Featured Article

Setting the Stage to Fight Fraud: Using ‘Scenario Planning’ to Prevent Crime

Please sign in to save this to your favorites.

Television police dramas typically portray investigators piecing together clues in the aftermath of a puzzling crime. They build a theory about how the crime was perpetrated, concealed, and – if theft was involved – converted into personal gain. Every step of the crime is analyzed as the investigators ask: When did it happen? Why did it happen? Who had access? Who may have observed the act? How did the perpetrator cover his tracks or dispose of his ill-gotten gains?

The information then is assembled carefully into the case framework until a likely series of events emerges. By understanding the whole, the television investigators build a picture of the crime and the characteristics and probable actions of the perpetrator. These characteristics help identify a likely suspect or pool of suspects who then face searing interrogations until eventually someone confesses.

Not unlike the detectives and investigators of television, fraud examiners build theories, gather information, and develop leads that point to suspect business operations or employees.

But imagine if fraud examiners could bypass the entire investigation process and actually solve the crime before it happened! By using a risk assessment tool called “scenario planning,” this may be a real possibility.

The Power of Scenario Planning 

Scenario planning is a device used to strategically analyze risk. It is a disciplined method for imagining the future or a set of possible futures and then taking measures to ensure that any negative “futures” do not unfold. The essence of scenario planning is to create a narrative description of conditions, assumptions, variables, and relationships about present business operations and then examine the result if any changes were to occur in the future. The scenario planner tries to capture and interpret complex patterns of outcomes through combining quantitative data (numbers, ratios, and statistics) and subjective information (observations, impressions, and thoughts). Once the hypothetical future or set of futures are determined, markers are drawn in the near-term to identify which assumptions are coming true. Management then can take positive steps (or precautions) to deter any negative scenarios before they develop.

Scenario planners need good visualization skills, an active imagination, and a thorough understanding of the processes and relationships under study. No other tool is as powerful for challenging assumptions. Peter Schwarz, president of Global Business Network, a consulting firm specializing in strategic planning using scenarios, views the scenario approach as a way to “lift the blinders” from our eyes and discover our creative problem-solving skills. The narrative process enforces a certain logical story development that can aid in expressing hidden assumptions.

Scenarios help organizations understand their current environment, identify structural uncertainties (frauds waiting to happen), and become more adaptable by expanding their mental models. By setting the stage for fraud, management has a chance to fight it before it appears. Patterns of fraud are explored and compared to the existing risk management responses. Strengths or unlikely scenarios are discounted; weaknesses and likely scenarios are studied carefully. Once the range and types of frauds have been discovered, improved risk management techniques can be designed to shore up the weaknesses.

For an example using specific risk scenarios to fight fraud, take a look at an actual Department of Motor Vehicles case below.

Duped at the DMV 

A certain Department of Motor Vehicles had been subjected to theft and fraud for a number of years. Auto license plates (more specifically, the adhesive stickers issued annually for the plates) were a significant problem.

nscrupulous employees were suspected of stealing the plate stickers and either reselling them or giving them away to others. Likewise, there was some concern over the proliferation of fake driver’s licenses. It was probable that employees or others were stealing or duplicating the blank card stock for licenses and creating false identifications.

Exhibit 1 

  License Plate Adhesive Stickers  Driver’s License Stock 
The Motivation for Fraud 
  • Avoiding severe financial penalties for failing to clear up previous traffic violations or support payments.
  • Avoiding the cost of “proof of insurance.”
  • Registering a stolen vehicle.
 
  • Creating fake identification for personal use, selling to others, or for further fraud such as forgery or theft.
 
The Normal Business Process 
  • Most vehicle license renewals are handled by mail.
  • New vehicles, new resident vehicles, handicap certificates, and “problems” are handled over the counter. Problems include outstanding traffic fines and back alimony/child support payments as well as lost or incongruent vehicle registration documentation.
  • Adhesive stickers are issued across the counter at local DMV offices.
 
