SlideShare a Scribd company logo
It’s All in the Numbers -Benford’s Law Ed Tobias, CISA, CIA May 12, 2010
Expectations Background Why it works Real-world examples How do I use it? Questions Topics
How many have heard of it? Useful tool to quickly discover possible fraudulent transactions Spend more time analyzing  data instead of searching for it Expectations
As of 2004, over 150 articles have been written about Benford’s Law Expectations
Expectations
All over the professional journals J. of Accountancy – 2003, 2007 J. of Forensic Accounting – 2004 Internal Auditor – 2008 ISACA Journal – 2010 Fraud Magazine - 2010 Expectations
1881 – Simon Newcomb, astronomer / mathematician Noticed that front part of logarithm books was more used Inferred that scientists were multiplying more #s that started with lower  digits (1, 2, 3, etc.) Background
1938 – Frank Benford, Physicist at GE Research labs Front part of the log book was more worn out than the back Analyzed 20 sets of “random numbers” – 20,299 #s in all Background
Tested random #s and  random categories Areas of rivers Baseball stats #s in magazine articles Street addresses - first 342 people listed in “American Men of Science” Utility Bills in Solomon Islands Background
Benford’s Law: Random  #s are not  random Lower  #s (1-3) occur more frequently as a first digit than higher numbers (7-9) In a sample of random numbers: #1 occurs 33% #9 occurs 5% Background
What are “random numbers”? Non-manipulated numbers Population stats, utility bills, Areas of rivers  NOT human-selected #s Zip codes, SSN, Employee ID Background
What’s the practical use? 1990s – Dr. Mark Nigrini, college professor Tested insurance costs (reim. claims), sales figures Performed studies detecting under/overstmts of financial figures Published results in J. of Accountancy (1990) and ACFE’s The White Paper (1994) Useful for CFEs and auditors Background
What about financial txns? “Random data” = non-manipulated numbers AP txns, company purchases NOT human-selected #s Expense limits (< $25) Approval limits (No sig < $500) Hourly wage rates Background
How will it help me with non-random data? Aid in detection of unusual patterns Circumventing controls Potential fraud Background
You won the lottery – invest $100M in a mutual fund compounding at 10% annually First digit is “1” Takes 7.3 yr to double your $ Why it works
Why it works First digit is 1 for 7+ years First digit is 2 in the 8th year
At $500M … First digit is “5” Takes 1.9 yr to increase $100M Why it works
Why it works ,[object Object]
There are more years that start with lower digits,[object Object]
Seems reasonable that the lower digits (1-3) occur more frequently These 3 digits make up approx. 60% of naturally-occurring digits Why it works
Scale invariant 1961-Roger Pinkham If you multiply the numbers by the same non-zero constant (i.e., 22.04 or 0.323) New set of #s still follows Benford’s Law Works with different currencies Why it works
$2M Check Fraud in AZ $4.8M Procurement fraud in NC Examples
Check fraud in AZ #s appear random to untrained eyes Suspicious under Benford’s Law Counter-intuitive to human nature Example #1
State of Arizona v. Wayne James Nelson (1993) Wrote 23 checks (approx. $2M) Check amounts < $100K Tried to circumvent a control that required a human signature Mgr tried to conceal fraud Claimed to be testing the system controls against a bogus vendor Example #1
Avoided common indicators: No duplicate amounts No round #s – all included cents Example #1
Example #1 ,[object Object]
Lots of 7, 8, and 9s
Counter-intuitive
Human choices are not  random,[object Object]
Example #1
Benford’s Law can be extended to first 2 digits Allow examiner to focus on specific areas High-level test of data authenticity Example #2
Procurement fraud in NC Years 2002-2005 Wake County School employees submitted at least $3.8M submitted for payment Employees purchased cars, campers, golf carts, plasma TVs Bid limit was only $2,500 Run a sample of 660 txns through Benford’s Law … Example #2
Example #2 See any suspicious areas?
Example #2 Drilling down in the “51” txns Multiple duplicate amts
Example #2 Red flags not noticed: Payments to the vendor increased 342% from 2002-2003 ($3.7M+) Over 60% of invoices under $2,500 limit and did not have a PO For 2 years – 99.95% of invoices were under $2,500 On 24 separate occasions – 50+ invoices with the same invoice date / consecutive invoice #s
Example #2 On 24 separate occasions – 50+ invoices with the same invoice date / consecutive invoice #s
Example #2 The investigation recovered $4.8M from the vendor and former school employees.
Data Analytics software ACL / IDEA Excel Add-Ons Built-in Excel Functions How do I use it?
Questions
Expectations Background Why it works Real-world examples How do I use it? Summary
Ed Tobias ed.tobias@hillsclerk.com LinkedIn http://www.linkedin.com/in/ed3200 Contact Information
Benford’s Law Overview. n.d. Retrieved March 10, 2010 from http://www.acl.com/supportcenter/ol/courses/course.aspx?cid=010&ver=9&mod=1&nodeKey=3 Browne, M. Following Benford’s Law, or Looking Out for No. 1.n.d. Retrieved March 10, 2010 from http://www.rexswain.com/benford.html Durtschi, C., Hillison, W., and Pacini, C. The Effective Use of Benford’s Law to Assist in Detecting Fraud in Accounting Data.  2004. Journal of Forensic Accounting. Vol. V. Retrieved March 10, 2010 from http://www.auditnet.org/articles/JFA-V-1-17-34.pdf Managing the Business Risk of Fraud. EZ-R Stats, LLC. 2009. Retrieved March 10, 2010 from http://www.ezrstats.com/CS/Case_Studies.htm Kyd, C. Use Benford’s Law with Excel to Improve Business Planning.  2007. Retrieved March 10, 2010 from http://www.exceluser.com/tools/benford_xl11.htm References

