SlideShare a Scribd company logo
1 of 94
E
M
A
C Fraud Risk Management
By Sako Mayrick
Elsam Management Consultants
Elsam Management Consultants-www.elsamconsult.com 1
FRAUD RISK MANAGEMENT
Training Materials
March,2015
E
M
A
C
 Introduction
 Nature and types of fraud
 Internal controls against fraud
 Fraud as a risk
 Evolution of Operational Risks
 Fraud as a major operational risk
 Why people commit Fraud
 Fraud indicators
 Fraud risk management techniques
 FRM – Good practice guide
Elsam Management Consultants-www.elsamconsult.com 2
Coverage
E
M
A
C
 20% of government expenditure is lost through corruption in
Tanzania equivalent to Tshs.
 Corruption costs global economy $1.5 trilion every year
 The detection recovers only small amount
 High percentage of frauds are committed by senior
management and executives
 Greed is one of the main motivators for committing fraud
 Fraudsters often work in finance function
 Every sector is affected by fraud
 It is high prevalent in developed countries
 With all these facts, many organisations still do not have
formal systems and procedures in place to prevent, detect
and respond to fraud.
Elsam Management Consultants-www.elsamconsult.com 3
Introduction
E
M
A
C
 Fraud is a complex subject regard its
 It can mean
 Theft
 Corruption
 Conspiracy
 Embezzlement
 Money Laundering
 Bribery
 Extortion
 DeceptionElsam Management Consultants-www.elsamconsult.com 4
Introduction
E
M
A
C
 Forms of fraud
 Crimes by individuals e.g. substandard goods, pyramid
schemes
 Employee fraud e.g. payroll, expense, theft of cash, assets
or IP
 Crimes of business against investors or consumers or
employees
 Crimes against financial institutions
 Grant fraud, tax evasion
 Counterfeit
 E-crimes
Elsam Management Consultants-www.elsamconsult.com 5
Introduction
E
M
A
C
 Internal control is
 A process consisting of ongoing tasks and activities. It is a means
to an end and not the end in itself
 Effected by people. It is not merely about policy manuals, system
and forms but about people at every level of organization that
impact internal control
 Able to provide reasonable assurance, not absolute assurance, to
an entity’s senior management and board
 Geared to the achievement of objectives in one or more separate
overlapping categories
 Adaptable to the entity structure
 It is designed to provide reasonable assurance regarding the
achievements of objectives; effectiveness and efficiency of
operations, reliability of reporting and compliance with
applicable laws and regulations
Elsam Management Consultants-www.elsamconsult.com 6
Internal Control and Fraud
E
M
A
C
COSO - Framework (Control
Framework)
7Elsam Management Consultants-www.elsamconsult.com
Case Study 1
A Car internal
control
exemplification
E
M
A
C
End of session I
Elsam Management Consultants-www.elsamconsult.com 8
E
M
A
C
• Operational risk attaches itself to people, systems
and process
• Operational risk is the risk of loss resulting from
inadequate or failed internal processes, people
and systems or from external events.
• It includes other risks such as legal risks, physical
risks, political risks and environmental risks
• Fraud is part of operational risk in any
organization
 Internal fraud such as tax evasion, assets
misappropriation, bribery, corruption and larceny
 External fraud such as theft, forgery, hacking and
information theft
Elsam Management Consultants-www.elsamconsult.com 9
Fraud as risk
E
M
A
C
Credit
Risk
Market
Risk
Operation
al Risk
Complianc
e Risk
Informati
on Risk
Data Risk Other Risk
Basic Strategic ERM Integrated
Elsam Management Consultants-www.elsamconsult.com 10
Evolution of Operational Risk
E
M
A
C
• Joint McKinsey finds have shown that risk
management has not been able to prove its value
to organization
• Operational risk is seen as immature discipline that
has often not proven its value to organization
• There is evidence that operational risk can be
destructive as market loose faith in management
and control following large events (Enron Case)
• The discipline is focused more on measurement
than on management
Elsam Management Consultants-www.elsamconsult.com 11
Perception on operational Risk
E
M
A
C
• Fraud is a broad legal concept that generally
refers to an intentional act committed to
secure an unfair or unlawful gain.
• Misconduct is also a broad concept, generally
referring to violations of laws, regulations,
internal policies, and market expectations of
ethical business conduct.
• It is an intentional act by one or more
individuals among management , those
charged with governance, employee or third
parties involving the use of deception to obtain
an unjust or illegal advantage
Elsam Management Consultants-www.elsamconsult.com 12
What is fraud?
E
M
A
C
Fraud commonly includes activities
such as theft, corruption,
conspiracy, embezzlement, money
laundering, bribery and extortion.
It involves using deception to
dishonestly make a personal gain
for oneself and / or create a loss for
another.
Elsam Management Consultants-www.elsamconsult.com 13
Scope of Fraud
E
M
A
C
• Pressure on employee to misappropriate
cash or organizational assets
• Employees/people committing fraud are
not career criminals, they are trusted
employees
• Dr. Donald Cressey, a criminologist
developed a model to get reasons for why
people in trust commit fraud (Case Study II)
• Model is referred as fraud triangle
Elsam Management Consultants-www.elsamconsult.com 14
Why people commit fraud?
E
M
A
C
• Most of fraudsters are first time offenders with
no criminal past and therefore don’t view
themselves as criminals (See Arthur Andersen
case)
• They must always justify the crime in a way that
makes it an acceptable and justifiable act
(rationalization) e.g. I was underpaid, my
employer cheated me, my employer is
dishonest, I was entitled to the money or I was
only borrowing money.
Elsam Management Consultants-www.elsamconsult.com 15
Causes of Fraud - Rationalization
E
M
A
C
Fraud
Pressure
or
Incentive
Rationalizati
on
Opportunity
Elsam Management Consultants-www.elsamconsult.com 16
What causes fraud?- Fraud Triangle
All the three factors must be present for fraud to occur, if any one of the
three is missing, fraud will not occur
E
M
A
C
Elsam Management Consultants-www.elsamconsult.com 17
Why fraud happens?
Fraud Need/
Rationalization
•Every one
Does it
•Simply borrow
-money
Pressure
Unrealistic
Corporate
Target can
Force
Employees to
Commit fraud
Opportunity- due to weak
And override of controls
E
M
A
C
• It is a perceived non-sharable financial pressure
• Non-Shareable involves some sort of embarrassment,
shame or disgrace
• It is the first motivation for crime
• A person may have financial problem that cannot be solved
through legitimate means
 Consideration for illegal acts such as stealing cash or falsifying a
financial statement as a way to solve problem
 It can be deep personal debt or a job/business is in jeopardy e.g.
Desire for status symbol eg. Big house, nicer car; need to meet
productivity targets; drug or gambling addition or inability to
pay bills ( See the Enron Case Study)
 It can sexual addiction and importance of status
Elsam Management Consultants-www.elsamconsult.com 18
Causes of Fraud (Pressure/Incentive)
E
M
A
C
• It is a perceived opportunity defining method by
which crime can be committed
• Involves uses of position of trust to solve financial
problems
• It is critical that the fraudster be able to solve
problem in secret since motivation is over the
status
• Always the fraudster will act in secret e.g. forcing
bank reconciliation to balance if he had paid a
cheque to oneself ( See a case of TV show)
Elsam Management Consultants-www.elsamconsult.com 19
Causes of fraud (Opportunity)
E
M
A
C
• Not applicable to professional fraudsters or
predatory employees ( employees taking job with
intent to stealing from the employer)
• Rationalization is only necessary for first
commitment of fraud and afterwards it is
abandoned
• Comprehensive case study – Fraud triangle ( see
handouts and FRM Manual)
Elsam Management Consultants-www.elsamconsult.com 20
Fraud Triangle - Limitations
E
M
A
C
• Reduce pressures on employees that might push
them to committing fraud
• Reduced perceived opportunities to commit fraud
• Dispel rationalization for engaging in fraudulent
conduct
• Sanctions does not work, why
 Fraudsters never think that they can be caught in a
perceived opportunity
 Fraudsters always rationalize their conduct
 Sanctions are only secondary consideration
Elsam Management Consultants-www.elsamconsult.com 21
Fraud Triangle-Deterrence measures
E
M
A
C
22
Types of fraud
Fraudulent
Financial
Reporting
Asset
Misappropriation
Other
Questionable
or Improper
Business
Practices
 Manipulation, falsification/alteration of records
or documents
 Misappropriation of assets
 Suppression or omission of the effect of
transaction from records or documents
 Recording transaction without substance
 Misapplication of accounting principles
 These can be elaborated on this
presentationElsam Management Consultants-www.elsamconsult.com
E
M
A
C
Elsam Management Consultants-www.elsamconsult.com 23
Types of Internal Fraud
E
M
A
C
End of Session II
Elsam Management Consultants-www.elsamconsult.com 24
E
M
A
C
 Types
 Warning Signs
Organization indicators
Business risks, financial risk, environmental risk
IT risk
Data risk
 Fraud Alerts
These are red frags
The list is not exhaustive
They appear in many different guises
Elsam Management Consultants-www.elsamconsult.com 25
Fraud Indicators (Red Flags)
E
M
A
C
 Business risks
 Cultural issues, management issues, employee issues, process
issues and transaction issues
 Cultural issues include; absence of ant-fraud policy and
culture, failure of management to develop sound system of
internal control
 Management issues include; lack of financial management
expertise and professionalism, history of legal or regulatory
violation, strained relationship between management,
internal and external auditors, lack of management
supervision of staff, lack of clear management control of
responsibility, bonus schemes linked to ambitious targets
Elsam Management Consultants-www.elsamconsult.com 26
Fraud Indicators
E
M
A
C
 Business Risks
 Employee issues includes; inadequate recruitment process and
absence of screening, Unusual close relationship, internal and
external,Potential or actual labor reduction, dissatsfied employees
who have access to desirable assets, unsual staff behavior patterns,
personal financial pressure on key staff, low salary levels of key staff,
poor dessmination of internal controls, employees working unsocial
hours unsupervised, employees not taking annual leave requirements,
unwillingness to share duties.
 Process issues include; lack of job segregation and independent
checking, lack of identification of assets, poor management
accountability and reporting systems, poor physical security of assets,
poor access controls to physical assets and IT security systems, lack or
inadequate internal controls, poor documentation support, large cash
transactions, susceptibility of assets to misappropriation
Elsam Management Consultants-www.elsamconsult.com 27
Fraud Indicators
E
M
A
C
 Financial Risks
 Unrealistic management targets
 Significant pressures on management
 Extensive use of tax havens without clear
business justifications
 Complex transactions
 Use of complex financial products
 Complex legal ownership
 Rapid changes in profitability
 Personal or corporate guarantees
Elsam Management Consultants-www.elsamconsult.com 28
Fraud Indicators
E
M
A
C
 IT and Data risks
 Unauthorized systems access
 Wealth of malicious codes and tools for attackers
 Rapid changes in information technology
 Users not adopting good computer security practices
 Unauthorized electronic transfer of funds and other assets
 Manipulation of computer programs
 Compromised business information
 Breaches of date security and privacy
 Sensitive data being stolen leaked or lost
Elsam Management Consultants-www.elsamconsult.com 29
Fraud Indicators
E
M
A
C
• Aggressive application of accounting codes
• Information provided unwillingly or after unreasonable
delay
• Unsupported transactions
• Fewer confirmation responses
• Evidence of unduly lifestyle by officers or employees
• Long outstanding imprest balances
• Poor documentation
• False & improper entries in records
• Unauthorized payments
• Unauthorized use of corporate assets
• Misapplication of funds
Elsam Management Consultants-www.elsamconsult.com 30
Fraud Indicators (Red Flags)
E
M
A
C
 Undue secrecy
• Questionable practices
• Significant manager or director transactions
• Drop of sales or earnings
• Aggressive accounting treatment
• Posting of transactions to headquarters
• Receipt of poor quality goods
• Related party arrangements
• Weak security checks for employees
• Delay in submission of reports
Elsam Management Consultants-www.elsamconsult.com 31
Fraud Indicators (Red Flags)
E
M
A
C
• Flouting directives and regulations
• Personal interest
• Uncorrected entries and stock adjustments
• High fly management decisions
• Incompatible functions done by one person
• Misuse of computer for private business
• Frequent use of allocated issue voucher even
when the system is available
• Questionable system adjustments
Elsam Management Consultants-www.elsamconsult.com 32
Fraud indicators (Red flags)
E
M
A
C
• Unauthorized transactions
• Cash shortages
• Unexplained variation in prices
