Making a Bad Match a Bad Match<p>​Your online dream date may be scam artist. And the dating service may be knowingly turning a blind eye to the fraud. That's among the accusations in a U.S. Federal Trade Commission (FTC) lawsuit against Match Group, which operates many popular online dating apps, <a href="" target="_blank"> <em>TechCrunch</em> reports</a>. </p><p>The FTC suit accuses Match of using misleading advertising, billing, and cancellation policies to convince <span>Match</span><span>.</span><span>com</span> app users to become subscribers. The FTC alleges that <a class="vglnk" href="" rel="nofollow"> <span>Match</span><span>.</span><span>com</span></a> sent emails to app users alerting them to messages from interested individuals, even though the service already had flagged those accounts as fraudulent. Indeed, the FTC contends that Match knew scammers comprise as much as 30% of <span>Match</span><span>.</span><span>com</span> registrations. Moreover, Match's research confirms that between June 2016 and May 2018, almost 500,000 people signed up for subscriptions to the site within 24 hours of receiving an email associated with a fraudulent account. </p><p>Once users had signed up for a six-month subscription, the FTC alleges <span>Match</span><span>.</span><span>com</span> made it difficult for them to cancel the service. That would put <span>Match</span><span>.</span><span>com</span> in violation of the U.S. Restore Online Confidence Act, which requires companies to provide a simple method to stop recurring charges.</p><h2> Lessons Learned</h2><p>According to FTC statistics, U.S. residents reported losing $143 million to romance scams in 2018 — a higher total than for any other type of scam reported to the commission. The median reported loss was $2,600, and it was $10,000 for people over 70. </p><p>This story brings to light that online dating businesses cannot be trusted to fully protect subscribers from such scams, nor are they transparent in the way they deal with customers and their concerns. While the outcome of this case is not yet known, online dating services can take several measures to detect and reduce such scams and business practice exploitation. </p><ul><li> <strong>Mandatory audits of anti-fraud and scamming activities should be required.</strong> While Match does have some educational anti-fraud material on its company website, it is not clear how comprehensive the company's approach is. According to this story, Match contends that it has "developed industry-leading tools and [artificial intelligence] that block 96% of bots and fake accounts from our site within a day." The company says it relentlessly pursues malicious accounts.<br> <br>Companies that operate in fields where quantitative business processes and data are abundant should be able to monitor, audit, and publicly report the results. The latter may be a regulatory measure worth considering by the FTC, at least temporarily when a company has violated standards and laws.<br><br></li><li> <strong>The consequences for deceptive business practices need to be significant.</strong> These consequences also should apply to companies that knowingly allow fraud to take place. Penalties such as reimbursement of subscription fees — as the FTC is asking for in this case — are justified. <br> <br>Match also needs to review and clean up its subscription, billing, and cancellation policies and process. For example, the company could establish a "no questions asked" cancellation and refund policy for an initial period, or provide potential new subscribers with a free trial period with full access to services. The billing and cancellation policy and process should be simplified and publicized, with no hidden additional requirements. Internal auditors would be able to advise on ways to implement these measures.<br><br></li><li> <strong>Measures to ensure market competition may be needed.</strong> Match may face negative publicity from this case, which could lead the company to change its business practices. Given that Match is the predominant company in the online dating field, the FTC could consider whether there is sufficient competition in this industry to foster a high ethical standard of business practices and undertake additional regulatory measures. </li></ul>Art Stewart0
Deepfake Deception Deception<p>​The CEO just called asking you to send a wire transfer. But are you sure it's the CEO? That voice that sounds like the organization's leader may be a deepfake — an audio or video file that has been created using artificial intelligence.</p><p>Deepfakes are becoming the latest lure in phishing schemes, <a href="" target="_blank"> <em>PC Magazine</em> reports</a>. Recently, hackers tricked a managing director at a British energy company into authorizing a $243,000 wire transfer to an account in Hungary by creating a fake voice model that sounded like the company's CEO, according to <a href="" target="_blank"> <em>The Wall Street Journal</em></a>. In an email, the employee told the company's insurance carrier, Euler Hermes, that "the voice was so lifelike that he felt he had no choice but to comply," <a href="" target="_blank"> <em>The Washington Post</em></a> says. Cybersecurity firm Symantec told the <em>Post</em> that it knew of three recent incidents in which attackers mimicked the voices of executives to defraud companies.</p><h2>Lessons Learned</h2><p>Any new technology or societal advance seems to inevitably raise opportunities for fraudsters to benefit at the expense of organizations and individuals. As this news story illustrates, the threat of deepfake fraud and phishing is here and likely to grow. In fact, deepfake audio and video is becoming cheap and easy to create with computers and software, and how-to videos are showing up on social media. </p><p>Deepfake video and audio files are not necessarily bad, as we have seen with some educational and comedic videos on late night TV. The problem is when they are used for crime. What can regulators, organizations, and internal auditors do to identify and counter this threat before it causes damage?</p><ul><li>First and foremost, fraud detection and prevention is a cat-and-mouse exercise — what works now may not last as a long-term solution. Therefore, regulators, organizations, and internal auditors need to educate themselves on how the AI behind deepfakes can be used to defraud.