More Related Content

What's hot

Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
Sampath
 
Badanie przestępczości gospodarczej 2018. Raport PwC
Badanie przestępczości gospodarczej 2018. Raport PwCBadanie przestępczości gospodarczej 2018. Raport PwC
Badanie przestępczości gospodarczej 2018. Raport PwC
PwC Polska
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
mattyp99
 
Session 4 the murer of james bulger.2016
Session 4  the murer of james bulger.2016Session 4  the murer of james bulger.2016
Session 4 the murer of james bulger.2016
Nathan Loynes
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
Colin Bartram
 
Exploring Social Media with NodeXL
Exploring Social Media with NodeXL Exploring Social Media with NodeXL
Exploring Social Media with NodeXL
Shalin Hai-Jew
 
Types of Data Validation
Types of Data ValidationTypes of Data Validation
Types of Data Validation
Metric Fox
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
Department of Defense
 
14 steps to a better LinkedIn profile
14 steps to a better LinkedIn profile14 steps to a better LinkedIn profile
14 steps to a better LinkedIn profile
Karl Filtness
 

What's hot (9)

Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
Badanie przestępczości gospodarczej 2018. Raport PwC
Badanie przestępczości gospodarczej 2018. Raport PwCBadanie przestępczości gospodarczej 2018. Raport PwC
Badanie przestępczości gospodarczej 2018. Raport PwC
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
Session 4 the murer of james bulger.2016
Session 4  the murer of james bulger.2016Session 4  the murer of james bulger.2016
Session 4 the murer of james bulger.2016
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Exploring Social Media with NodeXL
Exploring Social Media with NodeXL Exploring Social Media with NodeXL
Exploring Social Media with NodeXL
 
Types of Data Validation
Types of Data ValidationTypes of Data Validation
Types of Data Validation
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
14 steps to a better LinkedIn profile
14 steps to a better LinkedIn profile14 steps to a better LinkedIn profile
14 steps to a better LinkedIn profile
 

Viewers also liked

Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
FraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
FraudBusters
 