• Missing documentation
• Excessive refunds
• Living beyond ones means
• Drug and alcoholic abuse
• High personal debt/loses
• Compulsive gambling/stock speculation
• Risk of increase IT, increases the risk of
manipulation, access control
Elsam Management Consultants-www.elsamconsult.com 33
Fraud Indicators
E
M
A
C
• Management Environment
 Pressure
 Management style and attitude
• Competitive and business environment
e.g. technology
• Employee relationship ( spouse
receiving non competitive contract)
• Attractive assets
• Internal controls
• Lack of separation of duties
• Too much trust placed on few
employees
Elsam Management Consultants-www.elsamconsult.com 34
Fraud Indicators
E
M
A
C
• Although the level of fraud risk at an
organisation may be assessed as low,
individuals in the business can have a
personal motivation to commit fraud
– Personal pressures
– Individual performance targets
– Infiltration by organised crime
• Controls may be overridden or ignored
by certain individuals:
– Powerful (overrides controls, staff intimidated)
– Successful (not to be bothered, too busy earning money)
– Trusted (responsibility has moved beyond their job description)
Elsam Management Consultants-www.elsamconsult.com 35
Personal Fraud indicators
E
M
A
C
Elsam Management Consultants-www.elsamconsult.com 36
Managing Fraud -Forces
Entity Governance and Responsibility
Code of
Ethics
Staff Regulations
Director &
Officer
Liability
Internal
Audit
Risk
Management
Business Plan
and Budget Procurement
and Finance Acts
Customer
Service
Surveys
Stakeholders
pressures
Reputation
and
Credibility
E
M
A
C
• Rapid increase of activities Weak competition
• Rapidly growing sales
• Relatively high profitability
• ….. In such an environment, effective anti-fraud
measures can be ascribed low priority or be
undetected because the current level of profitability
allows for fraud losses to be absorbed within existing
profit margins.
• …. Consider tough times ahead…. More competition,
changing government regulations?
Elsam Management Consultants-www.elsamconsult.com 37
Business environment
E
M
A
C
 What are they?
1. Reviewed and Strengthening of internal controls
2. Periodic compliance audit
3. Employee hotline
4. Appointed compliance personnel
5. Establish and implement code of conduct for all
employees
6. Conducted background check for hires with budgetary
responsibility
7. Instituted fraud awareness training
8. Tied employee evaluations to ethics or compliance
objectives
What is your answer on the above from 0-10
Elsam Management Consultants-www.elsamconsult.com 38
Do we have any fraud mitigation?
E
M
A
C
Elsam Management Consultants-www.elsamconsult.com 39
Fraud Risk Management Techniques
Management
Internal Audit Internal Controls Whistle-blowing
Reliance
?
E
M
A
C
• Good controls on paper are not strictly
followed in practice
• Grey areas in the rules – open to
interpretation
• Lack of segregation of duties
• Collusion
• Management override
• Failure of senior management to lead by
example
• Bureaucracy &/or formulaic compliance
• Failure to share knowledge of fraud
experience, control weaknesses and
control improvements
• Clash of cultures
Elsam Management Consultants-www.elsamconsult.com 40
Controls Barriers
E
M
A
C
Elsam Management Consultants-www.elsamconsult.com 41
Objectives of Fraud Risk
Management
Prevention
Detection
Response
controls designed
to reduce the risk of
fraud and
misconduct from
occurring in the first
place
controls
designed to
discover fraud
and misconduct
when it occurs
controls
designed to take
corrective action
and remedy the
harm
caused by fraud
or misconduct
appropria
tely if
discovere
d
occurrence
fraud and
misconduct
Fraud Risks Management - Measures
Elsam Management Consultants-www.elsamconsult.com 42
Detect
Respond
Prevent
Fraud Risk Management - components
Elsam Management Consultants-www.elsamconsult.com 43
E
M
A
C
• Before an organisation can develop an effective program to
prevent and detect fraud, it must first understand the types of
fraud risk, including specific types of frauds and schemes, to
which it may be vulnerable.
Elsam Management Consultants-www.elsamconsult.com 44
Fraud risk assessment
Likelihood
Significance/Impact
Qualitative factors in the assessment include:
• the accounting system
• complexity, volume and nature of
transactions
• internal controls in place
• compliance, training and monitoring
Incorporates the views of:
• management;
• control functions;
• line employees
Management are then able to:
• Prioritise identified risks and evaluate the existing controls
• Link each risk to specific controls and commit resources to implement
any enhancements
E
M
A
C
 Surveys suggest that:
1. Over 50% of frauds are discovered as a result
of information provided by staff
2. Losses after an introduction of a whistle-
blowing hotline can be reduced by up to 60%.
3. Staff prefer the following reporting channels:
 57%: a telephone hotline;
 20%: conventional mail; and
 16%: e-mail.
Elsam Management Consultants-www.elsamconsult.com 45
Fraud Risk Management Experiences
Source: 2006 ACFE Report to the Nation on Occupational Fraud & Abuse
E
M
A
C
Elsam Management Consultants-www.elsamconsult.com 46
FRM – Hotline best practices
Confidentiality
Anonymity
Availability
Assistance –
Real Time
Procedures
Classify & Notify
Communicate
All matters treated confidentially; reported on a need
to know basis
Process should allow for anonymous submission &
resolution
Should be available in remote outposts, not just head
office
A ‘live’ response – operators need to be qualified,
trained & able to provide advice
Consistent protocols to gather information and manage
the call
Qualified staff assess the allegation; protocols establish
basis for escalation & investigation
Publicise the hotline prominently; commit to, & test for,
non-retaliation
E
M
A
C
Elsam Management Consultants-www.elsamconsult.com 47
FRM - Response
• Objective is to take corrective action & remedy the
harm caused by fraud or misconduct:
• Examine the primary cause of the control
breakdown, ensuring that risk is mitigated and controls
are strengthened.
• Discipline those involved in the inappropriate
actions, as well as those in management positions
who failed to detect or prevent such events.
• Communicate to the wider population of employees
that management took appropriate, responsive
action.
E
M
A
C
Consideration should be
given to:
• Data and information gathering;
• Interviewing techniques;
• Appropriate resource;
• Analytical tools such as data mining; and
• Organisation intelligence information.
• My first fraud investigation Video
Elsam Management Consultants-www.elsamconsult.com 48
FRM - Basis of Investigation
E
M
A
C
• Once the symptoms of fraud are found
and additional tests have indicated that
there is a strong possibility of fraud, the
review enters the formal investigation
phase
• Investigator must know;
Results of investigation can be used later
as an educational tools for auditors,
fraud investigators and other employees
(See a Case of Forensic Accountant)
Elsam Management Consultants-www.elsamconsult.com 49
Fraud investigation
E
M
A
C
• Briefing management, followed by terms of reference
detailing the initial scope of work
• Communication with parties involved e.g. Internal
audit, audit committee and accounting staff
• Determining the extent of fraud
• Interviewing the defrauder ( only if fraud is known
with certainty)
• Investigating the known area with detailed audit test.
E.g. Procurement tendering, wages, cash debtors and
stock, payroll
• Report to the management on the findings, with
copies to interested parties e.g. Internal auditor, audit
committee.
Elsam Management Consultants-www.elsamconsult.com 50
Fraud investigation- stages
E
M
A
C
• Circumstances which led to
investigation
• Fraud discovered and their extent
• Identity of the defrauder
• Effects on the reported profit of the
past period
• Effects on f/s of current periods
Elsam Management Consultants-www.elsamconsult.com 51
Investigation – details of report
E
M
A
C
• IC weakness which allowed the fraud
and recommendations for eliminating
them
• Report of any interviewing with the
defrauder, including offers of restitution
etc, which may be relevant to
management in deciding what action, if
any they should take against him/her
• If there is any suggestion that the
internal auditors has been negligent the
extent of claim against him.
Elsam Management Consultants-www.elsamconsult.com 52
Investigation – details of report
E
M
A
C
Investigator should
Consider the potential effects in F/s
Where the fraud is material the
auditor should modify the audit
procedures so as to perform
procedures appropriate to
circumstances depending on the type
of the fraud/error suspected, the
likelihood of their occurrence and
extent of damage in the F/sElsam Management Consultants-www.elsamconsult.com 53
Action upon proof of fraud or error
E
M
A
C
• If some proof of fraud exists,
management has several options
Cause a deeper audit to be done if
amount of loss appears substantial
Terminate employee responsible if loss
is minimal
File a claim to recover a loss from
clients fidelity insurance agent
Arrange with law enforcement agents
to probe into the matter
Elsam Management Consultants-www.elsamconsult.com 54
Action upon proof of fraud or
error
E
M
A
C
• If some proof of fraud exists, management has
several options
Engage a private investigator to probe
into the loss and document it for claim
purpose/prosecution
Disregard losses if minimal and tighten
controls
Alert the directors, audit committees or
the Board
Elsam Management Consultants-www.elsamconsult.com 55
Action upon proof of fraud or
error
E
M
A
C
• Strong internal Control System is not a
warrant from fraud
Entityshould have an effective anti-fraud and
corruption strategy which is aimed at
encouraging prevention, promote early
detection and respond to concern raised
Awareness programs to employees
Screening job applicants
Sound corporate policy on fraud
AVOID atmosphere of distrust and paranoia
by over-emphasising fraud deterrence
measures.Elsam Management Consultants-www.elsamconsult.com 56
Fraud deterrence measures
E
M
A
C
• Management should ensure enforcement of
compliance with operations SOPs
• Risk management function should be embedded in
business activities
• Internal audit should be proactively risk based
Elsam Management Consultants-www.elsamconsult.com 57
Fraud Deterrence –three lines of defense
E
M
A
C
 Management and other personnel on the front line provide the
first line of defense as they are responsible for maintaining
effective internal control day to day; they are compensated based
on performance in relation to all applicable objectives
 Business enabling functions such as risk, control, legal, and
compliance provide the second line of defense as they clarify
internal control requirements and evaluate adherence to defined
standards. While they are functionally aligned to the business, their
compensation is not directly tied to performance of the area which
they render expert advice
 Internal auditors provide the third line of defense as they assess
and report on internal control and recommend corrective actions
or enhancements for management considerations and
implementation; their position and compensation are separate and
distinct from the business area they review.
Elsam Management Consultants-www.elsamconsult.com 58
Three lines of defense
E
M
A
C
• It is important to stick to facts, and
to discount hearsay, rumour, or
opinion and record what is relevant
to the cause of the incident and its
effect
• Audit reports on fraud and other
improprieties should be addressed to
the right person who can take action
Elsam Management Consultants-www.elsamconsult.com 59
Fraud Risk Reporting
E
M
A
C
 Report must contain all details of fraud
 Must provide framework to analyse the fraud case
 Must enable the user to develop improved
management and security policies and detect and
prevent fraud.
 Investigation and reporting should proceed in such
a way that the outcome will be litigated. Recording
exact times, data, names of person and specific;
description of evidence are critical in civil or
criminal investigation or litigation
Elsam Management Consultants-www.elsamconsult.com 60
Fraud reporting
E
M
A
C
Handbook supporting
development of fraud risk
management
Elsam Management Consultants-www.elsamconsult.com 61
Fraud Risk- Good Practice Guide
E
M
A
C
Session I
Elsam Management Consultants-www.elsamconsult.com 62
Part III
Interviewing and Interrogation
Techniques
Elsam Management Consultants-www.elsamconsult.com 63
E
M
A
C
Coverage
 Understand the differences and similarities between
interviews and interrogation
 Outline the steps in preparing for an interview and an
interrogation
 Assess the challenges in relying on eyewitness
identification
 Explain the role of hypnosis in criminal investigation
 Describe Neuro-Linguistic Programming (NLP)
 Identify interviewing processes and techniques
 Identify interrogation processes and techniques
 Understand the methods and importance of
documenting an interview and interrogation
 Understanding chain of custody
 Basic of Forensic examinationElsam Management Consultants-www.elsamconsult.com 64
E
M
A
C
OBJECTIVES OF THE INTERROGATION PROCESS
Successful interrogation
accomplishes four objectives:
Obtaining facts
Eliminating the innocent
Identifying the guilty
