SlideShare a Scribd company logo
1 of 11
Download to read offline
Guest Commentary
Preventing Construction Fraud
The construction industry is especially susceptible to fraud because of the complexity of project finances,
multi-tiered entities—such as subcontracting—and the large number, variety and cost of materials
By Marion A. Hecht



L
        ike the national debt, dollar amounts                                                                 invoices: Payments may be
        attributed to fraud and corruption are                        “Construction executives                authorized and sent to a post-
        staggering. According to the 2010 “Re-                          should carefully consider             office box or fake address.
port to the Nations on Occupational Fraud                                                                         “Ghost employees”: Pay-
and Abuse” by the Association of Certified                              the possible sources of
                                                                                                              roll may include extra hours
Fraud Examiners and based on a survey of                                fraud.”                               not worked or hours for a
its members, global fraud loss is estimated to                       — marion a. heCht                        non-existent employee.
be more than $2.9 trillion annually.                                    Managing Director
                                                                                                                  Vehicle and equipment
    While incredulity and outrage may greet
                                                                                                              maintenance: Without prop-
such excess, the best response is action—
                                                                                                              er systems in place, a service
namely, fraud prevention at the local level.
What should a construction executive look        consider carefully the possible sources of provider may unknowingly receive payment
                                                 fraud.                                       from a construction company for work done
for when it comes to such an enormous
problem? Plenty.                                    The construction industry is especially on a non-business vehicle or parts may be
    Facts about fraud cited in the 2010 report   susceptible to fraud because of the com- ordered for non-business reasons.
include survey results from ACFE members:        plexity of project finances, multi-tiered       Off-site work: Services performed at an
    • Organizations lose an average of 5% in     entities, subcontracting, large amounts of unauthorized site may include a change
      annual revenue to fraud.                   public and private funding with complicat- order created to falsely identify the cost as
                                                 ed documentation, expensive equipment, project related.
    • Misappropriation schemes are the most
                                                 and the large number, variety and cost of       Bid collusion: Multiple contractors or
      common form of fraud.
                                                 materials, among other opportunities for il- subcontractors may agree which company
    • Occupational fraud is most likely to       legal activity.                              will be awarded a job and at what price.
      be detected by tips, a finding that has       The schemes outlined below are exam-
      been consistent since the ACFE began                                                       Kickbacks: Payments made “under the
                                                 ples that range from actions committed by
      tracking data in 2002.                                                                  table” for favoritism or special deals result
                                                 one person to more complex activities that
                                                                                              in higher costs for the legitimate company.
    • Small organizations are more likely to     involve two or more people.
      be victimized by fraud.
                                                    Tool theft: Hand tools may disappear               A company’s leadership determines that
    • Individuals at higher levels of an orga-   from jobsites and be reported as lost. These       company’s vulnerability to fraud. A robust
      nization cause the most harm.              tools may be taken by employees for their          prevention and detection program is a must.
    • Executive-level fraud takes longer to      personal use and potentially their own small       Strong internal controls, integrity, back-
      detect.                                    businesses if they moonlight on the side.          ground checks, codes of ethics, training, tip
    • A fraud may last an average of 18             Materials waste: Excessive materials as         lines and internal surprise audits—among
      months before being detected.              well as non-project materials may be or-           other company-specific risk strategies—can
    • Eighty-five percent of perpetrators        dered and diverted for personal use and ulti-      mitigate the conditions that allow for the oc-
      are not associated with known prior        mately reported as stolen.                         currence of fraud by employees, suppliers or
      offenses.                                      Product substitution: An inferior grade        subcontractors as well as secure jobsites and
                                                 of a material may be ordered if purchase or-       equipment. n
    • Most fraud is committed by people in
      accounting, operations, sales, execu-      ders are not matched to receipts.                  Marion A. Hecht is managing director of the Valua-
      tive management, customer service or           Duplicate payments: Two checks may             tion and Forensic Services practice in the Arlington,
      purchasing.                                                                                   Va., office of Clifton Gunderson LLP. She has more
                                                 be written to the same payee, and the fraud-       than 20 years of experience investigating fraud and
                                                 ster may decide to endorse the second check        transactions involving shell companies, multi-tiered
Construction-Specific Fraud                      over to himself or to a third party. The payee     organizations and alter-ego entities.
Difficult economic times often provide a         of the second check is recorded in the gener-
backdrop for illegal activity. The downturn                                                         The Association of Certified Fraud Examiners’ 2010
                                                 al ledger but is not the actual recipient of the   “Report to the Nations on Occupational Fraud and
in the economy affects many industries,          check. Alternatively, two payments may be          Abuse” can be found at www.acfe.com.
and it seems to have a significant impact on     received by the vendor on the same invoice.
the construction industry in particular. It
is important for construction executives to         Fictitious vendors and shell-company


