SlideShare a Scribd company logo
“Finding Fraud and
What To Do With It.”
New York State Department
of Transportation
February 5, 2010
Edward T. Dominelli, CFE, MPA
BST Forensic Accounting and Litigation Services
Offices: New York - Albany
2
Goals and Objectives
Organizations involved in transportation-related
construction, both public and private, can take
proactive steps to mitigate the risk of fraudulent
activity on their projects. This session will
discuss suggested steps such organizations
can consider to better deter and detect
fraudulent activity, and what they need to do
when fraud is detected or suspected to ensure
appropriate follow-up and investigation.
3
What is fraud?
Fraud is any intentional act or omission
designed to deceive others, resulting in
the victim suffering a loss and/or the
perpetrator achieving a gain.
Managing the Business Risk of Fraud: A Practical Guide, prepared by
IIA, AICPA, and ACFE
4
Why do people commit fraud?
5
Who commits construction fraud?
• Project Manager
• Superintendent
• “Clerk of the Works”
• Construction Manager
• Contracting Officer
• Architects
• Engineers
• Controlled Inspectors
• Estimators
• Contractors
• Subcontractors
• Materials Suppliers
• Corrupt Union Officials
• Organized Crime
• Labor Coalitions
• Other?
6
“Fraud prevention and detection is
like a mortal’s need for air. When it’s
present, it’s never noticed. When it’s
missing, it’s all that’s noticed”
Author: Unknown
7
Why must we address fraud?
Requirement of ARRA Program
Fraud happens in all organizations
Public Safety
Fiduciary duty to protect public
assets
8
Why must we address fraud?
Mitigate risk
Limit liability
Protect organizational reputation
Promote transparency in operations
9
Fraud Mitigation Process
Finding Fraud – Prevention and
Detection
Responding to Fraudulent Activity
10
Finding Fraud – Key Steps
Management Commitment
Recognize Relevant Fraud Schemes
Identify High Risk Areas
Establish Prevention/Detection
Measures
11
Management Commitment
Acceptance That Fraud Exists
Set as Management Priority
Develop/Revise Code of Conduct
• agency level - conflicts of interest, gifts
• business partners
• embody in documents, i.e. contracts
12
Recognize Relevant Schemes
Review agency history
Review professional literature
Consult with “experts”
Identify “Red Flags”
13
14
Conduct Risk Assessment
Where are we most vulnerable?
Focus on high risk areas
15
Establish Prevention/Detection Measures
Design/Implement Internal Controls
Examples:
• employee/vendor ethics policy
• contractor/vendor due diligence
• separation of duties
• change order review process
• random contract audits
• independent project estimates
• original supporting documents
• worker identification system
• analyze bidding patterns
16
Due Diligence Steps
• Check References
• Visit Projects Completed
• Speak with Peers
• Similar Scope, Size and
Complexity
• Check Debarment Lists
• Public Database Search
• Review Subcontractors
• Enforce Subcontracting
Limits
• Review Bid Pricing
• Verify Licenses
17
Establish Prevention/Detection Measures
Set Fraud Reporting Requirements
• mandated reporting
• anonymous reporting - Hotline
• whistleblower protection
• internal and external resources
• “When in doubt, report it.”
18
REPORT FRAUD, WASTE & ABUSE
One of the core missions of the Recovery Board is to prevent fraud, waste, and mismanagement of
Recovery funds. Recovery.gov gives you the ability to find Recovery projects in your own
neighborhood and if you suspect fraudulent actions related to the project you can report those
concerns in several ways:
Submit a Complaint Form electronically
Call the Recovery Board Fraud Hotline: 1-877-392-3375 (1-877-FWA-DESK)
Fax the Recovery Board: 1-877-329-3922 (1-877-FAX-FWA2)
Write the Recovery Board:
Recovery Accountability and Transparency Board
Attention: Hotline Operators
P.O. Box 27545
Washington, D.C. 20038-7958
The Recovery Board is committed to helping ensure these funds are spent properly, but we cannot do
it without your help. Additionally, the Recovery Act provides protections for certain individuals
(whistleblowers) who make specific disclosures about uses of Recovery Act funds.
Source: Recovery.gov
19
Establish Prevention/Detection Measures
 Education
• employee training - fraud schemes, red flags, altered
documents, reporting requirements
• contractor/vendor awareness
 contractor/vendor code of conduct
 “zero tolerance”
 incorporate into contract language
 discuss in bidders meetings/vendor interviews
 reinforce in routine communications
 posters
20
Fraud Response Plan
 Prepare Plan in Advance – Don’t wait until it
happens!!!
 Investigative Process
• consistent
• timely
• impartial
• professional
 Identify Investigative Resources
• internal - IG, SIU, Counsel’s Office, Internal Auditor
• external – USDOTIG, NYSDOT, NYSOIG, State Police,
FBI, District Attorney
21
Evidentiary Considerations
 Evidence collected will be disputed
for three reasons:
• Legality of the acquisition of the
evidence
• Integrity of the evidence
• Interpretation of the evidence
22
Evidentiary Considerations
 Preserving and Protecting Evidence
• documents – paper and electronic
• physical – i.e., core sample
• chain of custody/illegal search issues
 Interviewing Witnesses
• false imprisonment issues
• self-incrimination issues
• union contract issues
 Maintain Confidentiality – “Need to know.”
 Let the “Pros” Handle It
23
- Sudden change in work habits – tardiness, productivity,
reliability
- Sudden change in lifestyle – living beyond means, clothing,
cars, jewelry, vacations, cash
- Sense of entitlement, complaints of being underpaid
- Sudden change in personality/appearance
- Prior history of misconduct/criminal history
- Excessive unscheduled absences/tardiness
- Evidence of mounting financial difficulties – collection agency
calls, wage garnishments, borrowing money from co-workers
Employee Fraud Indicators
24
- Complaints from vendors (contactors, consultants, suppliers)
- Difficulty contacting during workday, unavailability
- Unreported outside employment/business activities
- Unwillingness to be away from job for extended periods, no
vacations
- Non-acceptance of promotions
- Failure to share important information with supervisor or
subordinates
- Resistance to supervision/oversight
- Reluctance to delegate to subordinates
Employee Fraud Indicators
25
- Excessive non-work related phone calls or emails during the
workday
- Consistent failure to follow established procedures/overrides
established internal controls
- Poor record-keeping/inadequate documentation to support
decisions or transactions
- Non-cooperation with auditors/inspectors
- By-pass chain of command
- High turnover of subordinates
- No/limited segregation of key functions within work unit, weak
controls
Employee Fraud Indicators
26
- Untimely bank deposits/bank reconciliations
- Consistent math errors in computations
- Alteration/falsification/destruction of official records
- Socialization with vendors
- Soliciting/accepting gifts and gratuities from vendors
- Frequent, unexplained meetings with vendors behind closed
doors or off- site
- Meeting with “unfamiliar” people in office
- Failure to enforce contract provisions with vendors
Employee Fraud Indicators
27
- Consistent use of same vendors
- Vendor’s insistence to deal with a specific representative
- Personal intervention to get certain vendors paid
- Referral of certain vendors to perform work
- Referral of subcontractors to primes
- Limited/restricted competition for procurement of goods and
services
DON’T IGNORE RED FLAGS. THEY MIGHT MEAN
NOTHING, BUT THEN AGAIN …..
Employee Fraud Indicators
28
Questions
29
Thank you
Edward T. Dominelli, CFE, MPA
BST Valuation and Litigation Advisors
Forensic Accounting and Financial Investigations
26 Computer Drive West
Albany, NY 12205
1-800-724-6700, ext 133
edominelli@bstco.com

