Title: AFS FRAUD
1AFS FRAUD RISK MANAGEMENT SEMINAR
2Fraud Risk Best of EnemiesRisk Management
- Gail Chadwick
- gail.chadwick_at_rsmbentleyjennison.com
3- THE BETTER THE RISK MANAGEMENT
- THE LOWER THE INCIDENTS OF FRAUD
4Fraud Risk
- Number one fraud risk impact is reputational loss
(Societe Generale) - Do you have a fraud risk register?
- Should it be stand-alone or part of your main
risk register?
5Challenges (excuses) in managing fraud risk
- Fraud and misconduct not considered High Risk
within the organisation - No Fraud Here mentality
- Fraud not defined
- Availability and alignment of internal resources
- Adequacy of funding for anti-fraud programme and
initiatives - Reactive fraud management - focus on incident
response - No unified Fraud Risk Management strategy
- No senior management designated with ownership
and responsibility for FRM
6What should be done
- Consider fraud risk as an integral part of an
overall corporate risk management strategy - Develop an integrated strategy for fraud
prevention and control - Develop an ownership structure which cascades
downwards throughout the organisation - Introduce a fraud policy and ethics statement and
actively promote them - Establish a sound control environment
- Establish sound operational control procedures
- Introduce a fraud education, training and
awareness programme - Introduce a Fraud Response Plan as part of
organisational contingency planning - Introduce a Whistle blowing Policy
- Constantly monitor adherence to controls and
procedures - Develop appropriate information and communication
systems
7Scenarios document areas of fraud
- Administration
- IT Director
- CEO
- Contracts
- HR
- Employees
- Clients
- IT
- Suppliers
- Company Secretarial
8Whats your protection?
1st Line of Defence
2nd Line of Defence
3rd Line of Defence
Business Frontline
Independent Assurance
Oversight (Risk Compliance)
- The Board sets risk strategy, policies and
appetite for the firm - The second line is commonly Legal, Compliance,
Finance, HR, Risk Actuarial - Risk provides support to the business through the
risk management framework - Risk provides challenge to Group policies
- Primary responsibility for identifying and
managing risk - Management puts in place appropriate controls and
monitors their effectiveness - Roles, responsibilities and relationships between
functions should be clearly documented
- Group Internal Audit provides independent
assurance of the robustness of the model and
systems and controls. They report to the Audit
Committee (Board)
9Whats your protection? (cont.)
- Your 3rd line of defence - Internal Audit
- Do Internal Audit review ALL aspects of your
business from a risk and fraud prospective? - IT HR EUC contracts systems clients etc
10 of Internal Audits
- Risk assessment
- Risk audits
- Controls evidence criteria
- Education training
- Developing risk plans
- Implementing risk platforms
- Developing risk databases
- Policy strategy
- Risk awareness training
- Risk identification evaluation
- Dashboard KPI integration
- 3rd party risk management
- Indirect uncontrolled risk
- Risk software
- IT Audits
- Strategy
- Network management
- Data security (internal external)
- HR
- Human Resources services
- Performance management
- Employee motivation
- People polices
- Organisational change
- Training development
- Payroll
- Human Resources planning
- Human Resources function
- Teaming
- Corporate culture
- Pensions
- Operational Audits
- Corporate Governance reviews
- Board reviews
- Controls assessment
- Outsourcing
- HS
- Marketing
- Supply chain
- Project Programme Audit
- Training education (I.A Ned)
- Universe development
- Annual plan
- Methodology
- Forensic investigations
- SOX
- Self assessments
- Due diligence
- Compliance
- Sales management
11Excellent!
-
- We need an army of highly qualified,
- experienced auditors
- for our clients
12Visiting times
- What is your personal liability?
