Fraud risk management iia singapore conferenec 2013
-
Upload
tommy-seah -
Category
Business
-
view
351 -
download
1
description
Transcript of Fraud risk management iia singapore conferenec 2013
![Page 2: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/2.jpg)
Important Disclaimer
• A speaker’s opinions are just that – opinions
• Not offering legal advice – just discussing principles
• Any questions from audience welcome, but any replies are general comments only and should not be construed as legal advice
2
![Page 3: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/3.jpg)
3
What is FRAUD ?
ICFE CONSULTANCY GROUP PTE LTDInternational Cybercrime & Forensics Examiners www-icfe-cg.com
![Page 4: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/4.jpg)
4
Principles of FraudFIVE (5) ELEMENTS OF FRAUD
Mens Rea - Criminal Intent
Actus Reus - Criminal Action
Carelessness or Innocence on the part of the victim
An active participation by the victim as a result of the carelessness or innocence
The transaction is concealed to prevent detection.
![Page 5: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/5.jpg)
The Fraud Triangle
Per
ceiv
ed
Pre
ssure
Ratio
naliza
tio
n
Perceived OpportunityAuditor’s Domain
Fraud Risk Management
Fraud Risk Management
5
![Page 6: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/6.jpg)
14
Fraud Classification System
6
![Page 7: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/7.jpg)
Internal Controls
7
![Page 8: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/8.jpg)
8
The
Trinity
of
Controls
Internal Audit Internal Audit CPA(CIA) CPA(CIA) CSI, CSI,
CISACISA
ComplianceCompliance
CPA,LLB,CPA,LLB, CSICSI
Risk Risk ManagementManagement
CPA,CFA CPA,CFA CSICSI
Financial Control
The Fraud ExaminerThe Fraud Examiner
CFECFE
The Certified System Investigator
CSI
The Existing model
![Page 9: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/9.jpg)
Limitations of Internal Control
Errors may arise from misunderstandings of instructions, mistakes of judgment, fatigue, etc.
Controls that depend on the segregation of duties may be circumvented by collusion
Management may override the structure
Compliance may deteriorate over time
9
![Page 10: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/10.jpg)
10
What is Risk ?What is Risk ?
BB
EE
CC
DD
AAOperational Risk
Liquidity Risk
Credit Risk
Reputational Reputational RiskRisk
Market Risk
What happened to
![Page 11: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/11.jpg)
Fraud Control Principle(the correct way in understanding
anything is to understand the principles involved)
11
![Page 12: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/12.jpg)
12
No organization is immune to fraud – the next step is to
Acknowledge the need for fraud risk management.
12
![Page 13: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/13.jpg)
Copyright (c)2006 13
Regardless of these variables, any Fraud Risk Management model should aim to achieve one, or all, of the fiveprimary objectives:
13
![Page 14: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/14.jpg)
Copyright (c)2006 14
The firstprimary objective:_ Prevention
14
![Page 15: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/15.jpg)
Copyright (c)2006 15
The secondprimary objective:_ Deterrence
15
![Page 16: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/16.jpg)
Copyright (c)2006 16
The thirdprimary objectives:_ Disruption
16
![Page 17: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/17.jpg)
Copyright (c)2006 17
The fourthprimary objective:_ Identification
17
![Page 18: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/18.jpg)
Copyright (c)2006 18
The fifthprimary objective:_ Civil action/criminal prosecution
18
![Page 19: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/19.jpg)
Copyright (c)2006 19
How to achieve the FIVE Objectives ?
We need direction……….
19
![Page 20: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/20.jpg)
Use the Compass to get the right direction
in detecting/preventing
Fraud
20
![Page 21: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/21.jpg)
The eight points on the compass are:
1. The fraud environment
7
Compass for Fraud Detection
1
2
3
4
5
6
2. The types of fraud
3. The execution of the fraud
7. Accomplice identification
4. eDiscovery
5. Preliminary evidence evaluation
6. Evidence collection
21
![Page 22: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/22.jpg)
Determination by Area
Determination by Scheme
Determination by Person
The approach…….