More Related Content

Similar to Finding Fraud and What To Do With It.ppt

I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
Financial Poise
 
2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension
Dr Darren O'Connell AGIA
 
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds Sutherland
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14
ACFCS
 
False Invoices - Would you detect them
False Invoices - Would you detect themFalse Invoices - Would you detect them
False Invoices - Would you detect them
Mark Scales
 
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
PYA, P.C.
 
The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention
Rea & Associates
 
vigilance-ppt.ppt
vigilance-ppt.pptvigilance-ppt.ppt
vigilance-ppt.ppt
ALLINDIARADIOJammu
 
Hot topics in financial crime - Singapore
Hot topics in financial crime - SingaporeHot topics in financial crime - Singapore
Hot topics in financial crime - Singapore
Bovill
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 
ContractMgmtMPJunejaEx-CTE_300315.ppt
ContractMgmtMPJunejaEx-CTE_300315.pptContractMgmtMPJunejaEx-CTE_300315.ppt
ContractMgmtMPJunejaEx-CTE_300315.ppt
ssuser1526e0
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
Case IQ
 
Navigating Government Investigations of Health Care Fraud
Navigating Government Investigations of Health Care FraudNavigating Government Investigations of Health Care Fraud
Navigating Government Investigations of Health Care Fraud
Polsinelli PC
 
The Forensics Frontier
The Forensics FrontierThe Forensics Frontier
The Forensics Frontier
whbrown5
 
Encouraging Internal Compliance Communication Webinar
Encouraging Internal Compliance Communication WebinarEncouraging Internal Compliance Communication Webinar
Encouraging Internal Compliance Communication Webinar
Case IQ
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
Emily2014
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
EDR
 