                                                                                                             January/February 2012          Constructor 59
Construction Fraud, Corporate Corruption, Jobsite Theft, Work Fraud, Fraud Losses
The construction industry is especially susceptible to fraud because of its inherent complexity.
Guest Commentary
Constructor magazine Fraud article
Constructor magazine Fraud article
Constructor magazine Fraud article
Constructor magazine Fraud article
Constructor magazine Fraud article

More Related Content

What's hot

The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmDavid Sweigert
 
Accountbaility and transparency_in_the_extractive_sector_guyana_tl(tsegaye_le...
Accountbaility and transparency_in_the_extractive_sector_guyana_tl(tsegaye_le...Accountbaility and transparency_in_the_extractive_sector_guyana_tl(tsegaye_le...
Accountbaility and transparency_in_the_extractive_sector_guyana_tl(tsegaye_le...Laura George
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
Fighting corruption in the supply chain
Fighting corruption in the supply chainFighting corruption in the supply chain
Fighting corruption in the supply chainLexisNexisDiligence
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
ETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyMichael Heron
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
Discovering and Preventing Employee Dishonesty and Fraud
Discovering and Preventing Employee Dishonesty and FraudDiscovering and Preventing Employee Dishonesty and Fraud
Discovering and Preventing Employee Dishonesty and FraudSikich LLP
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 
Taking a Closer Look - Assessing Risk of Fraud in the Payday Advance Industry
Taking a Closer Look - Assessing Risk of Fraud in the Payday Advance IndustryTaking a Closer Look - Assessing Risk of Fraud in the Payday Advance Industry
Taking a Closer Look - Assessing Risk of Fraud in the Payday Advance IndustryDecosimoCPAs
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
Not-For-Profit Risks in the COVID-19 Environment
Not-For-Profit Risks in the COVID-19 EnvironmentNot-For-Profit Risks in the COVID-19 Environment
Not-For-Profit Risks in the COVID-19 EnvironmentCitrin Cooperman
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsInfosys BPM
 

What's hot (20)

The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
SEC Alert
SEC AlertSEC Alert
SEC Alert
 
Accountbaility and transparency_in_the_extractive_sector_guyana_tl(tsegaye_le...
Accountbaility and transparency_in_the_extractive_sector_guyana_tl(tsegaye_le...Accountbaility and transparency_in_the_extractive_sector_guyana_tl(tsegaye_le...
Accountbaility and transparency_in_the_extractive_sector_guyana_tl(tsegaye_le...
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Fighting corruption in the supply chain
Fighting corruption in the supply chainFighting corruption in the supply chain
Fighting corruption in the supply chain
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
ETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case Study
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Discovering and Preventing Employee Dishonesty and Fraud
Discovering and Preventing Employee Dishonesty and FraudDiscovering and Preventing Employee Dishonesty and Fraud
Discovering and Preventing Employee Dishonesty and Fraud
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Taking a Closer Look - Assessing Risk of Fraud in the Payday Advance Industry
Taking a Closer Look - Assessing Risk of Fraud in the Payday Advance IndustryTaking a Closer Look - Assessing Risk of Fraud in the Payday Advance Industry
Taking a Closer Look - Assessing Risk of Fraud in the Payday Advance Industry
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Not-For-Profit Risks in the COVID-19 Environment
Not-For-Profit Risks in the COVID-19 EnvironmentNot-For-Profit Risks in the COVID-19 Environment
Not-For-Profit Risks in the COVID-19 Environment
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with Facts
 

Similar to Constructor magazine Fraud article

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudCognizant
 
Technology: maintaining a cutting edge
Technology: maintaining a cutting edgeTechnology: maintaining a cutting edge
Technology: maintaining a cutting edgeLSG
 
