SlideShare a Scribd company logo
“Finding Fraud and
What To Do With It.”
New York State Department
of Transportation
February 5, 2010
Edward T. Dominelli, CFE, MPA
BST Forensic Accounting and Litigation Services
Offices: New York - Albany
2
Goals and Objectives
Organizations involved in transportation-related
construction, both public and private, can take
proactive steps to mitigate the risk of fraudulent
activity on their projects. This session will
discuss suggested steps such organizations
can consider to better deter and detect
fraudulent activity, and what they need to do
when fraud is detected or suspected to ensure
appropriate follow-up and investigation.
3
What is fraud?
Fraud is any intentional act or omission
designed to deceive others, resulting in
the victim suffering a loss and/or the
perpetrator achieving a gain.
Managing the Business Risk of Fraud: A Practical Guide, prepared by
IIA, AICPA, and ACFE
4
Why do people commit fraud?
5
Who commits construction fraud?
• Project Manager
• Superintendent
• “Clerk of the Works”
• Construction Manager
• Contracting Officer
• Architects
• Engineers
• Controlled Inspectors
• Estimators
• Contractors
• Subcontractors
• Materials Suppliers
• Corrupt Union Officials
• Organized Crime
• Labor Coalitions
• Other?
6
“Fraud prevention and detection is
like a mortal’s need for air. When it’s
present, it’s never noticed. When it’s
missing, it’s all that’s noticed”
Author: Unknown
7
Why must we address fraud?
Requirement of ARRA Program
Fraud happens in all organizations
Public Safety
Fiduciary duty to protect public
assets
8
Why must we address fraud?
Mitigate risk
Limit liability
Protect organizational reputation
Promote transparency in operations
9
Fraud Mitigation Process
Finding Fraud – Prevention and
Detection
Responding to Fraudulent Activity
10
Finding Fraud – Key Steps
Management Commitment
Recognize Relevant Fraud Schemes
Identify High Risk Areas
Establish Prevention/Detection
Measures
11
Management Commitment
Acceptance That Fraud Exists
Set as Management Priority
Develop/Revise Code of Conduct
• agency level - conflicts of interest, gifts
• business partners
• embody in documents, i.e. contracts
12
Recognize Relevant Schemes
Review agency history
Review professional literature
Consult with “experts”
Identify “Red Flags”
13
14
Conduct Risk Assessment
Where are we most vulnerable?
Focus on high risk areas
15
Establish Prevention/Detection Measures
Design/Implement Internal Controls
Examples:
• employee/vendor ethics policy
• contractor/vendor due diligence
• separation of duties
• change order review process
• random contract audits
• independent project estimates
• original supporting documents
• worker identification system
• analyze bidding patterns
16
Due Diligence Steps
• Check References
• Visit Projects Completed
• Speak with Peers
• Similar Scope, Size and
Complexity
• Check Debarment Lists
• Public Database Search
• Review Subcontractors
• Enforce Subcontracting
Limits
• Review Bid Pricing
• Verify Licenses
17
Establish Prevention/Detection Measures
Set Fraud Reporting Requirements
• mandated reporting
• anonymous reporting - Hotline
• whistleblower protection
• internal and external resources
• “When in doubt, report it.”
18
REPORT FRAUD, WASTE & ABUSE
One of the core missions of the Recovery Board is to prevent fraud, waste, and mismanagement of
Recovery funds. Recovery.gov gives you the ability to find Recovery projects in your own
neighborhood and if you suspect fraudulent actions related to the project you can report those
concerns in several ways:
Submit a Complaint Form electronically
Call the Recovery Board Fraud Hotline: 1-877-392-3375 (1-877-FWA-DESK)
Fax the Recovery Board: 1-877-329-3922 (1-877-FAX-FWA2)
Write the Recovery Board:
Recovery Accountability and Transparency Board
Attention: Hotline Operators
P.O. Box 27545
Washington, D.C. 20038-7958
The Recovery Board is committed to helping ensure these funds are spent properly, but we cannot do
it without your help. Additionally, the Recovery Act provides protections for certain individuals
(whistleblowers) who make specific disclosures about uses of Recovery Act funds.
Source: Recovery.gov
19
Establish Prevention/Detection Measures
 Education
• employee training - fraud schemes, red flags, altered
documents, reporting requirements
• contractor/vendor awareness
 contractor/vendor code of conduct
 “zero tolerance”
 incorporate into contract language
 discuss in bidders meetings/vendor interviews
 reinforce in routine communications
 posters
20
Fraud Response Plan
 Prepare Plan in Advance – Don’t wait until it
happens!!!
 Investigative Process
• consistent
• timely
• impartial
• professional
 Identify Investigative Resources
• internal - IG, SIU, Counsel’s Office, Internal Auditor
• external – USDOTIG, NYSDOT, NYSOIG, State Police,
FBI, District Attorney
21
Evidentiary Considerations
 Evidence collected will be disputed
for three reasons:
• Legality of the acquisition of the
evidence
• Integrity of the evidence
• Interpretation of the evidence
22
Evidentiary Considerations
 Preserving and Protecting Evidence
• documents – paper and electronic
• physical – i.e., core sample
• chain of custody/illegal search issues
 Interviewing Witnesses
• false imprisonment issues
• self-incrimination issues
• union contract issues
 Maintain Confidentiality – “Need to know.”
 Let the “Pros” Handle It
23
- Sudden change in work habits – tardiness, productivity,
reliability
- Sudden change in lifestyle – living beyond means, clothing,
cars, jewelry, vacations, cash
- Sense of entitlement, complaints of being underpaid
- Sudden change in personality/appearance
- Prior history of misconduct/criminal history
- Excessive unscheduled absences/tardiness
- Evidence of mounting financial difficulties – collection agency
calls, wage garnishments, borrowing money from co-workers
Employee Fraud Indicators
24
- Complaints from vendors (contactors, consultants, suppliers)
- Difficulty contacting during workday, unavailability
- Unreported outside employment/business activities
- Unwillingness to be away from job for extended periods, no
vacations
- Non-acceptance of promotions
- Failure to share important information with supervisor or
subordinates
- Resistance to supervision/oversight
- Reluctance to delegate to subordinates
Employee Fraud Indicators
25
- Excessive non-work related phone calls or emails during the
workday
- Consistent failure to follow established procedures/overrides
established internal controls
- Poor record-keeping/inadequate documentation to support
decisions or transactions
- Non-cooperation with auditors/inspectors
- By-pass chain of command
- High turnover of subordinates
- No/limited segregation of key functions within work unit, weak
controls
Employee Fraud Indicators
26
- Untimely bank deposits/bank reconciliations
- Consistent math errors in computations
- Alteration/falsification/destruction of official records
- Socialization with vendors
- Soliciting/accepting gifts and gratuities from vendors
- Frequent, unexplained meetings with vendors behind closed
doors or off- site
- Meeting with “unfamiliar” people in office
- Failure to enforce contract provisions with vendors
Employee Fraud Indicators
27
- Consistent use of same vendors
- Vendor’s insistence to deal with a specific representative
- Personal intervention to get certain vendors paid
- Referral of certain vendors to perform work
- Referral of subcontractors to primes
- Limited/restricted competition for procurement of goods and
services
DON’T IGNORE RED FLAGS. THEY MIGHT MEAN
NOTHING, BUT THEN AGAIN …..
Employee Fraud Indicators
28
Questions
29
Thank you
Edward T. Dominelli, CFE, MPA
BST Valuation and Litigation Advisors
Forensic Accounting and Financial Investigations
26 Computer Drive West
Albany, NY 12205
1-800-724-6700, ext 133
edominelli@bstco.com