  • Nearly half of all renewals are handled by mail with no new physical license issued (an extension card is issued).
  • New drivers, new residents, and lost licenses are the major causes of new licenses issued.
  • Licensees are photographed at the local DMV offices. Applicant’s information (including signature) is laminated with the photo on card stock with the state seal.
  • Licenses are issued by mail.
 

Reversing the normal sequence of fraud discovery and building a case, the fraud examiner decided to use a scenario approach to analyze the fraud risk exposure at the DMV and then recommend methods to thwart these frauds. For both the adhesive stickers and the driver’s licenses, the three possible scenarios were employee theft, burglary, and unlawful duplication.

The examiner began by constructing a “process and controls” narrative for the issuance of adhesive stickers and driver’s licenses. (See Exhibits 1 and 2.) These narratives outlined the procedures and existing controls at the DMV.

Exhibit 2 

Adhesive Stickers Narrative   Driver’s Licenses Narrative 
  • Adhesive Stickers are held in a safe overnight and issued to clerks as needed each day.
  • Adhesive stickers are sequentially numbered and controlled by a log book.
  • Stickers are issued to customers throughout the day in response to various kinds of documents (new vehicle registration, etc.).
  • Mistakes and damaged stickers are noted in the log.
  • Transactions are balanced in the control log at the closing of each business day.
 
  • Blank stock for driver’s licenses is held in a safe when not used during printing.
  • Printing and printer’s waste are carefully noted in the log.
  • Licenses are printed in the state capital and mailed to the individual’s postal address shown on the license and application.
 

Next, the examiner identified possible weaknesses, strengths, and outcomes if present conditions were to continue. Fraud was broken down into a three-part act: the theft, the concealment, and the conversion.

Exhibit 3: Employee Theft Scenario 

Adhesive Stickers  Driver’s Licenses 

The Theft: 

  • Many employees have access to the adhesive stickers during the day.
  • There are numerous opportunities to steal from stock during the day.
 
  • Blank stock is stored in a locked cabinet in a computer room.
  • Few employees have access to stock or printer’s waste.
  • Waste is shredded.
 

The Concealment: 

  • The adhesive stickers are small and easily palmed or otherwise hidden while stolen.
  • Documents to support issuing a sticker can be falsified and later destroyed.
  • The stickers are numbered consecutively, making outright theft difficult to conceal.
 
  • Small batches of stock could be concealed instead of destroyed by shredding.
  • Blank stock is not numbered, making it easy to conceal a theft.
 

The Conversion: 

  • The stickers can be used (affixed to plates) or sold to others. They are simple to use or convert.
  • The only detection is a random traffic stop and a check of vehicle registration (bootleg stickers will not have a current registration certificate).
 
  • Intact blank stock can be used to create false identification.
  • The only detection is a random check of driver’s license number (traffic stop, credit check, or other). Crude falsifications might be detected more easily.
 

Under the employee theft scenarios (see Exhibit 3), there was little or no control once the stickers and blank stock were stolen. Only random events would reveal an employee theft. Concealment and conversion were easy, so the examiner’s recommendations (which are stated later in this article) had to focus on prevention and detection. Also, because theft was a significant risk in these scenarios, they were rated as “highly likely.”

Exhibit 4: Burglary Scenario 

Adhesive Stickers  Driver’s Licenses 

The Theft: 

  • The safe is left unlocked (but closed) during the day.
  • There are alarms, including infrared intrusion and safe-tampering.
 
  • Blank stock is stored in a locked cabinet in a computer room.
  • The computer room is a secure location, requiring special authorization to enter.
 

The Concealment: 

  • The adhesive stickers are small and easily hidden while stolen.
  • The stickers are numbered consecutively, making outright theft difficult to conceal.
 
  • Small batches of stock could be concealed.
  • Blank stock is not numbered, making it easy to conceal a theft.
 

The Conversion: 

  • The stickers can be used (affixed to plates) or sold to others. They are simple to use or convert.
  • The only detection is a random traffic stop and a check of vehicle registration (bootleg stickers will not have a current registration certificate).
 