- More SOX type regulations
- Process owners face firms and jail sentences
- Not just Board level
- FSA fines
13IT IS real
- The Financial Services Authority (FSA) today
arrested two people, including a senior corporate
finance advisor, in connection with an ongoing
investigation into suspected insider dealing - The FSA has banned Walthamstow-based mortgage
adviser Ashfaq Ahmed for submitting mortgage
applications on his own behalf that were based on
false and misleading information about his income - The FSA has fined Blackburn insurance broker
Aspray Ltd 21k for failings in control of its
appointed representatives (ARs) and for
misleading its clients and the FSA - Asprays did not maintain appropriate systems and
controls for the recruitment, training and
monitoring of its ARs
14Fear factor
- Company had Internal Audit team that
- Did not fully understand risks or fraud
- Did not undertake audits across the company
- Apprehensive about interfaces with Executives and
Non-Execs - No Governance reviews or Board reviews
15What we did
- We found a significant number of issues on the
first Governance review - Results for the company
- No more FSA letters
- No Board worries about fraud
- Improved compliance
- Reduced costs
16 17 18(No Transcript)
19When the going gets tough, the tough go
claimingBusiness Integrity and Investigation
Services
- Dave Foley
- david.foley_at_rsmbentleyjennison.com
20The Fraud Act 2006
- Effective since 15th January 2007
- Created for the first time a specific offence of
fraud, split into three categories - Fraud by false representation (s.2)
- Fraud by failure to disclose information (s.3)
- Fraud by abuse of position (s.4)
21Fraud in Insurance
- Insurance fraud consists of
- Knowingly providing false information when
purchasing an insurance product in order to
obtain insurance cover that either would have
been provide had the true facts been disclosed
or alternatively to obtain cover on materially
favourable terms - Knowingly presenting a fraudulent insurance claim
by - Fabricating a fictitious incident to enable a
false claim to be made - Deliberately causing an incident to enable a
false claim to be made - Including false items as part of a claim arising
from a genuine incident
22Some facts and figures
- According to the Insurance Fraud Bureau,
insurance fraud costs 1.6bn every year - Of this figure, the impact of organised fraud is
estimated to be up to 200 million every year - Fraud can add up to 5 to every policy holders
premiums - 1 in 5 state they would falsify or exaggerate an
insurance claim - The insurance industry prevented over 700m of
fraud in 2008
23Fraud risks and exposures
- Claims (insurance/death/pension) open to
exaggeration and/or false documentation/ID fraud
etc - Organised crime
- Internal staff fraud
- 3rd party outsource frauds
- Mis-selling
- Suppliers and contractor procurement frauds etc
24What drives people to fraud?
Opportunity
Pressure
Rationalisation
25- Opportunist
- Will try every product and angle Property,
Motor, Personal Injury, Travel etc - Will earn from, and share with, others family,
friends, colleagues
- Organised
- Always trying to keep ahead
- Sophisticated, no boundaries or limits
- Run as a business
- Excellent risk managers
26The emerging fraudsters
- 150,000 bankruptcies forecast for 2009 and the
Government announces serious public expenditure
restrictions for years to come - Bank of England base rate at the lowest in its
314 year history and GDP predicted to fall by
4.1 during 2009 - Unemployment predicted to rise to over 3,000,000
by the end of the year - The prize is shifting to the public sector away
from the financial, retail and services
industires - Pressures increase to maintain current (or
former) position - Better educated and acquainted with technology
and systems
27High Risk Claims
- Personal property
- Loss of high-value personal possessions rings,
necklaces, watches, cash etc - Burglaries staged or exaggerated
- Accidental damage to televisions and electrical
equipment - Loss of values close to or exceeding policy limits
28High Risk Claims
- Commercial property
- Fire/arson
- Malicious damage
- Escape of water
- Theft / burglary / robbery
29Liability
- Employers
- Redundancy grudge against employer loyalty gone
- Notification of injury during notice period
- Copycat incidents
- Exaggeration
- Public
- Aggressive tactics for compensation
- Claims Management Companies behaviour/referral
fees - Copycat incidents
- Personal circumstances
- family/friend/postcode connections
30Trippers and Slippers
- Multiple accidents involving the same defect
- Duty of care is high maintenance and
inspections requirements - Difficulty in proving that an accident didnt
happen lack of witnesses, no duty to report the
incident early - Organised crime
31Case study
- Cash for Crash Pair Sentenced
- Two men, who were part of a gang that put
hundreds of bogus car accident claims worth
almost 3m, have been sentenced - The court heard details of how more than 300
invented motor accidents, that were said to
have happened in the London area between 2005-07,
that amounted to a combined claims value of
approximately 3m
32Key messages
- Fraud is on the increase due, at least, to the
recession - Fraudsters are more organised than ever before
- 1 in 5 surveyed would consider inflating an
insurance claim - On average, organisations lose between 3-8 to
fraud - Its not all bad newsfraud can be countered but
needs appropriate and proportionate investment
33 34(No Transcript)
35Forensic Accounting for Friendly Societies -
Fraud in Insurance Claims
- Gordon Hodgen
- gordon.hodgen_at_rsmbentleyjennison.com
36Forensic Accounting in relation to claims
- Analysing Accounting Data
- Financial motives
- Fraud vs over-optimistic Claimants
37Analysing Accounting Data
- Seasonality in figures
- Trends
- The appeal of percentages
- The detail provided by monthly performance
38Annual sales
39Sales by month
40Financial motives / causes other than
- Identify issues such as over-trading
- Cashflow analyses analysis of bank records in
addition to accounting records - Inventory analysis working capital tied up in
stock can cause many businesses significant
problems - Even if the financial situation did not provide
the reason for a fraud, a financial analysis can
assist in identifying the prospects of a business
41Fraud vs over-optimism
- Insureds can often produce claims that appear
overly optimistic. This can be because - They simply are optimistic for the prospects of
the business - They have a misguided idea that a larger claim
should give them a stronger negotiating position
when it comes to settlement - They are unaware of the need to adjust for
savings and other similar mitigation issues - Capacity issues Insureds need to show that the
results they forecast are achievable this
interacts with the possibility of underinsurance
42Fraud vs over-optimism (Cont.)
