SlideShare a Scribd company logo
Recognizing and Preventing
Fixed Asset and Inventory
Fraud using Data Analysis
March 27, 2013
Special Guest Presenter:
Katrina Kiselinchev, CIA, CPA, CFE, CFF

Copyright © 2013 FraudResourceNet™ LLC

About Peter Goldmann, MSc., CFE



President and Founder of White Collar Crime 101

Publisher of White‐Collar Crime Fighter
Developer of FraudAware® Anti‐Fraud Training 
Monthly Columnist, The Fraud Examiner, 
ACFE Newsletter

 Member of Editorial Advisory Board, ACFE
 Author of “Fraud in the Markets”
Explains how fraud fueled the financial crisis.

Copyright © 2013 FraudResourceNet™ LLC
About Jim Kaplan, MSc, CIA, CFE
 President and Founder of AuditNet®, the global resource for auditors 
 Auditor, Web Site Guru
 Internet for Auditors Pioneer
 Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.
 Author of “The Auditor’s Guide to Internet Resources” 2nd Edition 

Copyright © 2013 FraudResourceNet™ LLC

About Katrina Kiselinchev, CPA, CIA, CFE, CFF







President of Inclusivitie, We Do “SMART”
Integration Partner with IDEA
Experience across industries, audit, fraud, and value
Achieved Value of $5+ Million & ROI of 2000+%, which 
included using IDEA’s SMART Analyzer .
Adjunct Professor at Georgia State University
Specific Fraud in Fixed Asset e.g. Mischaracterized Fixed  
Asset v. Expense to Increase Bottom Line. 

Copyright © 2013 FraudResourceNet™ LLC
Webinar Housekeeping
This webinar and its material are the property of AuditNet® and FraudAware®.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We will be recording the webinar and you will be provided access to
that recording within five business days after the webinar. Downloading or
otherwise duplicating the webinar recording is expressly prohibited.
Please complete the evaluation to help us continuously improve our Webinars.
You must answer the polling questions to qualify for CPE per NASBA.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
If GTW stops working you may need to close and restart. You can always dial
in and listen and follow along with the handout.

Copyright © 2013 FraudResourceNet™ LLC

Disclaimers
The views expressed by the presenters do not necessarily represent the views,
positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’
respective organizations. These materials, and the oral presentation
accompanying them, are for educational purposes only and do not constitute
accounting or legal advice or create an accountant-client relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this
presentation, including any websites maintained by third parties and linked
to the FRN website
Any mention of commercial products is for information only; it does not
imply recommendation or endorsement by FraudResourceNet LLC
Copyright © 2013 FraudResourceNet™ LLC

5
Learning Objectives
 Phantom inventory: How to Know What’s Really in your 
Warehouses and What’s Not
 How Managers Conceal Inventory and Capital Asset Theft by 
Reporting Fraudulently Inflated Values
 Case Studies of Inventory/Fixed Asset Theft and Concealment
 Effective Data Analytics Tests Revealing Red Flags of Inventory 
Theft and Asset Value Misstatement
 What to Do After Data Analytics  Has Uncovered Signs of Asset 
Fraud/Misstatement

Copyright © 2013 FraudResourceNet™ LLC

6

Agenda
 Introduction
 The Auditor’s Role
 Fraud State of the Union
 In the News: Costliest Forms of Fixed Asset & Inventory Fraud
 Fixed Asset & Inventory Fraudsters
 IMA Building an Asset Company Case 
 Planning for Fixed Asset and/or Inventory Fraud
 Data Gathering & Software Introduction
 Discovery with DA: Is There Fraud at IMA Building an Asset
 Red Flag Detection & Collusion 
 Finding Fixed Asset and Inventory Fraud & Next Steps

Copyright © 2013 FraudResourceNet™ LLC

7
The Auditor’s Role

IPPF Standard 1210.A3
 Internal auditors must have sufficient 
knowledge of…available technology 
based audit techniques   to perform their 
assigned work

Copyright © 2013 FraudResourceNet™ LLC

IIA Guidance – GTAG 13
Internal auditors require appropriate skills 
and should use available technological 
tools to help them maintain a successful 
fraud management program that covers 
prevention, detection, and investigation. 
As such, all audit professionals — not just 
IT audit specialists — are expected to be 
increasingly proficient in areas such as 
data analysis and the use of technology to 
help them meet the demands of the job.

Copyright © 2013 FraudResourceNet™ LLC
Professional Guidance

Copyright © 2013 FraudResourceNet™ LLC

Fraud State of the Union

Source: 2012 ACFE Report to the 
Nations

Copyright © 2013 FraudResourceNet™ LLC
Fraud State of the Union

Source: 2012 ACFE Report to the 
Nations

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 1
Types of Inventory Scheme 
(Choose all that apply):  
A.
B.
C.
D.
E.