Obtaining a confession
Elsam Management Consultants-www.elsamconsult.com 65
Similarities between interviews and
interrogations
Interviews
Planning
important
Controlling
surroundings
important
Privacy or semi
privacy desirable
Interrogations
Planning critical
Controlling
surroundings
critical
Absolute privacy
essential
Elsam Management Consultants-www.elsamconsult.com 66
Similarities Between Interviews And Interrogations
(cont'd)
Interviews
Establishing
rapport
important
Careful listening
Proper
documentation
Interrogations
Establishing
rapport
important
Careful listening
Proper
documentation
Elsam Management Consultants-www.elsamconsult.com 67
Differences between interviews and interrogations
Interviews
 Purpose is to obtain
information
 Minimal or no pre-
interview legal
requirements; no rights
warning
 Cooperative relationship
between interviewer and
subject likely
 Case Study
Interrogations
 Purpose to test information
already obtained
 Extensive pre interrogation
legal requirements; rights
warning required
 Adversarial or hostile
relationship between
interviewer and subject likely
 Case Study
Elsam Management Consultants-www.elsamconsult.com 68
Differences between interviews and interrogations (cont'd)
Interviews
 No guilt or guilt
uncertain
 Moderate planning or
preparation
 Private or
semiprivate
environment
desirable
Interrogations
 Guilt suggested or
likely
 Extensive planning
preparation
 Absolute privacy
essential
Elsam Management Consultants-www.elsamconsult.com 69
E
M
A
C
Preparation for interviews or interrogations
 Know as much as possible about the
witness
 Know what crime or crimes were
committed
 Learn as much as possible about the
victim
 Evaluate what is known about the suspect
Elsam Management Consultants-www.elsamconsult.com 70
E
M
A
C
Preinterrogation checklist
 Many
investigators
find it useful to
complete a pre-
interrogation
checklist to
assist them in
adequately
preparing for
their meeting
with the
suspect.
Do You Have These Facts Regarding the Crime? Check
Here
1 The legal description of the defense
2 The value and nature of loss
3 Time, date, and place of occurrence
4 Description of Fraud crime scene and
surrounding area
5 Physical evidence collected
6 Weather conditions at time of offense
7 Specific entry/exit points of perpetrator
8 Approach and departure routes of perpetrator
9 Methods of travel to and from scene
10 The modus operandi of the perpetrator
11 The tools or weapons used
12 Names of persons having knowledge
13 Possible motive
14 Details from other case files that
a. point to particular suspects
b. show matching modi operandi
c. suggest a pattern of criminality
(Source: John Fay, unpublished notebook, American Society for Industrial Security,
Workshop in Criminal Interrogation (Jacksonville, FL: ASIS, 1981), p. A4-1.Elsam Management Consultants-www.elsamconsult.com 71
E
M
A
C
Challenges in relying on eyewitness
identification
 The significance or insignificance of the
event to the witness
 The length of the period of observation
by the witness
 The lack of ideal conditions for the
witnesses
Elsam Management Consultants-www.elsamconsult.com 72
E
M
A
C
Challenges in relying on eyewitness identification
(cont'd)
The psychological factors internal
to the witness
The physical condition of the
witness
The expectancy of the witness
Elsam Management Consultants-www.elsamconsult.com 73
E
M
A
C
EYEWITNESS IDENTIFICATION
 Research indicates this form of identification is often
unreliable.
 Human perception and memory are selective do not
make exact copies
(Source: Scientific American, 1974, Vol. 231, No. 6, Reprinted by permission.)Elsam Management Consultants-www.elsamconsult.com 74
E
M
A
C
Hypnosis as an investigative tool
 Hypnosis can be used by investigators to aid
witness recall
 Courts have disagreed on whether or not to admit
information obtained as a result of hypnosis
 Investigators need to be aware of the following
potential problems with using hypnosis:
 Hyper suggestibility
 Hyper compliance
 Confabulation
Elsam Management Consultants-www.elsamconsult.com 75
E
M
A
C
Neuro-linguistic programming three basic concepts
 Neuro comes from the idea that behavior
originates from neurological processes
involving the five senses
 Then we communicate our life experiences
through language
 Programming refers to how we organize our
ideas and actions to produce results
 The investigator understands these concepts
and can get in “sync” with the witness
Elsam Management Consultants-www.elsamconsult.com 76
E
M
A
C
Steps in interview process
 Interview consists of:
 Beginning, middle, end
 Beginning should be a time:
 When the investigator can identify himself or herself
 When the investigator can discuss the purpose for the
interview
 When the investigator establishes rapport
 Middle
 The investigator gathers information
 Ending
 Thank the witness for his/her cooperation
Elsam Management Consultants-www.elsamconsult.com 77
E
M
A
C
Cognitive interview technique
A method of jogging the memory
of an eyewitness
Encouraging the free flow of
thoughts
Looking at the event from different
perspectives
Elsam Management Consultants-www.elsamconsult.com 78
E
M
A
C
Cognitive interview technique
(cont'd)
 Four basic techniques to elicit information
 Asking the witness to think about the general
circumstances
 Report everything, no matter how minor or
unimportant it may appear
 Recall events in a different order
 Change perspectives by looking at the event from
the standpoint of a third person
Elsam Management Consultants-www.elsamconsult.com 79
E
M
A
C
Requirements imposed on Investigators
 The police/investigators are required to
advise in-custody suspects of:
 The right to remain silent
 The right to be told that anything said can and
will be used against him or her in court
 The right to consult with an attorney prior to
answering any questions and the right to have
an attorney present during the interrogation
 If the suspect cannot afford to pay for an
attorney, the court will appoint one
Elsam Management Consultants-www.elsamconsult.com 80
E
M
A
C
The interrogation process
Beginning the interrogation
Composing and asking questions
Recognizing and coping with deception
Verbal signals and non-verbal signals
Statement analysis
Elsam Management Consultants-www.elsamconsult.com 81
E
M
A
C
Interrogation techniques and approaches
 Logical approach
 Emotional approach
 Sympathetic approach
 Indirect approach
 Playing one suspect against another
suspect
Elsam Management Consultants-www.elsamconsult.com 82
E
M
A
C
Importance of listening during interviews and
interrogations
Investigators can conduct a
successful interview only if they are
good listeners
Listening is as valuable a tool as
questioning
To be effective, one must be an
active listener
Elsam Management Consultants-www.elsamconsult.com 83
E
M
A
C
Comparison types of interview documentation
Type Advantages Disadvantages
Memory Quick and easy Limited absorption and recall
Most information lost shortly
afterward
Note taking by interviewer Sufficient in most cases
Captures salient details
Prevents need for reinterviewing
May distract or offend witness
May preoccupy interviewer,
creating appearance of
inattentiveness
May cause interviewer to miss
nonverbal messages
Handwritten or signed
statements by witness
Useful if witness cannot testify
Can be used to impeach if witness
changes story in court
Request may be offensive to
witness
Not necessary in routine
statements
Sound or sound-and-visual
recordings
Relatively inexpensive
Some equipment portable
All information recorded in
witnesses’ own words
Does not rely on inaccuracies of
memory or another’s notes
Does not distract
Prevents unnecessary reinterviews
Not necessary except in the
most important cases
Generally not practical
Elsam Management Consultants-www.elsamconsult.com 84
E
M
A
C
Comparison types of confession documentation
Type Advantages Disadvantages
1. Video-audiotape or movie Shows all ,including fairness,
procedures, and treatment
Easy to do
Can be relatively inexpensive
May be legal constraints
Quality equipment may be costly
2. Audio recording Can hear conversations
Can infer fairness
Some words or descriptions may
be meaningless without
pictorial support
Necessitates identifying people
and things involved
3. Statement written and
signed in suspect’s own
handwriting
Can be identified as coming directly
from suspect
Can’t see demeanor or hear
voice inflections
Suspect may not agree to
procedure
4. Typed statement signed by
suspect
Signature indicates knowledge of an
agreement with contents of
statement
Less convincing than methods
described above
5. Typed unsigned statement
acknowledged by suspect
Contents of confession or
admission are present
Acknowledgement helps show
voluntariness
Reduced believability of
voluntariness and accuracy
of contents
6. Testimony of someone
who heard confession or
admission given
Contents admissible Carries little weight with juries
Elsam Management Consultants-www.elsamconsult.com 85
E
M
A
C
Session II
Elsam Management Consultants-www.elsamconsult.com 86
E
M
A
C
 Forensic means, “ having to do with the law”
 It is application of broad spectrum of art or sciences to
investigation and establish facts of interest in relation to criminal or
civil law
 It is synonym for legal or related to the courts
 Forensic auditor is someone who can look behind the facade--not
accept the records at their face value--someone who has a
suspicious mind that the documents he or she is looking at may not
be what they purport to be and someone who has the expertise to
go out and conduct very detailed interviews of individuals to
develop the truth, especially if some are presumed to be lying.
 Example ACCA case study on forensic accounting
Elsam Management Consultants-www.elsamconsult.com 87
Forensic Examination
E
M
A
C
 Forensic examination is the action of
identifying, recording, settling, extracting,
sorting, reporting, and verifying past data or
other activities for settling current or
prospective legal disputes or using such past
data for projecting future data to settle legal
disputes.
 Fraud Investigator is a professional especially
skilled in who is generally engaged in investigation
with a view toward fraud discovery,
documentation, and prevention.
Elsam Management Consultants-www.elsamconsult.com 88
Forensic examination
E
M
A
C
Issue Audit Forensic Examination
Timing Recurring: audits are
conducted on a regular basis
Nonrecurring: fraud examinations are
nonrecurring. They are conducted only
with sufficient predication.
Scope General: collection of
sufficient, competent data to
support the opinion
rendered.
Specific: the fraud examination is
conducted to resolve specific
allegations.
Objective Opinion: express opinion on
financial statements
Affix blame: determine if fraud
occurred and who is responsible.
Adversarial in nature.
Methodology Audit techniques applied
primarily to financial data.
Fraud examination techniques include
document examination, public record
searches, and interviews.
Presumption Professional skepticism Proof to support or refute an allegation
of fraud.
Elsam Management Consultants-www.elsamconsult.com 89
Difference between auditing and forensic examination
90
Covert Aspects
Attitudes
Feelings (Fear, Anger, etc.)
Values
Norms
Interaction
Supportiveness
Satisfaction
Overt Aspects
Hierarchy
Financial Resources
Goals of the Organization
Skills and Abilities of Personnel
Technological State
Performance Measurement
Behavioral
Considerations
Water line
Thinking as a Forensic Investigator
Structural
Considerations
The Iceberg Theory of Fraud
Source: G.J. Bologna and R.J. Lindquist, Fraud
Auditing and Forensic Accounting, 2nd Edition, New
York: John Wiley, 1995, pp. 36-37
Elsam Management Consultants-www.elsamconsult.com
E
M
A
C
 Chain of custody is important to be observed in fraud cases since any
broken chain may lead to disqualification by court in legal litigation
 Chain of custody refers to the chronological documentation of paper
train showing the seizure, custody, control, transfer, analysis and
disposition of physical or electronic evidence.
 The main objective of chain of custody is to establish that the alleged
evidence is in fact related to the alleged crime, rather than having, for
example been planted fraudulently to make some one appear guilty.
 The custody is normally discharged to a police officer of investigator
and should be stored in a good and secured place.
Elsam Management Consultants-www.elsamconsult.com 91
Significance of observing chain of
custody
E
M
A
C
Chain of custody requires from the
moment the evidence is collected, every
transfer of evidence from person to
person be documented and that it be
provable that nobody else could have
accessed that evidence. It is best to keep
the number of transfer as low as possible.
Elsam Management Consultants-www.elsamconsult.com 92
Significance of observing chain of
custody
E
M
A
C
“Trust ,but verify” Ronald Reagan
Trust no one; question everything;
verify
Elsam Management Consultants-www.elsamconsult.com 93
Always Remember
E
M
A
C
Elsam Management Consultants
(EMAC)
Recruitment, training and business Consultants
Website: http://www.elsamconsult.com
Email: info@elsamconsult.com
We provide risk management training for
organization and support preparation of risk
management/Internal Control frameworks
Elsam Management Consultants-www.elsamconsult.com 94
For more training inquiries

