SlideShare a Scribd company logo
1 of 47
Jakarta Business Networkers
Fraud and Corruption in
Indonesia
Consulting
Strictly private
and confidential
12 October 2017
PwC
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
3
Jakarta Business Networkers
Indonesia probes corruption related to Rolls-Royce and Airbus
Former chief of state airline Garuda placed under investigation
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
4
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
5
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
6
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
7
Agenda 1
Agenda Executive Summary Executive Summary
Fraud is everywhere
Executive Summary
9
2 Fraud triangle 11
3 Anti-corruption efforts and their effectiveness / KPK-'statistics' 18
4 Real life fraud cases 23
5 Suspicious Transaction Analysis 36
6 What can you do? 45
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
8
Fraud is
everywhere
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
9
There are many kinds of financial crime
• Financial statement fraud
• Procurement fraud
• Bank card and cheque fraud
• Cyber fraud
• Counterfeit goods fraud
• Employee fraud
• Money laundering
• Tax fraud
• Insurance fraud
• Expense claim fraud
• Misappropriation of assets
• Insider trading
• EtcJakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
10
Fraud triangle
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
11
Rationalisation
• I’m doing the Company a favour.
This will definitely enhance
shareholder value
• I’ll help expose my Company’s
internal control weaknesses
• I’ll just borrow the money and return
it later
• I deserve it since I’ve sacrificed so
much for the company…
Incentive – fraud is often committed
because perpetrators are in some
form of financial difficulty or need
(e.g. gambling, drugs, living beyond
means, etc.)
• Pressure to meet loan covenants or
forecast numbers
• Pressure to meet market expectations
Opportunity
• Fraudsters are in the right position at the right time
• They recognise and seize the opportunity to commit fraud
• They understand operations, policies and procedures, and have access to
records/funds
It is generally accepted that the following three conditions must be present for fraud to occur:
Opportunity
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
12
RationalisationIncentive
!Fraud
Introduction to the Fraud Triangle
What is corruption?
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
13
Corruption Fraud
vs
Offering or receiving something
to Influence improperly the action
of another party
Action of misrepresentation that
knowingly is misleading
to gain financial benefit or avoid
obligation
Reported bribery and Corruption, by region
27%
12%
14%
25%
30%
35%
39%
39%
24%
12%
7%
19%
32%
43%
36%
34%
10% 50%
Global
Western Europe
North America
Latin America
Asia Pacific
Middle East*
Eastern Europe
Africa
20% 30% 40%
% of all respondents who experienced economic crime over the survey period
2011 Global 2014 Global
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
14
0%
*Indonesia and Middle East included in
the “Asia Pacific” region in 2011
Source: PwC GECS
Source: Transparency International
2 Fraud triangle
90 Indonesia 37
Top 5 most/least corrupt countries
Corruption Perception Index 2016
Rank Country Score Rank Country Score
1 Denmark 90 1 Denmark 91
New Zealand 90 New Zealand 91
2 Finland 89 2 Finland 90
3 Sweden 88 3 Sweden 89
4 Switzerland 86 4 Norway 88
5 Norway 85 5 Switzerland 86
88 Indonesia 36
174 North Korea 12 174 North Korea 8
175 South Sudan 11 175 South Sudan 15
176 Somalia 10 176 Somalia 8
Corruption Perception Index 2015
Executive SummaryExecutive SummaryExecutive SummaryAgenda
Note: 1 is perceived to be least corrupt, 176 is perceived to be most corrupt
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
15
24%
24%
72%
22%
24%
23%
27%
29%
69%
Cybercrime
Bribery and
Corruption
Procurement fraud
Asset
Misappropriation
2014
2011
Jakarta Business Networkers 0% 20% 40% 60% 80%
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
16
Bribery and
Corruption is
identified as
one of the five
most prevalent
forms of fraud,
after Asset
Misappropriat
ion
PwC’s Global Economic Crime Survey indicates only slight changes
year on year
Accounting fraud
Source: PwC GECS
Sector % of respondents
reporting
Financial services 19%
Professional services 18%
Entertainment and media 14%
Sector % of respondents
reporting
Engineering and construction 50%
Energy, utilities, and mining 42%
Government/state-owned enterprises 35%
Sectors reporting the least bribery and corruption:
Source: PwC GECS
Executive SummaryExecutive Summary2 Fraud triangle Agenda Executive Summary
Industries most at risk of bribery and corruption
Sectors reporting the most bribery and corruption:
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
17
Anti-corruption
efforts and their
effectiveness /
KPK-'statistics'
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
18
Anti-corruption efforts and their effectiveness / KPK-'statistics‘
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
19
Anti-corruption efforts and their effectiveness / KPK-'statistics‘ (continued)
Total Cases in 2012:
49
Total Cases in 2016:
99
Source : http://nasional.kompas.com/read/2013/12/30/2149106/2013.KPK.Tangani.70.Kasus
Total Money Saved :
IDR 500 Billion
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
20
Anti-corruption efforts and their effectiveness / KPK-'statistics‘ (continued)
Source : KPK
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
21
Positions of convicted:
• Judges
• Prosecutors
• Parliamentary Members
• Ministers
• Government Officials
• Ambassadors
• Commissioners
Bribery and corruption in high risk markets
10%
14%
26%
29%
40%
Lost
opportunity to
competitor
believe paid
bribe
Asked to pay
bribe
0% 10% 20% 30%
Org with operations in high risk markets
Org with no operations in high risk markets
Respondents
with operations
in high risk
markets are twice
as likely to be
asked to pay a
bribe and believe
they lost an
opportunity to a
competitor bribe
3 Anti-corruption efforts and their effectiveness / KPK-
'statistics'
Source: PwC GECS
Jakarta Business Networkers
Executive SummaryExecutive SummaryExecutive SummaryAgenda
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential Pricewaterhou1s2eOCcotopberrs20|17
22 22
Real life
fraud cases
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
23
A Business in a business
Customer Company Company Company Customer
Own transport
Fraudulent company
Customer
Customer
√
√
X
Pick up goods from customer Bring goods to port Pick up goods from port Deliver goods to customer Result
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
24
Middleman
• During our image analysis and document vouching, we noted the following pattern from a number of transactions to end customers:
o A number of quotations from Company ABC to end customers
o A number of quotations from Fraud company to end customers
o POs received from Fraud company with lower product prices compared to identified quotations
o Sales to Fraud company with product deliveries directly to end customers
• The chart below summarises the above findings
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
25
Cyber fraud
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
26
There are many fraud schemes when it comes to procurement…..
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
27
Below we have listed some of the fraud schemes we have come across during our
engagements:
1. Supplier = Company X employee
2. All suppliers are owned by same person so tender is not "real“
3. Split POs to stay under approval threshold for Direct award when should have gone
out for tender
4. Kick backs to Company X employees/procurement staff to get contracts
5. Overpayment for goods of lower quality
6. Company X pays for services that were never provided
7. Supplier is middleman and is owned by employee or his family member and
provides goods to Company X with a mark up
8. Inappropriate and ineffective internal controls
1. Supplier = Company X employee
Issue
• The supplier is actually an employee of CompanyX,
but has not declared its business interest in the
supplying entity
• Undeclared conflict of interest
Approach
• Identify common addresses, bank accounts and phone
numbers through Suspicious Transaction Analysis,
Corporate Intelligence and forensic investigation
• Conduct Due Diligence before accepting/during
relationship with vendor
• Pre and post employment screening of employees
Outcome
• Identify undeclared conflicts of interest
Company X
4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
28
2. All suppliers are owned by same person so tender is not "real“
Issue
• Company X invites 3 companies to provide a proposal, but they
are actually owned by the same person
Approach
• Identify common shareholders, directors, etc, common addresses,
and phone numbers through Suspicious Transaction Analysis and
forensic investigation
Outcome
• Establish whether entities are related
Proposal Proposal Proposal
Company X
4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
29
3. Split POs to stay under approval threshold for Direct award
when should have gone out for tender
Issue
• Company X procurement people arrange with
supplier to split POs into smaller POs to stay
under the threshold so that they can “direct
award” a contract and not have to go out for
tender
Approach
• Identify common shareholders, directors, etc,
common addresses, and phone numbers through
Suspicious Transaction Analysis and forensic
investigation
• Review G/L for unusual transactions, volume
and amounts
Outcome
• Identify POs that are connected and relate to the
same contract
Note: Approval threshold for direct appoint is US$ 750k
4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
30
4. Kick backs to Company X employees/procurement staff to get
contracts
Issue
• Company X employees/procurement staff ask
vendors for kick backs before/in order for them
to get awarded contracts by vendor
Approach
• Identify correspondence (e.g. e-mail, SMS,
WhatsApp messages) between Company X staff
and vendors (use Forensic Technology Services)
• Pre and post employment screening of
employees
• Conduct data analytics between customers/staff
to identify inconsistencies in procurement
Outcome
• Identify employees who are requesting kick
backs from vendors
Vendor
Procurement staff/
employee
Kick back
Contract
Company X
4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
31
5. Overpayment for goods of lower quality
Issue
• Suppliers deliver lower quality goods, but charge
for higher quality goods and share the difference
in price with Company X staff
Approach
• Identify correspondence (e.g. e-mail, SMS,
WhatsApp messages) between Company X staff
and vendors (use Forensic Technology Services)
• Conduct price comparison/data analytics
Outcome
• Identify employees who are in collusion with
vendors
• Identify potential quality issues
Good worth US$100,
but invoiced US$ 150
50Company X pays US$ 1
to vendor
Vendor pays US$ 25
to employee
Company X
Company X
employee
4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
32
6. Company X pays for services that were never provided
Issue
• Supplier charges Company X for services that were
never provided and share the proceeds with Company
X staff
Approach
• Identify correspondence (e.g. e-mail, SMS, WhatsApp
messages) between Company X staff and vendors (use
Forensic Technology Services)
• Conduct walk through of procurement cycle to identify
weaknesses in internal controls and “points of leakage”
• Check sample of “services” transactions
Outcome
• Identify employees who are in collusion with vendors
• Identify “fake” transactions
Invoice for S$ 150
for services
Company X pays
US$ 150
to vendor
Vendor pays US$ 25
to employee
Employee acknowledges
receipt of services
Company X
Company X
employee
4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
33
7. Supplier is middleman and is owned by employee or his family
member and provides goods to Company X with a mark up
Issue
• Entity owned by Company X staff acts as
middleman and on-sells goods to Company X
with a mark-up
Approach
• Identify common addresses, bank accounts and
phone numbers through Suspicious Transaction
Analysis/data analytics and forensic
investigation
• Conduct Due Diligence before accepting new
vendors/during relationship
• Pre and post employment screening of
employees
• Conduct price survey
Outcome
• Identify undeclared conflicts of interest
Profit sharing
Marked up goodsGoods
Company X
Company X
employee
4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
34
9. Inappropriate and ineffective internal controls
Issue
• Employee had a conflict of interest, he/she did
not declare as claimed was not aware that he
should declare
Approach
• Conduct fraud risk Diagnostic (Company self
assessment initially) and Fraud “Risk Storm”