Stealing
Diverting in Transit
Skimming
Check Counterfeiting
Adding “Phantom Inventory”

Copyright © 2013 FraudResourceNet™ LLC
Costliest Forms of Fixed Asset
and / or Inventory Fraud





According to ACFE's "Report to the Nation on Occupational Fraud and Abuse":
> 7% of Fraud Cases in Financial Statement Fraud with < 99 Employees 
> 15% of Fraud Cases in Non‐Cash Schemes
Private Companies at 39%+ Of 2012 Fraud, $200K+ Per Incident
Banking & Financial Services, Government, and Manufacturing—Highest Fraud %

Copyright © 2013 FraudResourceNet™ LLC

Fraud Schemes
Fixed Asset 
 Booking Fictitious Assets
 Misrepresenting Asset Valuation
 Falsifying Assets to Meet Loan Covenants
 Improper Capitalization
 Stealing Assets

Inventory 
 Stealing Inventory 
 Diverting Inventory in Transit
 Falsifying Inventory Numbers to Boost Profits
 Manipulating inventory to conceal embezzlement (Phar‐Mor)
 Falsifying Inventory to meet Loan Covenants
 Creating “Phantom” Inventory
‐‐ Inventory on books > on hand due to theft or fraudulent reporting
Copyright © 2013 FraudResourceNet™ LLC
AICPA Fraud Task Force & Six Men &
$4B in Fraud

It All Started With a Loan Failure
Description: The perpetrator and his companies were the guarantors of 
several large loans related to entertainment contracts. The loans were 
participation loans with several foreign banks. Fraud began with failure to 
record or disclose a liability caused by a failed loan.
Perpetrator’s internal accountants relayed that the bankers had requested 
that the loss be kept off financial statements and that the external CPAs did 
not know about it. The fraud grew to include overstatement of assets and
understatement of liabilities to keep the businesses functioning. 
Dollar loss: $236 million. 
What was done to conceal the fraud: Extensive internal collusion helped to 
hide the fraud.
“Audit evidence” provided to external CPAs included falsified contracts and 
invoices that presented certain assets as company‐ owned.
Assets that were sold were not removed from the books, assets that were 
borrowed were presented as owned, and certain guarantees of loans were 
not disclosed. 
How scheme was detected: A whistleblower tipped off authorities to the 
fraud. 
Copyright © 2013 FraudResourceNet™ LLC

Perpetrators

Copyright © 2013 FraudResourceNet™ LLC
Case Study 1: IMA ASSETS CO.
Initial Contact:
ORANGE U GLADICALL,  Tipster Calls Hotline at IMA Building 
Co. with anonymous tip that there is massive theft going on 
in the warehouse, as well as overstatement of assets to 
meet loan covenants.  
 “Concerns about All the Fixed Asset  & Inventory Fraud”
 “Scared to Come Forward”
 We Need Someone from the Outside
 “We Need a Data Analysis Expert… .. Massive Data”

Copyright © 2013 FraudResourceNet™ LLC

Data Analytics for Fraud:
Software Overview
Data Analytics







Traditional Auditing

Large Amounts of Data 
Identify Red Flags Faster
Increased Coverage
Determine Trends
Continuous Analysis
Process Improvement






Small Amounts of Data
Delay in Identifying Red Flags
Decreased Coverage
Harder to ID Trends

Show First View of IDEA

Copyright © 2013 FraudResourceNet™ LLC

19
Software Overview & Introduction
 Set Working Folder
 Import Data
 Check Control Totals

Copyright © 2013 FraudResourceNet™ LLC

Software Overview & Introduction
 Set Working Folder
 Import Data
 Check Control Totals

Copyright © 2013 FraudResourceNet™ LLC
IMA Building an Asset Co








1000+ Assets with No Physical Review
Inability to Generate + Cash Flows while Reporting Earnings Growth
No Inventory Comparison of Price v. Unit Cost 
Caught Operations Manager Stealing a TV Via Video Camera
Tight Loan Covenants & EBITDA Nearing Every Quarter
Two People in Fixed Assets and Inventory at Corporate
All Locations Decentralized 

Operations Manager
Fixed Asset Clerk
Counted On Tapes Not Working
Reviewed Tapes & Notified Management
No Raise in 3+ Years
Manager Says Okay to Not Do Physical Counts
10 Year Employee
TV Worth $500+
Operations Manager Terminated After Exit Interview
Claims Happened Only 1 Time 
Needed Money to Help Pay Rent

.

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 2

What Is/Are Added Tests for IMA Building an Asset Co. 
to Consider?
A.
B.
C.
D.

