Chapter Member Photo: Kari Overson

Investigating Fictitious Businesses: Techniques and Notable Cases

October 20, 2024 10:00 AM | Anonymous member (Administrator)

Fictitious businesses, often used for laundering money, inflating invoices, or diverting funds, represent a growing challenge for fraud examiners. Fraudsters use fake companies, often masked behind shell corporations and false identities, to manipulate financial systems. In recent years, cases like that of Registered Agents Inc., revealed by a Wired investigation, show how easily criminals can create entire personas to deceive regulatory systems.

Key Indicators and Techniques for Detecting Fictitious Businesses

1. Public Records & Corporate Registry Searches

Fraud examiners begin by scrutinizing corporate filings, seeking anomalies in registration data. Fictitious companies often lack historical records, or provide inconsistent details, such as listing residential addresses for corporate headquarters or using P.O. boxes. One recent example involved fake "registered agents" used in schemes to hide the true beneficial owners of businesses. By comparing data from state corporate registries and regulatory filings, investigators can spot patterns of suspicious behavior.

2. Beneficial Ownership Investigations

Fraudsters often layer ownership structures to obscure who controls a business. Investigators can identify shell companies by examining financial documents and cross-referencing ownership structures across jurisdictions. The infamous Panama Papers leak in 2016 exposed how international shell companies were used to facilitate tax evasion and money laundering, highlighting the importance of tracing beneficial ownership in fraud cases.

3. Online Presence and Verification

A fictitious business typically has a limited or non-existent online footprint. Fraud examiners can use open-source intelligence (OSINT) techniques to search for the company’s digital footprint, examining websites, social media profiles, and customer reviews. Investigators should also verify physical locations, phone numbers, and email domains to ensure the company is legitimate. The Theranos case, for instance, illustrated how fraudulent companies can appear legitimate through elaborate marketing while failing to deliver on their actual business claims.

4. Cross-Referencing with Vendor and Financial Records

In procurement fraud, fake companies are often used to generate false invoices and inflate costs. Fraud examiners should review vendor lists and financial records, comparing the frequency and amount of payments made to suppliers. The CityTime fraud scandal in New York City saw contractors creating shell companies to siphon millions from government contracts through false billing.

5. Use of Data Analytics

Data analytics tools can help fraud examiners sift through vast amounts of financial data to detect irregularities that might indicate fictitious businesses. Investigators can flag unusual patterns, such as high-volume transactions between seemingly unrelated entities or sudden increases in payments to new vendors. In a well-known case, the WorldCom accounting fraud was partially uncovered by identifying large, unexplained financial transfers between subsidiaries.

Conclusion

Fictitious businesses are at the heart of many large-scale fraud schemes. Fraud examiners must be vigilant and use a combination of public records, beneficial ownership tracing, and digital intelligence to uncover these entities. By leveraging these techniques, fraud investigators can detect and disrupt fraudulent activities, protecting organizations from significant financial loss. The recent surge in cases involving fake companies emphasizes the need for diligence in unmasking such fraud schemes and bringing perpetrators to justice.


Copyright © 2024 Pacific Northwest Chapter, ACFE - All Rights Reserved.

"ACFE Pacific Northwest Chapter" is a 501(c)3 non-profit organization. Bellevue, WA

Contact Us Online   or email at info@pnwacfe.org

Powered by Wild Apricot Membership Software