<br><br></li><li>Implementing a two-step verification process where sensitive information, money, or decisions are being sought, is essential. Auditors should keep in mind the concept of "never trust, always verify." That verification process can be as simple and low-tech as a mandatory return phone call to verify sources. Technology-based verification includes requiring the requestor to enter an encrypted passcode separately, and subjecting the request, regardless of its form, to computer-based audio/video analysis to verify its authenticity before taking action. <br><br></li><li>While human beings inevitably will bear the brunt of having to respond to these deepfake fraud attacks, a machine-based approach will be more effective — but only under certain conditions. People still need to learn more about this threat and be equipped to address it.<br><br></li><li>One tool that shows promise is a recurrent neural network (RNN). An RNN is a class of artificial neural network in which connections between nodes form a pattern along a temporal sequence, allowing it to exhibit temporal dynamic behavior that can be applied to handwriting, speech, or visual recognition. These networks can be trained to identify inconsistencies. <br> <br>Applied to video deepfakes, an RNN could identify inconsistencies in lighting conditions, shadows, reflections, or even an entire face, including physiological elements such as mouth movement, blinking, and breathing. This is possible because the algorithms used to build a deepfake work frame by frame but cannot remember what is created for previous frames. <br> <br>While RNN technology can be expensive and may be best suited to protecting against deepfakes of senior executives, software companies currently are developing products that will be more cost-scalable and readily deployed across larger organizations. Such technology could be used in real time to verify the authenticity of a video or audio request as it comes in. For example, Adobe has developed AI that can detect faces that have been manipulated in Photoshop. Another example uses blockchain technology along with AI to create a digital signature that cannot be altered, and will identify attempts to alter it, for embedding in legitimate audio and video.<br><br></li><li>Academic research and collaboration also is needed to understand deepfakes and other forms of manipulated media. Since deepfake videos can go viral on social media, these sites already are working to combat the threat. <br> <br>For example, Facebook deploys engineering teams that can spot manipulated photos, audio, and video. In addition to using software, Facebook and other social media companies hire people to look for deepfakes manually. Similarly, the AI Foundation, a nonprofit organization that focuses on human and AI interaction, conducts research into these issues.</li> </ul>Art Stewart0
Protecting the Protectors the Protectors<p>​U.S. federal prosecutors say a former U.S. Army civilian employee and four accomplices stole money from current and former military members and opened accounts in their names to facilitate the crimes, <a href="" target="_blank"><em>Military Times</em> reports</a>. Prosecutors allege that former civilian medical records technician Fredrick Brown photographed the medical files of service members stationed at the Yongsan Garrison in South Korea. Those records included Social Security numbers and military IDs. </p><p>With that information, prosecutors say Brown and his alleged accomplices set up fake accounts in the U.S. Department of Defense and Department of Veterans Affairs (VA) benefits systems and routed money from those accounts into other bank accounts. The group members, now under arrest, also allegedly accessed and stole money from service members' bank accounts. </p><p> <strong>Lessons Learned</strong></p><p>Members of the U.S. military are twice as likely as other people to be victims of fraud, including identity theft, according to a 2017 AARP study, <a href="" target="_blank">Under Fire: Military Veterans and Consumer Fraud in the United States</a> (PDF). The AARP website also details the wide range of fraud schemes perpetrated on veterans, including phishing, imposter scams, and investment and loan schemes. </p><p>What can internal auditors and military organizations learn from this story to better prevent and detect identity theft targeting military service members?</p><ul><li>First and foremost, access to the personal information of service members needs to be tightly restricted, while permitting efficient use for legitimate reasons. The fact that the accused individuals had access to medical files and the scheme appears to have been going on since 2014 suggests a need for greater security measures. For example, supervisors and security cameras could have monitored employee activity better during working hours — taking thousands of pictures of medical files takes time and effort that should have been noticed sooner. <br> <br>More frequent rotation of employees who handle sensitive personal information is another possible measure. Likewise, more stringent employee background checks and regular monitoring updates, especially for jobs handling sensitive information, may have helped deter the alleged fraud.<br><br></li><li>All organizations, including the military, need to review and tighten access to employees' personal information such as Social Security numbers. For example, for decades, the U.S. military used Social Security numbers as personal identifiers, which were shared all over the world as service members filled out forms, checked in on base, and showed their military ID cards. <br> <br>In recent years, the military has reduced or eliminated the use of Social Security numbers wherever possible. The U.S. federal government has been removing Social Security numbers from ID cards since 2008, but they are not scheduled to be fully removed from the cards' bar codes, QR codes, and magnetic strips until 2022.</li> <br> <li>Bank and credit card alerts could help military personnel protect their personal information from identify thieves, particularly when service members are involved in a lengthy deployment. When service members are not able to check their bank and credit card accounts regularly, fraudsters have time to do a lot of damage before anyone notices. <br> <br>Deployed military personnel can help prevent identity theft by placing an active duty report on a credit report through a credit reporting company such as Equifax, Experian, and TransUnion. These alerts last for one year but are renewable. The credit reporting company is required to contact the other credit reporting companies about the alerts. <br> <br>In addition, veterans may be eligible for free credit monitoring through the VA. The VA also has an identity protection program called <a href="" target="_blank">More Than a Number</a> that provides veterans and their beneficiaries with information about how to protect themselves. Banks may offer similar programs. </li></ul>Art Stewart0