Workshops to “challenge” the initial assessment
• Update fraud risk assessment
• Review fraud risk policies and procedures
• Conduct fraud awareness training
Outcome
• Identify weaknesses in internal controls
Examples:
• No Code of Conduct
• No “conflict of interest” policy
• No whistleblower facility
• No proper segregation of duties
• No independence / declaration policy
• No SOPs
4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
35
Suspicious
Transaction
Analysis
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
36
What is “Suspicious Transaction Analysis”?
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
37
Suspicious Transaction Analysis (STA) is an automated fraud detection and data analysis
process which can search through millions of transactions and master file data to identify
those that require further investigation. STA complements an organisation’s existing
schedule of audit and control tests, making best use of valuable resources. It is a tool
which quickly identifies problem areas, particularly in those high risk functions such as
payroll, accounts payable and expense claims.
STA utilises sophisticated software programs to data match and interrogate an
organisation’s supplier and employee databases to quickly identify, for example:
• Duplicate payments (made either fraudulently or in error)
• Collusion between suppliers and employees
• Suppliers fitting known fraud profiles
• Unusual, anomalous or otherwise questionable transactions.
A proactive approach to fraud detection
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
38
Benefits of Suspicious Transaction Analysis
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
39
Benefits of Suspicious Transaction Analysis
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
40
Some Case studies
Case Study One: Duplicate payments to suppliers
Our role: To undertake an STA over accounts payable and payroll for a large
organisation. There were no prior suspicions of fraud orerror.
Outcome: In addition to data quality issues, we identified a large number of duplicate
payments to suppliers amounting to over $1,700,000 which was recoverable from
suppliers.
Case Study Two: OverpaidOvertime
Our role: We were asked by a government agency to use STA to analyse staff salaries
and overtime payments over a three yearperiod.
Outcome: We identified nine employees who were paid overtime rates in excess of
$1,000 per hour, the highest being $4,989 per hour. These results allowed the agency
to investigate the payments and recover theover-payments.
Case Study Three: Duplicate payment of invoices and cleaning of supplier master
files
Our Role: We undertook an STA of master supplier and purchasing transaction files
for a large organisation. We identified approximately $600,000 of duplicate invoice
payments over a two year period. The STA also revealed that a number of suppliers
had been entered in the master file more thanonce.
Outcome: The organisation cleaned the master file of duplicated suppliers, thereby
reducing the risk of inadvertent duplicate payments and commenced to recover the
overpayments.
Case Study Four: Vehicle over-servicing
Our Role: Unsatisfied with the operating costs of its vehicle fleet, particularly relating
to vehicle maintenance, this organisation approached us to undertake an STA
specifically over vehicle maintenancepayments.
Outcome: We analysed all electronic maintenance data for the entire vehicle fleet over
a three year period. Several anomalies were detected, including apparent over-
servicing of vehicles and vehicles serviced with either no labour costs or no parts costs.
Our client was able to revisit the service provider agreements with the intention of
terminating the relationship with the vehicle maintenance provider.
There are literally thousands of possible STA tests that can be run. The decision as to
which tests to run depends on a number of factors such as type of business, quality of
data, the number of records, internal control weaknesses, past fraud incidents and so
on.
Some of the more useful routine Accounts Payable and Payroll tests we run are listed
below. However, it should be noted that we can also tailor these tests or design
additional tests which will address your specific needs andconcerns.
5 Suspicious Transaction Analysis Executive SummaryExecutive SummaryExecutive SummaryAgenda
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
41
Some examples of STA tests for Procurement
1.
2.
3.
4.
5.
6.
•
•
Collusion between employees and suppliers: Identify details shared between
employees and suppliers (either address, telephone or bank details). Identify
whether payroll and accounts payable transactionsexist.
NB: In the event employee related suppliers reside on the Supplier Master File
for the purposes of the reimbursement of work related expenses, these will be
eliminated from the test results where the supplier name is the same as the
employee name.
Identify suppliers sharing address, telephone, with the PwC profile database
(prisons, document exchanges, serviced offices, postal services and adult
entertainment). Identify payments to thesesuppliers.
NB: In the event employee related suppliers reside on the Supplier Master File
for the purposes of the reimbursement of work related expenses, these will be
eliminated from the test results where the supplier name is the same as the
employee name.
Payments to suppliers which do not appear on the Supplier Master File (by
supplier number or bank details).
NB: In the event the Supplier Master File is maintained real time such that
only the latest bank details are captured, a historical listing of bank accounts
is required to eliminate false positives from theresults.
Duplicate supplier payment transactions to the same supplier based on:
Identical invoice amount and identical or similar invoice number
Identical invoice amount and description.
8. Duplicate supplier payment transactions based on identical invoice number
and amount to different supplier numbers.
9. One off payments to suppliers.
10. Invoices dated (i.e. suppliers invoices date) onweekends.
11. Active suppliers sharing information (address, telephone, bank details) with
one or more other suppliers within the same branch (i.e. different supplier
numbers within the same branch). Identify whether duplicate supplier
payments have occurred to these suppliers per Test No. 8.
12. Identify favourable payment of invoices (i.e. invoices paid within 10 days of
the suppliers invoicedate).
13. Compare suppliers invoice date to the purchase order creation date to identify
purchase orders created on the same date or subsequent to the suppliers
invoice date.
14. Identify multiple invoices from the same supplier on the same date.
15. Identify active suppliers in the Supplier Master File which have no accounts
payable transactions (i.e. active on the Supplier Master File but they are not
really active because they have no transactions). Such suppliers should be
disabled on the Supplier MasterFile.
16. Split purchasing by employees: Identify multiple purchase orders created on
the same day or within three days of each other to the same supplier and
authoriser where the total value exceeds the acceptable tolerable level for the
authoriser.
5 Suspicious Transaction Analysis Executive SummaryExecutive SummaryExecutive SummaryAgenda
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
42
Some examples of STA tests for Procurement (Cont’d)
18. Identify invoices paid before the suppliers invoice date.
19. Identify accounts payable transactions processed by employees while they are
on annual leave or sick leave.
20. Benford analysis on invoice amount.
21. Identify large invoices without purchase orders or which have not been
receipted.
22. Excessive purchasing from suppliers.
23. Identify duplicate cheques issued to differentsuppliers.
24. Identify quantity mismatches between the quantity ordered and the quantity
receipted.
25. Compare purchase order amount to the amount invoiced.
26. Analyse round invoice amounts from suppliers.
5 Suspicious Transaction Analysis Executive SummaryExecutive SummaryExecutive SummaryAgenda
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
43
Some examples of STA tests for Payroll
1. Compare payroll dates with employee start and termination dates to identify
payments to employees:
• Prior to hire date
• More than 60 days after termination date.
2. Identify employees sharing address and/or telephone with the PwC Australian
profile database (prisons, document exchanges, serviced offices, postal services
and adult entertainment). Identify payroll transactions to these employees.
3. Employees sharing information (either bank details, DOB and same name, name
and address, or name and phone number) with one or more other employees (i.e.
different employee numbers). Identify payroll transactions to theseemployees.
4. Employees receiving excessive overtime as a proportion of gross pay (40% or
more of gross pay is overtime).
5. Employees receiving excessive allowances as a proportion of gross pay (40% or
more of gross pay is allowances).
6. Payroll payments with no taxdeducted.
7. Payments to employees which do not appear in the Employee Master File (by
employee number and bank details information).
NB: In the event the Employee Master File is maintained real time such that only
the latest bank details are captured, a historical listing of bank accounts is
required to eliminate false positives from theresults.
8. Identify round payroll payments to employees.
9. Identify payments to employees with unusual dates of birth:
• Aged 17 years orless
• Aged 65 andover.
10. Identify duplicate payroll payments based on employee number and pay run
number.
11. Identify payments to employees where the bank account name differs to the
employees’ name.
12.Payroll transactions dated on weekend dates.
13.Identify payments made to employees employed for 10 days or less.
14.Excessive number of payments per period.
15. Identify employees with high amounts of gross pay (e.g. over $80,000).
16. Identify incorrect payroll payments by comparing the gross amount in the
Employee Master File to the actual amount paid to theemployee.
17. Identify annual leave and long service leave taken prior to approval.
18. Employees sharing information (either bank details, address or telephone) but
not name with different employees. Identify payroll payments to these
employees.
19. Identify payroll payments to employees where the bank account name differs
from the employee’s name.
5 Suspicious Transaction Analysis Executive SummaryExecutive SummaryExecutive SummaryAgenda
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
44
What can
you do?
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
45
There are many ways to avoid or mitigate fraud
Jakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
46
Action Comment
Code of Conduct Tone at the top is key!
Back ground due diligence Know who you’re dealing with
Segregation of duties Don’t give people the opportunity to
commit fraud
Delegation of Authority The CFO does not need to approve
everything
Data Analytics/Suspicious Transaction
Analysis
To be performed periodically
Fraud Risk Analysis Know where your risks lie, and make sure
you mitigate exposures
Whistle blower hotline Follow up on reports
Forensic investigation Follow up on indications of fraud
PwC Forensics Service Offerings
Without an effective fraud risk
management strategy, a company
is exposed to fraud for which the
Board and management may be
legally and financially liable for
failure to establish a pro-active
fraud risk framework.
PwC’s Forensic Services practice
specialises in establishing fraud
risk and control frameworks
which help to identify relevant
fraud risks and the associated
controls.
We assist clients to understand
and meet their obligations in
fraud control in accordance with
both private and public sector
Standards such as AS 8001-2008
Fraud and Corruption Control,
various Fraud Control Guidelines
and other requirements. We
divide our fraud risk frameworks
into three headings: Prevent,
Detect and Investigate.
• Fraud risk policies and procedures
• Fraud control plans
• Annual declarations
• Pre and post employment screening of employees
• Fraud awareness training
• “Whistle blower” hotline procedures
• Investigative Intelligence & Analysis • Procurement Fraud ManagementJakarta Business Networkers
Fraud and Corruption in Indonesia
PwC
Strictly private and confidential 12 October 2017
47
• Fraud risk assessments
• Facilitated workshops
to identify fraud risk
• Proactive internal and
external audit
procedures
• Data analytics
(“suspicious
transactions analysis”)
• Fraud investigations
• Forensic Accounting
• Electronic Discovery Services
• Anti-Money Laundering (AML) & Sanctions
• Anti-Bribery & Corruption
• Licensing Management Services