More Related Content

PDF
D&B onboard.pdf
PPTX
2015 NGMA slides
PPTX
Navigate the Financial Crime Landscape with a Vendor Management Program
PPTX
"Lucky 13" Fraud Prevention Considerations
PDF
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
PPTX
Management training assignment 3 advanced accounting bayo cary
PDF
Audit, investigation & forensic accounting: Exploring the nexus
PPTX
14_PREVENTIVE VIGILANCEASFASFASFDAA.pptx
D&B onboard.pdf
2015 NGMA slides
Navigate the Financial Crime Landscape with a Vendor Management Program
"Lucky 13" Fraud Prevention Considerations
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Management training assignment 3 advanced accounting bayo cary
Audit, investigation & forensic accounting: Exploring the nexus
14_PREVENTIVE VIGILANCEASFASFASFDAA.pptx

Similar to Finding Fraud and What To Do With It.ppt (20)

PDF
Doculabs 2014 risk and compliance practice introduction finance
PDF
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
PPTX
2016 - IQPC - The key to raising awareness and comprehension
PPTX
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
PPTX
Gac, money flow, ds, ar, 2 26-14
PPT
ACFC302-Management-Fraud-and-Audit-Risk_166972.ppt
PDF
False Invoices - Would you detect them
PPT
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
PPTX
The Importance of Internal Controls in Fraud Prevention
 