Add Test of Recalculation of Depreciation
Add Test of Comparison of Anticipated Value to Book Value
Neither of the Above
Both a and b

Copyright © 2013 FraudResourceNet™ LLC
Client Communication:
Planning for Fixed Assets and/or
Inventory Fraud







Walk‐through of Asset & Inventory Addition & Screening
Procure‐to‐Pay Cycle & COGS Transfer
Complete Audit Plan with Data Analysis Incorporated
Include  Capital Purchase & Inventory Process & Gap
Comparisons to Similar Vendor & Contract Pricing

Copyright © 2013 FraudResourceNet™ LLC

Observations Found








No Asset Valuation Other than Write‐Up With Acquisitions
No Policy or Review of Capital vs. Expense
No Recalculation of Depreciation or Cost v. Depreciation
No Capital or Inventory Budgetary Review
No Oversight of Transfer of Inventory to COGS
Monthly Inventory Turned in From Site
Recurring Negative Cash Flows

Copyright © 2013 FraudResourceNet™ LLC
Data Gathering for Data Analysis
Request All Meta Data Fields  & Files
Inventory
Assets:
 Vendor Name
Asset ID
 Vendor ID & Site & Address
 Depreciation for Period
 Purchase Order
 Total Depreciation
 History for X Time Period 
 Book Value
 Posted & Approved by ID
 Item Description
 Budgets by Vendor / Item
 Date of Sale
 Comments
 Date of Disposal
 Unit Cost
 Loss / Gain on Sale
 Transfer to COGS
 Date of Sale
 Date of Transfer
 Changes to Fields & Who Made Them
Copyright © 2013 FraudResourceNet™ LLC

Discovery with Data Analysis:
Is There Fraud at IMA?
Audits to Perform:
 Inventory:
 Join for Cost v. Price
 COGS Transfer 


Fixed Assets:
 Review Cost v. Book Value
 Review Cost v. Value
 Duplicates
 Recalculate Depreciation
 Come Up  with Tests for Sales, Accounts Payable, Closing Entries
 Request Data in Line with Tests.
Copyright © 2013 FraudResourceNet™ LLC
Polling Question 3

Which Tests Should IMA Run Initially for Inventory?  
A.
B.
C.
D.

Join Comparison Price v Cost
Recalculate Depreciation
COGS Transfer to Sale
Both a and c

Copyright © 2013 FraudResourceNet™ LLC

Discovery with DA: Spend
Audits to Perform:
Inventory: 
Summarize by Item
Price v. Cost
Duplicate Tests
COGS Transfer

Red Flag #1:‐ #3 Pricing Issues on  
52”  & Blu‐Ray, Transfer $, Dates

Copyright © 2013 FraudResourceNet™ LLC
Discovery with DA: Duplicates

Red Flag #4: Same Assets Listed 
Multiple Times

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 4

Which Red Flags Were Discovered with Initial 
Inventory Testing?
A.
B.
C.
D.

Pricing Issues on DVDs
Pricing Issues on TVs 52”
COGS Transfer Dates e.g. Expense Recognition
B & C

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 5

Which of the following is/are Red Flag(s)/ 
Finding(s) Identified in IMA Building?
A.
B.
C.
D.

Improper Depreciation Calculated
Vendor Spend is Excessive Over Budgeted Amounts
Terminated Employees Receiving Paychecks
None of the Above

Copyright © 2013 FraudResourceNet™ LLC

Discovery with DA:
Cost v. Book Value & Depreciation

Red Flag #5 ‐ #7:
Significant Discrepancies in Cost v. Book Value 
Cost v. Anticipated Value
Improper Depreciation Calculation

Copyright © 2013 FraudResourceNet™ LLC
Total Issues Found & Next Steps
1)  Complete Summary of Data & Findings
a) Total by Inventory Discrepancies
b) Total by Asset Discrepancies
c) Total by Depreciation Discrepancies
2)    Determine Additional Tests to Run & Perform
3) Discuss Findings with CEO Initially & Recommendations
4) Complete Interviews with Employees 
5) Review Gaps & Control Deficiencies & Provide Recommendations 
6) Recommend Management Review for Cost v Benefit & Implement ASAP
7) Determine if Client has Fraud Insurance Rider.  If not, recommend.
8) Contact Insurance Carrier (if applicable) & Begin Claim Process.
9) Contact Authorities & File Report.
10) Determine if Prosecution is Viable e.g. Dollar Amount, Management, etc.
11) Complete Report (See ACFE.com) 
12) Complete Supporting Doc for Insurance Co. & Authorities
Copyright © 2013 FraudResourceNet™ LLC

Preventing Fixed Asset & Inventory
Fraud
Prevention and Detection at IMA Building:
Assets