More Related Content

What's hot

Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryAsad Hameed
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud InvestigationSalih Islam
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplaceDecosimoCPAs
 
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaPresentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaRammohanpnb
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Showvikas_k
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
 
Anti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeAnti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeRaviPrashant5
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensicswhbrown5
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 

What's hot (20)

Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and Forgery
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the Workplace
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaPresentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in India
 
Fraud & forgery
Fraud & forgeryFraud & forgery
Fraud & forgery
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Show
 
Aml cft training programme
Aml cft training programmeAml cft training programme
Aml cft training programme
 
AML presentation
AML presentationAML presentation
AML presentation
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
Anti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeAnti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crime
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
How to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your OrganizationHow to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your Organization
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 

Viewers also liked

Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresVeriti Consulting LLC
 
Afrosaie regularity audit manual 2010 final
Afrosaie regularity audit manual 2010 finalAfrosaie regularity audit manual 2010 final
Afrosaie regularity audit manual 2010 finalHassen Mohammed
 
How Do Fraud Risk Assessments Fit In Your Organization?
How Do Fraud Risk Assessments Fit In Your Organization?How Do Fraud Risk Assessments Fit In Your Organization?
How Do Fraud Risk Assessments Fit In Your Organization?McKonly & Asbury, LLP
 
Shilts Fraud Risk Assessment Deck
Shilts Fraud Risk Assessment DeckShilts Fraud Risk Assessment Deck
Shilts Fraud Risk Assessment Deckchris75308
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Vivastream
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
Risk management checklist
Risk management checklistRisk management checklist
Risk management checklistabpeters82
 
Financial advisor job description
Financial advisor job descriptionFinancial advisor job description
Financial advisor job descriptionfinancemanagement
 
La valeur d’un conseiller financier
La valeur d’un conseiller financierLa valeur d’un conseiller financier
La valeur d’un conseiller financierb2bbanque
 
Npd presentation file risk management
Npd presentation file   risk managementNpd presentation file   risk management
Npd presentation file risk managementOmid Aminzadeh Gohari
 
The value of a financial advisor
The value of a financial advisorThe value of a financial advisor
The value of a financial advisorB2BBank
 
Class 1: Investigation Interview Preparation Recording
Class 1: Investigation Interview Preparation RecordingClass 1: Investigation Interview Preparation Recording
Class 1: Investigation Interview Preparation RecordingCase IQ
 
Fraud risk assessment
Fraud risk assessmentFraud risk assessment
Fraud risk assessmentcstovall69
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud programchris75308
 

Viewers also liked (17)

Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Afrosaie regularity audit manual 2010 final
Afrosaie regularity audit manual 2010 finalAfrosaie regularity audit manual 2010 final
Afrosaie regularity audit manual 2010 final
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
How Do Fraud Risk Assessments Fit In Your Organization?
How Do Fraud Risk Assessments Fit In Your Organization?How Do Fraud Risk Assessments Fit In Your Organization?
How Do Fraud Risk Assessments Fit In Your Organization?
 
