines on internal audit’s role in pro- understanding of fraud to be able to iden- Accounting Services, LLC
tecting the organization against fraud tify conditions that may indicate the Fraud and Cyber-Law
goes back to 1985 with the IIA’s publica- existence of red flags that fraud might Patricia S. Eyres, Esq., Litigation
Management & Training Services Inc.
tion of Statement of Internal Audit have occurred.
Corporate Fraud Investigation
Standards No.3 (SAIS 3). •Study and assess corporate structure R.A. (Andy) Wilson, Wilson & Turner
to identify opportunities for committing Incorporated
financial statement fraud. Corporate Integrity and
“DETECTING AND PREVENTING •Evaluate choices made by fraud- Compliance
Martin Biegelman, Microsoft Corporation
FRAUD IN TODAY’S sters in perpetrating financial state- Securities Fraud
ment fraud …and determine whether G.W. “Bill” McDonald, Investment and
HIGH-CRIME CLIMATE" those choices represent potential red Financial Fraud Consultant
SIGN UP NOW FOR THE NEW 2011 flags of future fraud and if so, how to Prosecution
adjust internal controls to eliminate the Phil Parrott, Deputy District Attorney
SERIES FROM AUDITNET Denver District Attorney’s Office,
opportunities. Economic Crime Unit
AND FRAUDAWARE •Inform the appropriate individuals Computer and Internet Investigation
in the organization when signs of poten- Donald Allison, Senior Consultant,
G et Expert Advice on how to stay
a step ahead of fraudsters with
proven tactics and techniques.
tial financial statement fraud are identi-
fied. (It is then management’s responsi-
Stroz Friedberg LLC
Fraud Auditing
bility to determine if a full-fledged fraud Tommie W. Singleton, PhD
After completing this carefully University of Alabama at Birmingham
investigation is warranted.)
designed series of 12 high-impact White-Collar Crime Fighter (ISSN 1523-
0821) is published monthly by White-Collar
Webinars featuring the anti-fraud ANTI-FRAUD PRACTICES AND Crime 101, LLC, 213 Ramapoo Rd.,
profession’s top experts, your audi- TECHNIQUES Ridgefield, CT 06877. www.wccfighter.com.
tors, investigators, accounting staff, On a day-to-day basis, the effective- Subscription cost: $295/yr. Canada, $345.
financial personnel, compliance offi- Copyright © 2010 by White Collar Crime
ness of internal audit in reducing the 101, LLC. No part may be reproduced with-
cers and senior management teams organization’s exposure to financial out express permission of the publisher.
will have a unique body of knowl- statement fraud comes down to a set
edge, skills and abilities to launch of very specific risk-mitigation prac- Mission Statement
highly effective initiatives that beat tices that fall into six key areas... White-Collar Crime Fighter provides
fraudsters at their own games— Area #1: Basic practices of an information of maximum practical value
affordably and efficiently. effective internal audit group: to organizations and individuals involved
in all facets of investigating, detecting
Sign up now for this unique series •Report to the audit committee or and preventing economic crime.
of learning sessions that gets right to function in a way that affirms its inde- This community includes law internal
the brass tacks of using your organi- pendence with regard to potential finan- auditors…fraud examiners…regulatory
zation’s resources to safeguard its cial statement fraud. officials…corporate security profession-
financial, intellectual and physical •Obtain training on conducting a als…senior executives…private investi-
fraud risk assessment and stay informed gators…and many more.
assets from the growing army of
of current fraud schemes and detec- The editors of White-Collar Crime
fraudsters. Fighter strive to gather and compile the
For full details, dates, CPE credits tion/deterrence methods. most useful and timely information on
and registration options, PLUS •Become proficient in identifying red economic crime issues.
VALUABLE FREE BONUSES please flags of financial statement fraud. Comments, suggestions and ques-
visit http:/www.auditnet.org/FAST •Apply professional skepticism to all tions are welcome. Please fax us at
audit exercises. 203-431-6054, or E-mail us at edi
2011.htm tor@wccfighter.com. Visit us on the
Area #2: Practices related to eval- Internet at www.wccfighter.com.
2
WHITE-COLLAR CRIME FIGHTER

