1 / 62

Detecting & Prosecuting Fraud 2 June 2010

Detecting & Prosecuting Fraud 2 June 2010. Army Day. What is Fraud?. Fraud is defined by Generally Accepted Government Auditing Standards as a type of illegal act involving the obtaining of something of value through willful misrepresentation. Common Types of Fraud.

halona
Download Presentation

Detecting & Prosecuting Fraud 2 June 2010

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Detecting & Prosecuting Fraud 2 June 2010 Army Day

  2. What is Fraud? • Fraud is defined by Generally Accepted Government Auditing Standards as a type of illegal act involving the obtaining of something of value through willful misrepresentation.

  3. Common Types of Fraud • Theft of cash, supplies, inventory, equipment, and information • Skimming • Fictitious disbursement • Duplicate billing • Billing for goods not delivered or services not performed • Inflated employee expense claims—travel vouchers • Payroll fraud • Fraudulent financial statements or performance reports • Bribery and kickbacks • Bid rigging • Corruption • Conflict of interest • Unauthorized use of government property • Falsifying information • Overtime fraud • Contractor misrepresenting or overstating costs • Contractor misrepresenting self as small/disadvantaged business • Product substitution • Noncompliance with contract specifications

  4. Fraud Characteristics • Most frauds begin small and continue to grow over time. • Fraudsters primarily exploit inadequate internal controls for their own gain. • Fraudsters usually try to conceal fraud by making false entries into systems.

  5. Fraud Characteristics • Typical fraudster: • Middle age • Member of management • Employed by the organization for a number of years • In position of trust • Educated • Head of household • Member of community organizations

  6. Fraud Indicators • Management override of key controls. • Inadequate or weak internal controls. • No written policies and procedures. • Overly complex organizational structure. • Key employee never taking leave or vacation. • High turnover rate, reassignment, firing of key personnel.

  7. Fraud Indicators • Missing electronic or hard copy documents that materialize later in the review. • Lost or destroyed electronic or hard copy records. • Photocopied documents instead of originals.  Copies are poor quality or illegible. • “Unofficial” electronic files or records instead of “archived” or “official” files or records. • Revisions to electronic or hard copy documents with no explanation or support. • Use of means of alteration to data files.

  8. Fraud Indicators • Computer-generated dates for modifications to electronic files that do not fit the appropriate time line for when they were created. • Missing signatures of approval or discrepancies in signature/handwriting. • Computer report totals that are not supported by source documentation. • Lengthy unexplained delays in producing requested documentation.

  9. How is Fraud Detected? • Audits • Government Employees • Hotline Allegations/Tips • Accident • Crime Prevention Surveys

  10. Fraud Detection Statistics • Certified Fraud Examiners Survey 2008 showed fraud detection as: • 66% by tips or accidents • 28% by audits

  11. Auditor’s Responsibilities • In planning an audit, auditors should assess risks of fraud occurring that is significant within the context of the audit objectives (workplace/individual pressures, opportunity, rationalization). • Auditors should design procedures to provide reasonable assurance of detecting fraud if risk factors indicate that fraud has or is likely to occur.

  12. Auditor’s Responsibilities • Auditors should extend audit steps to determine whether fraud has likely occurred if information comes to the auditors’ attention indicating that fraud that is significant within the context of objectives may have occurred. • When risk factors are identified, auditors should document the risk factors identified, the auditors’ response to those risk factors individually or collectively, and the auditors’ conclusions .

  13. What is Fraud Risk? • The possibility of asset misappropriation, misuse of entrusted power, and the intentional misreporting/concealment of information for private gain. • Risk is measured in terms of: • Impact. • Likelihood.

  14. Fraud Risk Assessment • Determine relevant fraud risks within context of audit objectives. • Identify potential fraud schemes and prioritize them based on risk. • Map existing controls to potential fraud schemes and test controls. • Test for fraud. • Document and report on the fraud risk assessment.

  15. Investigative Referral Process • Contact investigators about potential fraud whenever audit results show: • Presence of one or more “red flag” fraud indicators combined with risk assessment showing heightened fraud risk and major control weaknesses. • Actual examples or evidence of potentially fraudulent activity (e.g., falsified documents or misrepresentation, vendor overbilling, and/or testimonial statements). • Contact your Office of Counsel to discuss fraud risk and indicators.

  16. Investigative Referral Process • Auditor’s role in supporting investigations & prosecutions: • Provide analytical support to investigators. • Assist the activity in correcting internal control weaknesses that allowed fraud to occur. • Provide working papers to U.S. Attorney. • Testify as requested.