Shilts Fraud Risk Assessment Deck
Shilts Fraud Risk Assessment DeckShilts Fraud Risk Assessment Deck
Shilts Fraud Risk Assessment Deck
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
Financial advisory ppt
Financial advisory pptFinancial advisory ppt
Financial advisory ppt
 
Risk management checklist
Risk management checklistRisk management checklist
Risk management checklist
 
Financial advisor job description
Financial advisor job descriptionFinancial advisor job description
Financial advisor job description
 
La valeur d’un conseiller financier
La valeur d’un conseiller financierLa valeur d’un conseiller financier
La valeur d’un conseiller financier
 
Npd presentation file risk management
Npd presentation file   risk managementNpd presentation file   risk management
Npd presentation file risk management
 
E Fraud
E FraudE Fraud
E Fraud
 
The value of a financial advisor
The value of a financial advisorThe value of a financial advisor
The value of a financial advisor
 
Class 1: Investigation Interview Preparation Recording
Class 1: Investigation Interview Preparation RecordingClass 1: Investigation Interview Preparation Recording
Class 1: Investigation Interview Preparation Recording
 
Fraud risk assessment
Fraud risk assessmentFraud risk assessment
Fraud risk assessment
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud program
 

Similar to Fraud risk management and interrogation techniques part ii

Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturnacfesj
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptxjaramulat
 
St. Louis County Municipal League - 7 keys to fraud prevention
St. Louis County Municipal League - 7 keys to fraud preventionSt. Louis County Municipal League - 7 keys to fraud prevention
St. Louis County Municipal League - 7 keys to fraud preventionRon Steinkamp
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsThieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsAllen, Gibbs & Houlik, L.C.
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskSantosh Pande
 
7 keys to fraud prevention
7 keys to fraud prevention7 keys to fraud prevention
7 keys to fraud preventionRon Steinkamp
 
What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014Ron Steinkamp
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3Habib Ullah Qamar
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIARon Steinkamp
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGARon Steinkamp
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXshwetadarak
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 

Similar to Fraud risk management and interrogation techniques part ii (20)

Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptx
 
St. Louis County Municipal League - 7 keys to fraud prevention
St. Louis County Municipal League - 7 keys to fraud preventionSt. Louis County Municipal League - 7 keys to fraud prevention
St. Louis County Municipal League - 7 keys to fraud prevention
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsThieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
 
7 keys to fraud prevention
7 keys to fraud prevention7 keys to fraud prevention
7 keys to fraud prevention
 
What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014
 
Who Commits Fraud
Who Commits Fraud   Who Commits Fraud
Who Commits Fraud
 
Fraud, it could happen to you
Fraud, it could happen to youFraud, it could happen to you
Fraud, it could happen to you
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIA
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGA
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTX
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 

More from EMAC Consulting Group

Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1EMAC Consulting Group
 
Contracts risk management notes bagamoyo 2.12.2017 final v1
Contracts risk management  notes bagamoyo 2.12.2017 final v1Contracts risk management  notes bagamoyo 2.12.2017 final v1
Contracts risk management notes bagamoyo 2.12.2017 final v1EMAC Consulting Group
 
Comprehensive audit committee training emac
Comprehensive audit committee training emacComprehensive audit committee training emac
Comprehensive audit committee training emacEMAC Consulting Group
 
Advanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management ConsultantsAdvanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management ConsultantsEMAC Consulting Group
 
Ipsas training part ii differences btn ipsas and ifrs
Ipsas training part ii differences btn ipsas and ifrsIpsas training part ii differences btn ipsas and ifrs
Ipsas training part ii differences btn ipsas and ifrsEMAC Consulting Group
 
Assurance engagement and prospective financial information 2
Assurance engagement and prospective financial information 2Assurance engagement and prospective financial information 2
Assurance engagement and prospective financial information 2EMAC Consulting Group
 
Financial markets and financial instruments
Financial markets and financial instrumentsFinancial markets and financial instruments
Financial markets and financial instrumentsEMAC Consulting Group
 
Analyitical review procedures and going concern
Analyitical review procedures and going concernAnalyitical review procedures and going concern
Analyitical review procedures and going concernEMAC Consulting Group
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITEMAC Consulting Group
 
Audit Question And Answer Book 2008 3
Audit Question And Answer Book 2008 3Audit Question And Answer Book 2008 3
Audit Question And Answer Book 2008 3EMAC Consulting Group
 

More from EMAC Consulting Group (20)

Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1
 
Contracts risk management notes bagamoyo 2.12.2017 final v1
Contracts risk management  notes bagamoyo 2.12.2017 final v1Contracts risk management  notes bagamoyo 2.12.2017 final v1
Contracts risk management notes bagamoyo 2.12.2017 final v1
 
Talent Management
Talent ManagementTalent Management
Talent Management
 
Comprehensive audit committee training emac
Comprehensive audit committee training emacComprehensive audit committee training emac
Comprehensive audit committee training emac
 
Ifrs for pensions schemes emac
Ifrs for pensions schemes emacIfrs for pensions schemes emac
Ifrs for pensions schemes emac
 
Advanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management ConsultantsAdvanced Risk Management - Elsam Management Consultants
Advanced Risk Management - Elsam Management Consultants
 
Ipsas training part iii final
Ipsas training part iii  finalIpsas training part iii  final
Ipsas training part iii final
 
Ipsas training part ii differences btn ipsas and ifrs
Ipsas training part ii differences btn ipsas and ifrsIpsas training part ii differences btn ipsas and ifrs
Ipsas training part ii differences btn ipsas and ifrs
 
Ipsas training part i overview
Ipsas training part i   overviewIpsas training part i   overview
Ipsas training part i overview
 
Fraud risk management
Fraud risk management Fraud risk management
Fraud risk management
 
Assurance engagement and prospective financial information 2
Assurance engagement and prospective financial information 2Assurance engagement and prospective financial information 2
Assurance engagement and prospective financial information 2
 
Management audit sako
Management audit sakoManagement audit sako
Management audit sako
 
Financial markets and financial instruments
Financial markets and financial instrumentsFinancial markets and financial instruments
Financial markets and financial instruments
 
Analyitical review procedures and going concern
Analyitical review procedures and going concernAnalyitical review procedures and going concern
Analyitical review procedures and going concern
 
Audit of contracts version 2
Audit of contracts version 2Audit of contracts version 2
Audit of contracts version 2
 
Contract audit
Contract auditContract audit
Contract audit
 
Value for money audit
Value for money auditValue for money audit
Value for money audit
 
Financial audit
Financial auditFinancial audit
Financial audit
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
 
Audit Question And Answer Book 2008 3
Audit Question And Answer Book 2008 3Audit Question And Answer Book 2008 3
Audit Question And Answer Book 2008 3
 