PPT
vigilance-ppt.ppt
PDF
Hot topics in financial crime - Singapore
PPTX
Deconstructing Data Breach Cost
PDF
Co3 rsc r5
PPT
ContractMgmtMPJunejaEx-CTE_300315.ppt
PPTX
Forensic Accounting & Fraud Investigation
PPTX
5 Steps to Creating an Ethical Work Culture
PDF
Navigating Government Investigations of Health Care Fraud
PDF
The Forensics Frontier
PPT
Encouraging Internal Compliance Communication Webinar
PPTX
Identifying Your Agency's Vulnerabilities
Doculabs 2014 risk and compliance practice introduction finance
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
2016 - IQPC - The key to raising awareness and comprehension
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Gac, money flow, ds, ar, 2 26-14
ACFC302-Management-Fraud-and-Audit-Risk_166972.ppt
False Invoices - Would you detect them
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Importance of Internal Controls in Fraud Prevention
 
vigilance-ppt.ppt
Hot topics in financial crime - Singapore
Deconstructing Data Breach Cost
Co3 rsc r5
ContractMgmtMPJunejaEx-CTE_300315.ppt
Forensic Accounting & Fraud Investigation
5 Steps to Creating an Ethical Work Culture
Navigating Government Investigations of Health Care Fraud
The Forensics Frontier
Encouraging Internal Compliance Communication Webinar
Identifying Your Agency's Vulnerabilities
Ad

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Modernizing your data center with Dell and AMD
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Ad