PAWS - Pentana Audit Work System software
PAWS - Pentana Audit Work System softwarePAWS - Pentana Audit Work System software
PAWS - Pentana Audit Work System software
Mantala
 
[MPKD1] Introduction to business analytics and simulation
[MPKD1] Introduction to business analytics and simulation[MPKD1] Introduction to business analytics and simulation
[MPKD1] Introduction to business analytics and simulation
Nguyen Ngoc Binh Phuong
 
law of diminishing marginal returns
law of diminishing marginal returnslaw of diminishing marginal returns
law of diminishing marginal returns
Govardhan Andari Vadae Lae
 
Law of diminishing returns
Law of diminishing returnsLaw of diminishing returns
Law of diminishing returns
bernamarcos
 
WorldCom Fraud
WorldCom FraudWorldCom Fraud
WorldCom Fraud
Deepika Bajaj
 
Project Management PERT and CPM
Project Management PERT and CPMProject Management PERT and CPM
Project Management PERT and CPM
Institute of Rural Management
 
Perform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodPerform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling Method
Tao Li CPA,CA
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
guest4ea866f
 

Viewers also liked (11)

Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
PAWS - Pentana Audit Work System software
PAWS - Pentana Audit Work System softwarePAWS - Pentana Audit Work System software
PAWS - Pentana Audit Work System software
 
Picalo Tool Audit
Picalo Tool AuditPicalo Tool Audit
Picalo Tool Audit
 
[MPKD1] Introduction to business analytics and simulation
[MPKD1] Introduction to business analytics and simulation[MPKD1] Introduction to business analytics and simulation
[MPKD1] Introduction to business analytics and simulation
 
law of diminishing marginal returns
law of diminishing marginal returnslaw of diminishing marginal returns
law of diminishing marginal returns
 
Law of diminishing returns
Law of diminishing returnsLaw of diminishing returns
Law of diminishing returns
 
WorldCom Fraud
WorldCom FraudWorldCom Fraud
WorldCom Fraud
 
Project Management PERT and CPM
Project Management PERT and CPMProject Management PERT and CPM
Project Management PERT and CPM
 
Perform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodPerform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling Method
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
 

Similar to Benfords Law

Mathematics ib ia example
Mathematics ib ia exampleMathematics ib ia example
Mathematics ib ia example
Writers Per Hour
 
Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
easternman99
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
Robert Hillard
 
The sociological value of transactional data?
The sociological value of transactional data?The sociological value of transactional data?
The sociological value of transactional data?
Ben Anderson
 
Arnaldo Barreto & Ben Anderson - The sociological value of transactional data?
Arnaldo Barreto & Ben Anderson - The sociological value of transactional data?Arnaldo Barreto & Ben Anderson - The sociological value of transactional data?
Arnaldo Barreto & Ben Anderson - The sociological value of transactional data?
Sociology@Essex
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BI
Jen Stirrup
 
benfords Law
benfords Lawbenfords Law
benfords Law
Mark Luciani
 
10 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt110 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt1
Lavante, Inc.
 
Excel vs fraud an analysis saran kumar u
Excel vs fraud an analysis   saran kumar uExcel vs fraud an analysis   saran kumar u
Excel vs fraud an analysis saran kumar u
SBS AND COMPANY LLP, CHARTERED ACCOUNTANTS
 
Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensics
whbrown5
 
Facts, Figures & Fictions
Facts, Figures & Fictions Facts, Figures & Fictions
Facts, Figures & Fictions
Johnbillett.com
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
Karen Harkavy
 
Auditing and fraud detection using Picalo
Auditing and fraud detection using PicaloAuditing and fraud detection using Picalo
Auditing and fraud detection using Picalo
Sii Quist
 
Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...
Dr Danilo Samà
 
Nov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYNov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKY
Fay Teplitsky
 