More Related Content

What's hot

Challenges in AML Implementation in Bangladesh
Challenges in AML Implementation in Bangladesh Challenges in AML Implementation in Bangladesh
Challenges in AML Implementation in Bangladesh Abhishek Bali
 
Fintech regulations presentation
Fintech regulations presentationFintech regulations presentation
Fintech regulations presentationJoseph Rubin
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Guardian Analytics
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachLaurent Pacalin
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
Chapter 10 aml technologies
Chapter 10   aml technologiesChapter 10   aml technologies
Chapter 10 aml technologiesQuan Risk
 
IRJET-Anti Money Laundering System to Detect Suspicious Account
IRJET-Anti Money Laundering System to Detect Suspicious AccountIRJET-Anti Money Laundering System to Detect Suspicious Account
IRJET-Anti Money Laundering System to Detect Suspicious AccountIRJET Journal
 
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowGuardian Analytics
 
P2P Lending Business Research by Artivatic.ai
P2P Lending Business Research by Artivatic.aiP2P Lending Business Research by Artivatic.ai
P2P Lending Business Research by Artivatic.aiArtivatic.ai
 
e commerce by N.P.Ghadge
 e commerce by N.P.Ghadge e commerce by N.P.Ghadge
e commerce by N.P.Ghadgeneeta ghadge
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupLaurent Pacalin
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Advising Chinese Companies
Advising Chinese CompaniesAdvising Chinese Companies
Advising Chinese CompaniesPetr Alendeev
 
A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)Kullarat Phongsathaporn
 
ICIL IT Enabled Services
ICIL IT Enabled ServicesICIL IT Enabled Services
ICIL IT Enabled ServicesAdnan Tabassum
 
How to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4jHow to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4jNeo4j
 

What's hot (19)

Challenges in AML Implementation in Bangladesh
Challenges in AML Implementation in Bangladesh Challenges in AML Implementation in Bangladesh
Challenges in AML Implementation in Bangladesh
 
Fintech regulations presentation
Fintech regulations presentationFintech regulations presentation
Fintech regulations presentation
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Chapter 10 aml technologies
Chapter 10   aml technologiesChapter 10   aml technologies
Chapter 10 aml technologies
 
IRJET-Anti Money Laundering System to Detect Suspicious Account
IRJET-Anti Money Laundering System to Detect Suspicious AccountIRJET-Anti Money Laundering System to Detect Suspicious Account
IRJET-Anti Money Laundering System to Detect Suspicious Account
 
2017 thomson reuters regulatory & compliance salary survey harbridge
2017 thomson reuters regulatory & compliance salary survey harbridge2017 thomson reuters regulatory & compliance salary survey harbridge
2017 thomson reuters regulatory & compliance salary survey harbridge
 
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and Tomorrow
 
P2P Lending Business Research by Artivatic.ai
P2P Lending Business Research by Artivatic.aiP2P Lending Business Research by Artivatic.ai
P2P Lending Business Research by Artivatic.ai
 
e commerce by N.P.Ghadge
 e commerce by N.P.Ghadge e commerce by N.P.Ghadge
e commerce by N.P.Ghadge
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Advising Chinese Companies
Advising Chinese CompaniesAdvising Chinese Companies
Advising Chinese Companies
 
A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)
 
What is Social KYC?
What is Social KYC? What is Social KYC?
What is Social KYC?
 