uating and improving the organi- INTERNAL CONTROL ESSENTIALS


zation’s anti-fraud measures:
•Assess fraud risks by evaluating
management’s fraud risk assessment.
•Assess the organization’s culture In an Era of Widespread
to verify and, as necessary, enhance
the effectiveness of:
Written policies specifying ethical
and Costly Fraud:
behavior and prohibited/unethical
conduct.
Are You Still Neglecting Basic
Transaction approval processes. Anti-Fraud Controls?
Whistleblower hotline(s).
Communication about financial
statement fraud incidents—as well as
detection and prevention measures to
the board, top management, managers,
supervisors and line employees.
Area #3: Practices for measuring
irginia Lee Uy was hired in 2002
the organization’s ethical culture:
•Assess the likelihood that employ-
ees who observe suspected or actual
financial fraud will report it.
V as a “billing clerk” at Hudd
Distribution Services Inc., a
warehousing and trans-shipping com-
June 2009 Virginia Lee:
•Created phony invoices appearing
to be from legitimate or phony ven-
dors.
•Created phony check request forms
pany in Sumner, WA, near Seattle and
•Evaluate management’s posture serving shipping customers in the US to go with the phony invoices.
regarding whistleblowers—with focus and Canada. •Copied and pasted one of her own
on the degree to which management The company was acquired by supervisors’ signatures onto the phony
would or wouldn’t retaliate against Maersk Line of Copenhagen, one of the request forms.
them. Propose corrective measures as largest ocean shipping companies in •Had checks issued by Maersk
needed. the world. Maersk, which owned a accounting headquarters in Charlotte,
company in the same business as Hudd, NC, delivered to her via FedEx for for-
Area #4: Practices for evaluat-
warding to the legitimate vendor.
ing the organization’s fraud detec- Maersk Distribution Systems Inc.,
•Stole the checks, whited out the
tion activities: acquired Hudd in 1997 and the name of
payee names and put her own name on
•Review the hotline’s design and the combined firms became Maersk the payee lines of the FedEx-ed checks;
processes for effectiveness. Implement Distribution Systems Inc. (MDSI). endorsed them and deposited them
corrective measures as needed. According to court documents, into one of three different accounts
everything went fine with Virginia Lee (including her account which was des-
•Regularly evaluate/audit the specif-
for the first four years of her employ- ignated for direct deposit of her payroll
ic design and implementation proce-
ment at MDSI. checks).
dures of management’s internal con-
But then Virginia Lee began stealing: •Submitted phony invoices and check
trols over financial reporting fraud.
The required payment procedure at requests to Maersk’s North Carolina
Area #5: Practices for projecting MDSI was for Virginia Lee to receive all headquarters that were duplicates of
a “perception of detection” by: vendor invoices and send them on to legitimate payments already processed
•Communicating to management the appropriate employees who had and paid to vendors. This resulted in an
and employees throughout the orga- placed orders for the corresponding overpayment to legitimate vendors. The
nization that internal audit is looking invoiced goods or services. The vendors subsequently issued refund
for fraud...welcomes tips and is pre- employees’ supervisors were required checks to MDSI’s office where, of
pared to ask tough questions of man- to approve check requests. The course, Virginia Lee received them.
agement in the event that financial employees were then required to initi- •Altered the payee names and
statement fraud is suspected. ate and obtain supervisor approval of endorsed the refund checks and
Area #6: Practices for conduct- check requests to facilitate vendor pay- deposited them into one of her person-
ing timely investigations of allega- ment. Virginia collected all approved al bank accounts.
tions and suspicions of financial invoices and check requests and sent THE DAMAGE
statement fraud. them on to Maersk Accounting HQ in •Virginia’s fraud schemes contin-
White-Collar Crime Fighter sources: NC for payment. Often, according to ued for 37 months and involved the
•Zabihollah Rezaee, PhD, CPA, CFE, CIA, Agent Wills’ affidavit, legitimate pay-
CGFM, CMA,Thompson-Hill Chair of Excellence
fraudulent use of some 40 different
ments were sent directly to the ven- vendor names. The schemes were dis-
and Professor of Accountancy, University of
Memphis. dors. However, transactions that were covered when one of the vendors
•Richard Riley, PhD, CPA, CFE, Louis F. part of Virginia Lee’s fraud scheme spotted a cancelled check that had
Tanner Distinguished Professor of Public were sent back to Virginia Lee via been altered and called MDSI man-
Accounting, West Virginia University. FedEx, ostensibly so that she could for-
Professors Rezaee and Riley are coauthors of agement to report it.
Financial Statement Fraud, Prevention and
ward the payments on to their legiti- •A total of 85 checks totaling
Detection, 2nd Edition (Riley), on which this mate recipients. $188,600 were fraudulently generat-
article is based. Details: Between June 2006 and Continued on pg. 4