The Make Your Own Credit Card Scam Make Your Own Credit Card Scam<p>​Five individuals allegedly used fake credit cards to steal more than $500,000 in merchandise from HomeGoods, Marshalls, and TJ Maxx stores, <a href="$500000/5470192/" target="_blank">WABC reports</a>. Police in Westchester County, N.Y. say the group created fake credit cards for the three stores and purchased items with those cards until the stores discovered they were fraudulent. Police charged the individuals with multiple counts of grand larceny and are investigating whether the group's alleged activities extended beyond Westchester County.</p><h2>Lessons Learned</h2><p>The value of the goods and money allegedly stolen by the fraudsters in this story pales in comparison<strong> </strong>with the billions of dollars lost in the past two decades to hackers, skimmers, and other kinds of credit card and identity thieves. Yet, it is still easy for criminals to manufacture fake credit cards and IDs to commit fraud. </p><p>For example, it is legal to purchase a credit card embosser, but it is illegal to use it to commit credit card fraud. These machines can be bought for $1,000 to $3,000, including on the internet. Moreover, there are plenty of videos that show in detail how to make fake credit cards and IDs. In addition, anyone can purchase a magnetic stripe reader (skimmer) for $5 to $10.</p><p>What more can be done to help prevent this kind of fraud? Here are some suggestions for regulators, financial institutions, retailers, and auditors.</p><ul><li> <strong>Restrict the availability of credit card embossing and other similar machines. </strong>While there can be legitimate reasons why individuals would own these machines, requiring greater background checks before allowing such purchases to take place could help prevent them from being used illegitimately.<br><br></li><li> <strong>Extend the use of </strong> <strong>two-factor authentication in conducting financial transactions.</strong> Whether it is a password, personal identification number (PIN), or code sent to a verified location for a card not present transaction, these technologies are helping reduce fraud. More particularly, accelerating the deployment of smart chip technology — known as Europay, MasterCard, and Visa (EMV) — is a significant way to prevent credit card fraud. <br> <br>Widely used in Canada, Europe, and other countries, EMV-based cards are much more secure and harder to hack, at least from a skimming point of view, and they also require a PIN. Counterfeit fraud rates decreased more than 50% in the U.S. between 2016 and 2017 as a result of EMV adoption by merchants, according to MasterCard and Visa.<br> <br>Being EMV-compliant requires having a terminal or point of sale system that can process credit cards with chips embedded in them. Switching to a credit card terminal that can accept chip cards comes with a cost and currently is not mandatory. However, businesses that do not have EMV-compliant terminals risk incurring financial responsibility for any credit card fraud that happens. Not only can business owners protect themselves by becoming EMV-compliant, but they also can contribute to the overall effort to combat credit card fraud.<br><br></li><li> <strong>Retailers and banks need to move away from using magnetic stripes</strong><strong>.</strong> In addition to the transition costs, some critics say people won't use their credit cards as often if they have to enter a PIN. Yet, a dual EMV/magnetic stripe system invites fraudsters to simply avoid using the chip technology. That said, many retailers are using a system that requires the use of the chip on a credit card where available. <br> <br>Alternatively, some retailers are moving to a system where consumers can just tap their cards without entering a PIN, or even just have their cards in their pockets. This type of system is not secure, though — anyone with the right equipment can sit in his or her car and intercept transaction information.<br><br></li><li> <strong>Retailers and auditors should review transaction processes to ensure there are adequate controls in place. </strong>This review needs to include the policies and processes around transaction processes as well as whether employees are trained and required to comply with them.<br> <br>First, inspect the credit card before processing. Indications of tampering or damages may include embossing on the card that isn't clear or straight, a hologram that is rough and not three-dimensional, and signs of tampering on the front and back of the card.<br> <br>Second, ask for customer identification before accepting a credit card and verify that the information between the shopper's ID and his or her payment card match. Specifically, keep an eye out for the shopper's name and signature.<br> <br>Third, compare the account number on the card with the number in the terminal and receipt. Regardless of whether a card is swiped, tapped, or inserted into the machine, verify that the digits on the card match the ones in the retailer's terminal. Examine the printed receipt to see if the last four numbers on the card match the ones on the receipt. When there is doubt, make an authorization request. Doing so will connect the retailer to the card issuer, who will then ask a series of yes or no questions to avoid alerting the customer that his or her card is being flagged.<br> <br>Fourth, be aware of the business' purchasing averages and patterns. If a transaction falls completely outside of those averages, or a daily maximum is reached (as in this story), pay close attention to that transaction and take extra steps to verify the card's authenticity. </li></ul>Art Stewart0