Importance Of Positive Attitude Fr
Importance Of Positive Attitude FrImportance Of Positive Attitude Fr
Importance Of Positive Attitude Fr
Divya Watson
 
modern-elementary-statistics-12th-ed-new-pearson-international-ed-1292039094-...
modern-elementary-statistics-12th-ed-new-pearson-international-ed-1292039094-...modern-elementary-statistics-12th-ed-new-pearson-international-ed-1292039094-...
modern-elementary-statistics-12th-ed-new-pearson-international-ed-1292039094-...
chezannedolor2
 
EDI 2009 Case Law Update
EDI 2009 Case Law UpdateEDI 2009 Case Law Update
The value of storytelling through data
The value of storytelling through dataThe value of storytelling through data
The value of storytelling through data
Gramener
 
The Southbourne Tax Group: 10 Ways to Identify Accounts Payable Fraud
The Southbourne Tax Group: 10 Ways to Identify Accounts Payable FraudThe Southbourne Tax Group: 10 Ways to Identify Accounts Payable Fraud
The Southbourne Tax Group: 10 Ways to Identify Accounts Payable Fraud
Vasilisa Yefimova
 

Similar to Benfords Law (20)

Mathematics ib ia example
Mathematics ib ia exampleMathematics ib ia example
Mathematics ib ia example
 
Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
 
The sociological value of transactional data?
The sociological value of transactional data?The sociological value of transactional data?
The sociological value of transactional data?
 
Arnaldo Barreto & Ben Anderson - The sociological value of transactional data?
Arnaldo Barreto & Ben Anderson - The sociological value of transactional data?Arnaldo Barreto & Ben Anderson - The sociological value of transactional data?
Arnaldo Barreto & Ben Anderson - The sociological value of transactional data?
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BI
 
benfords Law
benfords Lawbenfords Law
benfords Law
 
10 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt110 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt1
 
Excel vs fraud an analysis saran kumar u
Excel vs fraud an analysis   saran kumar uExcel vs fraud an analysis   saran kumar u
Excel vs fraud an analysis saran kumar u
 
Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensics
 
Facts, Figures & Fictions
Facts, Figures & Fictions Facts, Figures & Fictions
Facts, Figures & Fictions
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
 
Auditing and fraud detection using Picalo
Auditing and fraud detection using PicaloAuditing and fraud detection using Picalo
Auditing and fraud detection using Picalo
 
Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...
 
Nov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYNov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKY
 
Importance Of Positive Attitude Fr
Importance Of Positive Attitude FrImportance Of Positive Attitude Fr
Importance Of Positive Attitude Fr
 
modern-elementary-statistics-12th-ed-new-pearson-international-ed-1292039094-...
modern-elementary-statistics-12th-ed-new-pearson-international-ed-1292039094-...modern-elementary-statistics-12th-ed-new-pearson-international-ed-1292039094-...
modern-elementary-statistics-12th-ed-new-pearson-international-ed-1292039094-...
 
EDI 2009 Case Law Update
EDI 2009 Case Law UpdateEDI 2009 Case Law Update
EDI 2009 Case Law Update
 
The value of storytelling through data
The value of storytelling through dataThe value of storytelling through data
The value of storytelling through data
 
The Southbourne Tax Group: 10 Ways to Identify Accounts Payable Fraud
The Southbourne Tax Group: 10 Ways to Identify Accounts Payable FraudThe Southbourne Tax Group: 10 Ways to Identify Accounts Payable Fraud
The Southbourne Tax Group: 10 Ways to Identify Accounts Payable Fraud
 