Finding Fraud and What To Do With It.ppt

  • 1. “Finding Fraud and What To Do With It.” New York State Department of Transportation February 5, 2010 Edward T. Dominelli, CFE, MPA BST Forensic Accounting and Litigation Services Offices: New York - Albany
  • 2. 2 Goals and Objectives Organizations involved in transportation-related construction, both public and private, can take proactive steps to mitigate the risk of fraudulent activity on their projects. This session will discuss suggested steps such organizations can consider to better deter and detect fraudulent activity, and what they need to do when fraud is detected or suspected to ensure appropriate follow-up and investigation.
  • 3. 3 What is fraud? Fraud is any intentional act or omission designed to deceive others, resulting in the victim suffering a loss and/or the perpetrator achieving a gain. Managing the Business Risk of Fraud: A Practical Guide, prepared by IIA, AICPA, and ACFE
  • 4. 4 Why do people commit fraud?
  • 5. 5 Who commits construction fraud? • Project Manager • Superintendent • “Clerk of the Works” • Construction Manager • Contracting Officer • Architects • Engineers • Controlled Inspectors • Estimators • Contractors • Subcontractors • Materials Suppliers • Corrupt Union Officials • Organized Crime • Labor Coalitions • Other?
  • 6. 6 “Fraud prevention and detection is like a mortal’s need for air. When it’s present, it’s never noticed. When it’s missing, it’s all that’s noticed” Author: Unknown
  • 7. 7 Why must we address fraud? Requirement of ARRA Program Fraud happens in all organizations Public Safety Fiduciary duty to protect public assets
  • 8. 8 Why must we address fraud? Mitigate risk Limit liability Protect organizational reputation Promote transparency in operations
  • 9. 9 Fraud Mitigation Process Finding Fraud – Prevention and Detection Responding to Fraudulent Activity
  • 10. 10 Finding Fraud – Key Steps Management Commitment Recognize Relevant Fraud Schemes Identify High Risk Areas Establish Prevention/Detection Measures
  • 11. 11 Management Commitment Acceptance That Fraud Exists Set as Management Priority Develop/Revise Code of Conduct • agency level - conflicts of interest, gifts • business partners • embody in documents, i.e. contracts
  • 12. 12 Recognize Relevant Schemes Review agency history Review professional literature Consult with “experts” Identify “Red Flags”
  • 13. 13
  • 14. 14 Conduct Risk Assessment Where are we most vulnerable? Focus on high risk areas
  • 15. 15 Establish Prevention/Detection Measures Design/Implement Internal Controls Examples: • employee/vendor ethics policy • contractor/vendor due diligence • separation of duties • change order review process • random contract audits • independent project estimates • original supporting documents • worker identification system • analyze bidding patterns
  • 16. 16 Due Diligence Steps • Check References • Visit Projects Completed • Speak with Peers • Similar Scope, Size and Complexity • Check Debarment Lists • Public Database Search • Review Subcontractors • Enforce Subcontracting Limits • Review Bid Pricing • Verify Licenses
  • 17. 17 Establish Prevention/Detection Measures Set Fraud Reporting Requirements • mandated reporting • anonymous reporting - Hotline • whistleblower protection • internal and external resources • “When in doubt, report it.”
  • 18. 18 REPORT FRAUD, WASTE & ABUSE One of the core missions of the Recovery Board is to prevent fraud, waste, and mismanagement of Recovery funds. Recovery.gov gives you the ability to find Recovery projects in your own neighborhood and if you suspect fraudulent actions related to the project you can report those concerns in several ways: Submit a Complaint Form electronically Call the Recovery Board Fraud Hotline: 1-877-392-3375 (1-877-FWA-DESK) Fax the Recovery Board: 1-877-329-3922 (1-877-FAX-FWA2) Write the Recovery Board: Recovery Accountability and Transparency Board Attention: Hotline Operators P.O. Box 27545 Washington, D.C. 20038-7958 The Recovery Board is committed to helping ensure these funds are spent properly, but we cannot do it without your help. Additionally, the Recovery Act provides protections for certain individuals (whistleblowers) who make specific disclosures about uses of Recovery Act funds. Source: Recovery.gov
  • 19. 19 Establish Prevention/Detection Measures  Education • employee training - fraud schemes, red flags, altered documents, reporting requirements • contractor/vendor awareness  contractor/vendor code of conduct  “zero tolerance”  incorporate into contract language  discuss in bidders meetings/vendor interviews  reinforce in routine communications  posters
  • 20. 20 Fraud Response Plan  Prepare Plan in Advance – Don’t wait until it happens!!!  Investigative Process • consistent • timely • impartial • professional  Identify Investigative Resources • internal - IG, SIU, Counsel’s Office, Internal Auditor • external – USDOTIG, NYSDOT, NYSOIG, State Police, FBI, District Attorney
  • 21. 21 Evidentiary Considerations  Evidence collected will be disputed for three reasons: • Legality of the acquisition of the evidence • Integrity of the evidence • Interpretation of the evidence
  • 22. 22 Evidentiary Considerations  Preserving and Protecting Evidence • documents – paper and electronic • physical – i.e., core sample • chain of custody/illegal search issues  Interviewing Witnesses • false imprisonment issues • self-incrimination issues • union contract issues  Maintain Confidentiality – “Need to know.”  Let the “Pros” Handle It
  • 23. 23 - Sudden change in work habits – tardiness, productivity, reliability - Sudden change in lifestyle – living beyond means, clothing, cars, jewelry, vacations, cash - Sense of entitlement, complaints of being underpaid - Sudden change in personality/appearance - Prior history of misconduct/criminal history - Excessive unscheduled absences/tardiness - Evidence of mounting financial difficulties – collection agency calls, wage garnishments, borrowing money from co-workers Employee Fraud Indicators
  • 24. 24 - Complaints from vendors (contactors, consultants, suppliers) - Difficulty contacting during workday, unavailability - Unreported outside employment/business activities - Unwillingness to be away from job for extended periods, no vacations - Non-acceptance of promotions - Failure to share important information with supervisor or subordinates - Resistance to supervision/oversight - Reluctance to delegate to subordinates Employee Fraud Indicators
  • 25. 25 - Excessive non-work related phone calls or emails during the workday - Consistent failure to follow established procedures/overrides established internal controls - Poor record-keeping/inadequate documentation to support decisions or transactions - Non-cooperation with auditors/inspectors - By-pass chain of command - High turnover of subordinates - No/limited segregation of key functions within work unit, weak controls Employee Fraud Indicators
  • 26. 26 - Untimely bank deposits/bank reconciliations - Consistent math errors in computations - Alteration/falsification/destruction of official records - Socialization with vendors - Soliciting/accepting gifts and gratuities from vendors - Frequent, unexplained meetings with vendors behind closed doors or off- site - Meeting with “unfamiliar” people in office - Failure to enforce contract provisions with vendors Employee Fraud Indicators
  • 27. 27 - Consistent use of same vendors - Vendor’s insistence to deal with a specific representative - Personal intervention to get certain vendors paid - Referral of certain vendors to perform work - Referral of subcontractors to primes - Limited/restricted competition for procurement of goods and services DON’T IGNORE RED FLAGS. THEY MIGHT MEAN NOTHING, BUT THEN AGAIN ….. Employee Fraud Indicators
  • 29. 29 Thank you Edward T. Dominelli, CFE, MPA BST Valuation and Litigation Advisors Forensic Accounting and Financial Investigations 26 Computer Drive West Albany, NY 12205 1-800-724-6700, ext 133 edominelli@bstco.com