Varieties Statistical Fraud Models: 30 Models in 30 Minutes Daniel Finnegan, CFE ISO Innovative Analytics Quality Planning Corporation.

Slides:



Advertisements
Similar presentations
THE USE OF STATISTICS AND DATA MINING TO INCREASE AUDIT EFFICIENCIES AND EFFECTIVENESS Abraham Meidan, Ph.D. WizSoft Inc.
Advertisements

Chapter 1 Business Driven Technology
Welcome to Jeopardy!.
Paychecks and Tax Forms Take Charge of your Finances
G Personal Finance G  Almost 31% of an individual’s paycheck is deducted  Taxes are the largest expense most individuals will have 
Time Share Fraud Investigations
Data Mining Glen Shih CS157B Section 1 Dr. Sin-Min Lee April 4, 2006.
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Multiobjective VLSI Cell Placement Using Distributed Simulated Evolution Algorithm Sadiq M. Sait, Mustafa I. Ali, Ali Zaidi.
Data Mining Knowledge Discovery in Databases Data 31.
Antonio Lara. Founded: 1852; Roots in banking dating to before the Civil War  PNC has grown into one of the leading financial services organizations.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Proactive Approaches to Detecting Fraud CHAPTER 6.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
Richard A. Derrig Ph. D. OPAL Consulting LLC Visiting Scholar, Wharton School University of Pennsylvania Daniel Finnegan Quality Planning Corp Innovative.
NYS Office of Children and Family Services Technical Solution Initiative Child Care Program Integrity (CCPI) Jim Hart, Director of Regional Operations,
10 Data Mining. What is Data Mining? “Data Mining is the process of selecting, exploring and modeling large amounts of data to uncover previously unknown.
Shilpa Seth.  What is Data Mining What is Data Mining  Applications of Data Mining Applications of Data Mining  KDD Process KDD Process  Architecture.
THE SCIENCE OF RISK SM 1 Interaction Detection in GLM – a Case Study Chun Li, PhD ISO Innovative Analytics March 2012.
Understanding Your Paycheck and Tax Forms
PAYCHECKS Personal Finance PAYING EMPLOYEES There are 3 methods employers may use to pay employees: Paycheck – payment given with a paper check.
Identity Theft Insurance Charles P. Orlowicz November CAS Annual Meeting – Session CS04 A division of the property and casualty subsidiaries.
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
Business Intelligence, Data Mining and Data Analytics/Predictive Analytics By: Asela Thomason IS 495 Summer 2015.
Data Mining Techniques As Tools for Analysis of Customer Behavior
Mining Insurance Data to Promote Traffic Safety and Better Match Rates to Risk 2002 CAS Seminar on Ratemaking Greg Hayward.
On Target Group Coaching
© EZ-R Stats, LLC Duplicate Payments Slide 1 Auditing for Duplicate Payments A better way … Presentation of
FRAUD Prevention & Detection. Group Members Raven Smith Tommy Harville Kedron Hilario.
NYS Office of Children and Family Services Child Care Program Integrity (CCPI) Technical Solution Initiative Jim Hart, Director of Regional Operations,
Banking Savings Checking Credit Cards
1 Comparison of AD (Active Data) and ACL (Audit Command Language) Comparison of AD (Active Data) and ACL (Audit Command Language) January 27, 2011
Integrating the Broad Range Applications of Predictive Modeling in a Competitive Market Environment Jun Yan Mo Mosud Cheng-sheng Peter Wu 2008 CAS Spring.
© EZ-R Stats, LLC Duplicate Payments Slide 1 Auditing for Duplicate Payments A better way … Web CAAT.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 12-1 Chapter 12 Advanced Intelligent Systems.
Predictive Modeling Spring 2005 CAMAR meeting Louise Francis, FCAS, MAAA Francis Analytics and Actuarial Data Mining, Inc
Chapter 6 Payroll Schemes.
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Special Challenges With Large Data Mining Projects CAS PREDICTIVE MODELING SEMINAR Beth Fitzgerald ISO October 2006.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Financial Data mining and Tools CSCI 4333 Presentation Group 6 Date10th November 2003.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Proactive Approaches to Detecting Fraud CHAPTER 6.
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Monday, February 22,  The term analytics is often used interchangeably with:  Data science  Data mining  Knowledge discovery  Extracting useful.
CLRS Intermediate Track II September 2006 Atlanta, Georgia Investigating and Detecting Change.
Understanding Your Paycheck and Tax Forms Family Economics & Financial Education.
Paychecks and Tax Forms Take Charge of your Finances
Paychecks and Tax Forms Take Charge of your Finances
Fraud Mobility Ken Meiser VP- Identity Solutions.
Understanding Your Paycheck and Tax Forms
Understanding Your Paycheck and Tax Forms
Agenda 10/13/2015 Warm-up: Overtime Word Problems
Understanding Your Paycheck and Tax Forms
Understanding Your Paycheck and Tax Forms
Computers and Data Collection
Paychecks and Tax Forms Take Charge of your Finances
Paychecks and Tax Forms Take Charge of your Finances
Paychecks and Tax Forms Take Charge of your Finances
Understanding Your Paycheck and Tax Forms
Understanding Your Paycheck and Tax Forms
Chapter 12 Advanced Intelligent Systems
Understanding Your Paycheck and Tax Forms
Paychecks and Tax Forms Take Charge of your Finances
Understanding Your Paycheck and Tax Forms
Welcome! Knowledge Discovery and Data Mining
Paychecks and Tax Forms Take Charge of your Finances
Presentation transcript:

Varieties Statistical Fraud Models: 30 Models in 30 Minutes Daniel Finnegan, CFE ISO Innovative Analytics Quality Planning Corporation

Benford’s Law in Accounting Fraud

Tests for Manufacture Numbers  Frequency or equidistribution test (possible elements should occur with equal frequency);  Serial test (pairs of elements should be equally likely to be in descending and ascending order);  Gap test (runs of elements all greater or less than some fixed value should have lengths that follow a binomial distribution);  Coupon collector's test (runs before complete sets of values are found should have lengths that follow a definite distribution);  Permutation test (in blocks of elements possible orderings of values should occur equally often);  Runs up test (runs of monotonically increasing elements should have lengths that follow a definite distribution);  Maximum-of-t test (maximum values in blocks of elements should follow a power-law distribution).