3
WHITE-COLLAR CRIME FIGHTER

Continued from page 3


REPORTING MATTERS
ed and converted.
•A total of 31 vendor checks for
refunds totaling $75,000 were altered
“STEALTH” RESTATEMENTS and fraudulently converted.
INTERNAL CONTROLS: WHAT
Accounting Aberrations Flying COULD HAVE PREVENTED THIS?
Under the Radar Lesson: Management of some large
organizations continue to underesti-
mate the cost of fraud despite the
ccounting restatements have panies must file with the SEC to

A been a common by-product announce major events that sharehold-


of financial reporting—and ers should know about.”
accounting fraud—for decades. Problem: While, in the majority of
increased media and law enforcement
focus on corporate crime, the imple-
mentation of new mandatory anti-
fraud auditing standards by the
Fortunately, the frequency of restate- restatements, some combination of Institute of Internal Auditors and
ments overall has declined substan- these procedures is followed, because increasingly stringent oversight of
tially from a high of 1,796 in 2006. restatements tend to tarnish a compa- external audit firms by the Public
Analysts at Audit Analytics, a financial ny’s reputation even if no fraud was Company Accounting Oversight Board
research firm, point to less stringent involved, management sometimes has (PCAOB).
SEC reporting rules Accounting restatements have incentives to obfus- Important: The Virginia Lee frauds
and improved inter- cate the way in which are sobering examples of how organiza-
been a common by-product of
nal controls over they disclose restate- tions continue to run accounts payable
financial reporting financial reporting—and ments. and other financial operations with min-
(ICFR) as possible accounting fraud—for decades. Stealth restatements imal—or even no—anti-fraud controls.
reasons for the decline. are the answer for many companies.
Problem: Restatements are by no They are “released” when management THE PARADOX: PREVENTION IS
means a thing of the past. In 2009 ignores SEC requirements and chooses CHEAP AND EASY
there were 674 restatements. Expense to just amend a prior report or to tuck Related lesson: It is often extreme-
recording, accounts receivable and the restatement into a not-so-readily- ly easy to prevent fraudsters like
revenue recognition were the prima- noticeable section of a scheduled annu- Virginia Lee from ripping off their
ry issues involved in 14%, 12% and al or quarterly report. employers… which in turn teaches us
10% respectively of all restatements in And there are plenty of them: that it is incredibly easy to prevent sim-
2009. Fortunately, many, if not most According to Audit Analytics, despite ilar frauds that are going on right now.
such restatements are not fraud relat- the overall decline in restatements, Here are some of the basic anti-