ICIL IT Enabled Services
ICIL IT Enabled ServicesICIL IT Enabled Services
ICIL IT Enabled Services
 
How to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4jHow to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4j
 

Similar to Paul Van Der Aa - Dealing With Fraud And Corruption In A Pragmatic Manner

Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachGuardian Analytics
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_finalAudrius Sapola
 
Digital Finance Use Cases
Digital Finance Use CasesDigital Finance Use Cases
Digital Finance Use CasesCGAP
 
RandyRomesCyberRisks.pptx
RandyRomesCyberRisks.pptxRandyRomesCyberRisks.pptx
RandyRomesCyberRisks.pptxJohn Donahue
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 
A project report on Forensic Accounting and Auditing
A project report on Forensic Accounting and AuditingA project report on Forensic Accounting and Auditing
A project report on Forensic Accounting and AuditingDannyNaik
 
Corporate Fraud in India-Perception and Emerging Issues
Corporate Fraud in India-Perception and Emerging IssuesCorporate Fraud in India-Perception and Emerging Issues
Corporate Fraud in India-Perception and Emerging IssuesKrishna Patel
 
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...Dataconomy Media
 
The Fight for Dominance & The Technology Battlefield in Asset Management
The Fight for Dominance & The Technology Battlefield in Asset ManagementThe Fight for Dominance & The Technology Battlefield in Asset Management
The Fight for Dominance & The Technology Battlefield in Asset ManagementFrederik Gregaard
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Rebecca1243
 
Financial Frauds In Indian Banking System: A Case Study Analysis
Financial Frauds In Indian Banking System: A Case Study Analysis Financial Frauds In Indian Banking System: A Case Study Analysis
Financial Frauds In Indian Banking System: A Case Study Analysis Rubeena Shaik
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j
 
Marco Sebastian - Pricewater Consulting - The Biggest Competitor You Didn't K...
Marco Sebastian - Pricewater Consulting - The Biggest Competitor You Didn't K...Marco Sebastian - Pricewater Consulting - The Biggest Competitor You Didn't K...
Marco Sebastian - Pricewater Consulting - The Biggest Competitor You Didn't K...Jakarta Business Networkers
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Neo4j
 
Fintech o2o digital hybrid finance presentation by Grow VC Group
Fintech o2o digital hybrid finance presentation by Grow VC GroupFintech o2o digital hybrid finance presentation by Grow VC Group
Fintech o2o digital hybrid finance presentation by Grow VC GroupGrow VC Group
 
Corda for Corporates at Sibos 2019
Corda for Corporates at Sibos 2019Corda for Corporates at Sibos 2019
Corda for Corporates at Sibos 2019R3
 
Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012EY
 
Venture Backed IPOs in FinTech
Venture Backed IPOs in FinTechVenture Backed IPOs in FinTech
Venture Backed IPOs in FinTechFrontline Ventures
 

Similar to Paul Van Der Aa - Dealing With Fraud And Corruption In A Pragmatic Manner (20)

Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_final
 
Digital Finance Use Cases
Digital Finance Use CasesDigital Finance Use Cases
Digital Finance Use Cases
 
RandyRomesCyberRisks.pptx
RandyRomesCyberRisks.pptxRandyRomesCyberRisks.pptx
RandyRomesCyberRisks.pptx
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
A project report on Forensic Accounting and Auditing
A project report on Forensic Accounting and AuditingA project report on Forensic Accounting and Auditing
A project report on Forensic Accounting and Auditing
 
Corporate Fraud in India-Perception and Emerging Issues
Corporate Fraud in India-Perception and Emerging IssuesCorporate Fraud in India-Perception and Emerging Issues
Corporate Fraud in India-Perception and Emerging Issues
 
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
 
Fintech 2021: Overview and Applications
Fintech 2021: Overview and Applications  Fintech 2021: Overview and Applications
Fintech 2021: Overview and Applications
 
The Fight for Dominance & The Technology Battlefield in Asset Management
The Fight for Dominance & The Technology Battlefield in Asset ManagementThe Fight for Dominance & The Technology Battlefield in Asset Management
The Fight for Dominance & The Technology Battlefield in Asset Management
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014
 
Financial Frauds In Indian Banking System: A Case Study Analysis
Financial Frauds In Indian Banking System: A Case Study Analysis Financial Frauds In Indian Banking System: A Case Study Analysis
Financial Frauds In Indian Banking System: A Case Study Analysis
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Marco Sebastian - Pricewater Consulting - The Biggest Competitor You Didn't K...
Marco Sebastian - Pricewater Consulting - The Biggest Competitor You Didn't K...Marco Sebastian - Pricewater Consulting - The Biggest Competitor You Didn't K...
Marco Sebastian - Pricewater Consulting - The Biggest Competitor You Didn't K...
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
 
Fintech o2o digital hybrid finance presentation by Grow VC Group
Fintech o2o digital hybrid finance presentation by Grow VC GroupFintech o2o digital hybrid finance presentation by Grow VC Group
Fintech o2o digital hybrid finance presentation by Grow VC Group
 
Corda for Corporates at Sibos 2019
Corda for Corporates at Sibos 2019Corda for Corporates at Sibos 2019
Corda for Corporates at Sibos 2019
 
Economic-Crime-Thailand-PwC-Consulting
Economic-Crime-Thailand-PwC-ConsultingEconomic-Crime-Thailand-PwC-Consulting
Economic-Crime-Thailand-PwC-Consulting
 
Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012
 
Venture Backed IPOs in FinTech
Venture Backed IPOs in FinTechVenture Backed IPOs in FinTech
Venture Backed IPOs in FinTech
 

More from Jakarta Business Networkers

Building Your Community Through Social Media Marketing
Building Your Community Through Social Media MarketingBuilding Your Community Through Social Media Marketing
Building Your Community Through Social Media MarketingJakarta Business Networkers
 
Guillem Segarra - Happy Fresh - Building a successful e-commerce business: Th...
Guillem Segarra - Happy Fresh - Building a successful e-commerce business: Th...Guillem Segarra - Happy Fresh - Building a successful e-commerce business: Th...
Guillem Segarra - Happy Fresh - Building a successful e-commerce business: Th...Jakarta Business Networkers
 
Rama Dhonanto, Heroleads Indonesia - The Missing Link: The Role of Digital Pl...
Rama Dhonanto, Heroleads Indonesia - The Missing Link: The Role of Digital Pl...Rama Dhonanto, Heroleads Indonesia - The Missing Link: The Role of Digital Pl...
Rama Dhonanto, Heroleads Indonesia - The Missing Link: The Role of Digital Pl...Jakarta Business Networkers
 