The Refund Cheat Refund Cheat<p>​<span style="font-size:12px;">The Ontario Court of Appeal has ruled that a university student who fraudulently obtained more than CA$41 million in tax refunds should have been sentenced to 36 months' jail time, rather than the original 13 month-sentence he received, the <em>Toronto Sun</em> reports. Nonetheless, the court decided to spare the individual any further jail time, stating that it could not justify additional punishment.</span></p><p>The offender, now 30, pleaded guilty in 2018 to filing fraudulent tax forms, falsely representing himself as an official from various corporate entities in a scam that began in 2013. The multimillion-dollar refunds were deposited into his personal accounts, though bank diligence prevented him from accessing the bulk of the funds. The Ontario man managed to withdraw just CA$15,000, which he later paid back to the Canadian Revenue Agency (CRA).<br></p><h2>Lessons Learned<br></h2><p>Although there's room for debate on the severity of this fraudster's sentence, audit analysis should focus on how the fraud was committed and what might be done to prevent it from occurring in the future. The method used represents a unique form of phishing/mail fraud, and the ease with which the Ontario man perpetrated it against the CRA is somewhat alarming.<br></p><p>The offender simply downloaded publicly available forms from the CRA website to redirect direct deposits made to several large corporations — including Coca Cola Ltd. and Shell Canada Ltd. — to his own accounts. He placed his personal banking information on the form and mailed it to the CRA. Refunds amounting to more than CA$41 million relating to the Goods and Services/ Harmonized Sales Tax were then paid into his accounts. He apparently needed to make numerous phone calls, falsify information, and impersonate others to succeed, but it worked — until the banking institutions caught on to the scheme. <br></p><p>This case illustrates a variation of a newer form of phishing fraud, where fraudsters use emails/communications (increasingly well written, cordial, and free of misspellings <span style="font-size:12px;">and grammatical errors) purporting to come from CEOs, chief financial officers, or payroll directors. The fraudsters seek to convince officials to change the bank account and routing information used for direct deposit of checks. This kind of fraud is growing because it can more easily bypass many existing technical controls. Plus, if the perpetrator steals smaller sums, the victim organization may just fold it into the cost of doing business.</span></p><p>The CRA — and perhaps other tax agencies around the world — needs to review and strengthen controls over its direct deposit system, if it has not already done so. That could be accomplished simply by limiting the access to corporate direct deposit processes, such as requiring them to be managed via CRA's My Business Account process. My Business Account is more secure than public websites and forms, while still facilitating electronic transactions. Whether the agency prefers a secure electronic account process or continues to use a more public method, additional verification methods need to be applied — particularly where a new or changed set of banking information is involved. Some of the verification methods to prevent direct-deposit phishing scams include:</p><ul><li><span style="font-size:12px;">Implement a two-step or multifactor verification process.</span><br></li><li><span style="font-size:12px;">Require administrators, including IT, to monitor unusual activity, such as changes made to contact and banking information on a large number of accounts over a short period.</span><br></li><li><span style="font-size:12px;">Create a policy that, after a change to banking information, requires a temporary reversion to paper check and/or direct contact with the requestor or bank involved.</span><br></li><li><p>Ensure that login credentials required for changes in account/banking information are different from credentials used for other purposes.<br></p></li></ul><p></p><p>Finally, employee education should cover areas such as:</p><p></p><ul><li><span style="font-size:12px;">Common social engineering and phishing techniques.</span><br></li><li><span style="font-size:12px;">Basic cybersecurity hygiene.</span><br></li><li><span style="font-size:12px;">Strategies for identifying phishing attacks, including new variations.</span><br></li><li><span style="font-size:12px;">Ways to safeguard personal and corporate information.</span><br></li><li><span style="font-size:12px;">Unsafe online behavior.</span><br></li></ul>Art Stewart0
Guilt by Association by Association<p>​Olivia Munro, a hospital chief financial officer (CFO) and former pharmacist, was approached about the treasurer position with her state's pharmacy organization, which was experiencing sustainability issues. The organization's finances and membership numbers were in decline, and the board was struggling to lead through these challenging times. Out of a sense of professional obligation, she agreed to serve in the role. Never having served on a professional board, Munro did not know what to expect. </p><p>The small association of approximately 750 members charged an annual fee of $350, which included educational programming to satisfy mandatory continuing education requirements for professional licensure. Most of the revenues, however, came from an annual educational meeting that charged a registration fee to attend. The meeting was poorly attended, so most revenue came from pharmaceutical manufacturer grants for advertising. </p><p>After joining the board, Munro quickly realized that the organization had exhausted the available and willing volunteers within the state. Subsequently, it recruited fewer qualified people into leadership roles and recycled previous leaders. With the focus of the organizational leadership on the professional mandate, the financial affairs had been placed in the hands of underqualified individuals with limited fiscal acumen. As a result, this once-healthy organization became insolvent and contracted with an external professional management company specializing in turning around professional organizations. </p><p>Historically, the organization had several decades of financial success, accumulating $500,000 in reserves for operating purposes and an additional $250,000 in restricted funds to support scholarships for students in underserved communities. Although the organization previously had a treasurer, his limited financial expertise was evident in the lack of financial controls in place. </p><p>Munro wanted to determine the status of the organizational books that she was inheriting, so she conducted a review of them to make sure transactions had supporting paperwork, there were not any unusual transactions, and that the bank balances reconciled. She had several questions regarding the language in the contract with the management company and learned that it was signed without legal review. In particular, the contract contained