IRS Audit Selection System 1964 Rule-Based Scoring System 1970’s TCMP Statistical Audit System 2003 NRP System: A.Random Audits of Sample of Returns B.Identification of Returns “In Need of Examine” C.Statistical Model of DIF score of “Probability of Need to Examine” D.Monitoring and Update of System

Text Mining for Fraudulent Medical Bills  Search for identical typos  Search for identical prognosis  Search for date discrepancies  Holidays  Claimant out of town/dead

Medical Usage Pattern Fraud Analysis  Uniformly high numbers of treatments (Normed on Diagnosis)  High number of modalities per treatment  Few Patients Recover Quickly  Low Percentage of Objective Injuries  Treatment Ends Abruptly at Payment of Claim

FAIS Money Laundering Statistical Detection  Link Analysis with Known Criminal Elements  Pattern Analysis such as Large Sum Deposited and Immediately Withdrawn  Benford Distribution of Deposits and Withdrawals  Circular Movements of Funds

Network Analysis of Auto Accidents

Staged Accident Ring

Sequential Handling of Questionable Claims  Random Sample of 3,000 BI Claims  Decision Flow Model

Timing Claims Curves

Other Threshold Fraud Models  Adding Coverage for Comp  Two-Year New Vehicle Replacement  School Lunch Eligibility

Deviant Purchase Patterns for Credit Card Fraud  Identification of Individual Purchase Patterns (Neural Net Models)  Identification of Typical Fraud Purchase Patterns (Electronics, International Spending)  Movement out of Typical Toward Fraud Patterns  Expert Patterns Such Geographic Dispersion of Purchases

Geographic Analysis of Staged Accidents

Driver’s License Translator Fraud  Pass Rate:  51% vs 95+%  Time to Complete  Minutes vs Minutes

Insider Stock Dealing  MonITARS: Fuzzy Logic, Neural Nets, Genetic Algorithms for London Stock Exchange  Advanced Detection System (ADS) for Nasdaq matches rule-based sequential trading patterns  SONAR matches wire stories to stock trading using pattern analysis to detect stock manipulation

WC Premium Audit Selection Model  Statistical Modeling of 4 Years of Audit Results  Holdback of 5 th Year of Results  Combined Expert Theory and Inductive Modeling  Final Model Built with Multiple Statistical Methods:  Decision Trees, MARS, GLM  Model Concentrated on Key Ratios by Industry  Results more than Doubled Audit Returns

University Student Aid Fraud  Very High and Similar Hardship Deductions (High Medical Bills)  Identical Applications for Student Financial Aid (High Aid with No Audit)  Fraud Clusters by Successful Sports Teams

Work Load Analysis of Medical Billing Fraud  Psychiatrist billing 80 hour work days  Billing on 365 day years  Billing from distant locations  Billing for 200 patients per day

Adjuster – Vendor Pairing Models  Billing Pattern Analysis for 5 Million Claims and 12 Million Payments  Dozen Questionable Patterns Identified:  Relative High Payment Average for Adjuster and Vendor  Identification of Vendors with Multiple Payments to PO Box with Single Adjuster

Social Security Disability Model  Random Sample File Review  Identified Decision Errors/Fraud  Built Multiple Models  Econometric  Decision Trees, GLM, Hybrid  Rule Violation  Decision Maker Focused  Final Artificial Intelligence Model

Sales Agent Rating Models  Sales Agents Mileage Model  Low to Expectations  Below Rating Cut Points  Missing Drivers  Teenagers Low to Expectations  High Permissive Use Claims  Frequent Claims After Comp Added

Food Stamp Store Investigation System  Prior System Viewed as a Success  Random Investigation of 2,000 Stores  Statistical Analysis of Discovered Violations

Food Stamp Investigation Outcomes

VIPER System  Statistical Pattern Targeting  Random Component for Updating  Geographic Clustering Component  Tripled Discovered Violations  Doubled Investigator Productivity

Thresholding Cell Phone Accounts  6-8 Percent Cell Phone Costs Fraudulent  High Volume of Calls and Turnover of Fraud Requires Rapid Response  Account “Thresholding” Process Used  30-Day, Fraud Free, Norming Process  Account Specific Expert Rules on Duration, Location, Timing  Calls Scored Statistical Distance from Norms  Percent of Potential Fraud Calls Monitored  Norms Constantly Updated

Identity Theft Scoring Scoring System Includes Variety of Data Matching and Pattern Analysis Variables  High Numbers of Credit Card or Cell Phone Applications from Address  Identity Variable Conflicts  Mail Drop Address  Impossible SSN Dead, Issued Before Born, Un-issued, Impossible

Statistical Adjuster Assignment Models  Review of Areas of Fraud Loss  Identification of Best Practices for Handling Questionable Claims  Sample Investigation of Matched Samples of 1,500 Standard Handling and 1,500 Enhanced Handling  Statistical Modeling of Handling Gains

Statistical Adjuster Assignment Models

Common Elements of Successful Statistical Fraud Control  Statistical Methods Selected to Fit the Problem (One Size Does Not Fit All)  High Input from Substance Area Experts  Feedback Loop Evaluates and Updates System  Strong Integration with Operations