ed. But the problem is that it’s often stealth restatements make up approxi- fraud controls that readers of this and
difficult to tell whether they are or mately one-half of the total. other fraud prevention publication
they aren’t. have been hearing about—and urg-
THE FRAUD FACTOR ing organizations to adopt for years:
UNDER THE RADAR Important: As indicated, not all •Segregation of duties. Virginia
So-called “stealth restatements” con- stealth restatements are created to should not have been allowed to send
stitute a subset of all restatements obscure fraud in the company. Nor, check requests/invoices to North
that may be flying under the radars of according to one forensic accountant Carolina headquarters. This should
financial statement users due to the experienced in analyzing stealth restate- have been done by one or more of her
obscure manner in which they are ments, is it even possible to definitely supervisors (she had three) only after
disclosed. determine if fraud is a factor in manage- review and confirmation of the legiti-
Key: Under current regulatory ment’s decision not to file an 8-K. macy of the payments.
guidelines for disclosing restate- However, the high proportion of In addition, headquarters should not
ments, a company can disclose a revenue recognition-related restate- have been allowed to accede to
restatement in several ways: 1) press ments suggests that fraud is at least Virginia Lee’s request to have vendor
release…2) Form 8-K…3) amended sometimes an underlying motive for checks sent to her for forwarding on to
periodic reports (10-K/A or 10-Q/A) “going stealth,” as many revenue the legitimate payees.
…and 4) periodic financial reports recognition improprieties are, of •Supervisor review of vendor
(10-K or 10-Q). course, highly illegal. accounts. Had one of Virginia Lee’s
Example: A company that restates supervisors or one of the company’s
its prior year financial information White-Collar Crime Fighter sources: accountants or auditors done a routine
•“2009 Financial Restatements: A Nine Year
could issue a press release disclosing Comparison,” Audit Analytics, www.auditanalyt examination of accounts payable
the restatement…file a Form 8-K ics.com. records, they would have easily
…and in conjunction with the 8-K, •“‘Stealth’ Restatements: An Issue Requiring noticed that certain vendors were
file any relevant amended periodic Attention,” by Kevin Hee, PhD, and Leon Chan, receiving unusual numbers of “pay-
PhD, assistant professors in the Charles W. ments” starting in 2006 (the first year
returns that cover the restatement Lamden School of Accountancy at San Diego
period. Form 8-K is, according to SEC State University, San Diego, CA, CPA Journal, of Virginia’s scheme).
language, “...the ‘current report’ com- April 2010. Continued on page 5