Obtain Expected Industry Valuation After X Period & Decline By Year
Compare Unit Costs & Assets vs. Industry Standards
Add System Preventative Controls e.g. X Value Per X Asset
Default Depreciation to X System Level on Set‐Up
Add Test of Comparison of Anticipated Value to Book Value
Recommend & Implement Capital & Inventory Budgetary Review

Inventory






Add Test of Inventory to Transfer Period Review
Add Control of Oversight of Transfer of Inventory to COGS
Add Surprise Physical Counts for Inventory & Fixed Assets 
Perform Physical Counts of All Assets & Inventory of High Volume Sites 
Extrapolate and Adjust Asset & Inventory Values
Copyright © 2013 FraudResourceNet™ LLC
Preventing Fixed Asset &
Inventory Fraud
Continuous Monitoring





Complete Risk Assessment & Annual Audit Plan with Data Analysis
Determine Monthly & Quarterly Tests by Priority
Implement Data Analysis Testing
Perform & Complete Ongoing Control Assessments

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 6

What Could Have Prevented IMA’s Asset Issues ?
A.
B.
C.
D.

Procurement Manager from Sole Vendor Selection
System Depreciation Calculation
Implement Data Analysis Testing
None of the above.

Copyright © 2013 FraudResourceNet™ LLC
Thank You!
Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com
Katrina Kiselinchev
Inclusivitie, LLC
832-236-4778
katrina@inclusivitie.com
http://www.inclusivitie.com
Copyright © 2013 FraudResourceNet™ LLC

Questions?
 Any Questions?
Don’t be Shy!

Copyright © 2013 FraudResourceNet™ LLC
Coming Up Next Month

 Detecting Healthcare
Vendor Fraud Using
Data Analysis (DA-2)
April 17
 Anti-Fraud
Professionals’ Role in
Building an Anti-Fraud
Culture (OF-1) April 23

Copyright © 2013 FraudResourceNet™ LLC

More Related Content

PDF
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
PDF
Using Data Analytics to Conduct a Forensic Audit
PDF
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PPTX
2016 MSCPA Fraud Conference Presentation
PPTX
Q1 2016 Fraud Detection, Prevention & Risk Management
PDF
Fraud Incident Response Planning Essentials
PDF
Protecting Your Organization Against Check and ACH Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
Using Data Analytics to Conduct a Forensic Audit
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
2016 MSCPA Fraud Conference Presentation
Q1 2016 Fraud Detection, Prevention & Risk Management
Fraud Incident Response Planning Essentials
Protecting Your Organization Against Check and ACH Fraud

What's hot (20)

PDF
Fraud Awareness Program - OpenThinking
PPT
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
PDF
Fraud Awareness
PPTX
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
PDF
How To: Prevent Loan Application Fraud
PDF
Fraud & Risk Management - A Guide to Good Practice
PPTX
Social networks background checks
PDF
Payroll Fraud by Andrew Firth, Forensic Accountant
PPT
Detecting and Preventing Payroll Fraud
PPTX
Fraud principles1
PPT
Accounts Payable Fraud: Keys to Detection and Prevention
PDF
Bribery and Corruption (FCPA): What Auditors Need to Know
PPT
Fight Fraud with Employee Fraud Training
PDF
Combating Fraud: Six Principles for Security
PPT
The Countdown is on: Key Things to Know About the GDPR
PDF
Red flags fraud
PDF
Prevent banking frauds through identity management
PDF
Financial Orchestra - PICPA Middle East Conference
PDF
Essentials of a Highly Effective Employee Fraud Awareness Program
Fraud Awareness Program - OpenThinking
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Fraud Awareness
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
How To: Prevent Loan Application Fraud
Fraud & Risk Management - A Guide to Good Practice
Social networks background checks
Payroll Fraud by Andrew Firth, Forensic Accountant
Detecting and Preventing Payroll Fraud
Fraud principles1
Accounts Payable Fraud: Keys to Detection and Prevention
Bribery and Corruption (FCPA): What Auditors Need to Know
Fight Fraud with Employee Fraud Training
Combating Fraud: Six Principles for Security
The Countdown is on: Key Things to Know About the GDPR
Red flags fraud
Prevent banking frauds through identity management
Financial Orchestra - PICPA Middle East Conference
Essentials of a Highly Effective Employee Fraud Awareness Program
Ad

Viewers also liked (19)