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Ethisphere
 
Discovering and Preventing Employee Dishonesty and Fraud
Discovering and Preventing Employee Dishonesty and FraudDiscovering and Preventing Employee Dishonesty and Fraud
Discovering and Preventing Employee Dishonesty and Fraud
Sikich LLP
 

Similar to Finding Fraud and What To Do With It.ppt (20)

I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
 
2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension
 
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14
 
False Invoices - Would you detect them
False Invoices - Would you detect themFalse Invoices - Would you detect them
False Invoices - Would you detect them
 
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
 
The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention
 
vigilance-ppt.ppt
vigilance-ppt.pptvigilance-ppt.ppt
vigilance-ppt.ppt
 
Hot topics in financial crime - Singapore
Hot topics in financial crime - SingaporeHot topics in financial crime - Singapore
Hot topics in financial crime - Singapore
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
ContractMgmtMPJunejaEx-CTE_300315.ppt
ContractMgmtMPJunejaEx-CTE_300315.pptContractMgmtMPJunejaEx-CTE_300315.ppt
ContractMgmtMPJunejaEx-CTE_300315.ppt
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
 
Navigating Government Investigations of Health Care Fraud
Navigating Government Investigations of Health Care FraudNavigating Government Investigations of Health Care Fraud
Navigating Government Investigations of Health Care Fraud
 
The Forensics Frontier
The Forensics FrontierThe Forensics Frontier
The Forensics Frontier
 
Encouraging Internal Compliance Communication Webinar
Encouraging Internal Compliance Communication WebinarEncouraging Internal Compliance Communication Webinar
Encouraging Internal Compliance Communication Webinar
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
 
Discovering and Preventing Employee Dishonesty and Fraud
Discovering and Preventing Employee Dishonesty and FraudDiscovering and Preventing Employee Dishonesty and Fraud
Discovering and Preventing Employee Dishonesty and Fraud
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 

