In the beginning of my career, someone once told me, "People commit fraud, not internal controls." So, if we are to perform a proper analysis of fraud risk, then we need first to assess people. No, I do not mean a psychological profile. To me, it means the opportunity the person has by virtue of the position in the business cycle. Or by their sophistication to conceal the fraud scheme. Or, by understanding the natural vulnerabilities that exist within their business system.
Without this analysis, your fraud risk assessment is simply an academic exercise to satisfy a standard. Or more bluntly, your fraud risk assessment is designed to fail. Sorry!
In our risk assessment, we have five categories of offenders. The first-time offender, repeat offender, crime groups, management, and external parties. Who the external offender might be depends on where we are in the business cycle. For instance, in the expenditure cycle, the external party is the vendor, and in the revenue cycle, it would be the customer, etc.
With each category, we need to understand how they would commit the scheme (fraud scenario) and how they would create the illusion of propriety (concealment strategies). Then, we need to consider whether we have the right preventive and detective controls to mitigate the fraud risk for each category of offender.
Now, let’s look at a real-life example of how an organized crime group committed a theft of assets scheme.
Three individuals were sentenced recently for their participation in a scheme to defraud the Georgia Department of Labor (GaDOL) out of tens of millions of dollars in benefits meant to assist unemployed individuals during the COVID-19 pandemic.
According to court documents and evidence presented in court, from March 2020 through November 2022, three individuals and their co-conspirators caused more than 5,000 fraudulent unemployment insurance (UI) claims to be filed with the GaDOL, resulting in at least $30 million in stolen benefits.
To execute the scheme, the defendants and their co-conspirators created fictitious employers and fabricated lists of purported employees using personally identifiable information (PII) from thousands of identity theft victims and filed fraudulent unemployment insurance claims on the GaDOL website. The conspirators obtained PII for use in the scheme from a variety of sources, including by paying an employee of an Atlanta-area health care and hospital network to unlawfully obtain patients’ PII from the hospital’s databases, and by purchasing PII from other sources over the internet. Using victims’ PII, the three perpetrators and their co-conspirators caused the stolen UI funds to be disbursed via prepaid debit cards mailed to various locations. The identity theft victims and unwitting participants were purported employees of several fictitious companies, which were created to execute this fraud scheme.
FYI, we know that unemployment fraud was rampant in all states during COVID. So, was this a COVID issue or the failure of the state unemployment offices to understand how a crime group could perpetrate unemployment fraud? Let’s be honest, individuals have been committing unemployment fraud since the beginning of unemployment insurance.
Put on your auditor hat and start by creating your fraud risk assessment by creating two different fraud risk statements
What makes the expected fraud scheme different from the unexpected fraud risk statement?
Without access to the various state unemployment office fraud risk assessment documents, we can only surmise what they say or do not say. We can also only guess what internal controls they had in place and what internal controls they did not have in place.
If I may, let’s talk about a few strategies that may have prevented this fraud or at least minimized it.
By understanding how the category of person committing the fraud risk statement, we can better identify the right internal controls for each fraud risk statement. In this case, here are some things that could have been considered a red flag
So, was their fraud risk assessment process designed to fail? I think you know the answer.
So many times, I hear auditors say, "You need to think like a thief." So, do you think you could think like Simon? Could you pull off these schemes? In my opinion, think like an auditor. You need to know fraud risk, fraud concealment, internal control theory, and the principles of fraud auditing better than the thief.
There is little doubt that AI is creating new opportunities for individuals to perpetrate fraud schemes. Voice-overs or creating the image of someone are being used to gain access to your business systems. Your phone rings, and it looks like someone you know is calling you. But before all of this wonderful technology, let's see Hollywood already perpetrate some of these schemes. Please name the person
I am not minimizing the fraud risk created by AI, but in many ways, Hollywood understood how to create impostors a long time ago.