Reinis Simanovskis - Danabijak - A New Era of Borrowing and Lending in Indonesia
Reinis Simanovskis - Danabijak - A New Era of Borrowing and Lending in IndonesiaReinis Simanovskis - Danabijak - A New Era of Borrowing and Lending in Indonesia
Reinis Simanovskis - Danabijak - A New Era of Borrowing and Lending in IndonesiaJakarta Business Networkers
 
Shaun Harper – People Centric – Emotional Intellegence for Leaders
Shaun Harper – People Centric – Emotional Intellegence for LeadersShaun Harper – People Centric – Emotional Intellegence for Leaders
Shaun Harper – People Centric – Emotional Intellegence for LeadersJakarta Business Networkers
 
Asok Kumar - DB SChenker - Logistics in Indonesia Today and What to Expect To...
Asok Kumar - DB SChenker - Logistics in Indonesia Today and What to Expect To...Asok Kumar - DB SChenker - Logistics in Indonesia Today and What to Expect To...
Asok Kumar - DB SChenker - Logistics in Indonesia Today and What to Expect To...Jakarta Business Networkers
 
Ivan Aditya - The Power of Digital Marketing - Tunas Group
Ivan Aditya - The Power of Digital Marketing - Tunas GroupIvan Aditya - The Power of Digital Marketing - Tunas Group
Ivan Aditya - The Power of Digital Marketing - Tunas GroupJakarta Business Networkers
 
Ridzki Kramadibrata - Building Disruptive Business - Grab Indonesia
Ridzki Kramadibrata - Building Disruptive Business - Grab IndonesiaRidzki Kramadibrata - Building Disruptive Business - Grab Indonesia
Ridzki Kramadibrata - Building Disruptive Business - Grab IndonesiaJakarta Business Networkers
 
Michael Ginarto - Starting From Scratch: The GIN International Start-up Succe...
Michael Ginarto - Starting From Scratch: The GIN International Start-up Succe...Michael Ginarto - Starting From Scratch: The GIN International Start-up Succe...
Michael Ginarto - Starting From Scratch: The GIN International Start-up Succe...Jakarta Business Networkers
 
Riki Kono Basmeleh - Building a Premium Brand - DORÉ by LeTAO
Riki Kono Basmeleh - Building a Premium Brand - DORÉ by LeTAORiki Kono Basmeleh - Building a Premium Brand - DORÉ by LeTAO
Riki Kono Basmeleh - Building a Premium Brand - DORÉ by LeTAOJakarta Business Networkers
 
Raymond Purnama - Basic International Trade Payment Methods
Raymond Purnama - Basic International Trade Payment MethodsRaymond Purnama - Basic International Trade Payment Methods
Raymond Purnama - Basic International Trade Payment MethodsJakarta Business Networkers
 
Cally Alexandra - General Manager of Crowdo Indonesia
Cally Alexandra - General Manager of Crowdo IndonesiaCally Alexandra - General Manager of Crowdo Indonesia
Cally Alexandra - General Manager of Crowdo IndonesiaJakarta Business Networkers
 
Nicholas Llovet - Senior Communication Coach of KPI Training
Nicholas Llovet - Senior Communication Coach of KPI TrainingNicholas Llovet - Senior Communication Coach of KPI Training
Nicholas Llovet - Senior Communication Coach of KPI TrainingJakarta Business Networkers
 
Jehanne Fabre - Programme Management Officer of Danone
Jehanne Fabre - Programme Management Officer of DanoneJehanne Fabre - Programme Management Officer of Danone
Jehanne Fabre - Programme Management Officer of DanoneJakarta Business Networkers
 
Dharmesti Sindhunatha - Organizational Climate Drives Performance
Dharmesti Sindhunatha - Organizational Climate Drives PerformanceDharmesti Sindhunatha - Organizational Climate Drives Performance
Dharmesti Sindhunatha - Organizational Climate Drives PerformanceJakarta Business Networkers
 
Dwi Anita Daruherdani - IP protection and IP trading in your business
Dwi Anita Daruherdani - IP protection and IP trading in your businessDwi Anita Daruherdani - IP protection and IP trading in your business
Dwi Anita Daruherdani - IP protection and IP trading in your businessJakarta Business Networkers
 
Rhesa Yogaswara - The Role of Modern Store as Consumer’s Brand Decision
Rhesa Yogaswara - The Role of Modern Store as Consumer’s Brand DecisionRhesa Yogaswara - The Role of Modern Store as Consumer’s Brand Decision
Rhesa Yogaswara - The Role of Modern Store as Consumer’s Brand DecisionJakarta Business Networkers
 
Jeffrey Cheung - Collective Action to Promote Business Integrity
Jeffrey Cheung - Collective Action to Promote Business IntegrityJeffrey Cheung - Collective Action to Promote Business Integrity
Jeffrey Cheung - Collective Action to Promote Business IntegrityJakarta Business Networkers
 

More from Jakarta Business Networkers (20)

Building Your Community Through Social Media Marketing
Building Your Community Through Social Media MarketingBuilding Your Community Through Social Media Marketing
Building Your Community Through Social Media Marketing
 
Guillem Segarra - Happy Fresh - Building a successful e-commerce business: Th...
Guillem Segarra - Happy Fresh - Building a successful e-commerce business: Th...Guillem Segarra - Happy Fresh - Building a successful e-commerce business: Th...
Guillem Segarra - Happy Fresh - Building a successful e-commerce business: Th...
 
Rama Dhonanto, Heroleads Indonesia - The Missing Link: The Role of Digital Pl...
Rama Dhonanto, Heroleads Indonesia - The Missing Link: The Role of Digital Pl...Rama Dhonanto, Heroleads Indonesia - The Missing Link: The Role of Digital Pl...
Rama Dhonanto, Heroleads Indonesia - The Missing Link: The Role of Digital Pl...
 
Reinis Simanovskis - Danabijak - A New Era of Borrowing and Lending in Indonesia
Reinis Simanovskis - Danabijak - A New Era of Borrowing and Lending in IndonesiaReinis Simanovskis - Danabijak - A New Era of Borrowing and Lending in Indonesia
Reinis Simanovskis - Danabijak - A New Era of Borrowing and Lending in Indonesia
 
Shaun Harper – People Centric – Emotional Intellegence for Leaders
Shaun Harper – People Centric – Emotional Intellegence for LeadersShaun Harper – People Centric – Emotional Intellegence for Leaders
Shaun Harper – People Centric – Emotional Intellegence for Leaders
 
Asok Kumar - DB SChenker - Logistics in Indonesia Today and What to Expect To...
Asok Kumar - DB SChenker - Logistics in Indonesia Today and What to Expect To...Asok Kumar - DB SChenker - Logistics in Indonesia Today and What to Expect To...
Asok Kumar - DB SChenker - Logistics in Indonesia Today and What to Expect To...
 
Ivan Aditya - The Power of Digital Marketing - Tunas Group
Ivan Aditya - The Power of Digital Marketing - Tunas GroupIvan Aditya - The Power of Digital Marketing - Tunas Group
Ivan Aditya - The Power of Digital Marketing - Tunas Group
 
Ridzki Kramadibrata - Building Disruptive Business - Grab Indonesia
Ridzki Kramadibrata - Building Disruptive Business - Grab IndonesiaRidzki Kramadibrata - Building Disruptive Business - Grab Indonesia
Ridzki Kramadibrata - Building Disruptive Business - Grab Indonesia
 
Michael Ginarto - Starting From Scratch: The GIN International Start-up Succe...
Michael Ginarto - Starting From Scratch: The GIN International Start-up Succe...Michael Ginarto - Starting From Scratch: The GIN International Start-up Succe...
Michael Ginarto - Starting From Scratch: The GIN International Start-up Succe...
 