22
![Page 23: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/23.jpg)
23
Collusion between employees and third parties
represents a growing number PROCUREMENT frauds in SINGAPORE.
![Page 24: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/24.jpg)
24
What type of individual commits FRAUD?
It is not limited to any one type of person.
Human element in all fraud
ICFE CONSULTANCY GROUP PTE LTDInternational Cybercrime & Forensics Examiners www-icfe-cg.com
![Page 25: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/25.jpg)
25
Conclusion: Fraud Perpetrators Look Exactly Like Us!
Optimistic High self-esteem
Achieving Family harmony
Socially conforming Self control
Kind Sympathetic
![Page 26: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/26.jpg)
26
Given the right circumstances, almost
everyone can rationalize that it is OK to commit fraud..
26
Profile of A Person Who Commits Fraud
![Page 27: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/27.jpg)
27
“Red Flags”
Text
AlcoholAlcohol GamblingGambling
DrugsDrugs
SexSex
Profile of A Person Who Commits
Fraud
Given the “right circumstances”, almost everyone can rationalize that it is OK tocommit fraud..
![Page 28: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/28.jpg)
28
The key, in any effective anti-fraud program, is to strike the right balance between
oversight
and
trust
![Page 29: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/29.jpg)
The
4
Investigative methods
29
Proving wrongdoing
![Page 30: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/30.jpg)
Covert Investigative Methods1.Surveillance and covert operations2.Invigilation3.Seizing and searching digital evidence on computers4.Physical evidence
Concealment Investigative
Methods1.Document examination2.Digital Audits3.Electronic searches4.Physical asset count
Conversion investigative
Methods1.Searching public records2.Online resources3.The net worth methodInquiry Investigative
Methods1.Interviews/Profiling and interrogation2.Honesty testing
30
![Page 31: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/31.jpg)
31
The problem with proving intent is that it requires determining a person’s state of
mind.
As a result, intent usually is proven circumstantially.
![Page 32: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/32.jpg)
32
Some of the ways we can help prove intent by circumstantial evidence include:
Motive : The motive for fraud is a strong circumstantial element.
Opportunity : Management typically has the opportunity to circumvent or override controls over financial reporting.
![Page 33: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/33.jpg)
33
Some of the ways we can help prove intent by circumstantial evidence include:
Repetitive acts : Should the financial statements contain a single false journal entry, a fraudster might be able to claim it was an error.
![Page 34: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/34.jpg)
34
Some of the ways we can help prove intent by circumstantial evidence include:
Witness statements : Circumstantial evidence rarely can be sufficient without the statements of witnesses.
![Page 35: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/35.jpg)
For those new to evidence in general, inculpatory evidence is that which
supports a charge or accusation of wrongdoing.
Inculpatory Evidence
35
![Page 36: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/36.jpg)
exculpatory evidence is that which would cast doubt or prove innocence.
Exculpatory Evidence
36
![Page 37: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/37.jpg)
Evidence used in Fraud Conviction:
“Tools and techniques to recover, preserve, and examine digital evidence on or transmitted by digital devices.”
PLUS data recovery
![Page 38: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/38.jpg)
![Page 39: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/39.jpg)
Sources of Digital Evidence Computers
4 Email4 Digital images4 Documents4 Spreadsheets4 Chat logs4 Illegally copied software or other
copyrighted material
39
![Page 40: Fraud risk management iia singapore conferenec 2013](https://reader035.fdocuments.us/reader035/viewer/2022062404/55498653b4c90582588b5097/html5/thumbnails/40.jpg)
40
Thank youThank you
Contact Information:
Tommy Seah
CFE, CSI, FCPA,ACIB,MSID
Regent Emeritus
ACFE Board of Regents, Texas, USA
www.cfe-in-practice.com
Phone : + (65) 9106 9872