PDF
Finding Payroll Fraud Using Audit Software
PPTX
Fraud, Waste & Abuse: Capture low hanging fruit and more
PDF
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
PDF
Catch T&E and P-Card Fraudsters Using Data Analytics
PDF
Vendor Master File Fraud Detection and Prevention Using Data Analytics
PDF
Quick Response Fraud Detection
PDF
Think Like a Fraudster to Catch a Fraudster
PDF
Using Data Analytics to Find and Deter Procure to Pay Fraud
PPTX
User Behavior Analytics And The Benefits To Companies
PDF
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
PDF
Using benford's law for fraud detection and auditing
PPTX
Fraud: Understanding Fraud and Our Responsibilities
PPTX
Hr analytics
PPTX
HR Analytics, Done Right
PDF
Fraud Detection presentation
PDF
Detecting Fraud Using Data Mining Techniques
PDF
HR / Talent Analytics
PDF
HR Analytics & HR Tools
Finding Payroll Fraud Using Audit Software
Fraud, Waste & Abuse: Capture low hanging fruit and more
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Quick Response Fraud Detection
Think Like a Fraudster to Catch a Fraudster
Using Data Analytics to Find and Deter Procure to Pay Fraud
User Behavior Analytics And The Benefits To Companies
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Using benford's law for fraud detection and auditing
Fraud: Understanding Fraud and Our Responsibilities
Hr analytics
HR Analytics, Done Right
Fraud Detection presentation
Detecting Fraud Using Data Mining Techniques
HR / Talent Analytics
HR Analytics & HR Tools
Ad

Similar to Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis (20)

PDF
Uncovering Fraud in Key Financial Accounts using Data Analysis
PDF
Best Practices in Detecting Payable Fraud Using Data Analytics
PDF
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
PDF
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
PDF
Using Data Analytics to Detect and Deter Procure to Pay Fraud
PDF
Partner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An Overview
PDF
Fraud Prevention and Internal Controls - A Winning Combination
PDF
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
PDF
Fraud Risk Assessment: An Expert’s Blueprint
PDF
Benford's Law: How to Use it to Detect Fraud in Financial Data
PDF
Fraud detection guide
PDF
Sage Fixed Assets Accounting for Sage 100
PDF
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
PDF
Forensic Accounting – How To Uncover Fraud Jan 2012
PPTX
Bank Fraud &amp; Data Forensics
PDF
Fixed Asset Controls and Reporting: Who's Paying Attention to Your Largest As...
PDF
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
PDF
can-you-think-like-a-fraudster-106948
PDF
Detecting Healthcare Vendor Fraud Using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
Best Practices in Detecting Payable Fraud Using Data Analytics
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Partner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An Overview
Fraud Prevention and Internal Controls - A Winning Combination
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Fraud Risk Assessment: An Expert’s Blueprint
Benford's Law: How to Use it to Detect Fraud in Financial Data
Fraud detection guide
Sage Fixed Assets Accounting for Sage 100
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Forensic Accounting – How To Uncover Fraud Jan 2012
Bank Fraud &amp; Data Forensics
Fixed Asset Controls and Reporting: Who's Paying Attention to Your Largest As...
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
can-you-think-like-a-fraudster-106948
Detecting Healthcare Vendor Fraud Using Data Analysis

More from FraudBusters (9)

PDF
The Power of Benford's Law in Finding Fraud
PDF
Background Check Best Practices
PDF
Best Practices: Planning Data Analytic into Your Audits
PDF
Fraud in Social Media: Facing the Growing Threat
PDF
Management Override: Common Tactics and How to Audit For Red Flags
PDF
Setting Up and Managing an Anonymous Fraud Hotline
PDF
Establishing an Organization Wide Fraud Policy
PDF
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
PDF
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
The Power of Benford's Law in Finding Fraud
Background Check Best Practices
Best Practices: Planning Data Analytic into Your Audits
Fraud in Social Media: Facing the Growing Threat
Management Override: Common Tactics and How to Audit For Red Flags
Setting Up and Managing an Anonymous Fraud Hotline
Establishing an Organization Wide Fraud Policy
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Modernizing your data center with Dell and AMD
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Mobile App Security Testing_ A Comprehensive Guide.pdf
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation

Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis

  • 1. Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis March 27, 2013 Special Guest Presenter: Katrina Kiselinchev, CIA, CPA, CFE, CFF Copyright © 2013 FraudResourceNet™ LLC About Peter Goldmann, MSc., CFE  President and Founder of White Collar Crime 101 Publisher of White‐Collar Crime Fighter Developer of FraudAware® Anti‐Fraud Training  Monthly Columnist, The Fraud Examiner,  ACFE Newsletter  Member of Editorial Advisory Board, ACFE  Author of “Fraud in the Markets” Explains how fraud fueled the financial crisis. Copyright © 2013 FraudResourceNet™ LLC
  • 2. About Jim Kaplan, MSc, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors   Auditor, Web Site Guru  Internet for Auditors Pioneer  Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition  Copyright © 2013 FraudResourceNet™ LLC About Katrina Kiselinchev, CPA, CIA, CFE, CFF       President of Inclusivitie, We Do “SMART” Integration Partner with IDEA Experience across industries, audit, fraud, and value Achieved Value of $5+ Million & ROI of 2000+%, which  included using IDEA’s SMART Analyzer . Adjunct Professor at Georgia State University Specific Fraud in Fixed Asset e.g. Mischaracterized Fixed   Asset v. Expense to Increase Bottom Line.  Copyright © 2013 FraudResourceNet™ LLC
  • 3. Webinar Housekeeping This webinar and its material are the property of AuditNet® and FraudAware®. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We will be recording the webinar and you will be provided access to that recording within five business days after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Please complete the evaluation to help us continuously improve our Webinars. You must answer the polling questions to qualify for CPE per NASBA. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet™ LLC Disclaimers The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC Copyright © 2013 FraudResourceNet™ LLC 5
  • 4. Learning Objectives  Phantom inventory: How to Know What’s Really in your  Warehouses and What’s Not  How Managers Conceal Inventory and Capital Asset Theft by  Reporting Fraudulently Inflated Values  Case Studies of Inventory/Fixed Asset Theft and Concealment  Effective Data Analytics Tests Revealing Red Flags of Inventory  Theft and Asset Value Misstatement  What to Do After Data Analytics  Has Uncovered Signs of Asset  Fraud/Misstatement Copyright © 2013 FraudResourceNet™ LLC 6 Agenda  Introduction  The Auditor’s Role  Fraud State of the Union  In the News: Costliest Forms of Fixed Asset & Inventory Fraud  Fixed Asset & Inventory Fraudsters  IMA Building an Asset Company Case   Planning for Fixed Asset and/or Inventory Fraud  Data Gathering & Software Introduction  Discovery with DA: Is There Fraud at IMA Building an Asset  Red Flag Detection & Collusion   Finding Fixed Asset and Inventory Fraud & Next Steps Copyright © 2013 FraudResourceNet™ LLC 7
  • 5. The Auditor’s Role IPPF Standard 1210.A3  Internal auditors must have sufficient  knowledge of…available technology  based audit techniques   to perform their  assigned work Copyright © 2013 FraudResourceNet™ LLC IIA Guidance – GTAG 13 Internal auditors require appropriate skills  and should use available technological  tools to help them maintain a successful  fraud management program that covers  prevention, detection, and investigation.  As such, all audit professionals — not just  IT audit specialists — are expected to be  increasingly proficient in areas such as  data analysis and the use of technology to  help them meet the demands of the job. Copyright © 2013 FraudResourceNet™ LLC
  • 6. Professional Guidance Copyright © 2013 FraudResourceNet™ LLC Fraud State of the Union Source: 2012 ACFE Report to the  Nations Copyright © 2013 FraudResourceNet™ LLC
  • 7. Fraud State of the Union Source: 2012 ACFE Report to the  Nations Copyright © 2013 FraudResourceNet™ LLC Polling Question 1 Types of Inventory Scheme  (Choose all that apply):   A. B. C. D. E. Stealing Diverting in Transit Skimming Check Counterfeiting Adding “Phantom Inventory” Copyright © 2013 FraudResourceNet™ LLC
  • 8. Costliest Forms of Fixed Asset and / or Inventory Fraud     According to ACFE's "Report to the Nation on Occupational Fraud and Abuse": > 7% of Fraud Cases in Financial Statement Fraud with < 99 Employees  > 15% of Fraud Cases in Non‐Cash Schemes Private Companies at 39%+ Of 2012 Fraud, $200K+ Per Incident Banking & Financial Services, Government, and Manufacturing—Highest Fraud % Copyright © 2013 FraudResourceNet™ LLC Fraud Schemes Fixed Asset   Booking Fictitious Assets  Misrepresenting Asset Valuation  Falsifying Assets to Meet Loan Covenants  Improper Capitalization  Stealing Assets Inventory   Stealing Inventory   Diverting Inventory in Transit  Falsifying Inventory Numbers to Boost Profits  Manipulating inventory to conceal embezzlement (Phar‐Mor)  Falsifying Inventory to meet Loan Covenants  Creating “Phantom” Inventory ‐‐ Inventory on books > on hand due to theft or fraudulent reporting Copyright © 2013 FraudResourceNet™ LLC