Riki Kono Basmeleh - Building a Premium Brand - DORÉ by LeTAO
Riki Kono Basmeleh - Building a Premium Brand - DORÉ by LeTAORiki Kono Basmeleh - Building a Premium Brand - DORÉ by LeTAO
Riki Kono Basmeleh - Building a Premium Brand - DORÉ by LeTAO
 
Raymond Purnama - Basic International Trade Payment Methods
Raymond Purnama - Basic International Trade Payment MethodsRaymond Purnama - Basic International Trade Payment Methods
Raymond Purnama - Basic International Trade Payment Methods
 
Sendra Wong - Fintech Development In Indonesia
Sendra Wong - Fintech Development In IndonesiaSendra Wong - Fintech Development In Indonesia
Sendra Wong - Fintech Development In Indonesia
 
Fitri Hilman - Offices In The Future
Fitri Hilman - Offices In The FutureFitri Hilman - Offices In The Future
Fitri Hilman - Offices In The Future
 
Cally Alexandra - General Manager of Crowdo Indonesia
Cally Alexandra - General Manager of Crowdo IndonesiaCally Alexandra - General Manager of Crowdo Indonesia
Cally Alexandra - General Manager of Crowdo Indonesia
 
Nicholas Llovet - Senior Communication Coach of KPI Training
Nicholas Llovet - Senior Communication Coach of KPI TrainingNicholas Llovet - Senior Communication Coach of KPI Training
Nicholas Llovet - Senior Communication Coach of KPI Training
 
Jehanne Fabre - Programme Management Officer of Danone
Jehanne Fabre - Programme Management Officer of DanoneJehanne Fabre - Programme Management Officer of Danone
Jehanne Fabre - Programme Management Officer of Danone
 
Dharmesti Sindhunatha - Organizational Climate Drives Performance
Dharmesti Sindhunatha - Organizational Climate Drives PerformanceDharmesti Sindhunatha - Organizational Climate Drives Performance
Dharmesti Sindhunatha - Organizational Climate Drives Performance
 
Dwi Anita Daruherdani - IP protection and IP trading in your business
Dwi Anita Daruherdani - IP protection and IP trading in your businessDwi Anita Daruherdani - IP protection and IP trading in your business
Dwi Anita Daruherdani - IP protection and IP trading in your business
 
Rhesa Yogaswara - The Role of Modern Store as Consumer’s Brand Decision
Rhesa Yogaswara - The Role of Modern Store as Consumer’s Brand DecisionRhesa Yogaswara - The Role of Modern Store as Consumer’s Brand Decision
Rhesa Yogaswara - The Role of Modern Store as Consumer’s Brand Decision
 
Jeffrey Cheung - Collective Action to Promote Business Integrity
Jeffrey Cheung - Collective Action to Promote Business IntegrityJeffrey Cheung - Collective Action to Promote Business Integrity
Jeffrey Cheung - Collective Action to Promote Business Integrity
 

Recently uploaded

Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 

Recently uploaded (20)

Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 

Paul Van Der Aa - Dealing With Fraud And Corruption In A Pragmatic Manner

  • 1. Jakarta Business Networkers Fraud and Corruption in Indonesia Consulting Strictly private and confidential 12 October 2017
  • 2. PwC
  • 3. Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 3
  • 4. Jakarta Business Networkers Indonesia probes corruption related to Rolls-Royce and Airbus Former chief of state airline Garuda placed under investigation Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 4
  • 5. Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 5
  • 6. Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 6
  • 7. Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 7
  • 8. Agenda 1 Agenda Executive Summary Executive Summary Fraud is everywhere Executive Summary 9 2 Fraud triangle 11 3 Anti-corruption efforts and their effectiveness / KPK-'statistics' 18 4 Real life fraud cases 23 5 Suspicious Transaction Analysis 36 6 What can you do? 45 Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 8
  • 9. Fraud is everywhere Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 9
  • 10. There are many kinds of financial crime • Financial statement fraud • Procurement fraud • Bank card and cheque fraud • Cyber fraud • Counterfeit goods fraud • Employee fraud • Money laundering • Tax fraud • Insurance fraud • Expense claim fraud • Misappropriation of assets • Insider trading • EtcJakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 10
  • 11. Fraud triangle Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 11
  • 12. Rationalisation • I’m doing the Company a favour. This will definitely enhance shareholder value • I’ll help expose my Company’s internal control weaknesses • I’ll just borrow the money and return it later • I deserve it since I’ve sacrificed so much for the company… Incentive – fraud is often committed because perpetrators are in some form of financial difficulty or need (e.g. gambling, drugs, living beyond means, etc.) • Pressure to meet loan covenants or forecast numbers • Pressure to meet market expectations Opportunity • Fraudsters are in the right position at the right time • They recognise and seize the opportunity to commit fraud • They understand operations, policies and procedures, and have access to records/funds It is generally accepted that the following three conditions must be present for fraud to occur: Opportunity Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 12 RationalisationIncentive !Fraud Introduction to the Fraud Triangle
  • 13. What is corruption? Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 13 Corruption Fraud vs Offering or receiving something to Influence improperly the action of another party Action of misrepresentation that knowingly is misleading to gain financial benefit or avoid obligation
  • 14. Reported bribery and Corruption, by region 27% 12% 14% 25% 30% 35% 39% 39% 24% 12% 7% 19% 32% 43% 36% 34% 10% 50% Global Western Europe North America Latin America Asia Pacific Middle East* Eastern Europe Africa 20% 30% 40% % of all respondents who experienced economic crime over the survey period 2011 Global 2014 Global Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 14 0% *Indonesia and Middle East included in the “Asia Pacific” region in 2011 Source: PwC GECS
  • 15. Source: Transparency International 2 Fraud triangle 90 Indonesia 37 Top 5 most/least corrupt countries Corruption Perception Index 2016 Rank Country Score Rank Country Score 1 Denmark 90 1 Denmark 91 New Zealand 90 New Zealand 91 2 Finland 89 2 Finland 90 3 Sweden 88 3 Sweden 89 4 Switzerland 86 4 Norway 88 5 Norway 85 5 Switzerland 86 88 Indonesia 36 174 North Korea 12 174 North Korea 8 175 South Sudan 11 175 South Sudan 15 176 Somalia 10 176 Somalia 8 Corruption Perception Index 2015 Executive SummaryExecutive SummaryExecutive SummaryAgenda Note: 1 is perceived to be least corrupt, 176 is perceived to be most corrupt Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 15
  • 16. 24% 24% 72% 22% 24% 23% 27% 29% 69% Cybercrime Bribery and Corruption Procurement fraud Asset Misappropriation 2014 2011 Jakarta Business Networkers 0% 20% 40% 60% 80% Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 16 Bribery and Corruption is identified as one of the five most prevalent forms of fraud, after Asset Misappropriat ion PwC’s Global Economic Crime Survey indicates only slight changes year on year Accounting fraud Source: PwC GECS
  • 17. Sector % of respondents reporting Financial services 19% Professional services 18% Entertainment and media 14% Sector % of respondents reporting Engineering and construction 50% Energy, utilities, and mining 42% Government/state-owned enterprises 35% Sectors reporting the least bribery and corruption: Source: PwC GECS Executive SummaryExecutive Summary2 Fraud triangle Agenda Executive Summary Industries most at risk of bribery and corruption Sectors reporting the most bribery and corruption: Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 17
  • 18. Anti-corruption efforts and their effectiveness / KPK-'statistics' Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 18
  • 19. Anti-corruption efforts and their effectiveness / KPK-'statistics‘ Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 19
  • 20. Anti-corruption efforts and their effectiveness / KPK-'statistics‘ (continued) Total Cases in 2012: 49 Total Cases in 2016: 99 Source : http://nasional.kompas.com/read/2013/12/30/2149106/2013.KPK.Tangani.70.Kasus Total Money Saved : IDR 500 Billion Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 20
  • 21. Anti-corruption efforts and their effectiveness / KPK-'statistics‘ (continued) Source : KPK Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 21 Positions of convicted: • Judges • Prosecutors • Parliamentary Members • Ministers • Government Officials • Ambassadors • Commissioners
  • 22. Bribery and corruption in high risk markets 10% 14% 26% 29% 40% Lost opportunity to competitor believe paid bribe Asked to pay bribe 0% 10% 20% 30% Org with operations in high risk markets Org with no operations in high risk markets Respondents with operations in high risk markets are twice as likely to be asked to pay a bribe and believe they lost an opportunity to a competitor bribe 3 Anti-corruption efforts and their effectiveness / KPK- 'statistics' Source: PwC GECS Jakarta Business Networkers Executive SummaryExecutive SummaryExecutive SummaryAgenda Fraud and Corruption in Indonesia PwC Strictly private and confidential Pricewaterhou1s2eOCcotopberrs20|17 22 22
  • 23. Real life fraud cases Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 23
  • 24. A Business in a business Customer Company Company Company Customer Own transport Fraudulent company Customer Customer √ √ X Pick up goods from customer Bring goods to port Pick up goods from port Deliver goods to customer Result Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 24
  • 25. Middleman • During our image analysis and document vouching, we noted the following pattern from a number of transactions to end customers: o A number of quotations from Company ABC to end customers o A number of quotations from Fraud company to end customers o POs received from Fraud company with lower product prices compared to identified quotations o Sales to Fraud company with product deliveries directly to end customers • The chart below summarises the above findings Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 25
  • 26. Cyber fraud Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 26
  • 27. There are many fraud schemes when it comes to procurement….. Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 27 Below we have listed some of the fraud schemes we have come across during our engagements: 1. Supplier = Company X employee 2. All suppliers are owned by same person so tender is not "real“ 3. Split POs to stay under approval threshold for Direct award when should have gone out for tender 4. Kick backs to Company X employees/procurement staff to get contracts 5. Overpayment for goods of lower quality 6. Company X pays for services that were never provided 7. Supplier is middleman and is owned by employee or his family member and provides goods to Company X with a mark up 8. Inappropriate and ineffective internal controls
  • 28. 1. Supplier = Company X employee Issue • The supplier is actually an employee of CompanyX, but has not declared its business interest in the supplying entity • Undeclared conflict of interest Approach • Identify common addresses, bank accounts and phone numbers through Suspicious Transaction Analysis, Corporate Intelligence and forensic investigation • Conduct Due Diligence before accepting/during relationship with vendor • Pre and post employment screening of employees Outcome • Identify undeclared conflicts of interest Company X 4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 28
  • 29. 2. All suppliers are owned by same person so tender is not "real“ Issue • Company X invites 3 companies to provide a proposal, but they are actually owned by the same person Approach • Identify common shareholders, directors, etc, common addresses, and phone numbers through Suspicious Transaction Analysis and forensic investigation Outcome • Establish whether entities are related Proposal Proposal Proposal Company X 4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 29
  • 30. 3. Split POs to stay under approval threshold for Direct award when should have gone out for tender Issue • Company X procurement people arrange with supplier to split POs into smaller POs to stay under the threshold so that they can “direct award” a contract and not have to go out for tender Approach • Identify common shareholders, directors, etc, common addresses, and phone numbers through Suspicious Transaction Analysis and forensic investigation • Review G/L for unusual transactions, volume and amounts Outcome • Identify POs that are connected and relate to the same contract Note: Approval threshold for direct appoint is US$ 750k 4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 30
  • 31. 4. Kick backs to Company X employees/procurement staff to get contracts Issue • Company X employees/procurement staff ask vendors for kick backs before/in order for them to get awarded contracts by vendor Approach • Identify correspondence (e.g. e-mail, SMS, WhatsApp messages) between Company X staff and vendors (use Forensic Technology Services) • Pre and post employment screening of employees • Conduct data analytics between customers/staff to identify inconsistencies in procurement Outcome • Identify employees who are requesting kick backs from vendors Vendor Procurement staff/ employee Kick back Contract Company X 4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 31
  • 32. 5. Overpayment for goods of lower quality Issue • Suppliers deliver lower quality goods, but charge for higher quality goods and share the difference in price with Company X staff Approach • Identify correspondence (e.g. e-mail, SMS, WhatsApp messages) between Company X staff and vendors (use Forensic Technology Services) • Conduct price comparison/data analytics Outcome • Identify employees who are in collusion with vendors • Identify potential quality issues Good worth US$100, but invoiced US$ 150 50Company X pays US$ 1 to vendor Vendor pays US$ 25 to employee Company X Company X employee 4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 32
  • 33. 6. Company X pays for services that were never provided Issue • Supplier charges Company X for services that were never provided and share the proceeds with Company X staff Approach • Identify correspondence (e.g. e-mail, SMS, WhatsApp messages) between Company X staff and vendors (use Forensic Technology Services) • Conduct walk through of procurement cycle to identify weaknesses in internal controls and “points of leakage” • Check sample of “services” transactions Outcome • Identify employees who are in collusion with vendors • Identify “fake” transactions Invoice for S$ 150 for services Company X pays US$ 150 to vendor Vendor pays US$ 25 to employee Employee acknowledges receipt of services Company X Company X employee 4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 33
  • 34. 7. Supplier is middleman and is owned by employee or his family member and provides goods to Company X with a mark up Issue • Entity owned by Company X staff acts as middleman and on-sells goods to Company X with a mark-up Approach • Identify common addresses, bank accounts and phone numbers through Suspicious Transaction Analysis/data analytics and forensic investigation • Conduct Due Diligence before accepting new vendors/during relationship • Pre and post employment screening of employees • Conduct price survey Outcome • Identify undeclared conflicts of interest Profit sharing Marked up goodsGoods Company X Company X employee 4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 34