4
ºWHITE-COLLAR CRIME FIGHTER

Continued from page 4 OPERATIONAL FRAUD


In addition, new vendors should be Ron Schwartz, Deloitte Financial Advisory Services LLP
authenticated by a staff member other
than the one(s) responsible for process-
ing invoices or approving payments.
•Vendor master file access con-
trol, review and “cleansing.”
PROCUREMENT FRAUD
Organizations must implement tight
controls over who has access to the
Detection and Prevention
vendor master file and for which spe-
cific purposes. Had Maersk’ s account-
ing or audit staff conducted regular
Essentials
vendor “cleansing,” it may have noticed
the existence of phony vendor names
or dormant vendor accounts that
Virginia Lee might have created and
stopped using.
•“NPO/NP.” Maersk evidently did ase study #1: A whistleblower at flags of possible fraud such as relation-
not have a “No PO/No Payment” policy.
According to the court documents,
MDSI only required invoices and
employee check requests. This pro-
C at large manufacturer reported to
the company’s internal audit
department that an employee in the pro-
curement department was colluding with
ships between employees and ven-
dors…such red flags include anomalies
in the pattern of purchasing, as well as
numerous other signs of procurement-
vides a tempting opportunity to steal related fraud including kickbacks,
a vendor to bill the company for security
to anyone with the inclination to do so.
services that were never rendered. bribery and billing schemes.
•Dual signatures on checks. Had
Internal audit’s subsequent investi- Problem: Organizations tend to instill
Maersk implemented and enforced
gation revealed several large round dol- a certain amount of trust in their employ-
such a policy, it is possible that at
lar invoices billed for security at events ees to operate efficiently. In the procure-
some point before 2009, one of the
that the company never held. The ven- ment function, key employees are entrust-
authorized signatories would have
dor admitted in an interview with an ed with access to vendor selection, the
reviewed a payment’s documentation
investigator that some of the invoices vendor master file, accounts payable files,
and discovered suspicious details.
were in fact fictitious while other invoice approval and purchase orders.All
•Bank statement review. Regular
invoices were for legitimate services of these elements of the procurement
bank statement review by a supervi-
ordered by the company. This scheme process provide potential opportunities
sor, accounting staff member or
lasted several years and cost the com- to commit fraudulent activity such as bid
accounts payable manager would have
pany hundreds of thousands of dollars rigging, false billing schemes, kickbacks
caught whited-out and otherwise
before the whistleblower, who also and conflicts of interest.
altered cancelled checks at a very early
worked in procurement, spoke up. In today’s sluggish economy, reduc-
stage in Virginia Lee’s fraud scheme.
Case study #2: An analysis of pur- tions in resources due to layoffs often
•Awareness training and hotline
chases by the maintenance department compromise segregation of duties, cre-
management. Employees should be
of a large company revealed that the ating new opportunities for dishonest
trained to recognize the red flags of
price paid for various supplies was behavior. In addition, more and more
fraud and continuously encouraged to
twice and sometimes three times that of employees are feeling increased finan-
report suspicious activity via the orga-
“market” value. An investigation cial pressure as well as justification for
nization’s confidential hotline.
revealed a financial connection committing frauds of many kinds,
CONCLUSION between the vendor and the mainte- especially procurement schemes.
At a time when organizations are nance department procurement officer. If dishonest procurement employees
being stung by costly frauds such as feel increased pressure to perform or
those involving deception by securities IMPORTANT LESSONS produce results, and if an organization
firms on Wall Street, and some of the These two real life examples have a simultaneously lacks appropriate con-
nation’s biggest banks are being called common thread. Both companies had trols and segregation of duties, these
to answer for the widespread use of controls in place such as segregation of employees will be able to identify ripe
fraudulent lending practices and other duties and supervisor approval. Yet in opportunities to abuse their procure-
financial crimes, it is more important both cases, the controls were overrid- ment roles by committing fraud.
than ever that basic business practices den by either collusion or abuse of Common frauds by procurement
be scrutinized for fraud risk and revised approval authorities. employees:
to defend against costly yet remarkably Key: Learning from the investigative •Kickbacks. Kickbacks involve the
basic crimes of opportunity such as process that uncovered the techniques giving or receiving of anything of
those committed by Virginia Lee Uy. used to perpetrate the frauds, and value to influence a business decision.
Moreover, to remain competitive employing similar investigative tech- Kickbacks may be undisclosed pay-
and profitable, focusing on the funda- niques to assess procurement activity ments made by vendors to employees
mentals of fraud control is more on a periodic, proactive basis can be in return for favorable treatment, such
urgent than ever. extremely helpful in identifying red Continued on page 6