Benfords Law

  • 1. It’s All in the Numbers -Benford’s Law Ed Tobias, CISA, CIA May 12, 2010
  • 2. Expectations Background Why it works Real-world examples How do I use it? Questions Topics
  • 3. How many have heard of it? Useful tool to quickly discover possible fraudulent transactions Spend more time analyzing data instead of searching for it Expectations
  • 4. As of 2004, over 150 articles have been written about Benford’s Law Expectations
  • 6. All over the professional journals J. of Accountancy – 2003, 2007 J. of Forensic Accounting – 2004 Internal Auditor – 2008 ISACA Journal – 2010 Fraud Magazine - 2010 Expectations
  • 7. 1881 – Simon Newcomb, astronomer / mathematician Noticed that front part of logarithm books was more used Inferred that scientists were multiplying more #s that started with lower digits (1, 2, 3, etc.) Background
  • 8. 1938 – Frank Benford, Physicist at GE Research labs Front part of the log book was more worn out than the back Analyzed 20 sets of “random numbers” – 20,299 #s in all Background
  • 9. Tested random #s and random categories Areas of rivers Baseball stats #s in magazine articles Street addresses - first 342 people listed in “American Men of Science” Utility Bills in Solomon Islands Background
  • 10. Benford’s Law: Random #s are not random Lower #s (1-3) occur more frequently as a first digit than higher numbers (7-9) In a sample of random numbers: #1 occurs 33% #9 occurs 5% Background
  • 11. What are “random numbers”? Non-manipulated numbers Population stats, utility bills, Areas of rivers NOT human-selected #s Zip codes, SSN, Employee ID Background
  • 12. What’s the practical use? 1990s – Dr. Mark Nigrini, college professor Tested insurance costs (reim. claims), sales figures Performed studies detecting under/overstmts of financial figures Published results in J. of Accountancy (1990) and ACFE’s The White Paper (1994) Useful for CFEs and auditors Background
  • 13. What about financial txns? “Random data” = non-manipulated numbers AP txns, company purchases NOT human-selected #s Expense limits (< $25) Approval limits (No sig < $500) Hourly wage rates Background
  • 14. How will it help me with non-random data? Aid in detection of unusual patterns Circumventing controls Potential fraud Background
  • 15. You won the lottery – invest $100M in a mutual fund compounding at 10% annually First digit is “1” Takes 7.3 yr to double your $ Why it works
  • 16. Why it works First digit is 1 for 7+ years First digit is 2 in the 8th year
  • 17. At $500M … First digit is “5” Takes 1.9 yr to increase $100M Why it works
  • 18.
  • 19.
  • 20. Seems reasonable that the lower digits (1-3) occur more frequently These 3 digits make up approx. 60% of naturally-occurring digits Why it works
  • 21. Scale invariant 1961-Roger Pinkham If you multiply the numbers by the same non-zero constant (i.e., 22.04 or 0.323) New set of #s still follows Benford’s Law Works with different currencies Why it works
  • 22. $2M Check Fraud in AZ $4.8M Procurement fraud in NC Examples
  • 23. Check fraud in AZ #s appear random to untrained eyes Suspicious under Benford’s Law Counter-intuitive to human nature Example #1
  • 24. State of Arizona v. Wayne James Nelson (1993) Wrote 23 checks (approx. $2M) Check amounts < $100K Tried to circumvent a control that required a human signature Mgr tried to conceal fraud Claimed to be testing the system controls against a bogus vendor Example #1
  • 25. Avoided common indicators: No duplicate amounts No round #s – all included cents Example #1
  • 26.
  • 27. Lots of 7, 8, and 9s
  • 29.
  • 31. Benford’s Law can be extended to first 2 digits Allow examiner to focus on specific areas High-level test of data authenticity Example #2
  • 32. Procurement fraud in NC Years 2002-2005 Wake County School employees submitted at least $3.8M submitted for payment Employees purchased cars, campers, golf carts, plasma TVs Bid limit was only $2,500 Run a sample of 660 txns through Benford’s Law … Example #2