Construction Industry Update - Spring/Summer 2015
Construction Industry Update - Spring/Summer 2015Construction Industry Update - Spring/Summer 2015
Construction Industry Update - Spring/Summer 2015Sikich LLP
 
Fighting fraud in construction
Fighting fraud in constructionFighting fraud in construction
Fighting fraud in constructionGrant Thornton
 
تقرير عن محاربة الإحتيال في القطاع الإنشائي
تقرير عن محاربة الإحتيال في القطاع الإنشائيتقرير عن محاربة الإحتيال في القطاع الإنشائي
تقرير عن محاربة الإحتيال في القطاع الإنشائيHani Saad
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)NAFCU Services Corporation
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Managementbanerjeerohit
 
Operationalizing Real-Time Fraud Detection
Operationalizing Real-Time Fraud DetectionOperationalizing Real-Time Fraud Detection
Operationalizing Real-Time Fraud DetectionVivastream
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3Habib Ullah Qamar
 
The Big Picture: Beyond Compliance To Risk Management
The Big Picture: Beyond Compliance To Risk ManagementThe Big Picture: Beyond Compliance To Risk Management
The Big Picture: Beyond Compliance To Risk ManagementNeira Jones
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industryitio Innovex Pvt Ltv
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 

Similar to Constructor magazine Fraud article (20)

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims Fraud
 
Technology: maintaining a cutting edge
Technology: maintaining a cutting edgeTechnology: maintaining a cutting edge
Technology: maintaining a cutting edge
 
Construction Industry Update - Spring/Summer 2015
Construction Industry Update - Spring/Summer 2015Construction Industry Update - Spring/Summer 2015
Construction Industry Update - Spring/Summer 2015
 
Fighting fraud in construction
Fighting fraud in constructionFighting fraud in construction
Fighting fraud in construction
 
تقرير عن محاربة الإحتيال في القطاع الإنشائي
تقرير عن محاربة الإحتيال في القطاع الإنشائيتقرير عن محاربة الإحتيال في القطاع الإنشائي
تقرير عن محاربة الإحتيال في القطاع الإنشائي
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Operationalizing Real-Time Fraud Detection
Operationalizing Real-Time Fraud DetectionOperationalizing Real-Time Fraud Detection
Operationalizing Real-Time Fraud Detection
 
Corporate fraud: the cost of doing nothing
Corporate fraud: the cost of doing nothingCorporate fraud: the cost of doing nothing
Corporate fraud: the cost of doing nothing
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3
 
The Big Picture: Beyond Compliance To Risk Management
The Big Picture: Beyond Compliance To Risk ManagementThe Big Picture: Beyond Compliance To Risk Management
The Big Picture: Beyond Compliance To Risk Management
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Cyber
Cyber Cyber
Cyber
 
B crisis
B crisisB crisis
B crisis
 

More from Ann Dee Allen

Illinois Manufacturer Chez
Illinois Manufacturer ChezIllinois Manufacturer Chez
Illinois Manufacturer ChezAnn Dee Allen
 
Colorado Construction & Design Humes.Buelow
Colorado Construction & Design Humes.BuelowColorado Construction & Design Humes.Buelow
Colorado Construction & Design Humes.BuelowAnn Dee Allen
 
Education Executive Loberg
Education Executive LobergEducation Executive Loberg
Education Executive LobergAnn Dee Allen
 
Biz Times Milwaukee K Mc Masters Set And Reach Your Goals
Biz Times Milwaukee K Mc Masters Set And Reach Your GoalsBiz Times Milwaukee K Mc Masters Set And Reach Your Goals
Biz Times Milwaukee K Mc Masters Set And Reach Your GoalsAnn Dee Allen
 
On Balance Smartphones Article
On Balance Smartphones ArticleOn Balance Smartphones Article
On Balance Smartphones ArticleAnn Dee Allen
 
Heidi Kummli Profile
Heidi Kummli ProfileHeidi Kummli Profile
Heidi Kummli ProfileAnn Dee Allen
 
Melanie Moertel Profile
Melanie Moertel ProfileMelanie Moertel Profile
Melanie Moertel ProfileAnn Dee Allen
 
Dora Schubert, Elizabeth Prior Profile
Dora Schubert, Elizabeth Prior ProfileDora Schubert, Elizabeth Prior Profile
Dora Schubert, Elizabeth Prior ProfileAnn Dee Allen
 