Finding Fraud and What To Do With It.ppt

  • 1. “Finding Fraud and What To Do With It.” New York State Department of Transportation February 5, 2010 Edward T. Dominelli, CFE, MPA BST Forensic Accounting and Litigation Services Offices: New York - Albany
  • 2. 2 Goals and Objectives Organizations involved in transportation-related construction, both public and private, can take proactive steps to mitigate the risk of fraudulent activity on their projects. This session will discuss suggested steps such organizations can consider to better deter and detect fraudulent activity, and what they need to do when fraud is detected or suspected to ensure appropriate follow-up and investigation.
  • 3. 3 What is fraud? Fraud is any intentional act or omission designed to deceive others, resulting in the victim suffering a loss and/or the perpetrator achieving a gain. Managing the Business Risk of Fraud: A Practical Guide, prepared by IIA, AICPA, and ACFE
  • 4. 4 Why do people commit fraud?
  • 5. 5 Who commits construction fraud? • Project Manager • Superintendent • “Clerk of the Works” • Construction Manager • Contracting Officer • Architects • Engineers • Controlled Inspectors • Estimators • Contractors • Subcontractors • Materials Suppliers • Corrupt Union Officials • Organized Crime • Labor Coalitions • Other?
  • 6. 6 “Fraud prevention and detection is like a mortal’s need for air. When it’s present, it’s never noticed. When it’s missing, it’s all that’s noticed” Author: Unknown
  • 7. 7 Why must we address fraud? Requirement of ARRA Program Fraud happens in all organizations Public Safety Fiduciary duty to protect public assets
  • 8. 8 Why must we address fraud? Mitigate risk Limit liability Protect organizational reputation Promote transparency in operations
  • 9. 9 Fraud Mitigation Process Finding Fraud – Prevention and Detection Responding to Fraudulent Activity
  • 10. 10 Finding Fraud – Key Steps Management Commitment Recognize Relevant Fraud Schemes Identify High Risk Areas Establish Prevention/Detection Measures
  • 11. 11 Management Commitment Acceptance That Fraud Exists Set as Management Priority Develop/Revise Code of Conduct • agency level - conflicts of interest, gifts • business partners • embody in documents, i.e. contracts
  • 12. 12 Recognize Relevant Schemes Review agency history Review professional literature Consult with “experts” Identify “Red Flags”
  • 13. 13
  • 14. 14 Conduct Risk Assessment Where are we most vulnerable? Focus on high risk areas
  • 15. 15 Establish Prevention/Detection Measures Design/Implement Internal Controls Examples: • employee/vendor ethics policy • contractor/vendor due diligence • separation of duties • change order review process • random contract audits • independent project estimates • original supporting documents • worker identification system • analyze bidding patterns
  • 16. 16 Due Diligence Steps • Check References • Visit Projects Completed • Speak with Peers • Similar Scope, Size and Complexity • Check Debarment Lists • Public Database Search • Review Subcontractors • Enforce Subcontracting Limits • Review Bid Pricing • Verify Licenses
  • 17. 17 Establish Prevention/Detection Measures Set Fraud Reporting Requirements • mandated reporting • anonymous reporting - Hotline • whistleblower protection • internal and external resources • “When in doubt, report it.”
  • 18. 18 REPORT FRAUD, WASTE & ABUSE One of the core missions of the Recovery Board is to prevent fraud, waste, and mismanagement of Recovery funds. Recovery.gov gives you the ability to find Recovery projects in your own neighborhood and if you suspect fraudulent actions related to the project you can report those concerns in several ways: Submit a Complaint Form electronically Call the Recovery Board Fraud Hotline: 1-877-392-3375 (1-877-FWA-DESK) Fax the Recovery Board: 1-877-329-3922 (1-877-FAX-FWA2) Write the Recovery Board: Recovery Accountability and Transparency Board Attention: Hotline Operators P.O. Box 27545 Washington, D.C. 20038-7958 The Recovery Board is committed to helping ensure these funds are spent properly, but we cannot do it without your help. Additionally, the Recovery Act provides protections for certain individuals (whistleblowers) who make specific disclosures about uses of Recovery Act funds. Source: Recovery.gov
  • 19. 19 Establish Prevention/Detection Measures  Education • employee training - fraud schemes, red flags, altered documents, reporting requirements • contractor/vendor awareness  contractor/vendor code of conduct  “zero tolerance”  incorporate into contract language  discuss in bidders meetings/vendor interviews  reinforce in routine communications  posters
  • 20. 20 Fraud Response Plan  Prepare Plan in Advance – Don’t wait until it happens!!!  Investigative Process • consistent • timely • impartial • professional  Identify Investigative Resources • internal - IG, SIU, Counsel’s Office, Internal Auditor • external – USDOTIG, NYSDOT, NYSOIG, State Police, FBI, District Attorney
  • 21. 21 Evidentiary Considerations  Evidence collected will be disputed for three reasons: • Legality of the acquisition of the evidence • Integrity of the evidence • Interpretation of the evidence
  • 22. 22 Evidentiary Considerations  Preserving and Protecting Evidence • documents – paper and electronic • physical – i.e., core sample • chain of custody/illegal search issues  Interviewing Witnesses • false imprisonment issues • self-incrimination issues • union contract issues  Maintain Confidentiality – “Need to know.”  Let the “Pros” Handle It
  • 23. 23 - Sudden change in work habits – tardiness, productivity, reliability - Sudden change in lifestyle – living beyond means, clothing, cars, jewelry, vacations, cash - Sense of entitlement, complaints of being underpaid - Sudden change in personality/appearance - Prior history of misconduct/criminal history - Excessive unscheduled absences/tardiness - Evidence of mounting financial difficulties – collection agency calls, wage garnishments, borrowing money from co-workers Employee Fraud Indicators
  • 24. 24 - Complaints from vendors (contactors, consultants, suppliers) - Difficulty contacting during workday, unavailability - Unreported outside employment/business activities - Unwillingness to be away from job for extended periods, no vacations - Non-acceptance of promotions - Failure to share important information with supervisor or subordinates - Resistance to supervision/oversight - Reluctance to delegate to subordinates Employee Fraud Indicators
  • 25. 25 - Excessive non-work related phone calls or emails during the workday - Consistent failure to follow established procedures/overrides established internal controls - Poor record-keeping/inadequate documentation to support decisions or transactions - Non-cooperation with auditors/inspectors - By-pass chain of command - High turnover of subordinates - No/limited segregation of key functions within work unit, weak controls Employee Fraud Indicators
  • 26. 26 - Untimely bank deposits/bank reconciliations - Consistent math errors in computations - Alteration/falsification/destruction of official records - Socialization with vendors - Soliciting/accepting gifts and gratuities from vendors - Frequent, unexplained meetings with vendors behind closed doors or off- site - Meeting with “unfamiliar” people in office - Failure to enforce contract provisions with vendors Employee Fraud Indicators
  • 27. 27 - Consistent use of same vendors - Vendor’s insistence to deal with a specific representative - Personal intervention to get certain vendors paid - Referral of certain vendors to perform work - Referral of subcontractors to primes - Limited/restricted competition for procurement of goods and services DON’T IGNORE RED FLAGS. THEY MIGHT MEAN NOTHING, BUT THEN AGAIN ….. Employee Fraud Indicators
  • 29. 29 Thank you Edward T. Dominelli, CFE, MPA BST Valuation and Litigation Advisors Forensic Accounting and Financial Investigations 26 Computer Drive West Albany, NY 12205 1-800-724-6700, ext 133 edominelli@bstco.com