  • Intact blank stock can be used to create false identification.
  • The only detection is a random check of driver’s license number (traffic stop, credit check, or other). Crude falsifications might be detected more easily.
 

The burglary scenarios (see Exhibit 4) revealed the same weaknesses in concealment and conversion. Once stolen, there was little to be done except to rely on accidental discovery. However, theft by burglars was fairly well-controlled. Therefore, these scenarios were rated “unlikely” because the opportunity for burglary was so limited.

Exhibit 5: Unlawful Duplication Scenario 

Adhesive Stickers  Driver’s Licenses 

The Theft: 

  • The size and color of the stickers are easy to duplicate. A piece of colored paper, black ink and glue is all it takes to create a counterfeit license sticker.
  • Stickers are printed with reflective inks which are hard to duplicate.
 
  • Blank stock is imprinted with state seal, which is readily available and easily duplicated using simple scanning and printing devices and a personal computer.
  • Photo and other information are duplicated easily by scanning and retouching with common PC software.
 

The Concealment: 

  • Falsified stickers could be concealed without suspicion, because these stickers rarely are examined closely once adhered to the vehicle. However, the counterfeits would be revealed easily at night because they would not reflect light as do genuine stickers.
 
  • False driver’s licenses could be concealed for a long time without suspicion, because the fraudster could use the license to obtain additional fabricated identification, thereby reducing the need to show the counterfeit driver’s license too often. Only if the police confronted the perpetrator would the fake license likely be detected.
 

The Conversion: 

  • The stickers can be used (affixed to plates) or sold to others. They are simple to use or convert.
  • The only detection is a random traffic stop and a check of vehicle registration (bootleg stickers will not have a current registration certificate).
 
  • Intact blank stock can be used to create false identification.
  • The only detection is a random check of driver’s license number (traffic stop, credit check, or other). Crude falsifications might be detected more easily.
 

The unlawful duplication scenarios (see Exhibit 5) revealed how counterfeit stickers and licenses could be created (the theft), concealed, and converted for personal use. Driver’s licenses were duplicated more easily without detection, but both suffered the weaknesses of easy concealment and ready conversion. The rating on these scenarios was “highly likely” for driver’s licenses and “unlikely” for adhesive stickers due to the unique reflective ink that is difficult to reproduce and can be detected easily at night.

Summary of the Scenarios 

Analyzing the scenarios exposed the fraud risks for the DMV, allowing the examiner to make recommendations for an anti-fraud environment. They were as follows:

  • Employee theft is highly likely for license plate adhesive stickers due to excessive exposure. To deal effectively with this exposure, adhesive sticker stock should be under the custody of one clerk and disbursed to customers solely by one other clerk rather than allowing general access to the stock. Daily reconciliation by a supervisor and periodic auditing of the submitted documents also should be part of the improved risk management process.
  • Both employee theft and unlawful duplication are highly likely fraud risk scenarios for driver’s licenses. Because the blank stock cannot be adequately controlled, the risk management solution should be to change the stock to hard plastic cards with embedded holograms and magnetic encoded strips. Without special hologram and encoding equipment, this new plastic stock would be difficult to reproduce.

Scenario planning predicts the likely forms in which fraud will arise, allowing management to make adjustments to processes and procedures before problems begin. By using this method, CFEs can enhance their abilities to foresee high-risk situations and perhaps stop potential fraudsters from committing future crimes.

David McNamee, CFE, CIA, CISA, CGFM, is president of Management Controls Concepts in Alamo, Calif., and a life member of the Association. 

The Association of Certified Fraud Examiners assumes sole copyright of any article published on ACFE.com. ACFE follows a policy of exclusive publication. Permission of the publisher is required before an article can be copied or reproduced. Requests for reprinting an article in any form must be e-mailed to: FraudMagazine@ACFE.com.  

Begin Your Free 30-Day Trial

Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.