  • 33. Example #2 See any suspicious areas?
  • 34. Example #2 Drilling down in the “51” txns Multiple duplicate amts
  • 35. Example #2 Red flags not noticed: Payments to the vendor increased 342% from 2002-2003 ($3.7M+) Over 60% of invoices under $2,500 limit and did not have a PO For 2 years – 99.95% of invoices were under $2,500 On 24 separate occasions – 50+ invoices with the same invoice date / consecutive invoice #s
  • 36. Example #2 On 24 separate occasions – 50+ invoices with the same invoice date / consecutive invoice #s
  • 37. Example #2 The investigation recovered $4.8M from the vendor and former school employees.
  • 38. Data Analytics software ACL / IDEA Excel Add-Ons Built-in Excel Functions How do I use it?
  • 40. Expectations Background Why it works Real-world examples How do I use it? Summary
  • 41. Ed Tobias ed.tobias@hillsclerk.com LinkedIn http://www.linkedin.com/in/ed3200 Contact Information
  • 42. Benford’s Law Overview. n.d. Retrieved March 10, 2010 from http://www.acl.com/supportcenter/ol/courses/course.aspx?cid=010&ver=9&mod=1&nodeKey=3 Browne, M. Following Benford’s Law, or Looking Out for No. 1.n.d. Retrieved March 10, 2010 from http://www.rexswain.com/benford.html Durtschi, C., Hillison, W., and Pacini, C. The Effective Use of Benford’s Law to Assist in Detecting Fraud in Accounting Data. 2004. Journal of Forensic Accounting. Vol. V. Retrieved March 10, 2010 from http://www.auditnet.org/articles/JFA-V-1-17-34.pdf Managing the Business Risk of Fraud. EZ-R Stats, LLC. 2009. Retrieved March 10, 2010 from http://www.ezrstats.com/CS/Case_Studies.htm Kyd, C. Use Benford’s Law with Excel to Improve Business Planning. 2007. Retrieved March 10, 2010 from http://www.exceluser.com/tools/benford_xl11.htm References
  • 43. Lehman, M., Weidenmeier, M, and Jones, T. Here’s how to pump up the detective power of Benford’s Law. Journal of Accountancy. 2007. Retrieved March 10, 2010 from http://www.journalofaccountancy.com/Issues/2007/Jun/FlexingYourSuperFinancialSleuthPower.htm Lynch, A. and Xiaoyuan, Z. Putting Benford’s Law to Work. 2008. Internal Auditor. Retrieved March 10, 2010 from http://www.theiia.org/intAuditor/itaudit/archives/2008/february/putting-benfords-law-to-work/ Nigrini, M. Adding Value with Digital Analysis. Internal Auditor. 1999. Retrieved March 10, 2010 from http://findarticles.com/p/articles/mi_m4153/is_1_56/ai_54141370/ Nigrini, M. I’ve Got Your Number. Journal of Accountancy. 1999. Retrieved March 10, 2010 from http://www.journalofaccountancy.com/Issues/1999/May/nigrini.htm Rose, A. and Rose, J. Turn Excel Into a Financial Sleuth. 2003.Journal of Accountancy. Retrieved March 10, 2010 from http://www.systrust.us/pubs/jofa/aug2003/rose.htm Simkin, M. Using Spreadsheets and Benford’s Law to Test Accounting Data. ISACA Journal. 2010, Vol. 1. Pp. 47-51. References
  • 44. Stalcup, K. Benford’s Law. Fraud Magazine. 2010, Jan/Feb. Pp 57-58. Summerford Accountancy, PC. Fraud Vulnerability Assessment. 2006. Retrieved May 10, 2010 from http://www.wcpss.net/audit/summerford.pdf References

Editor's Notes

  1. ACL guide -Some of the data scientific such as the areas of rivers and population figures to the idiosyncratic like the numbers from an issue of Reader’s Digest, the street addresses of the first 342 people listed in “American Men of Science”, and utility bills from the peoplein the Solomon Islands
  2. Example taken from Dr. Mark Nigrini article “I’ve Got Your Number”
  3. Example taken from Dr. Mark Nigrini article “I’ve Got Your Number”
  4. This will occur with any phenomenon that has a constant / erratic growth rate. (p.2)
  5. This will occur with any phenomenon that has a constant / erratic growth rate. (p.2)
  6. This will occur with any phenomenon that has a constant / erratic growth rate. (p.2)
  7. Nigrini, p. 3 for chart