a confusing evergreen clause perpetuating the relationship on a mandatory three-year cycle, rather than typical one-year extensions. Further, the contract did not contain a termination clause. The fee structure was equally complicated, with various a la carte upcharges that were poorly defined. This made it difficult to clarify which services were included in the initial contract and what was added on. </p><table class="ms-rteTable-default" width="100%" cellspacing="0"><tbody><tr><td class="ms-rteTable-default" style="width:100%;"><p>​<strong>Lessons Learned</strong></p><ul><li>Outsourcing relationships and contracts should be reviewed by internal audit for control weaknesses before implementation and before any significant changes. There is an opportunity for internal audit associations to share guidelines with nonaccounting associations to improve financial practices and protections. </li><li>Internal audit should ensure management has processes in place to monitor contract requirements on a regular basis. The absence of these reviews leads to undetected issues and the inability to optimize the value of the relationship.  </li><li>Organizations that don't segregate financial duties open themselves up to misappropriation of funds and fraud.</li><li>Failure to maintain signatory authority can prevent organizations from legally accessing their own banking information for audit.</li><li>Regardless of the professional nature of an organization, knowledgeable financial people should be assigned to monitor its finances. </li><li>If the outsourced relationship fails to produce financial statements and banking documents regularly, it should prompt an immediate review and rigorous follow-up.</li></ul></td></tr></tbody></table> <p>The relationship had been positive and the organization eventually transitioned additional authority to the management company, which was not reflected in a contractual amendment and instead was governed by email communications. This included managing the organization's website and membership database and organizing the annual meeting. As part of this transition, the organization's official mailing address was also changed to that of the management company, and the company was given signatory authority on the organization's bank accounts. It appeared that the management company had complete control of the organizational finances and operations. </p><p>Over time, the management company's level of service began to decline. The assigned management representative failed to attend board conference calls and provide contractual information such as monthly financial reports. In addition, bank statements were no longer being provided for review and reconciliation by the treasurer, and requests for status updates were responded to with increasingly vague answers. </p><p>Munro feared that the organization's funds had been fraudulently misappropriated and requested access to the organizational paperwork. Requests were repeatedly ignored or incompletely fulfilled. The management company was located in an adjacent state, so a local accountant was hired and law enforcement was notified to gain access to the records. Records were limited and those that were available had sloppy documentation, making it impossible to track payments and expenses accurately. Bank statements showed that $300,000 of the organization's funds were spent and current hotel expenses of $120,000 from the annual meeting had not been paid.</p><p>The organization obtained legal counsel and additional discovery followed. During the previous year, the management company had systematically billed the organization $100,000 for a la carte fees associated with ill-defined activities not specifically outlined in the contract. Because the management company was given authority to pay itself directly from the organization's bank account, and had used the a la carte provisions to generate repeat charges not reviewed by organizational leadership, legal counsel did not think it would be possible to recover these damages. The fact that the organization had not received the monthly bank statements to question these practices was considered gross negligence on behalf of the organization. </p><p>The remaining $250,000 from the restricted funds was also missing. When challenged, the management company refused to supply it, citing that the original contract had auto-renewed for an additional three-year period under the evergreen clause. The organization had failed to exercise the contractual 90-day notice period and, as a result, the remaining funds were due to the management company to satisfy the three-year extension on the contract. The organization's board concluded, with input from legal counsel, that the legal fees would be more than the organization could potentially gain. The management company filed for bankruptcy and subsequently reopened under a new name. </p><p>The management company had control of the organization's website, domain name, and membership lists, and ultimately, it agreed to return control to these proprietary operational elements and both sides walked away. The organization began to rebuild, and Munro set up appropriately designed financial controls. Shockingly, the membership reelected the same board, and Munro made the decision to step down from her role as treasurer.  <br></p>Scott Mark1
Fraud in Transit in Transit<p>​The new inspector general (IG) of New York's Metropolitan Transportation Authority (MTA) has issued 30 backlogged reports on misconduct within the agency, according to the <a href="" target="_blank"> <em>New York Daily News</em></a>. The reports detail incidents in which MTA employees were disciplined for overtime abuse, conflicts of interest, and corruption since 2017. </p><p>The most glaring incidents included a railroad foreman who received $280,000 in pay when he wasn't working, an MTA police officer who was using his company car for a second job, and a subway maintenance employee who used sick leave to take a European honeymoon. The reports came out six weeks after IG Carolyn Pokorny took office.