Janice Peacock Profile
Janice Peacock ProfileJanice Peacock Profile
Janice Peacock ProfileAnn Dee Allen
 
Margaret Zinser Profile
Margaret Zinser ProfileMargaret Zinser Profile
Margaret Zinser ProfileAnn Dee Allen
 
Maggie Roschyk, Kristen Frantzen Orr Profile
Maggie Roschyk, Kristen Frantzen Orr ProfileMaggie Roschyk, Kristen Frantzen Orr Profile
Maggie Roschyk, Kristen Frantzen Orr ProfileAnn Dee Allen
 
Kevin O’Grady Profile
Kevin O’Grady Profile Kevin O’Grady Profile
Kevin O’Grady Profile Ann Dee Allen
 
Biz Times Milwaukee Article
Biz Times Milwaukee Article Biz Times Milwaukee Article
Biz Times Milwaukee Article Ann Dee Allen
 
Iowa ABI FUTA Tax Article
Iowa ABI FUTA Tax ArticleIowa ABI FUTA Tax Article
Iowa ABI FUTA Tax ArticleAnn Dee Allen
 
Indiana Manufacturers Exporting Article
Indiana Manufacturers Exporting ArticleIndiana Manufacturers Exporting Article
Indiana Manufacturers Exporting ArticleAnn Dee Allen
 
Colorado Construction Benefit Plan Article
Colorado Construction Benefit Plan ArticleColorado Construction Benefit Plan Article
Colorado Construction Benefit Plan ArticleAnn Dee Allen
 

More from Ann Dee Allen (17)

Illinois Manufacturer Chez
Illinois Manufacturer ChezIllinois Manufacturer Chez
Illinois Manufacturer Chez
 
Colorado Construction & Design Humes.Buelow
Colorado Construction & Design Humes.BuelowColorado Construction & Design Humes.Buelow
Colorado Construction & Design Humes.Buelow
 
Education Executive Loberg
Education Executive LobergEducation Executive Loberg
Education Executive Loberg
 
Biz Times Milwaukee K Mc Masters Set And Reach Your Goals
Biz Times Milwaukee K Mc Masters Set And Reach Your GoalsBiz Times Milwaukee K Mc Masters Set And Reach Your Goals
Biz Times Milwaukee K Mc Masters Set And Reach Your Goals
 
On Balance Smartphones Article
On Balance Smartphones ArticleOn Balance Smartphones Article
On Balance Smartphones Article
 
Heidi Kummli Profile
Heidi Kummli ProfileHeidi Kummli Profile
Heidi Kummli Profile
 
Melanie Moertel Profile
Melanie Moertel ProfileMelanie Moertel Profile
Melanie Moertel Profile
 
Dora Schubert, Elizabeth Prior Profile
Dora Schubert, Elizabeth Prior ProfileDora Schubert, Elizabeth Prior Profile
Dora Schubert, Elizabeth Prior Profile
 
Top 10 Teachers
Top 10 TeachersTop 10 Teachers
Top 10 Teachers
 
Janice Peacock Profile
Janice Peacock ProfileJanice Peacock Profile
Janice Peacock Profile
 
Margaret Zinser Profile
Margaret Zinser ProfileMargaret Zinser Profile
Margaret Zinser Profile
 
Maggie Roschyk, Kristen Frantzen Orr Profile
Maggie Roschyk, Kristen Frantzen Orr ProfileMaggie Roschyk, Kristen Frantzen Orr Profile
Maggie Roschyk, Kristen Frantzen Orr Profile
 
Kevin O’Grady Profile
Kevin O’Grady Profile Kevin O’Grady Profile
Kevin O’Grady Profile
 
Biz Times Milwaukee Article
Biz Times Milwaukee Article Biz Times Milwaukee Article
Biz Times Milwaukee Article
 
Iowa ABI FUTA Tax Article
Iowa ABI FUTA Tax ArticleIowa ABI FUTA Tax Article
Iowa ABI FUTA Tax Article
 
Indiana Manufacturers Exporting Article
Indiana Manufacturers Exporting ArticleIndiana Manufacturers Exporting Article
Indiana Manufacturers Exporting Article
 
Colorado Construction Benefit Plan Article
Colorado Construction Benefit Plan ArticleColorado Construction Benefit Plan Article
Colorado Construction Benefit Plan Article
 