- Fraud very hard to prove overstatement must
be extreme to qualify - Claims for items that did not exist or that were
damaged are the most obvious form. Accounting
work plays a large part in identifying these
elements
43Income Protection policies
- Warning signs
- Policies with claims very close to inception
- Policies where the stated income and cover rise
dramatically prior to a claim - Possible actions
- As well as the possibility of investigation of
medical or employers records, it pays to have an
awareness of the availability of Replacement
Payslips that can show whatever details the
purchaser requires - If suspicion is aroused, bank statements showing
receipt of net income may be required or, if
allowed, contact the employer directly for
confirmation of earnings
44(No Transcript)
45 46(No Transcript)
47Fraud, Corruption Your IT SystemsInformation
Systems Assurance
- Stephen Temple
- stephen.temple_at_rsmbentleyjennsion.com
48Introduction
- Partner leading Information Systems Assurance
services in UK - Qualified Chartered Accountant and Information
Systems Security - Previously with Deloitte and Mazars
- Wide ranging experience in
- Friendly Societies (Ancient Order of Foresters,
Dentists Provident, Family Investments, National
Deposit) - Retail Banking (National Savings Investments,
Citibank) - Insurance (Cardiff Pinnacle, Groupama, Equity,
Hastings Direct)
49Agenda
- The threat landscape
- Trends in 2008
- Forecast for 2009
- The consequences
- Suggested responses
50The threat landscape
- Very few organisations can now ignore the risks
of the interconnected world - Any size
- Any sector
- Incidents have increased in recent years and will
continue to do so - Significant increase in awareness amongst
regulators and the general public
51The threat landscape
- Some interesting statistics
- For businesses in 2008
- 25 suffered business disruption by a virus
- 14 have experienced the loss of company data
- 10 have experiences the loss of a mobile device
52The threat landscape
- Its not just a technical risk - 37 of employees
admit they would sell their companys secrets - Of these 37...
- 67 would want gt 1m
- 10 would want their mortgage paid off
- 5 would like a holiday
- 5 would do it for a new job
- 4 want to clear their credit card debts
- 2 would do it for a meal!
- 88 believe they have access to valuable
information - 67 believe it was easy to steal data
- Polll at InfoSecurity Europe in April 2009
53The threat landscape
- Types of threat
- Website infection
- E-mail attachment
- Malware
- Spam
- Mobile devices
- Data leakage
54The threat landscape
- Website infection incidents in 2008
- January Fortune 500 companies
- February ITV (poisoned web advert)
- March Site selling Euro 2008 tickets hacked
- April Cambridge University Press website
compromised - June Association of Tennis Professionals website
infected - July Sonys US Playstaton (infected by
scare-ware) - September Business Week magazine (malware
attack) - October Adobe website
- Sophos Security Threat Report 2009
55The threat landscape
- E-mail threat in 2008
- Attachement based threats on the increase
- Number of threats has declined since 2005 (1 in
714 emails) - However, large increase since August 2008
- - InvoZip Trojan a FedEx and UPS parcel
delivery fake email - - Agent-HNY Trojan Apple iPhone game (Penguin
Panic) - - EncPk-CZ Trojan fake Microsoft security patch
- - Pushdo Trojan fake pictures of Angelina Jolie
and Nicole Kidman!