</p><h2>Lessons Learned</h2><p>It seems that the MTA, with the help of its IG, is achieving some success in uncovering time, attendance, and other forms of employee fraud. However, after reviewing the IG's annual report and recommendations covering the various cases in this news story, further measures may be needed to more systematically address widespread employee fraud. Here are three suggestions that might be applicable:</p><ul><li> <strong>Increase the scope and frequency of audits and monitoring of time and attendance processes. </strong>Continuous monitoring, along with regular audits, can reveal risks from employee time theft, and the processes needed can be implemented using technology. A simple way to do this is having managers and supervisors run monitoring reports or even audits on random employees' time reporting, whether they are paper- or electronic-based. <br> <br>There also should be separate scrutiny of managers' and supervisors' behaviors to determine whether they are monitoring and approving employee time and attendance reporting appropriately. This scrutiny also can help uncover collusion between employees and managers.<br>  <br> Further, the payroll department should run weekly reports to determine whether certain departments are consistently over budget for payroll, which may be caused by time and attendance fraud. Alternatively, this spending may be legitimate, but could point to the need for improvement, such as in how work is scheduled. Either way, monitoring and auditing can identify patterns and misinformation, and it may indicate that the time-tracking method currently in place is not the best option.<br><strong> </strong></li><li> <strong>Integrate time and attendance with payroll functions. </strong>This can help reduce errors and fraud in employees' time reporting. When attendance and payroll functions are separate, human resources (HR) staff must re-enter information and move the data between the two programs, creating an opportunity for mistakes and fraud. Employees may collude or engage in nepotism. An HR employee may purposefully record fraudulent time information for himself or herself, HR colleagues, or other co-workers. <br> <br>By integrating the two systems, information from the time and attendance program moves to the payroll program automatically, reducing the risk of fraud. Of course, this approach's effectiveness will be enhanced by good communication of what is expected of employees and establishing methods to facilitate their compliance. Such methods include encouraging employees to enter data timely and automating that process.<br> </li> <li> <strong>Cross-check time and attendance. </strong>Verifying that employees were truly present when they say they were is key to helping reduce time-and-attendance fraud. Although there are many methods for such cross-checks, a biometric time clock may be best suited in organizations with a large and diverse workforce. Mobile timesheets and web timesheets include time stamps and make it easier for employees to enter their information. By connecting timesheet data to other apps and tools, such as user engagement metrics or biometric data on employees' physical attendance, auditors can verify whether employees were present and working when they say they were. <br> <br>This story also references the fact that the MTA recently introduced global positioning system (GPS) units to track the location of employees and their company vehicles. The MTA should expand the use of GPS units, which employees can easily carry while working in many varied situations. </li></ul>Art Stewart0
The Benefits Swindlers Benefits Swindlers<p>​A Toronto hospital has fired about 150 employees accused of falsely claiming benefits in one of Canada's largest benefits fraud schemes, <a href="" target="_blank"> <em>The National Post</em> reports</a>. Baycrest Health Services acknowledged that $5 million in fraudulent claims occurred over an eight-year period at its Baycrest Hospital. </p><p>Consultants first discovered the fraud several months ago while they were vetting a potential partnership between Baycrest and other hospitals. A third-party internal investigation revealed that hospital employees submitted invoices for services they never received and paid a kickback to providers. Another scheme involved accepting products unrelated to the medical device that had been prescribed and paying the provider the difference in price between the two products. </p><p>Baycrest has opted not to press charges against the individuals who were allegedly involved. </p><h2>Lessons Learned</h2><p>Workplace benefits fraud is on the rise in Canada, costing insurance companies hundreds of millions of dollars each year, according to the <a href="" target="_blank">Canadian Life and Health Insurance Association</a> (CLHIA). For example, in 2018, employees at the Toronto Transit Commission were found to be engaging in similar benefits fraud activities worth as much as $5 million.</p><p>Baycrest's benefits administrator has said his company has "rigorous standards and protocols in place to defend against and detect such activities." He said the company is committed to becoming more vigilant about benefits fraud and has implemented measures "to further guard against similar misuse." Here are some additional measures that employers and regulators need to consider to combat this increasing problem:</p><ul><li> <strong>Increase regulatory audits.</strong> From a regulatory and compliance standpoint, the Canada Revenue Agency (CRA) could step up audits within the benefits service provider industry. The CRA requires that a service must actually be provided where there is an invoice.<br> <br>In Canada, insurance and service providers are both federally and provincially regulated in specific ways. Regulators should review whether these regulations are adequate to prevent benefits fraud. In particular, new provincial regulations may be needed to monitor service providers and levy fines on noncompliant providers. <br> <br>As part of this effort, the benefits insurance industry should take more comprehensive actions such as delisting unscrupulous providers. This has been effective for the biggest providers. For example, in 2018, Sun Life delisted 1,500 providers from across Canada — no longer accepting their claims — after proving their involvement in false claims. Benefits insurers also should carefully weigh the use of up-selling of services and related performance rewards, which can further contribute to benefits fraud.<br><br></li><li> <strong>Apply technology to fraud management.