  • 9. AICPA Fraud Task Force & Six Men & $4B in Fraud It All Started With a Loan Failure Description: The perpetrator and his companies were the guarantors of  several large loans related to entertainment contracts. The loans were  participation loans with several foreign banks. Fraud began with failure to  record or disclose a liability caused by a failed loan. Perpetrator’s internal accountants relayed that the bankers had requested  that the loss be kept off financial statements and that the external CPAs did  not know about it. The fraud grew to include overstatement of assets and understatement of liabilities to keep the businesses functioning.  Dollar loss: $236 million.  What was done to conceal the fraud: Extensive internal collusion helped to  hide the fraud. “Audit evidence” provided to external CPAs included falsified contracts and  invoices that presented certain assets as company‐ owned. Assets that were sold were not removed from the books, assets that were  borrowed were presented as owned, and certain guarantees of loans were  not disclosed.  How scheme was detected: A whistleblower tipped off authorities to the  fraud.  Copyright © 2013 FraudResourceNet™ LLC Perpetrators Copyright © 2013 FraudResourceNet™ LLC
  • 10. Case Study 1: IMA ASSETS CO. Initial Contact: ORANGE U GLADICALL,  Tipster Calls Hotline at IMA Building  Co. with anonymous tip that there is massive theft going on  in the warehouse, as well as overstatement of assets to  meet loan covenants.    “Concerns about All the Fixed Asset  & Inventory Fraud”  “Scared to Come Forward”  We Need Someone from the Outside  “We Need a Data Analysis Expert… .. Massive Data” Copyright © 2013 FraudResourceNet™ LLC Data Analytics for Fraud: Software Overview Data Analytics       Traditional Auditing Large Amounts of Data  Identify Red Flags Faster Increased Coverage Determine Trends Continuous Analysis Process Improvement     Small Amounts of Data Delay in Identifying Red Flags Decreased Coverage Harder to ID Trends Show First View of IDEA Copyright © 2013 FraudResourceNet™ LLC 19
  • 11. Software Overview & Introduction  Set Working Folder  Import Data  Check Control Totals Copyright © 2013 FraudResourceNet™ LLC Software Overview & Introduction  Set Working Folder  Import Data  Check Control Totals Copyright © 2013 FraudResourceNet™ LLC
  • 12. IMA Building an Asset Co        1000+ Assets with No Physical Review Inability to Generate + Cash Flows while Reporting Earnings Growth No Inventory Comparison of Price v. Unit Cost  Caught Operations Manager Stealing a TV Via Video Camera Tight Loan Covenants & EBITDA Nearing Every Quarter Two People in Fixed Assets and Inventory at Corporate All Locations Decentralized  Operations Manager Fixed Asset Clerk Counted On Tapes Not Working Reviewed Tapes & Notified Management No Raise in 3+ Years Manager Says Okay to Not Do Physical Counts 10 Year Employee TV Worth $500+ Operations Manager Terminated After Exit Interview Claims Happened Only 1 Time  Needed Money to Help Pay Rent . Copyright © 2013 FraudResourceNet™ LLC Polling Question 2 What Is/Are Added Tests for IMA Building an Asset Co.  to Consider? A. B. C. D. Add Test of Recalculation of Depreciation Add Test of Comparison of Anticipated Value to Book Value Neither of the Above Both a and b Copyright © 2013 FraudResourceNet™ LLC
  • 13. Client Communication: Planning for Fixed Assets and/or Inventory Fraud      Walk‐through of Asset & Inventory Addition & Screening Procure‐to‐Pay Cycle & COGS Transfer Complete Audit Plan with Data Analysis Incorporated Include  Capital Purchase & Inventory Process & Gap Comparisons to Similar Vendor & Contract Pricing Copyright © 2013 FraudResourceNet™ LLC Observations Found        No Asset Valuation Other than Write‐Up With Acquisitions No Policy or Review of Capital vs. Expense No Recalculation of Depreciation or Cost v. Depreciation No Capital or Inventory Budgetary Review No Oversight of Transfer of Inventory to COGS Monthly Inventory Turned in From Site Recurring Negative Cash Flows Copyright © 2013 FraudResourceNet™ LLC