5
WHITE-COLLAR CRIME FIGHTER

Continued from page 5


as bid rigging or inside bidding infor-
FRAUD-FIGHTERS’ mation. The vendor may also
approach an employee about submit-
NEED-TO-KNOW ting or approving invoices for goods
or services that were never received,
HOT LINE in exchange for a kickback.
Kickbacks are often cash pay-
ments, but they can also be in a form
that is more difficult to detect, such as
Fraudster Is Just a Nice Word for Cybercriminal payments on personal loans or credit
card bills, transfers of property or

F raud prevention mistake: Thinking that hackers and other cyber-criminals


are a separate and distinct group from fraudsters. Today, technology is indis-
pensable to conventional fraudsters, which means organizations must begin
vehicles at less than fair market value,
lavish vacations or a hidden interest
in the vendor’s business.
attacking their fraud risk problem by including technology-based frauds in those •Conflicts of interest. If an
efforts. employee has an interest in the finan-
Details: Top information/computer security experts gather annually at major cial well-being of a vendor, a conflict of
conferences sponsored by such respected organizations as RSA, Gartner and Black interest could exist. This may take the
Hat to stay up on the technologies and techniques used by criminals to defeat form of being a part-owner in the ven-
cybersecurity. But they don’t talk a lot about fraud—yet. dor company, or knowing someone
Key: Internet fraud is not so different from traditional IT security that it close, such as a spouse or family mem-
requires a different set of technologies and professionals to defend against it. ber, who works for the vendor and can
Hackers analyze systems to find backdoors that you didn’t know were there, while receive rewards for business the
fraudsters use the front door in ways that you never intended. employee provides.
Key question now: Who in the organization “owns” fraud prevention? More and more employees are
Examples: feeling increased financial pressure
•Large Internet retailers are fairly sophisticated in their anti-fraud measures. as well as justification for commit-
Most have a department devoted to controlling Web fraud with a budget, analysts ting procurement schemes
and tools assigned to deciding whether to accept, reject or review a Web transac-
tion—typically a credit card purchase. RED FLAGS
•Newer Web businesses that facilitate social connections online like dating and As is widely understood—but not
casual gaming are quickly getting up to speed on fraud as it infiltrates their busi- widely practiced—fraud detection
ness, putting their customers and their brands at risk. generally works better when every-
Bottom line: More and more fraud is the by-product of stolen or lost data one in the organization is trained to
and identity-related cyber-crimes. Fraudsters are cyber-criminals and vice recognize red flags that point to pos-
versa. sible fraud. In the purchasing func-
How do the bad guys get your identity? The way they’ve been doing it for years: tion, such red flags include:
They take over your computer with malicious software, steal personal data in bulk •Expenditures that do not make eco-
nomic sense (dollar amount and timing).
by penetrating IT security systems or look over your shoulder at Starbucks while
•Orders that are consistently made
you’re typing…and they even go through your trash.
from one vendor without inquiring with
White-Collar Crime Fighter source:
Tom Grubb, Vice President of Marketing, ThreatMetrix, a provider of online fraud prevention soft-
other vendors for comparison purposes.
ware, writing at SecurityWeek.com, www.securityweek.com. •Costs of goods or services that are
higher than those of competing vendors.
•Poor documentation for expendi-
tures.
Disturbing Findings About Cyber-crime •One-time payments to vendors (such
as those not officially set up and cleared
n its latest study of the frequency and cost of the main types of computer
I and Internet crime against organizations, the respected Ponemon Institute
reports that cyber-attacks by malicious insiders account for the second-high-
through accounts payable).
•Large round-dollar payments.
•Sudden unexplained replacement of
est annualized cost among seven major categories—led only by viruses and long-time vendors.
worms.
DETECTION METHODS
Added surprise: While, as expected, Web-based cyber-crimes are the most Data analysis is one of the most
damaging, costing an average $143,000 per incident, attacks by employees are effective techniques for identifying
not far behind—costing an average of $100,300 per incident. red flags of purchasing fraud.
Phishing attacks, by contrast, where companies have poured massive Example: Analyzing your vendor
amounts of resources in hopes of minimizing their risk of victimization, now master file, payroll database, and
cost only $35,000 per incident. accounts payable database can help
White-Collar Crime Fighter source: identify potential undisclosed relation-
First Annual Cost of Cyber Crime Study, Benchmark Study of U.S. Companies, by Ponemon ships between employees and vendors
Institute, Traverse City, MI, www.ponemon.org. Continued on page 7

6
WHITE-COLLAR CRIME FIGHTER

Continued from page 6


and such red flags as:
•Common bank account, address, and
phone numbers between vendors and
employees that may indicate a potential

