Who caused the failure of a bank via illicit stock trades? Nick Leeson
Who almost caused the failure of a bank due to illicit stock trades? Jérôme Kerviel
What carpet cleaner was listed on Forbes? Barry Minkow
Which was the first widely publicized case of computer crime to conceal a financial statement fraud? Equity Funding. I remember when this case was first publicized, and I must admit, it started with my fascination with fraud as an auditor.
I introduced a concept at this year’s ACFE 2022 Global Fraud Conference that I would like to now share with all my colleagues. Simply stated, it is that the fraud risk universe is the science of identifying all fraud risks both known and unknown impacting all organizations on a worldwide basis. To unpack that, let’s start with explaining the term “science.”
Science is the pursuit and application of knowledge and understanding of the natural and social world following a systematic methodology based on evidence. Source: Science Council.
In this blog, I will discuss the systematic methodology that allows us to achieve the goal of understanding all fraud risks facing your organization. The systematic methodology requires us to identify the key elements of the fraud risk universe.
With this high-level structure of the fraud risk universe, let’s take a look at each level.
There are two parties to every fraud transaction:
The first question you must ask: Who are these parties?
The primary category of fraud will provide clues to identifying these parties. For instance, in financial reporting, the perpetrator is typically someone in the financial reporting department or a corporate officer. The victim is the party that relies on the financial statement. In corruption schemes, the perpetrator is typically an internal decision maker in collusion with an outside party. The victim may be either the company or an external party.
As with most rules, there is typically an exception. Vendor bid rigging, another type of corruption scheme, does not have an internal party.
What are the primary and secondary categories of fraud?
The three most common primary categories of fraud risk are financial reporting, asset misappropriation, and corruption. However, other categories would include revenue obtained improperly, expense or liability avoidance, government regulation avoidance, improper obtaining, loss, or use of information. Lastly, you would need to identify those categories associated with your industry.
Each primary category has specific nuances that must be identified and understood. For example, with financial reporting, you must identify whether the misstatement will be an overstatement or an understatement. However, the direction of misstatement is not relevant to asset misappropriation schemes.
The primary categories of fraud risk are broad. To better understand, classify and describe fraud risk, I believe we should create subcategories. To illustrate using asset misappropriation, the secondary categories are:
The next step is to identify the fraud risk statements relevant to the business system within the primary category as well as the secondary category of the business system.
We use the perpetrator, victim, and categories of the fraud risk universe to create our audit scope. The fraud risk statement describes “what” could happen within each fraud category. It becomes the basis of our fraud risk assessment, fraud data analytics, and fraud auditing.
The five elements of a fraud risk statement are
The number of fraud risk statements is based on the permutations of each element. The number of permutations of each element is a finite number. At this level, we start by identifying the permutations of each element and then use a mathematical matrix theory or what is known as “combinatorics.” The goal of this phase is to understand “what" can happen rather than “how” it can happen.
In this phase, we are translating the generic fraud risk statement to the specific business system. In practice, you can go straight to the fraud risk statement phase for the core business system rather than starting with the generic fraud risk statement phase. Let’s take a close look at the following two schemes.
Budget owner acting alone or in collusion with a direct report / causes a shell company to be set up on the vendor master file / processes a contract and approves a fake invoice for goods or services not received / causing the diversion of company funds.
Loan officer acting alone or in collusion with a mortgage broker / causes a customer (straw customer) / to file a loan application, through submission of false documentation causes a loan to be issued based on nonexistent collateral or overvalued collateral / causing the diversion of bank funds.
At first glance, they sound different, but on closer examination, the structure of the two schemes is remarkably similar. They both have the same five components and both involve a false entity. The real difference is that one fraud risk statement is for accounts payable while the other is for loans in a bank.
Unlike the fraud risk statement, the number of fraud scenarios should be viewed as infinite. While I do not believe the number is infinite, I am sure that we can not count or identify all of them. This is why at that phase I classify fraud scenarios into three categories:
The goal of this phase is to understand how the perpetrator would commit the fraud risk statement, pierce your internal controls, and create the illusion that the transaction is proper. In my June blog, I discussed the concept of a vulnerability assessment. I encourage you to read it.
In the next few blogs, I will elaborate on each element of the fraud risk structure that I have introduced in this blog. FYI, in next month’s blog, I will discuss the entity structure in the fraud risk statement.
Fraud risk identification is the starting point for making audit the number one reason for fraud detection.
Last month we identified the person as Nick Lesson, so the following questions are based on the life events published in books regarding Barings Bank.
Why is this important to the auditing profession?