  • 14. Data Gathering for Data Analysis Request All Meta Data Fields  & Files Inventory Assets:  Vendor Name Asset ID  Vendor ID & Site & Address  Depreciation for Period  Purchase Order  Total Depreciation  History for X Time Period   Book Value  Posted & Approved by ID  Item Description  Budgets by Vendor / Item  Date of Sale  Comments  Date of Disposal  Unit Cost  Loss / Gain on Sale  Transfer to COGS  Date of Sale  Date of Transfer  Changes to Fields & Who Made Them Copyright © 2013 FraudResourceNet™ LLC Discovery with Data Analysis: Is There Fraud at IMA? Audits to Perform:  Inventory:  Join for Cost v. Price  COGS Transfer   Fixed Assets:  Review Cost v. Book Value  Review Cost v. Value  Duplicates  Recalculate Depreciation  Come Up  with Tests for Sales, Accounts Payable, Closing Entries  Request Data in Line with Tests. Copyright © 2013 FraudResourceNet™ LLC
  • 15. Polling Question 3 Which Tests Should IMA Run Initially for Inventory?   A. B. C. D. Join Comparison Price v Cost Recalculate Depreciation COGS Transfer to Sale Both a and c Copyright © 2013 FraudResourceNet™ LLC Discovery with DA: Spend Audits to Perform: Inventory:  Summarize by Item Price v. Cost Duplicate Tests COGS Transfer Red Flag #1:‐ #3 Pricing Issues on   52”  & Blu‐Ray, Transfer $, Dates Copyright © 2013 FraudResourceNet™ LLC
  • 16. Discovery with DA: Duplicates Red Flag #4: Same Assets Listed  Multiple Times Copyright © 2013 FraudResourceNet™ LLC Polling Question 4 Which Red Flags Were Discovered with Initial  Inventory Testing? A. B. C. D. Pricing Issues on DVDs Pricing Issues on TVs 52” COGS Transfer Dates e.g. Expense Recognition B & C Copyright © 2013 FraudResourceNet™ LLC
  • 17. Polling Question 5 Which of the following is/are Red Flag(s)/  Finding(s) Identified in IMA Building? A. B. C. D. Improper Depreciation Calculated Vendor Spend is Excessive Over Budgeted Amounts Terminated Employees Receiving Paychecks None of the Above Copyright © 2013 FraudResourceNet™ LLC Discovery with DA: Cost v. Book Value & Depreciation Red Flag #5 ‐ #7: Significant Discrepancies in Cost v. Book Value  Cost v. Anticipated Value Improper Depreciation Calculation Copyright © 2013 FraudResourceNet™ LLC
  • 18. Total Issues Found & Next Steps 1)  Complete Summary of Data & Findings a) Total by Inventory Discrepancies b) Total by Asset Discrepancies c) Total by Depreciation Discrepancies 2)    Determine Additional Tests to Run & Perform 3) Discuss Findings with CEO Initially & Recommendations 4) Complete Interviews with Employees  5) Review Gaps & Control Deficiencies & Provide Recommendations  6) Recommend Management Review for Cost v Benefit & Implement ASAP 7) Determine if Client has Fraud Insurance Rider.  If not, recommend. 8) Contact Insurance Carrier (if applicable) & Begin Claim Process. 9) Contact Authorities & File Report. 10) Determine if Prosecution is Viable e.g. Dollar Amount, Management, etc. 11) Complete Report (See ACFE.com)  12) Complete Supporting Doc for Insurance Co. & Authorities Copyright © 2013 FraudResourceNet™ LLC Preventing Fixed Asset & Inventory Fraud Prevention and Detection at IMA Building: Assets       Obtain Expected Industry Valuation After X Period & Decline By Year Compare Unit Costs & Assets vs. Industry Standards Add System Preventative Controls e.g. X Value Per X Asset Default Depreciation to X System Level on Set‐Up Add Test of Comparison of Anticipated Value to Book Value Recommend & Implement Capital & Inventory Budgetary Review Inventory      Add Test of Inventory to Transfer Period Review Add Control of Oversight of Transfer of Inventory to COGS Add Surprise Physical Counts for Inventory & Fixed Assets  Perform Physical Counts of All Assets & Inventory of High Volume Sites  Extrapolate and Adjust Asset & Inventory Values Copyright © 2013 FraudResourceNet™ LLC
  • 19. Preventing Fixed Asset & Inventory Fraud Continuous Monitoring     Complete Risk Assessment & Annual Audit Plan with Data Analysis Determine Monthly & Quarterly Tests by Priority Implement Data Analysis Testing Perform & Complete Ongoing Control Assessments Copyright © 2013 FraudResourceNet™ LLC Polling Question 6 What Could Have Prevented IMA’s Asset Issues ? A. B. C. D. Procurement Manager from Sole Vendor Selection System Depreciation Calculation Implement Data Analysis Testing None of the above. Copyright © 2013 FraudResourceNet™ LLC
  • 20. Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Katrina Kiselinchev Inclusivitie, LLC 832-236-4778 katrina@inclusivitie.com http://www.inclusivitie.com Copyright © 2013 FraudResourceNet™ LLC Questions?  Any Questions? Don’t be Shy! Copyright © 2013 FraudResourceNet™ LLC
  • 21. Coming Up Next Month  Detecting Healthcare Vendor Fraud Using Data Analysis (DA-2) April 17  Anti-Fraud Professionals’ Role in Building an Anti-Fraud Culture (OF-1) April 23 Copyright © 2013 FraudResourceNet™ LLC