  17. Case Studies • Kuwait Contracting • Vendor Payments In Southwest Asia • Active Duty Military Payroll Adjustments • Role Players At Joint Multinational Training Center • Job Order Contracting In Europe

  18. CASE STUDY #1 KUWAIT CONTRACTING

  19. Identified Fraud Indicators • Contract awarded to highest bidder and KO’s rationale not reasonable. • Unreasonably high prices. • Limited competition.

  20. Referral to CID • Command could not provide reasonable explanation concerning fraud indicators. • CID interested because: • Fraud indicators significant and involved multi-million dollar contract. • Investigators were investigating contractor based on allegation from Government employee.

  21. Investigative Support • Performed analyses on contractors’ current and past contracts to estimate overpayment. • Higher unit prices. • Unreasonable quantities. • Performed audit at the contracting office to assess the adequacy of internal controls and to determine whether significant fraud indicators existed for other contracts.

  22. Fixing Internal Controls • Audit and investigation led to significant changes to improve contracting operations. • Kuwait office reorganized and staff increased. • Task Force established to look at contracting operations throughout SWA. • Established the Gansler Commission.

  23. CASE STUDY #2 VENDOR PAYMENTS IN SOUTHWEST ASIA

  24. Identified Fraud Indicators • Hard copy voucher packages didn’t provide sufficient support to validate vendor payments. Voucher error rates: • 50% (563 of 1,116) in statistical sample. • 27% (105 of 394) judgmental (on-site) sample. • Automated data didn’t always match hardcopy voucher packages or actual operations. • Limited Depository Accounts (LDAs) not reconciled. • Lack of separation of duties. • Insufficient internal control program – checklist mentality.

  25. Referral to CID • Breakdowns with purchasing, accountability and payments processes. • Billing without support – 2,199 purchases ($5.5M) didn’t have proper support for requisitions. • Poor recordkeeping – about $640.7M in unaccounted for property. • Invalid payments – $47M on 4 invoices sampled were invalid payments due to lack of supporting documentation.

  26. Referral to CID • Developed partnership with CID early in audit process – continual communication. • CID interested in audit results due to increased number of fraud cases related to contracting and personnel handling cash on the battlefield. Examples of recent known cases: • An officer pilfered CERP funds ($690,000). • An officer falsified currency fluctuation rate ($400,000).

  27. Investigative Support • Provided names of individuals with access to cash – used to conduct FinCEN checks. • Conducted attestation on questionable purchases in Iraq based on vendor payment information. • Identified potential duplicate payments as part of data mining effort – 3,000 potential duplicate payments. • Continuing to refer questionable purchases and improperly supported payments based on audit results.

  28. Fixing Internal Controls • Cash off the Battlefield. • Vendor Pay Summit (April 2010) - members of fiscal triad collaboratively worked through contracting and payment issues. • Finance Management Workshop (May 2010) -addressed training and automation challenges. • Finance Management Command - revising internal control program (incorporating risk assessment).

  29. CASE STUDY #3 Active Duty Military Payroll Adjustments

  30. CID Request • Notified by California National Guard CID in Nov 2005. • AR 15-6 investigation completed. • Numerous suspicious DFAS transactions. • Occurred at U.S. Property & Fiscal Office, California. • Audit support requested on 15 Dec 2005.

  31. Investigative Support • Agreed Upon Procedures: • Verify accuracy of each Soldier’s pay, allowances, and adjustments while on Active Duty. • Compare each Soldier’s pay, allowances, and adjustments by month from Jan 2004 through Dec 2005. • Identify any unusual payroll transactions.

  32. Auditor Conclusions • $724,048 paid to 5 individuals over 24 months. • Transactions included Gross Pay, Basic Allowance For Housing, Miscellaneous Other Credits (W7). • 55 transactions—53 from California, 2 from Kuwait. • $323,228 in overpayments.

  33. Investigative Outcomes • Verified money received by 5 suspects. • Clear instances of kickbacks totaling about $150K. • One instance of one soldier’s pay going into another soldier’s bank account. • One soldier clearly identified as the leader.

  34. Followon Referral • Based on CID support, expanded review of high-risk manual payroll adjustments for Reserve Component soldiers receiving Federal active duty pay. • Identified a National Guard soldier who received high-dollar payments ($220K over 18 months). • Referred to investigators—Nov 2006. • DCIS request for audit support—Dec 2006.