THE
conflict of interest.
•Duplicate invoices with the same
supplier.
•Invoices from different suppliers
with the same dollar amount, date and
invoice number.
CON’S LATEST PLOY...
From White-Collar Crime Fighter’s files
Data analysis can also provide valu- of new scam, scheme and scandal reports
able trend data, such as the number of
invoices from suppliers over time,
unusual invoice number sequencing, San Jose, CA more than $40 million in corporate
and dollars spent for goods and ser- funds to a bank account in Japan. As a
vices purchased from a particular ven-
dor. This can assist with answering the W hitest of white-show law
firms under the gun for con-
cealing alleged multi-million dol-
result of Qu’s fraudulent conduct,
PrediWave was hit by a $2.8 billion
judgment against it. Qu remains an
question, “does the dollar amount and
timing of purchases from a particular lar client fraud. The elite New York international fugitive.
vendor make sense?” City-based law firm, Simpson Thacher The allegations contained in the
& Bartlett LLP, has been battling a legal latest PrediWave complaint include:
ADDITIONAL ANTI-FRAUD TOOLS assault against it for allegedly allowing
In addition to data analysis, some •Simpson Thacher attorneys be-
the CEO of one of its client companies came aware by December 1, 2004, that
commonly used investigative tech- to loot the organization and flee the
niques can also be used to help iden- Qu was directing PrediWave’s pur-
country following the perpetration of a chase of tens of millions of dollars of
tify anomalies in purchasing: major fraud scheme.
•Employee interviews. Inter - memory chips from a shell corpora-
Background: In August, Judge Mary tion whose profits were pocketed by
viewers sometimes find that employ- Jo Levinger of the Santa Clara Superior
ees have information about potential Qu.
Court rejected a request by Simpson to
inappropriate relationships between •Simpson Thacher uncovered evi-
dismiss charges of malpractice, breach
employees and vendors or are suspi- dence showing that delivery records
of fiduciary duty and unfair competi-
cious about certain transactions. and price quotes from a non-existent
tion made against the law firm by its
Interviews at all levels within the com- Chinese company were falsified,
former client, PrediWave Corporation.
pany can provide insight into daily while the memory chips themselves
In March, the California high-tech com-
procurement operations and can were purchased from a tech firm
pany filed an amended complaint alleg-
reveal fraud risks which may be other- operating only a few miles from
ing that Simpson Thacher lawyers
wise unknown to the organization. PrediWave’s Fremont headquarters.
concealed a massive fraud from
•Background checks can provide PrediWave’s board of directors and •“Tony” Qu was paid a $25 million
information about the employment allowed the company’s former CEO to bonus in January 2005 while Simpson
history, integrity and reputation of flee the US with tens of millions of dol- Thacher took no action regarding the
selected individuals and entities. lars in ill-gotten funds. evidence it had gathered about his
Example: A small amount of time Simpson Thacher’s objection to the allegedly illegal activities.
and money spent performing a back- •Attorneys for Simpson Thacher
charges was subsequently overruled by
ground investigation, such as Secretary filed a lawsuit in May 2004 preventing
the Santa Clara Superior Court, thus
of State records searches, might reveal two PrediWave directors from review-
suspicious connections between further setting back the law firm’s
efforts to prevent PrediWave’s claims ing company documents and pursu-
employees and vendors. Additionally, it ing an investigation that would have
can provide history on vendors’ perfor- from proceeding forward to trial.
Key: PrediWave’s complaint out- revealed Qu’s fraudulent actions.
mance, legal proceedings and other rele-
lines how Simpson Thacher allegedly •In 2005, Simpson Thacher retained
vant information.
•Electronic discovery, such as hired investigators who uncovered a a private investigation firm, not for the
extracting and analyzing E-mail files, can massive fraud scheme being perpetrat- purpose of exposing Qu’s actions, but
identify any questionable correspon- ed by former PrediWave chief execu- rather to determine the probability of
dence between vendors and employees tive officer, Jianping “Tony” Qu. But the fraud going public. Simpson
using an organization’s computers. rather than disclose their findings to Thacher inexplicably never disclosed
Key: These tools may be used the company’s board of directors, the results of that investigation to
proactively by the organization to Simpson Thacher attorneys allegedly PrediWave’s board of directors.
help identify potential fraudulent chose to conceal these facts and, •While serving as PrediWave’s
activity before significant financial according to court documents, counsel for only a little over a year,
losses are incurred. obstructed an investigation into Qu’s Simpson Thacher billed over $16 mil-
White-Collar Crime Fighter source: actions by members of PrediWave’s lion in legal fees. At the same time, Qu
Ron Schwartz, Partner, Forensic & Dispute was receiving approximately $25 mil-
Services, Deloitte Financial Advisory Services board.
LLP. Ron can be reached at Qu is reported to have fled the lion in annual bonuses from a compa-
rschwartz@deloitte.com. United States in 2006 after transferring ny that had recorded no sales and no