  • 35. 9. Inappropriate and ineffective internal controls Issue • Employee had a conflict of interest, he/she did not declare as claimed was not aware that he should declare Approach • Conduct fraud risk Diagnostic (Company self assessment initially) and Fraud “Risk Storm” Workshops to “challenge” the initial assessment • Update fraud risk assessment • Review fraud risk policies and procedures • Conduct fraud awareness training Outcome • Identify weaknesses in internal controls Examples: • No Code of Conduct • No “conflict of interest” policy • No whistleblower facility • No proper segregation of duties • No independence / declaration policy • No SOPs 4 Real life fraud cases Executive SummaryExecutiveASguemndmaaryExecutive Summary Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 35
  • 36. Suspicious Transaction Analysis Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 36
  • 37. What is “Suspicious Transaction Analysis”? Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 37 Suspicious Transaction Analysis (STA) is an automated fraud detection and data analysis process which can search through millions of transactions and master file data to identify those that require further investigation. STA complements an organisation’s existing schedule of audit and control tests, making best use of valuable resources. It is a tool which quickly identifies problem areas, particularly in those high risk functions such as payroll, accounts payable and expense claims. STA utilises sophisticated software programs to data match and interrogate an organisation’s supplier and employee databases to quickly identify, for example: • Duplicate payments (made either fraudulently or in error) • Collusion between suppliers and employees • Suppliers fitting known fraud profiles • Unusual, anomalous or otherwise questionable transactions.
  • 38. A proactive approach to fraud detection Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 38
  • 39. Benefits of Suspicious Transaction Analysis Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 39
  • 40. Benefits of Suspicious Transaction Analysis Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 40
  • 41. Some Case studies Case Study One: Duplicate payments to suppliers Our role: To undertake an STA over accounts payable and payroll for a large organisation. There were no prior suspicions of fraud orerror. Outcome: In addition to data quality issues, we identified a large number of duplicate payments to suppliers amounting to over $1,700,000 which was recoverable from suppliers. Case Study Two: OverpaidOvertime Our role: We were asked by a government agency to use STA to analyse staff salaries and overtime payments over a three yearperiod. Outcome: We identified nine employees who were paid overtime rates in excess of $1,000 per hour, the highest being $4,989 per hour. These results allowed the agency to investigate the payments and recover theover-payments. Case Study Three: Duplicate payment of invoices and cleaning of supplier master files Our Role: We undertook an STA of master supplier and purchasing transaction files for a large organisation. We identified approximately $600,000 of duplicate invoice payments over a two year period. The STA also revealed that a number of suppliers had been entered in the master file more thanonce. Outcome: The organisation cleaned the master file of duplicated suppliers, thereby reducing the risk of inadvertent duplicate payments and commenced to recover the overpayments. Case Study Four: Vehicle over-servicing Our Role: Unsatisfied with the operating costs of its vehicle fleet, particularly relating to vehicle maintenance, this organisation approached us to undertake an STA specifically over vehicle maintenancepayments. Outcome: We analysed all electronic maintenance data for the entire vehicle fleet over a three year period. Several anomalies were detected, including apparent over- servicing of vehicles and vehicles serviced with either no labour costs or no parts costs. Our client was able to revisit the service provider agreements with the intention of terminating the relationship with the vehicle maintenance provider. There are literally thousands of possible STA tests that can be run. The decision as to which tests to run depends on a number of factors such as type of business, quality of data, the number of records, internal control weaknesses, past fraud incidents and so on. Some of the more useful routine Accounts Payable and Payroll tests we run are listed below. However, it should be noted that we can also tailor these tests or design additional tests which will address your specific needs andconcerns. 5 Suspicious Transaction Analysis Executive SummaryExecutive SummaryExecutive SummaryAgenda Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 41
  • 42. Some examples of STA tests for Procurement 1. 2. 3. 4. 5. 6. • • Collusion between employees and suppliers: Identify details shared between employees and suppliers (either address, telephone or bank details). Identify whether payroll and accounts payable transactionsexist. NB: In the event employee related suppliers reside on the Supplier Master File for the purposes of the reimbursement of work related expenses, these will be eliminated from the test results where the supplier name is the same as the employee name. Identify suppliers sharing address, telephone, with the PwC profile database (prisons, document exchanges, serviced offices, postal services and adult entertainment). Identify payments to thesesuppliers. NB: In the event employee related suppliers reside on the Supplier Master File for the purposes of the reimbursement of work related expenses, these will be eliminated from the test results where the supplier name is the same as the employee name. Payments to suppliers which do not appear on the Supplier Master File (by supplier number or bank details). NB: In the event the Supplier Master File is maintained real time such that only the latest bank details are captured, a historical listing of bank accounts is required to eliminate false positives from theresults. Duplicate supplier payment transactions to the same supplier based on: Identical invoice amount and identical or similar invoice number Identical invoice amount and description. 8. Duplicate supplier payment transactions based on identical invoice number and amount to different supplier numbers. 9. One off payments to suppliers. 10. Invoices dated (i.e. suppliers invoices date) onweekends. 11. Active suppliers sharing information (address, telephone, bank details) with one or more other suppliers within the same branch (i.e. different supplier numbers within the same branch). Identify whether duplicate supplier payments have occurred to these suppliers per Test No. 8. 12. Identify favourable payment of invoices (i.e. invoices paid within 10 days of the suppliers invoicedate). 13. Compare suppliers invoice date to the purchase order creation date to identify purchase orders created on the same date or subsequent to the suppliers invoice date. 14. Identify multiple invoices from the same supplier on the same date. 15. Identify active suppliers in the Supplier Master File which have no accounts payable transactions (i.e. active on the Supplier Master File but they are not really active because they have no transactions). Such suppliers should be disabled on the Supplier MasterFile. 16. Split purchasing by employees: Identify multiple purchase orders created on the same day or within three days of each other to the same supplier and authoriser where the total value exceeds the acceptable tolerable level for the authoriser. 5 Suspicious Transaction Analysis Executive SummaryExecutive SummaryExecutive SummaryAgenda Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 42
  • 43. Some examples of STA tests for Procurement (Cont’d) 18. Identify invoices paid before the suppliers invoice date. 19. Identify accounts payable transactions processed by employees while they are on annual leave or sick leave. 20. Benford analysis on invoice amount. 21. Identify large invoices without purchase orders or which have not been receipted. 22. Excessive purchasing from suppliers. 23. Identify duplicate cheques issued to differentsuppliers. 24. Identify quantity mismatches between the quantity ordered and the quantity receipted. 25. Compare purchase order amount to the amount invoiced. 26. Analyse round invoice amounts from suppliers. 5 Suspicious Transaction Analysis Executive SummaryExecutive SummaryExecutive SummaryAgenda Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 43
  • 44. Some examples of STA tests for Payroll 1. Compare payroll dates with employee start and termination dates to identify payments to employees: • Prior to hire date • More than 60 days after termination date. 2. Identify employees sharing address and/or telephone with the PwC Australian profile database (prisons, document exchanges, serviced offices, postal services and adult entertainment). Identify payroll transactions to these employees. 3. Employees sharing information (either bank details, DOB and same name, name and address, or name and phone number) with one or more other employees (i.e. different employee numbers). Identify payroll transactions to theseemployees. 4. Employees receiving excessive overtime as a proportion of gross pay (40% or more of gross pay is overtime). 5. Employees receiving excessive allowances as a proportion of gross pay (40% or more of gross pay is allowances). 6. Payroll payments with no taxdeducted. 7. Payments to employees which do not appear in the Employee Master File (by employee number and bank details information). NB: In the event the Employee Master File is maintained real time such that only the latest bank details are captured, a historical listing of bank accounts is required to eliminate false positives from theresults. 8. Identify round payroll payments to employees. 9. Identify payments to employees with unusual dates of birth: • Aged 17 years orless • Aged 65 andover. 10. Identify duplicate payroll payments based on employee number and pay run number. 11. Identify payments to employees where the bank account name differs to the employees’ name. 12.Payroll transactions dated on weekend dates. 13.Identify payments made to employees employed for 10 days or less. 14.Excessive number of payments per period. 15. Identify employees with high amounts of gross pay (e.g. over $80,000). 16. Identify incorrect payroll payments by comparing the gross amount in the Employee Master File to the actual amount paid to theemployee. 17. Identify annual leave and long service leave taken prior to approval. 18. Employees sharing information (either bank details, address or telephone) but not name with different employees. Identify payroll payments to these employees. 19. Identify payroll payments to employees where the bank account name differs from the employee’s name. 5 Suspicious Transaction Analysis Executive SummaryExecutive SummaryExecutive SummaryAgenda Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 44
  • 45. What can you do? Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 45
  • 46. There are many ways to avoid or mitigate fraud Jakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 46 Action Comment Code of Conduct Tone at the top is key! Back ground due diligence Know who you’re dealing with Segregation of duties Don’t give people the opportunity to commit fraud Delegation of Authority The CFO does not need to approve everything Data Analytics/Suspicious Transaction Analysis To be performed periodically Fraud Risk Analysis Know where your risks lie, and make sure you mitigate exposures Whistle blower hotline Follow up on reports Forensic investigation Follow up on indications of fraud
  • 47. PwC Forensics Service Offerings Without an effective fraud risk management strategy, a company is exposed to fraud for which the Board and management may be legally and financially liable for failure to establish a pro-active fraud risk framework. PwC’s Forensic Services practice specialises in establishing fraud risk and control frameworks which help to identify relevant fraud risks and the associated controls. We assist clients to understand and meet their obligations in fraud control in accordance with both private and public sector Standards such as AS 8001-2008 Fraud and Corruption Control, various Fraud Control Guidelines and other requirements. We divide our fraud risk frameworks into three headings: Prevent, Detect and Investigate. • Fraud risk policies and procedures • Fraud control plans • Annual declarations • Pre and post employment screening of employees • Fraud awareness training • “Whistle blower” hotline procedures • Investigative Intelligence & Analysis • Procurement Fraud ManagementJakarta Business Networkers Fraud and Corruption in Indonesia PwC Strictly private and confidential 12 October 2017 47 • Fraud risk assessments • Facilitated workshops to identify fraud risk • Proactive internal and external audit procedures • Data analytics (“suspicious transactions analysis”) • Fraud investigations • Forensic Accounting • Electronic Discovery Services • Anti-Money Laundering (AML) & Sanctions • Anti-Bribery & Corruption • Licensing Management Services