Recently uploaded

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 

Recently uploaded (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

Fraud risk management and interrogation techniques part ii

  • 1. E M A C Fraud Risk Management By Sako Mayrick Elsam Management Consultants Elsam Management Consultants-www.elsamconsult.com 1 FRAUD RISK MANAGEMENT Training Materials March,2015
  • 2. E M A C  Introduction  Nature and types of fraud  Internal controls against fraud  Fraud as a risk  Evolution of Operational Risks  Fraud as a major operational risk  Why people commit Fraud  Fraud indicators  Fraud risk management techniques  FRM – Good practice guide Elsam Management Consultants-www.elsamconsult.com 2 Coverage
  • 3. E M A C  20% of government expenditure is lost through corruption in Tanzania equivalent to Tshs.  Corruption costs global economy $1.5 trilion every year  The detection recovers only small amount  High percentage of frauds are committed by senior management and executives  Greed is one of the main motivators for committing fraud  Fraudsters often work in finance function  Every sector is affected by fraud  It is high prevalent in developed countries  With all these facts, many organisations still do not have formal systems and procedures in place to prevent, detect and respond to fraud. Elsam Management Consultants-www.elsamconsult.com 3 Introduction
  • 4. E M A C  Fraud is a complex subject regard its  It can mean  Theft  Corruption  Conspiracy  Embezzlement  Money Laundering  Bribery  Extortion  DeceptionElsam Management Consultants-www.elsamconsult.com 4 Introduction
  • 5. E M A C  Forms of fraud  Crimes by individuals e.g. substandard goods, pyramid schemes  Employee fraud e.g. payroll, expense, theft of cash, assets or IP  Crimes of business against investors or consumers or employees  Crimes against financial institutions  Grant fraud, tax evasion  Counterfeit  E-crimes Elsam Management Consultants-www.elsamconsult.com 5 Introduction
  • 6. E M A C  Internal control is  A process consisting of ongoing tasks and activities. It is a means to an end and not the end in itself  Effected by people. It is not merely about policy manuals, system and forms but about people at every level of organization that impact internal control  Able to provide reasonable assurance, not absolute assurance, to an entity’s senior management and board  Geared to the achievement of objectives in one or more separate overlapping categories  Adaptable to the entity structure  It is designed to provide reasonable assurance regarding the achievements of objectives; effectiveness and efficiency of operations, reliability of reporting and compliance with applicable laws and regulations Elsam Management Consultants-www.elsamconsult.com 6 Internal Control and Fraud
  • 7. E M A C COSO - Framework (Control Framework) 7Elsam Management Consultants-www.elsamconsult.com Case Study 1 A Car internal control exemplification
  • 8. E M A C End of session I Elsam Management Consultants-www.elsamconsult.com 8
  • 9. E M A C • Operational risk attaches itself to people, systems and process • Operational risk is the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. • It includes other risks such as legal risks, physical risks, political risks and environmental risks • Fraud is part of operational risk in any organization  Internal fraud such as tax evasion, assets misappropriation, bribery, corruption and larceny  External fraud such as theft, forgery, hacking and information theft Elsam Management Consultants-www.elsamconsult.com 9 Fraud as risk
  • 10. E M A C Credit Risk Market Risk Operation al Risk Complianc e Risk Informati on Risk Data Risk Other Risk Basic Strategic ERM Integrated Elsam Management Consultants-www.elsamconsult.com 10 Evolution of Operational Risk
  • 11. E M A C • Joint McKinsey finds have shown that risk management has not been able to prove its value to organization • Operational risk is seen as immature discipline that has often not proven its value to organization • There is evidence that operational risk can be destructive as market loose faith in management and control following large events (Enron Case) • The discipline is focused more on measurement than on management Elsam Management Consultants-www.elsamconsult.com 11 Perception on operational Risk
  • 12. E M A C • Fraud is a broad legal concept that generally refers to an intentional act committed to secure an unfair or unlawful gain. • Misconduct is also a broad concept, generally referring to violations of laws, regulations, internal policies, and market expectations of ethical business conduct. • It is an intentional act by one or more individuals among management , those charged with governance, employee or third parties involving the use of deception to obtain an unjust or illegal advantage Elsam Management Consultants-www.elsamconsult.com 12 What is fraud?
  • 13. E M A C Fraud commonly includes activities such as theft, corruption, conspiracy, embezzlement, money laundering, bribery and extortion. It involves using deception to dishonestly make a personal gain for oneself and / or create a loss for another. Elsam Management Consultants-www.elsamconsult.com 13 Scope of Fraud
  • 14. E M A C • Pressure on employee to misappropriate cash or organizational assets • Employees/people committing fraud are not career criminals, they are trusted employees • Dr. Donald Cressey, a criminologist developed a model to get reasons for why people in trust commit fraud (Case Study II) • Model is referred as fraud triangle Elsam Management Consultants-www.elsamconsult.com 14 Why people commit fraud?
  • 15. E M A C • Most of fraudsters are first time offenders with no criminal past and therefore don’t view themselves as criminals (See Arthur Andersen case) • They must always justify the crime in a way that makes it an acceptable and justifiable act (rationalization) e.g. I was underpaid, my employer cheated me, my employer is dishonest, I was entitled to the money or I was only borrowing money. Elsam Management Consultants-www.elsamconsult.com 15 Causes of Fraud - Rationalization
  • 16. E M A C Fraud Pressure or Incentive Rationalizati on Opportunity Elsam Management Consultants-www.elsamconsult.com 16 What causes fraud?- Fraud Triangle All the three factors must be present for fraud to occur, if any one of the three is missing, fraud will not occur
  • 17. E M A C Elsam Management Consultants-www.elsamconsult.com 17 Why fraud happens? Fraud Need/ Rationalization •Every one Does it •Simply borrow -money Pressure Unrealistic Corporate Target can Force Employees to Commit fraud Opportunity- due to weak And override of controls
  • 18. E M A C • It is a perceived non-sharable financial pressure • Non-Shareable involves some sort of embarrassment, shame or disgrace • It is the first motivation for crime • A person may have financial problem that cannot be solved through legitimate means  Consideration for illegal acts such as stealing cash or falsifying a financial statement as a way to solve problem  It can be deep personal debt or a job/business is in jeopardy e.g. Desire for status symbol eg. Big house, nicer car; need to meet productivity targets; drug or gambling addition or inability to pay bills ( See the Enron Case Study)  It can sexual addiction and importance of status Elsam Management Consultants-www.elsamconsult.com 18 Causes of Fraud (Pressure/Incentive)
  • 19. E M A C • It is a perceived opportunity defining method by which crime can be committed • Involves uses of position of trust to solve financial problems • It is critical that the fraudster be able to solve problem in secret since motivation is over the status • Always the fraudster will act in secret e.g. forcing bank reconciliation to balance if he had paid a cheque to oneself ( See a case of TV show) Elsam Management Consultants-www.elsamconsult.com 19 Causes of fraud (Opportunity)
  • 20. E M A C • Not applicable to professional fraudsters or predatory employees ( employees taking job with intent to stealing from the employer) • Rationalization is only necessary for first commitment of fraud and afterwards it is abandoned • Comprehensive case study – Fraud triangle ( see handouts and FRM Manual) Elsam Management Consultants-www.elsamconsult.com 20 Fraud Triangle - Limitations
  • 21. E M A C • Reduce pressures on employees that might push them to committing fraud • Reduced perceived opportunities to commit fraud • Dispel rationalization for engaging in fraudulent conduct • Sanctions does not work, why  Fraudsters never think that they can be caught in a perceived opportunity  Fraudsters always rationalize their conduct  Sanctions are only secondary consideration Elsam Management Consultants-www.elsamconsult.com 21 Fraud Triangle-Deterrence measures
  • 22. E M A C 22 Types of fraud Fraudulent Financial Reporting Asset Misappropriation Other Questionable or Improper Business Practices  Manipulation, falsification/alteration of records or documents  Misappropriation of assets  Suppression or omission of the effect of transaction from records or documents  Recording transaction without substance  Misapplication of accounting principles  These can be elaborated on this presentationElsam Management Consultants-www.elsamconsult.com
  • 24. E M A C End of Session II Elsam Management Consultants-www.elsamconsult.com 24
  • 25. E M A C  Types  Warning Signs Organization indicators Business risks, financial risk, environmental risk IT risk Data risk  Fraud Alerts These are red frags The list is not exhaustive They appear in many different guises Elsam Management Consultants-www.elsamconsult.com 25 Fraud Indicators (Red Flags)
  • 26. E M A C  Business risks  Cultural issues, management issues, employee issues, process issues and transaction issues  Cultural issues include; absence of ant-fraud policy and culture, failure of management to develop sound system of internal control  Management issues include; lack of financial management expertise and professionalism, history of legal or regulatory violation, strained relationship between management, internal and external auditors, lack of management supervision of staff, lack of clear management control of responsibility, bonus schemes linked to ambitious targets Elsam Management Consultants-www.elsamconsult.com 26 Fraud Indicators
  • 27. E M A C  Business Risks  Employee issues includes; inadequate recruitment process and absence of screening, Unusual close relationship, internal and external,Potential or actual labor reduction, dissatsfied employees who have access to desirable assets, unsual staff behavior patterns, personal financial pressure on key staff, low salary levels of key staff, poor dessmination of internal controls, employees working unsocial hours unsupervised, employees not taking annual leave requirements, unwillingness to share duties.  Process issues include; lack of job segregation and independent checking, lack of identification of assets, poor management accountability and reporting systems, poor physical security of assets, poor access controls to physical assets and IT security systems, lack or inadequate internal controls, poor documentation support, large cash transactions, susceptibility of assets to misappropriation Elsam Management Consultants-www.elsamconsult.com 27 Fraud Indicators
  • 28. E M A C  Financial Risks  Unrealistic management targets  Significant pressures on management  Extensive use of tax havens without clear business justifications  Complex transactions  Use of complex financial products  Complex legal ownership  Rapid changes in profitability  Personal or corporate guarantees Elsam Management Consultants-www.elsamconsult.com 28 Fraud Indicators
  • 29. E M A C  IT and Data risks  Unauthorized systems access  Wealth of malicious codes and tools for attackers  Rapid changes in information technology  Users not adopting good computer security practices  Unauthorized electronic transfer of funds and other assets  Manipulation of computer programs  Compromised business information  Breaches of date security and privacy  Sensitive data being stolen leaked or lost Elsam Management Consultants-www.elsamconsult.com 29 Fraud Indicators
  • 30. E M A C • Aggressive application of accounting codes • Information provided unwillingly or after unreasonable delay • Unsupported transactions • Fewer confirmation responses • Evidence of unduly lifestyle by officers or employees • Long outstanding imprest balances • Poor documentation • False & improper entries in records • Unauthorized payments • Unauthorized use of corporate assets • Misapplication of funds Elsam Management Consultants-www.elsamconsult.com 30 Fraud Indicators (Red Flags)
  • 31. E M A C  Undue secrecy • Questionable practices • Significant manager or director transactions • Drop of sales or earnings • Aggressive accounting treatment • Posting of transactions to headquarters • Receipt of poor quality goods • Related party arrangements • Weak security checks for employees • Delay in submission of reports Elsam Management Consultants-www.elsamconsult.com 31 Fraud Indicators (Red Flags)
  • 32. E M A C • Flouting directives and regulations • Personal interest • Uncorrected entries and stock adjustments • High fly management decisions • Incompatible functions done by one person • Misuse of computer for private business • Frequent use of allocated issue voucher even when the system is available • Questionable system adjustments Elsam Management Consultants-www.elsamconsult.com 32 Fraud indicators (Red flags)