Constructor magazine Fraud article

  • 1. Guest Commentary Preventing Construction Fraud The construction industry is especially susceptible to fraud because of the complexity of project finances, multi-tiered entities—such as subcontracting—and the large number, variety and cost of materials By Marion A. Hecht L ike the national debt, dollar amounts invoices: Payments may be attributed to fraud and corruption are “Construction executives authorized and sent to a post- staggering. According to the 2010 “Re- should carefully consider office box or fake address. port to the Nations on Occupational Fraud “Ghost employees”: Pay- and Abuse” by the Association of Certified the possible sources of roll may include extra hours Fraud Examiners and based on a survey of fraud.” not worked or hours for a its members, global fraud loss is estimated to — marion a. heCht non-existent employee. be more than $2.9 trillion annually. Managing Director Vehicle and equipment While incredulity and outrage may greet maintenance: Without prop- such excess, the best response is action— er systems in place, a service namely, fraud prevention at the local level. What should a construction executive look consider carefully the possible sources of provider may unknowingly receive payment fraud. from a construction company for work done for when it comes to such an enormous problem? Plenty. The construction industry is especially on a non-business vehicle or parts may be Facts about fraud cited in the 2010 report susceptible to fraud because of the com- ordered for non-business reasons. include survey results from ACFE members: plexity of project finances, multi-tiered Off-site work: Services performed at an • Organizations lose an average of 5% in entities, subcontracting, large amounts of unauthorized site may include a change annual revenue to fraud. public and private funding with complicat- order created to falsely identify the cost as ed documentation, expensive equipment, project related. • Misappropriation schemes are the most and the large number, variety and cost of Bid collusion: Multiple contractors or common form of fraud. materials, among other opportunities for il- subcontractors may agree which company • Occupational fraud is most likely to legal activity. will be awarded a job and at what price. be detected by tips, a finding that has The schemes outlined below are exam- been consistent since the ACFE began Kickbacks: Payments made “under the ples that range from actions committed by tracking data in 2002. table” for favoritism or special deals result one person to more complex activities that in higher costs for the legitimate company. • Small organizations are more likely to involve two or more people. be victimized by fraud. Tool theft: Hand tools may disappear A company’s leadership determines that • Individuals at higher levels of an orga- from jobsites and be reported as lost. These company’s vulnerability to fraud. A robust nization cause the most harm. tools may be taken by employees for their prevention and detection program is a must. • Executive-level fraud takes longer to personal use and potentially their own small Strong internal controls, integrity, back- detect. businesses if they moonlight on the side. ground checks, codes of ethics, training, tip • A fraud may last an average of 18 Materials waste: Excessive materials as lines and internal surprise audits—among months before being detected. well as non-project materials may be or- other company-specific risk strategies—can • Eighty-five percent of perpetrators dered and diverted for personal use and ulti- mitigate the conditions that allow for the oc- are not associated with known prior mately reported as stolen. currence of fraud by employees, suppliers or offenses. Product substitution: An inferior grade subcontractors as well as secure jobsites and of a material may be ordered if purchase or- equipment. n • Most fraud is committed by people in accounting, operations, sales, execu- ders are not matched to receipts. Marion A. Hecht is managing director of the Valua- tive management, customer service or Duplicate payments: Two checks may tion and Forensic Services practice in the Arlington, purchasing. Va., office of Clifton Gunderson LLP. She has more be written to the same payee, and the fraud- than 20 years of experience investigating fraud and ster may decide to endorse the second check transactions involving shell companies, multi-tiered Construction-Specific Fraud over to himself or to a third party. The payee organizations and alter-ego entities. Difficult economic times often provide a of the second check is recorded in the gener- backdrop for illegal activity. The downturn The Association of Certified Fraud Examiners’ 2010 al ledger but is not the actual recipient of the “Report to the Nations on Occupational Fraud and in the economy affects many industries, check. Alternatively, two payments may be Abuse” can be found at www.acfe.com. and it seems to have a significant impact on received by the vendor on the same invoice. the construction industry in particular. It is important for construction executives to Fictitious vendors and shell-company January/February 2012 Constructor 59
  • 2. Construction Fraud, Corporate Corruption, Jobsite Theft, Work Fraud, Fraud Losses
  • 3.
  • 4. The construction industry is especially susceptible to fraud because of its inherent complexity.
  • 5.