</strong> Insurance carriers should invest in fraud management and business-process solutions that can also support efficient operations. Sun Life, for example, uses data analytics and machine learning to identify suspicious behavior, intelligence analysis to identify players in complex schemes, and investigative skills to monitor a facility's member-claim activity. <br> <br>From the business-process perspective, a direct billing system can deter both providers and employers from attempting benefits fraud. Such systems require service providers to submit electronic documentation at the time the service is provided. <br> <br>Increased scrutiny of frequent and higher-value claims through monitoring and audits is another technique. Additionally, both insurance carriers and employers should have strong whistleblower programs in place to encourage people to come forward with cases of suspected benefits fraud.<br><br></li><li> <strong>Educate the public.</strong> Employers and regulators should educate both employees and the public that benefits fraud is not a victimless crime. From the fraudster's perspective, the Fraud Triangle applies: Fraud typically occurs when three elements are present — opportunity, rationalization, and pressure. People take advantage of opportunity with the perception that there is little chance of detection, penalty, or consequence. They rationalize their actions by feeling entitled to the benefits, even though their employer pays directly for claims.<br> <br>Moreover, many Canadians feel workplace benefits fraud is not a significant problem. According to an Environics Research survey conducted for the CLHIA, 75% of respondents believe the consequences of benefits fraud are simply paying higher premiums or paying back wrong claim payments when uncovered. The insurance industry and regulators need to counteract these false perceptions.</li></ul>Art Stewart0
Elder Fraud Fraud<p>​The U.S. Justice Department has charged four executives of a Vancouver, B.C. payment processing firm with assisting fraud schemes that preyed on the elderly and other "vulnerable victims," <a href="" target="_blank"> <em>The National Post</em> reports</a>. Prosecutors allege that executives of PacNet Services Ltd. were aware that some of its mass-mail clients were sending misleading notifications to consumers and were profiting from the scheme. The notifications promised cash, prizes, or psychic services to recipients, but required them to pay a fee to obtain those awards.</p><p>Prosecutors say PacNet functioned as a middleman between its clients and banks, including aggregating payments collected by its clients, depositing funds into the company's accounts, and distributing funds. The accused individuals include two owners of PacNet, along with managers from the company's marketing and compliance departments. Each allegedly made $15 million from the scheme between 2013 and 2015. They now face conspiracy, money laundering, and mail and wire fraud charges.</p><h2>Lessons Learned</h2><p>In 2016, this column <a href="/2016/Pages/Following-the-Money.aspx">first covered the alleged fraud case</a> involving PacNet when the U.S. Treasury Department designated the company as a significant criminal activity organization. Now those individuals accused of facilitating the scam will face justice. </p><p>It is common to hear about the dangers of losing money to scam artists and money launderers, but this case involving fraudulent transactions within a large payment-processing company is no longer surprising. Recently, MoneyGram agents were found guilty of using tactics such as contacting unsuspecting people and posing as relatives who had an immediate need for money. These were schemes that the agents were supposed to protect their customers from.</p><p>The PacNet story demonstrates that individuals, companies, and institutions are at risk of mail fraud and must take steps to protect themselves as best they can. Even worse, not only are third-party scammers at work, payment-processing company owners and executives can be in on the take, as well. Two actions are particularly needed:</p><ul><li> <strong>More investigations.</strong> Regulators and enforcement agencies worldwide need to step up their investigations and enforcement actions against payment processors that are implicated in facilitating mail fraud schemes. These actions should include more severe penalties for individuals and companies that are found guilty of fraud. The payment-processing industry has relationships with banks around the world. Strengthened international cooperation and greater regulation of this industry — including registration, licensing, and background checks — would be appropriate.<br><br></li><li> <strong>Self-regulation and control.</strong> The payment-processing industry needs greater self-regulation, with a focus on fraud perpetrated by sellers and providers, including the processors' employees. Processors should educate consumers and businesses about the risks of mail fraud committed by sellers. They also need to strengthen their knowledge and controls over potential seller fraud. They can start by ensuring that account-opening procedures are adequate to verify the identity of account holders.<br> <br>Analytics, such as velocity checks and pattern-recognition checks, can enable companies to detect potential fraud in high-risk countries as well as high-risk products and services such as lottery sales and solicitations of money for causes. Processors should follow the example of banks and other financial institutions by focusing on the probability of a transaction being fraudulent — for example, by scoring transactions — and referring suspicious transactions to the company's anti-fraud unit.</li></ul><p><br></p><p>Of course, in a case where owners, partners, and managers collude to commit this kind of mail fraud, strong internal controls may not do much good. However, legitimate payment-processing companies also can benefit from:</p> <ul><li>Establishing an executive-level position to combat fraud, and creating an independent compliance and ethics committee on their boards. </li><li>Assessing the adequacy of the risks and risk mitigations around fraud and anti-money laundering activities that impact the organization.</li><li>Establishing and regularly monitoring the organization's anti-money laundering and fraud policies, procedures, and processes, as well as checking whether employees are complying with them. </li></ul><p><br></p><p>This last employee fraud concern is key to deterring and detecting the kind of behavior reported in this case. Along with fraud detection, employee and third-party human resources policies, processes, and compliance are needed. These should include reviewing and strengthening processes around recruitment, security and background checks, training, the code of conduct, and discipline. </p>Art Stewart0