  • 33. E M A C • Unauthorized transactions • Cash shortages • Unexplained variation in prices • Missing documentation • Excessive refunds • Living beyond ones means • Drug and alcoholic abuse • High personal debt/loses • Compulsive gambling/stock speculation • Risk of increase IT, increases the risk of manipulation, access control Elsam Management Consultants-www.elsamconsult.com 33 Fraud Indicators
  • 34. E M A C • Management Environment  Pressure  Management style and attitude • Competitive and business environment e.g. technology • Employee relationship ( spouse receiving non competitive contract) • Attractive assets • Internal controls • Lack of separation of duties • Too much trust placed on few employees Elsam Management Consultants-www.elsamconsult.com 34 Fraud Indicators
  • 35. E M A C • Although the level of fraud risk at an organisation may be assessed as low, individuals in the business can have a personal motivation to commit fraud – Personal pressures – Individual performance targets – Infiltration by organised crime • Controls may be overridden or ignored by certain individuals: – Powerful (overrides controls, staff intimidated) – Successful (not to be bothered, too busy earning money) – Trusted (responsibility has moved beyond their job description) Elsam Management Consultants-www.elsamconsult.com 35 Personal Fraud indicators
  • 36. E M A C Elsam Management Consultants-www.elsamconsult.com 36 Managing Fraud -Forces Entity Governance and Responsibility Code of Ethics Staff Regulations Director & Officer Liability Internal Audit Risk Management Business Plan and Budget Procurement and Finance Acts Customer Service Surveys Stakeholders pressures Reputation and Credibility
  • 37. E M A C • Rapid increase of activities Weak competition • Rapidly growing sales • Relatively high profitability • ….. In such an environment, effective anti-fraud measures can be ascribed low priority or be undetected because the current level of profitability allows for fraud losses to be absorbed within existing profit margins. • …. Consider tough times ahead…. More competition, changing government regulations? Elsam Management Consultants-www.elsamconsult.com 37 Business environment
  • 38. E M A C  What are they? 1. Reviewed and Strengthening of internal controls 2. Periodic compliance audit 3. Employee hotline 4. Appointed compliance personnel 5. Establish and implement code of conduct for all employees 6. Conducted background check for hires with budgetary responsibility 7. Instituted fraud awareness training 8. Tied employee evaluations to ethics or compliance objectives What is your answer on the above from 0-10 Elsam Management Consultants-www.elsamconsult.com 38 Do we have any fraud mitigation?
  • 39. E M A C Elsam Management Consultants-www.elsamconsult.com 39 Fraud Risk Management Techniques Management Internal Audit Internal Controls Whistle-blowing Reliance ?
  • 40. E M A C • Good controls on paper are not strictly followed in practice • Grey areas in the rules – open to interpretation • Lack of segregation of duties • Collusion • Management override • Failure of senior management to lead by example • Bureaucracy &/or formulaic compliance • Failure to share knowledge of fraud experience, control weaknesses and control improvements • Clash of cultures Elsam Management Consultants-www.elsamconsult.com 40 Controls Barriers
  • 41. E M A C Elsam Management Consultants-www.elsamconsult.com 41 Objectives of Fraud Risk Management Prevention Detection Response controls designed to reduce the risk of fraud and misconduct from occurring in the first place controls designed to discover fraud and misconduct when it occurs controls designed to take corrective action and remedy the harm caused by fraud or misconduct
  • 42. appropria tely if discovere d occurrence fraud and misconduct Fraud Risks Management - Measures Elsam Management Consultants-www.elsamconsult.com 42 Detect Respond Prevent
  • 43. Fraud Risk Management - components Elsam Management Consultants-www.elsamconsult.com 43
  • 44. E M A C • Before an organisation can develop an effective program to prevent and detect fraud, it must first understand the types of fraud risk, including specific types of frauds and schemes, to which it may be vulnerable. Elsam Management Consultants-www.elsamconsult.com 44 Fraud risk assessment Likelihood Significance/Impact Qualitative factors in the assessment include: • the accounting system • complexity, volume and nature of transactions • internal controls in place • compliance, training and monitoring Incorporates the views of: • management; • control functions; • line employees Management are then able to: • Prioritise identified risks and evaluate the existing controls • Link each risk to specific controls and commit resources to implement any enhancements
  • 45. E M A C  Surveys suggest that: 1. Over 50% of frauds are discovered as a result of information provided by staff 2. Losses after an introduction of a whistle- blowing hotline can be reduced by up to 60%. 3. Staff prefer the following reporting channels:  57%: a telephone hotline;  20%: conventional mail; and  16%: e-mail. Elsam Management Consultants-www.elsamconsult.com 45 Fraud Risk Management Experiences Source: 2006 ACFE Report to the Nation on Occupational Fraud & Abuse
  • 46. E M A C Elsam Management Consultants-www.elsamconsult.com 46 FRM – Hotline best practices Confidentiality Anonymity Availability Assistance – Real Time Procedures Classify & Notify Communicate All matters treated confidentially; reported on a need to know basis Process should allow for anonymous submission & resolution Should be available in remote outposts, not just head office A ‘live’ response – operators need to be qualified, trained & able to provide advice Consistent protocols to gather information and manage the call Qualified staff assess the allegation; protocols establish basis for escalation & investigation Publicise the hotline prominently; commit to, & test for, non-retaliation
  • 47. E M A C Elsam Management Consultants-www.elsamconsult.com 47 FRM - Response • Objective is to take corrective action & remedy the harm caused by fraud or misconduct: • Examine the primary cause of the control breakdown, ensuring that risk is mitigated and controls are strengthened. • Discipline those involved in the inappropriate actions, as well as those in management positions who failed to detect or prevent such events. • Communicate to the wider population of employees that management took appropriate, responsive action.
  • 48. E M A C Consideration should be given to: • Data and information gathering; • Interviewing techniques; • Appropriate resource; • Analytical tools such as data mining; and • Organisation intelligence information. • My first fraud investigation Video Elsam Management Consultants-www.elsamconsult.com 48 FRM - Basis of Investigation
  • 49. E M A C • Once the symptoms of fraud are found and additional tests have indicated that there is a strong possibility of fraud, the review enters the formal investigation phase • Investigator must know; Results of investigation can be used later as an educational tools for auditors, fraud investigators and other employees (See a Case of Forensic Accountant) Elsam Management Consultants-www.elsamconsult.com 49 Fraud investigation
  • 50. E M A C • Briefing management, followed by terms of reference detailing the initial scope of work • Communication with parties involved e.g. Internal audit, audit committee and accounting staff • Determining the extent of fraud • Interviewing the defrauder ( only if fraud is known with certainty) • Investigating the known area with detailed audit test. E.g. Procurement tendering, wages, cash debtors and stock, payroll • Report to the management on the findings, with copies to interested parties e.g. Internal auditor, audit committee. Elsam Management Consultants-www.elsamconsult.com 50 Fraud investigation- stages
  • 51. E M A C • Circumstances which led to investigation • Fraud discovered and their extent • Identity of the defrauder • Effects on the reported profit of the past period • Effects on f/s of current periods Elsam Management Consultants-www.elsamconsult.com 51 Investigation – details of report
  • 52. E M A C • IC weakness which allowed the fraud and recommendations for eliminating them • Report of any interviewing with the defrauder, including offers of restitution etc, which may be relevant to management in deciding what action, if any they should take against him/her • If there is any suggestion that the internal auditors has been negligent the extent of claim against him. Elsam Management Consultants-www.elsamconsult.com 52 Investigation – details of report
  • 53. E M A C Investigator should Consider the potential effects in F/s Where the fraud is material the auditor should modify the audit procedures so as to perform procedures appropriate to circumstances depending on the type of the fraud/error suspected, the likelihood of their occurrence and extent of damage in the F/sElsam Management Consultants-www.elsamconsult.com 53 Action upon proof of fraud or error
  • 54. E M A C • If some proof of fraud exists, management has several options Cause a deeper audit to be done if amount of loss appears substantial Terminate employee responsible if loss is minimal File a claim to recover a loss from clients fidelity insurance agent Arrange with law enforcement agents to probe into the matter Elsam Management Consultants-www.elsamconsult.com 54 Action upon proof of fraud or error
  • 55. E M A C • If some proof of fraud exists, management has several options Engage a private investigator to probe into the loss and document it for claim purpose/prosecution Disregard losses if minimal and tighten controls Alert the directors, audit committees or the Board Elsam Management Consultants-www.elsamconsult.com 55 Action upon proof of fraud or error
  • 56. E M A C • Strong internal Control System is not a warrant from fraud Entityshould have an effective anti-fraud and corruption strategy which is aimed at encouraging prevention, promote early detection and respond to concern raised Awareness programs to employees Screening job applicants Sound corporate policy on fraud AVOID atmosphere of distrust and paranoia by over-emphasising fraud deterrence measures.Elsam Management Consultants-www.elsamconsult.com 56 Fraud deterrence measures
  • 57. E M A C • Management should ensure enforcement of compliance with operations SOPs • Risk management function should be embedded in business activities • Internal audit should be proactively risk based Elsam Management Consultants-www.elsamconsult.com 57 Fraud Deterrence –three lines of defense
  • 58. E M A C  Management and other personnel on the front line provide the first line of defense as they are responsible for maintaining effective internal control day to day; they are compensated based on performance in relation to all applicable objectives  Business enabling functions such as risk, control, legal, and compliance provide the second line of defense as they clarify internal control requirements and evaluate adherence to defined standards. While they are functionally aligned to the business, their compensation is not directly tied to performance of the area which they render expert advice  Internal auditors provide the third line of defense as they assess and report on internal control and recommend corrective actions or enhancements for management considerations and implementation; their position and compensation are separate and distinct from the business area they review. Elsam Management Consultants-www.elsamconsult.com 58 Three lines of defense
  • 59. E M A C • It is important to stick to facts, and to discount hearsay, rumour, or opinion and record what is relevant to the cause of the incident and its effect • Audit reports on fraud and other improprieties should be addressed to the right person who can take action Elsam Management Consultants-www.elsamconsult.com 59 Fraud Risk Reporting
  • 60. E M A C  Report must contain all details of fraud  Must provide framework to analyse the fraud case  Must enable the user to develop improved management and security policies and detect and prevent fraud.  Investigation and reporting should proceed in such a way that the outcome will be litigated. Recording exact times, data, names of person and specific; description of evidence are critical in civil or criminal investigation or litigation Elsam Management Consultants-www.elsamconsult.com 60 Fraud reporting
  • 61. E M A C Handbook supporting development of fraud risk management Elsam Management Consultants-www.elsamconsult.com 61 Fraud Risk- Good Practice Guide
  • 62. E M A C Session I Elsam Management Consultants-www.elsamconsult.com 62 Part III
  • 63. Interviewing and Interrogation Techniques Elsam Management Consultants-www.elsamconsult.com 63
  • 64. E M A C Coverage  Understand the differences and similarities between interviews and interrogation  Outline the steps in preparing for an interview and an interrogation  Assess the challenges in relying on eyewitness identification  Explain the role of hypnosis in criminal investigation  Describe Neuro-Linguistic Programming (NLP)  Identify interviewing processes and techniques  Identify interrogation processes and techniques  Understand the methods and importance of documenting an interview and interrogation  Understanding chain of custody  Basic of Forensic examinationElsam Management Consultants-www.elsamconsult.com 64
  • 65. E M A C OBJECTIVES OF THE INTERROGATION PROCESS Successful interrogation accomplishes four objectives: Obtaining facts Eliminating the innocent Identifying the guilty Obtaining a confession Elsam Management Consultants-www.elsamconsult.com 65