56The threat landscape
- Malware threats in 2008
- Becoming known as scare-ware or rogue-ware
- Pretend bona fide security software
- Five new sites every day
- Norton AntiVirus and AVG have both been targeted
- Not just limited to Microsoft based systems
- Transferred through
- Social networking sites
- USB sticks
- Other software (Adobe Flash and PDFs)
- Sophos Security Threat Report 2009
57The threat landscape
- Spam
- 97 of all business e-mail is spam
- Most from unwitting home users
- Significant amount from companies with weak
anti-virus or system patching controls - Social networking sites also popular (Facebook
and Twitter)
58The threat landscape
- Mobile devices
- Increased reliance on flexible and mobile working
- Obvious risk of devices being lost
- But organisations are still not securing them
- Fundamental question of whether sensitive data
should be allowed to leave an organisation's
network
59The threat landscape
- Data leakage
- Incidents filled the headlines in 2008
- TK Maxx
- Home Office PA Consulting
- HMRC NAO
- Mobile and collaborative workforce
- Users insufficiently aware of risks 30 store
key data on removable media - Used hardware is a risk
- Sophos Security Threat Report 2009
60The impact
- Numerous examples recently in Information
Security failures - Data leakage (e.g staff emailing out customer
lists) - Data loss (e.g laptops left on trains)
- Data theft (outright or colluded)
61Consequences
- Damage to reputation and brand
- Loss of stakeholder confidence
- Loss of revenue
- Loss of customers
- Regulatory action
- Litigation / legal action
- Damage to employee relationships
62Consequences
- Disruption is the biggest single impact
- From BERR (nee DTI) survey in 2008, the worst
incidents cost - Small businesses 8k - 15k
- Large businesses 80k - 130k
- This is just business disruption cost and
excludes other direct and indirect costs (e.g
staff time) - Potential costs are larger for financial services
firms because of the threat of an FSA fine
63Response
- Companies need to look more holistically at
Information Security Management - There is no silver bullet but making information
security part of the business is a key step. This
is done by - Bring information security considerations into
strategic discussions - Make those responsible for Information Security
take a more business focused view - Focusing on changing culture and establishing
reliable Information Security Management processes
64Response
- Other actions that are recommended
- Educate staff
- Record your security incidents
- Have your security assesed
- Enhance security access controls security
tokens - Enhance data management controls encryption
data classification and control
65 66(No Transcript)
67Exploring the Myths of the NFRC June 2009
68Overview
- Reminder of NFIB NFRC
- NFIB Objectives
- High Level Design
- Proof of Concept results
- Next Steps
- Myths explored
- Question
69National Fraud Reporting Centre
- Public face of the 2005 Fraud Review
- Web and telephone based fraud reporting and
help/advice facility - Aimed at individuals and small businesses
- Run by a 3rd party (not a police service)
- Web-site part of DirectGov
- Web reporting pilot from later part of 09
- Telephone advice/support line from Autumn 2009
- National roll-out from 2010
- Data captured will feed in to NFIB
70(No Transcript)
71Benefits for Citizens, Business Industry
- Streamlined means of reporting confirmed frauds
- Reduce bureaucracy
- Clear Advice
- URN issued
- Referral where appropriate
- Alerts issued
- Information on Trends
- Reduce time, effort cost
- Fewer victims
72National Fraud Intelligence Bureau
- Confirmed frauds from public private sector
data sets - Analysis and bulk data matching
- Identify Persistent offenders Trends in
enablers and methodologies Vulnerabilities and
opportunities for prevention - Share outputs with law enforcement, government
and private sector (as appropriate) - Reassure educate the public
- SPOC
73Strategic Objectives
- Connect previously unconnected fraud data to add
value to and make sense of existing fraud
information. - Aim to identify what fraud affects the UK, where
it is being carried out, by whom, against whom,
in what form and at what cost
74High Level Design
75(No Transcript)
76NFIB Proof of Concept
- Datasets from
- APACS (FISS)
- CIFAS
- OFT Consumer Direct complaints database
- Selected SOCA datasets (false identity documents)
- Data-matching exercise
- High-level findings
- Inform the next stage
77NFIB Database
- Records supplied from 15 FISS members, 270
CIFAS members, Consumer Direct and SOCA
(Amberhill, Pisces Macchie) - Fields containing data suitable for matching
names, addresses, telephone numbers, bank account
numbers, e-mail address, web sites - Working with data suppliers to verify and
improve data quality
Note Of all the Consumer Direct data, only
trader complaints have been used
78Next stage for the NFIB
- Move to a pilot rather than a second proof of
concept - trial the IT solution in an
operational context people and structures
supported by investigative and analytical
processes - In principle agreement reached to use a system
developed by/for SOCA. - Pilot due to start August 09 initially 14 week
period - Analytical team being expanded (contractors plus
CoLP resources) Always interested in receiving
secondees from non-police sector
79Next stage for the NFIB
- Increased number of data providers/broader
provision - Engage data providers in the governance structure
- High level output from Pilot will be shared with
participating bodies but not at an individual
(names) level - Evaluate fraud crimes in line with National Crime
Recording Standards and Home Office Counting
Rules - In-depth analysis development of intelligence
- Pilot integration with West Midlands Police
80Next stage -Pilot for NFIB
Confirmed
Target Partners
81NFIB Myth Busting
- How will the NFIB be populated?