The Opportunistic CFO Opportunistic CFO<p>In 2009, LeBarge Inc., an oil rig company, was growing beyond the size of a typical small business. The owner and CEO, Lou Smith, decided to hire an accounting firm, which recommended that he add an internal auditor to the team to ensure his control environment kept up with the expanding needs of the business. Concerned about the cost of hiring a full-time person with salary and benefits, Smith decided to forgo the recommendation. </p><p>Each year for the next five years, the accounting firm again recommended that Smith hire an internal auditor. LeBarge continued to grow, but profits were shrinking. Smith could not understand why. Costs should be going up, but they were growing faster than revenues. The company’s chief financial officer (CFO) and Smith’s longtime friend, Jennifer Hagan, offered reports showing increased vendor costs and evidence of inflation. None of this made sense to Smith, as his intuition suggested profits should be up $200,000 annually. In 2014, Smith reluctantly agreed to hire veteran internal auditor Corey Ortiz.</p><p>Ortiz joined the company and quickly scoped out his first review of the highest risk area, the financial ledger, which was in QuickBooks. Ortiz prepared a standard audit program that focused on journal entry and reconciliation controls, system access rights, and segregation of duties. The program included walkthroughs of journal entries to evidence support and authority for the recording processes. Bank reconciliation testing was included to understand the process and follow transactions from the ledger to the reconciliation. The program included pulling and reviewing samples of journal entries and reconciliations to check for completeness, timeliness, support, and authorization. And finally, the plan included getting administrative access to QuickBooks through IT and viewing roles and rights within the system. </p><table cellspacing="0" width="100%" class="ms-rteTable-default"><tbody><tr><td class="ms-rteTable-default" style="width:100%;"><p> <strong>​Lessons Learned</strong><br> </p><p></p><ul><li><p>Companies that expand, whether large or small, are exposed to new risks. Controls designed for the business often stretch and break. In small companies, daily supervision and involvement by the owners often provides significant control value. Decreased supervision in a growing business causes normal control weaknesses, such as segregation of duties, to become glaring opportunities for waste or abuse. </p></li><li><p>Owners of small companies are not risk professionals. Growing companies are rarely prepared to identify and mitigate the expensive risks associated with their new success. Internal auditors are trained risk professionals and provide organizations with resources focused on identifying, preventing, and managing these risks. <br></p></li><li><p>Start with the ledger and work outward. Access controls and segregation of duties within the financial systems are the cause of many frauds. Trusting one person to manage the financial resources of any company is a dangerous strategy and should always be top of mind for any internal auditor and the first place to look. </p></li><li><p>Know the financial system’s logging and reporting features, as small systems sometimes don’t have robust controls. Reviewing reports on various changes, such as mailing addresses, employee name, and vendor name, can lead to early fraud detection. <br></p></li></ul></td></tr></tbody></table><p>Ortiz wanted to get off to a strong start and help the organization understand the internal audit process. He spent two weeks creating an audit program, scoping memos and other official communications. He communicated with his stakeholders in polite and professional emails, requesting samples and employee interviews.</p><p>The fieldwork began on the first day of week three. Samples were pulled and Ortiz started with the IT manager, who was prepared to show him around the QuickBooks program. At 11:00 a.m., Ortiz stopped the audit and contacted the CEO for an immediate meeting. </p><p>Ortiz explained to Smith that while reviewing the system administrative rights in QuickBooks, he found that the CFO, Hagan, was the only person with access to the system. This meant that she could create entries, make payments, and edit all data within the system with no checks and balances. It was not surprising to Ortiz that a small company with recent growth had such glaring segregation of duties issues within its ledger. However, a quick review of the system audit logs for the previous month showed numerous changes to payment fields, which is unusual in the normal course of business. He then checked the names of the vendors before they were changed in QuickBooks.</p><p>After the meeting with Smith, Ortiz spent the rest of the day working with the IT manager to identify vendor name changes that occurred over the past year. The next morning, Ortiz and Smith called a meeting with Hagan. Ortiz asked her to explain each vendor name change. Hagan was clearly uncomfortable, but offered an excuse about how the system has errors that need to be fixed sometimes. </p><p>Skeptical about the explanation, Ortiz started the next day by requesting a vendor spending report for the previous year. He then contacted each vendor and asked them to provide an updated billing summary for that time period. When Ortiz compared the reports, he found a $250,000 discrepancy for the past 12 months. </p><p>By the end of the day, Ortiz, Smith, and the human resources manager confronted Hagan with this information. For 15 minutes, she acted surprised and hurt at the accusation. Smith suspended Hagan without pay while the investigation continued. Law enforcement was notified the next day. </p><p>In 2017, Hagan was tried and convicted of embezzling more than $800,000. For five years, she used the company’s financial ledger as her personal checkbook to pay bills and purchase items. She would later change the vendor name in the payment information fields to a business-related vendor. By slowly increasing her theft as the business grew, she was able to convince management that the expenses were related to challenges associated with normal business growth. </p><p>Hagan pleaded guilty to a felony charge of aggregated theft. Before her plea agreement, she paid back half of the money she stole and agreed to pay the rest when her six-month jail sentence concluded. LeBarge has recovered its status of profitability.  <br></p>Bryant Richards1

  • Fastpath_Oct 2019_Premium 1
  • IIA CPA_Audit_Oct 2019_Premium 2
  • IIA Certification_Oct 2019_Premium 3