  • 66. Similarities between interviews and interrogations Interviews Planning important Controlling surroundings important Privacy or semi privacy desirable Interrogations Planning critical Controlling surroundings critical Absolute privacy essential Elsam Management Consultants-www.elsamconsult.com 66
  • 67. Similarities Between Interviews And Interrogations (cont'd) Interviews Establishing rapport important Careful listening Proper documentation Interrogations Establishing rapport important Careful listening Proper documentation Elsam Management Consultants-www.elsamconsult.com 67
  • 68. Differences between interviews and interrogations Interviews  Purpose is to obtain information  Minimal or no pre- interview legal requirements; no rights warning  Cooperative relationship between interviewer and subject likely  Case Study Interrogations  Purpose to test information already obtained  Extensive pre interrogation legal requirements; rights warning required  Adversarial or hostile relationship between interviewer and subject likely  Case Study Elsam Management Consultants-www.elsamconsult.com 68
  • 69. Differences between interviews and interrogations (cont'd) Interviews  No guilt or guilt uncertain  Moderate planning or preparation  Private or semiprivate environment desirable Interrogations  Guilt suggested or likely  Extensive planning preparation  Absolute privacy essential Elsam Management Consultants-www.elsamconsult.com 69
  • 70. E M A C Preparation for interviews or interrogations  Know as much as possible about the witness  Know what crime or crimes were committed  Learn as much as possible about the victim  Evaluate what is known about the suspect Elsam Management Consultants-www.elsamconsult.com 70
  • 71. E M A C Preinterrogation checklist  Many investigators find it useful to complete a pre- interrogation checklist to assist them in adequately preparing for their meeting with the suspect. Do You Have These Facts Regarding the Crime? Check Here 1 The legal description of the defense 2 The value and nature of loss 3 Time, date, and place of occurrence 4 Description of Fraud crime scene and surrounding area 5 Physical evidence collected 6 Weather conditions at time of offense 7 Specific entry/exit points of perpetrator 8 Approach and departure routes of perpetrator 9 Methods of travel to and from scene 10 The modus operandi of the perpetrator 11 The tools or weapons used 12 Names of persons having knowledge 13 Possible motive 14 Details from other case files that a. point to particular suspects b. show matching modi operandi c. suggest a pattern of criminality (Source: John Fay, unpublished notebook, American Society for Industrial Security, Workshop in Criminal Interrogation (Jacksonville, FL: ASIS, 1981), p. A4-1.Elsam Management Consultants-www.elsamconsult.com 71
  • 72. E M A C Challenges in relying on eyewitness identification  The significance or insignificance of the event to the witness  The length of the period of observation by the witness  The lack of ideal conditions for the witnesses Elsam Management Consultants-www.elsamconsult.com 72
  • 73. E M A C Challenges in relying on eyewitness identification (cont'd) The psychological factors internal to the witness The physical condition of the witness The expectancy of the witness Elsam Management Consultants-www.elsamconsult.com 73
  • 74. E M A C EYEWITNESS IDENTIFICATION  Research indicates this form of identification is often unreliable.  Human perception and memory are selective do not make exact copies (Source: Scientific American, 1974, Vol. 231, No. 6, Reprinted by permission.)Elsam Management Consultants-www.elsamconsult.com 74
  • 75. E M A C Hypnosis as an investigative tool  Hypnosis can be used by investigators to aid witness recall  Courts have disagreed on whether or not to admit information obtained as a result of hypnosis  Investigators need to be aware of the following potential problems with using hypnosis:  Hyper suggestibility  Hyper compliance  Confabulation Elsam Management Consultants-www.elsamconsult.com 75
  • 76. E M A C Neuro-linguistic programming three basic concepts  Neuro comes from the idea that behavior originates from neurological processes involving the five senses  Then we communicate our life experiences through language  Programming refers to how we organize our ideas and actions to produce results  The investigator understands these concepts and can get in “sync” with the witness Elsam Management Consultants-www.elsamconsult.com 76
  • 77. E M A C Steps in interview process  Interview consists of:  Beginning, middle, end  Beginning should be a time:  When the investigator can identify himself or herself  When the investigator can discuss the purpose for the interview  When the investigator establishes rapport  Middle  The investigator gathers information  Ending  Thank the witness for his/her cooperation Elsam Management Consultants-www.elsamconsult.com 77
  • 78. E M A C Cognitive interview technique A method of jogging the memory of an eyewitness Encouraging the free flow of thoughts Looking at the event from different perspectives Elsam Management Consultants-www.elsamconsult.com 78
  • 79. E M A C Cognitive interview technique (cont'd)  Four basic techniques to elicit information  Asking the witness to think about the general circumstances  Report everything, no matter how minor or unimportant it may appear  Recall events in a different order  Change perspectives by looking at the event from the standpoint of a third person Elsam Management Consultants-www.elsamconsult.com 79
  • 80. E M A C Requirements imposed on Investigators  The police/investigators are required to advise in-custody suspects of:  The right to remain silent  The right to be told that anything said can and will be used against him or her in court  The right to consult with an attorney prior to answering any questions and the right to have an attorney present during the interrogation  If the suspect cannot afford to pay for an attorney, the court will appoint one Elsam Management Consultants-www.elsamconsult.com 80
  • 81. E M A C The interrogation process Beginning the interrogation Composing and asking questions Recognizing and coping with deception Verbal signals and non-verbal signals Statement analysis Elsam Management Consultants-www.elsamconsult.com 81
  • 82. E M A C Interrogation techniques and approaches  Logical approach  Emotional approach  Sympathetic approach  Indirect approach  Playing one suspect against another suspect Elsam Management Consultants-www.elsamconsult.com 82
  • 83. E M A C Importance of listening during interviews and interrogations Investigators can conduct a successful interview only if they are good listeners Listening is as valuable a tool as questioning To be effective, one must be an active listener Elsam Management Consultants-www.elsamconsult.com 83
  • 84. E M A C Comparison types of interview documentation Type Advantages Disadvantages Memory Quick and easy Limited absorption and recall Most information lost shortly afterward Note taking by interviewer Sufficient in most cases Captures salient details Prevents need for reinterviewing May distract or offend witness May preoccupy interviewer, creating appearance of inattentiveness May cause interviewer to miss nonverbal messages Handwritten or signed statements by witness Useful if witness cannot testify Can be used to impeach if witness changes story in court Request may be offensive to witness Not necessary in routine statements Sound or sound-and-visual recordings Relatively inexpensive Some equipment portable All information recorded in witnesses’ own words Does not rely on inaccuracies of memory or another’s notes Does not distract Prevents unnecessary reinterviews Not necessary except in the most important cases Generally not practical Elsam Management Consultants-www.elsamconsult.com 84
  • 85. E M A C Comparison types of confession documentation Type Advantages Disadvantages 1. Video-audiotape or movie Shows all ,including fairness, procedures, and treatment Easy to do Can be relatively inexpensive May be legal constraints Quality equipment may be costly 2. Audio recording Can hear conversations Can infer fairness Some words or descriptions may be meaningless without pictorial support Necessitates identifying people and things involved 3. Statement written and signed in suspect’s own handwriting Can be identified as coming directly from suspect Can’t see demeanor or hear voice inflections Suspect may not agree to procedure 4. Typed statement signed by suspect Signature indicates knowledge of an agreement with contents of statement Less convincing than methods described above 5. Typed unsigned statement acknowledged by suspect Contents of confession or admission are present Acknowledgement helps show voluntariness Reduced believability of voluntariness and accuracy of contents 6. Testimony of someone who heard confession or admission given Contents admissible Carries little weight with juries Elsam Management Consultants-www.elsamconsult.com 85
  • 86. E M A C Session II Elsam Management Consultants-www.elsamconsult.com 86
  • 87. E M A C  Forensic means, “ having to do with the law”  It is application of broad spectrum of art or sciences to investigation and establish facts of interest in relation to criminal or civil law  It is synonym for legal or related to the courts  Forensic auditor is someone who can look behind the facade--not accept the records at their face value--someone who has a suspicious mind that the documents he or she is looking at may not be what they purport to be and someone who has the expertise to go out and conduct very detailed interviews of individuals to develop the truth, especially if some are presumed to be lying.  Example ACCA case study on forensic accounting Elsam Management Consultants-www.elsamconsult.com 87 Forensic Examination
  • 88. E M A C  Forensic examination is the action of identifying, recording, settling, extracting, sorting, reporting, and verifying past data or other activities for settling current or prospective legal disputes or using such past data for projecting future data to settle legal disputes.  Fraud Investigator is a professional especially skilled in who is generally engaged in investigation with a view toward fraud discovery, documentation, and prevention. Elsam Management Consultants-www.elsamconsult.com 88 Forensic examination
  • 89. E M A C Issue Audit Forensic Examination Timing Recurring: audits are conducted on a regular basis Nonrecurring: fraud examinations are nonrecurring. They are conducted only with sufficient predication. Scope General: collection of sufficient, competent data to support the opinion rendered. Specific: the fraud examination is conducted to resolve specific allegations. Objective Opinion: express opinion on financial statements Affix blame: determine if fraud occurred and who is responsible. Adversarial in nature. Methodology Audit techniques applied primarily to financial data. Fraud examination techniques include document examination, public record searches, and interviews. Presumption Professional skepticism Proof to support or refute an allegation of fraud. Elsam Management Consultants-www.elsamconsult.com 89 Difference between auditing and forensic examination
  • 90. 90 Covert Aspects Attitudes Feelings (Fear, Anger, etc.) Values Norms Interaction Supportiveness Satisfaction Overt Aspects Hierarchy Financial Resources Goals of the Organization Skills and Abilities of Personnel Technological State Performance Measurement Behavioral Considerations Water line Thinking as a Forensic Investigator Structural Considerations The Iceberg Theory of Fraud Source: G.J. Bologna and R.J. Lindquist, Fraud Auditing and Forensic Accounting, 2nd Edition, New York: John Wiley, 1995, pp. 36-37 Elsam Management Consultants-www.elsamconsult.com
  • 91. E M A C  Chain of custody is important to be observed in fraud cases since any broken chain may lead to disqualification by court in legal litigation  Chain of custody refers to the chronological documentation of paper train showing the seizure, custody, control, transfer, analysis and disposition of physical or electronic evidence.  The main objective of chain of custody is to establish that the alleged evidence is in fact related to the alleged crime, rather than having, for example been planted fraudulently to make some one appear guilty.  The custody is normally discharged to a police officer of investigator and should be stored in a good and secured place. Elsam Management Consultants-www.elsamconsult.com 91 Significance of observing chain of custody
  • 92. E M A C Chain of custody requires from the moment the evidence is collected, every transfer of evidence from person to person be documented and that it be provable that nobody else could have accessed that evidence. It is best to keep the number of transfer as low as possible. Elsam Management Consultants-www.elsamconsult.com 92 Significance of observing chain of custody
  • 93. E M A C “Trust ,but verify” Ronald Reagan Trust no one; question everything; verify Elsam Management Consultants-www.elsamconsult.com 93 Always Remember
  • 94. E M A C Elsam Management Consultants (EMAC) Recruitment, training and business Consultants Website: http://www.elsamconsult.com Email: info@elsamconsult.com We provide risk management training for organization and support preparation of risk management/Internal Control frameworks Elsam Management Consultants-www.elsamconsult.com 94 For more training inquiries