7
WHITE-COLLAR CRIME FIGHTER

profits. ment, that Kapp was controller for the scheme. The Supervisor of Material
•PrediWave is seeking over $100 recruiting, training and safe-driving Managers at now-defunct Zachry
million in restitution and disgorgement department of the large privately Corporation, Lee Mann, ended his 21-
of all legal fees paid by PrediWave to owned trucking company, C.R. year career at Zachry by getting
Simpson Thacher. England. The company, based in Salt caught for his role in a $10 million
Latest episode: California Court of Lake City, has a training arm with cam- kickback scheme.
Appeals Justice Patricia Bamatre – puses in Utah, California, Texas and Details: Lee, together with three
Manoukian in late November affirmed Indiana. Kapp was in charge of collect- subordinates, colluded with a group of
the denial of Simpson Thacher’s ing trainees’ payments—often made in outside vendors in orchestrating a
motion in a malicious prosecution law- cash—and reconciling the revenue false billing scheme whereby the out-
suit brought by former PrediWave out- with receipts he was responsible for side vendors would receive fraudu-
side director Jimmy Li. giving to trainees. Kapp was supposed lently inflated purchase orders from
This is the latest in the six-year to place copies of the receipts and the Mann and deliver only portions of the
string of adverse rulings against the cash in a lockbox. Cash from campuses orders.
law firm, which is facing charges of outside Utah was sent, along with Specifically, Mann and his co-con-
massive fraud leveled by its former copies of receipts, to Kapp at the Salt spirators would consult with David
client PrediWave. Li’s malicious prose- Lake City headquarters. Reitman, head of construction prod-
cution lawsuit has been deemed a Kapp allegedly deposited between ucts supplier, Mill and Safety Supply
“related case” to the PrediWave fraud $5,000 and $10,000 weekly into a per- Company (MSS) and sole owner of the
case by the Santa Clara Superior Court, sonal bank account from cash received shell company, Louisiana Marine and
where both cases are currently pro- from students at the educational facili- Industrial Supplies Company. After the
ceeding. ties operated by the trucking firm. consultation, Mann and his collabora-
From January 2007 until recently, he tors would submit inflated requisition
allegedly deposited about $1.3 million. orders to Zachry’s purchasing depart-
Salt Lake City, UT The indictment alleges that Kapp ment. Upon approval of the requisi-
used the stolen funds to buy a $48,000 tion orders, Mann would tell Reitman
T rucking company hits speed
bump when employee helps
himself to $1.3 million. Nathan
Lexus, to make a down payment on a
home and to make payments to a con-
how much product was actually need-
ed by Zachry.
tractor who specializes in high-end Mill would have the needed amount
Kapp was arrested by federal marshals
concrete work, resulting in the money delivered, but would submit invoices
on one count of mail fraud and four
laundering charges. to Mann for the full amount of the
counts of money laundering.
bogus PO. Mann would have the
If convicted, Kapp could be sen-
invoice approved and Mann would
tenced to a maximum of 20 years in San Antonio, TX be issued a check by Zachry’s
federal prison on the mail fraud charge accounts payable department. The
and as much as 10 years each on the
money laundering charges.
Details: According to the indict-
V eteran employees end careers
at construction company after
perpetrating seven-year kickback
excess money received would then be
split among Reitman, Mann and the
other co-conspirators.
The concealment: To help cover

WHITE-COLLAR CR ME
Your Secret Weapon in the War on Fraud
FIGHTER
up the fraud, Mann and his co-conspir-
ators created phony packing slips
falsely indicating that Zachry had
received the full amount of merchan-
YES! I want to save $100 on a one-year subscription to WHITE-COLLAR CRIME dise indicated on the requisition order
FIGHTER! By subscribing now, I’ll get the money-saving introductory subscription rate of and purchase order. He then entered
$150. That’s $100 off the regular subscription price of $250! into the company’s records that the
Plus, send me—for FREE—The new book, Detecting and Preventing Fraud in full amount requisitioned had been
Accounts Payable. This is a $50 value—yours absolutely FREE with your subscrip- received, though it had not been.
tion to White-Collar Crime Fighter! Reitman then paid Mann and his
Payment enclosed (or) Charge my Visa Mastercard AMEX Discover Bill me associates a kickback from the amount
paid by Zachry’s for undelivered
Card # Expiration date
goods.
Signature
COMING SOON IN
Name White-Collar Crime Fighter…
• Detecting and preventing manage-
Affiliation
ment override of internal controls
Address • Using data analysis to detect
fraud
City State Z ip
• Information security strategies for
Call 1-800-440-2261…Or Fax this order form to: 203-431-6054 non-technical decision-makers
Or subscribe on-line at www.wccfighter.com.
Or mail this form and your check to: White-Collar Crime Fighter, 213 Ramapoo Rd., Ridgefield, • Locating hidden assets in fraud
CT 06877. You can contact White-Collar Crime Fighter by E-Mail: subscribe@wccfighter.com cases

Anda mungkin juga menyukai