  35. Investigative Support • Agreed Upon Procedures: • Explain pay & allowance system used by DFAS for processing Reserve Component pay. • Macro analysis of pay & allowances associated with suspect account/any other pay accounts. • Onsite analysis of questionable manual transactions to determine who processed them. • Determine origination of funds for suspect transactions.

  36. Auditor Conclusions • 85 unsupported payment transactions resulting in $728,181 loss. • Transactions were result of pay account adjustments made by 2 DFAS employees: • 81 transactions paid to one individual—loss of $698,181. • 4 transactions paid to another individual—loss of $30,000.

  37. Fixing Internal Controls • Followon Audit of Miscellaneous Credits For Reserve Component Pay disclosed 4 causative factors that allowed fraud to occur without detection: • No tax impact—once processed unlikely to be reviewed/audited. • Use varied greatly among pay offices. • Used routinely for transactions that had legitimate transaction codes. • DJMPS-RC lacked controls to track & identify source of entry for pay transactions.

  38. Fixing Internal Controls • Inconsistently applied or ineffective controls were result of pay offices not having established guidance for processing W7 transactions. • These controls either weren’t in place or weren’t consistently followed: • Daily reconciliation of processed transactions. • Supervisory reviews of high-dollar transactions. • Document maintenance to support transactions. • Uniform guidance on use of miscellaneous credit transactions.

  39. Fixing Internal Controls • Recommendations: • Develop uniform guidance for managing miscellaneous credit transactions: • Reconciliation of daily transaction logs. • Appropriate Use Of W7 Transactions. • 100% review & support for miscellaneous credit transactions over a predetermined amount. • Test & implement system changes to correct site of entry weakness.

  40. CASE STUDY #4 ROLE PLAYERS AT JOINT MULTINATIONAL READINESS CENTER

  41. Identified Fraud Indicators • Poor internal controls for tracking attendance of contract role-players. • COR didn’t document contractor deficiencies. • Contractor’s invoice wasn’t mathematically accurate. • Neither COR’s nor contractor’s daily attendance records supported contractor’s invoice.

  42. Referral to CID • Follow-up interviews with COR raised more “red flags”: • Admitted he was aware the invoice wasn’t accurate. • Told us he and contractor’s lead employee were close friends. • Exhibited an unusually high-level of nervousness. • Made unusual statements concerning guilt. • CID interested because: • Numerous fraud indicators. • Critical theater contract. • Vale of contract.

  43. Investigative Support • Reconstructed invoice using available documentation. • Concluded the contractor billed: • For role-players it didn’t provide. • Using incorrect rates. • For contractors who were sick (unavailable). • Army overpaid the contractor about $807,000 (for a task order valued at about $4.6 million).

  44. Fixing Internal Controls • Audit and investigation led to significant changes in personnel and improvements to controls: • COR removed and retired (also debarred). • Contractor’s lead employee was terminated and debarred. • Funds recovered (entire amount). • Command revised its processes and improved contract oversight (confirmed by follow-up audit)

  45. CASE STUDY #5 JOB ORDER CONTRACTING IN EUROPE

  46. CID Request • Local national employee allegedly inflated IGEs to collude with contractors. • CID requested audit support for its investigation. • Audit evaluated whether processes and controls for preparing IGEs and contracting for work resulted in best value.

  47. Investigative Support • Identified high degree of commonality between IGE and contractor proposal for 30 of 33 task orders: • 17 with over 30% identical line items. • 9 with over 70% identical line items. • 4 with over 90% identical line items. • Re-creation of 4 IGEs showed DPW personnel inflated IGEs: • Independent estimates significantly lower than garrison IGEs and contractor proposals.

  48. Investigative Support • Identified 4 government employees who shared or falsified IGEs: • 1 got kickbacks (terminated and undergoing prosecution). • 3 to expedite contracting process. • Expanded scope to two other garrisons and found similar results.

  49. Control Weaknesses • Process weaknesses: • Work wasn’t described adequately. • Revised desk estimates weren’t supported with justifications. • SOWs didn’t clearly describe work required. • IGEs weren’t properly prepared or reviewed. • Contractor’s proposals weren’t properly controlled and safeguarded. • Negotiations not documented sufficiently. • Inadequate separation of key duties.

  50. Control Weaknesses • Guidance weaknesses: • Regulatory guidance wasn’t followed. • Regulatory guidance wasn’t incorporated into garrison SOPs. • Oversight weaknesses: • Feasibility studies weren’t performed. • Results of bi-annual inspection reviews weren’t reported to appropriate levels.

More Related