- Two main reporting channels Individuals and SMEs
via the website or Call Centre - Bulk data uploads will come via trade
organisation and trade bodies e.g. CIFAS, IFB etc
82Data enters data warehouse
Cleansed and processed
De-duped
Rules applied and matching identified
Matches reviewed and developed to form intel
packages
UNIFI
Filtering
Results fed to appropriate agency
IMPACT
Police Forces
Lead Force
PNC
Other Law Enforcement and Regulators
83NFIB Myth Busting
- Will the NFIB take suspicions of fraud from
trade bodies? - No only confirmed fraud data and data that is
subject to a Fair Processing Notice will be
accepted
84NFIB Myth Busting
- If we have data that does not meet FPN
requirements, but is still a confirmed fraud how
can this be passed through to the NFIB? - We encourage you to contact the National Lead
Force for Fraud or the local police force in
these cases. The NLF will have a case acceptance
criteria.
85NFIB Myth Busting
- Will the NFIB be providing any data back to
industry/trade bodies? - Top level details of matches will be shared with
the trade organisations who feed in to the NFIB.
86NFIB Myth Busting
- Will private investigation teams be able to gain
access to the NFIB? - No access will be only granted to police and
law enforcement agencies - DPA requests will be evaluated on a case-by-case
basis - Details of top level matches will be shared with
the trade organisations who feed in to the NFIB
87NFIB Myth Busting
- How will the NFIB ensure they have the specialist
skills to understand the data received from trade
bodies? - The NFIB will be actively encouraging secondees
from the private sector, with specialist fraud
skills, for periods of up to 24 months
88NFIB Myth Busting
- Why is the NFIB only taking feeds from trade
bodies rather than individual organisations? - It is more efficient for the project team to
negotiate with a trade body (who can represent
all its members) and sign an over-arching
contract rather than contracts with each
individual member
89NFIB Myth Busting
- We struggle to get some forces to accept our
fraud cases at present what will change when
the NFIB comes along? - With no central data base at present, it has been
impossible for Chief Constables, or ACPO to know
the frauds perpetrated in their force area. - The NFIB will facilitate a National co-ordinated
approach to fraud investigations by providing NIM
based products to all forces.
90NFIB Myth Busting
- How quickly will the NFIB be able to analyse the
data will it be real-time analysis? - Regular data feeds into the NFIB will be received
but it will not be a real time system. - Where organisations have time critical work that
requires to be undertaken e.g. to preserve
assets, they should continue to take the
necessary precautions to protect assets
91NFIB Myth Busting
- Will the NFIB be both strategic operational?
- The NFIB will be strategic and tactical.
- Operational intel role but not conduct operations
itself - crimes and intel packages will be
disseminated out to law enforcement - Will work closely with the National Lead Force
for Fraud and will work with operational teams
through the provision of fraud packages and intel
to support investigations
92NFIB Myth Busting
- Will the NFIB take on all investigations on
behalf of the trade bodies who feed in to it? - No the NFIB will not replace existing processes
or procedures. - It will perform a data matching/mining role
passing intel packages to Forces for them to
investigate further. Careful co-ordination at
local level with be undertaken to prevent blue
on blue
93NFIB Myth Busting
- How will the NFIB liaise with external agencies?
- Where appropriate, a SPOC system will be in place
for liaison with external agencies. -
94No hiding place for Fraudsters
95(No Transcript)