Fraud

Procurement fraud: common schemes and how to investigate them

October 25, 2022

Procurement fraud has been a longstanding risk for both private businesses and government agencies. This type of fraud can cost organizations huge sums of money in inflated fees, subpar materials, and more. A recent procurement fraud investigation of a manufacturing company with operations throughout Asia uncovered losses worth over $1 billion (1). Emerging markets are at particularly high risk for procurement fraud schemes, but businesses and governments around the world need to be vigilant.  

This article covers the basics of procurement fraud: what it is, what procurement fraud schemes look like, and common red flags. We also look at how new analytics technology can help analysts detect and investigate a procurement fraud scheme.

What is procurement fraud?

Procurement fraud is the manipulation of a procurement process. In a typical scenario, a vendor is engaged for a contract above the market price in exchange for a kickback in the form of cash, material goods, or other benefits for the employee awarding the contract. Procurement fraud also includes the manipulation of the bidding process among vendors. And it can also include fraud that happens after the contract has been awarded, with a supplier delivering subpar materials for example.

Procurement fraud schemes

Bad actors have many ways of carrying out procurement fraud. Some schemes involve collusion between an insider and a contractor; others involve illegal collusion among vendors. Here are some common procurement fraud schemes.

Employee contractor collusion

In this scenario, an employee responsible for the procurement process favors one vendor over another or awards a contract above market price. They do this in exchange for kickback money, goods, or services.

Conflict of interest

Conflict of interest in a procurement process is when a vendor is selected based on a personal relationship: the procurement manager awards a contract to a friend or family member based on that relationship rather than on specific objective criteria. They may do this as a personal favor or in exchange for some kind of material reward.

Bid rigging

Bid rigging involves collusion between vendors who manipulate the bids the business or government agency receives. Contractors may collude to offer identical prices, raise prices, remove competition, etc. In all of these cases, it’s the business or government agency that loses out.

Product substitution

This scheme occurs after a contract is won. The contractor swaps out the promised goods or products for other, cheaper ones and pockets the difference. Substitute goods may be sub-standard, faulty, not certified, falsely certified, not meet specifications, etc. This kind of scheme can end up being extra costly if the business or government agency in question needs to replace the faulty products or repair damage done by them. In extreme cases product substitution can also have a dire human cost (think of faulty medical devices or subpar construction materials).

Procurement fraud red flags

A first step to detecting and effectively investigating procurement fraud is understanding what the red flags are. Here are some common ones.

Unusual or duplicate invoices

Corrupt suppliers may create extra invoices or issue invoices for inflated amounts. This may be done with the collusion of an employee.

Unusually low bids

One bid being obviously lower than the others could be a sign that the vendor may commit fraud (like product substitution) after the contract has been awarded. A late bid that is also low is also a red flag: it may mean the vendor has insider information to position themselves at an advantage.

Connections between employees and vendors

An employee-vendor connection isn’t systematically suspicious. However, it’s problematic when an employee doesn’t disclose a personal, economic, or familial connection since this conflict of interest can prevent a fair bidding process.

Investigating procurement fraud

Procurement fraud can be hard to detect for a number of reasons, making it a difficult problem for auditors or investigators in government agencies and global companies to combat. Part or all of the scheme might be kept off the books and not immediately obvious. And bad actors typically take pains to conceal wrongdoing or red flags, such as personal relationships or shared interests. Last but not least, siloed data in organizations increases the risk of bad actors flying under the radar and forces auditors and investigators to connect information manually before they can find evidence of procurement fraud after time consuming and tedious anti-fraud investigations.

Banner to download ebook "Outsmarting fraudsters with next-generation technology"

Network analytics

The hidden ties between employees and vendors are often at the heart of a procurement fraud investigation, since most commonly a vendor is colluding with an employee. And if fraud is going on, the employee likely won’t have disclosed any connections. 

Because it’s natively built to analyze both data points and the relationships between them, graph analytics - or network analytics - is a powerful asset in procurement fraud investigations. Graph data is structured around nodes (individual data points) and edges or relationships (the connections between nodes.) Graph analytics quickly analyzes which entities are connected to each other and how.

Adding a graph visualization layer using a platform like Linkurious Enterprise enables you to see and analyze the connections you’re interested in in just a few clicks.

Applying network analytics and visualization to procurement fraud investigation

In the case of procurement fraud, connections between entities - employees, vendors, invoices, etc. - often represent the key indicators an investigator needs to uncover a fraud taking place. Graph quickly shows you these connections.

Graph visualization of connections indicating procurement fraud
Graph visualization lets you easily see if an employee shares an address with a contractor.

For example, with graph you can see if an employee shares an address with a contractor making a bid in a given procurement process. You can also analyze social media data to quickly understand if there are any social connections that raise a red flag. And if you have ownership data about your vendors, you can see if an employee has a financial stake in a supplier making a bid. 

Network analytics is also an excellent tool to identify anomalies, including those that can be procurement fraud red flags. You can quickly spot if many invoices have been issued on the same date, for example, indicating potentially fraudulent activity on the part of a vendor. You can also see if there are anomalies in the invoice amounts, such as an abnormal number of small invoices when payments are typically large and infrequent, or larger payments than is typical with a given vendor.  

By visualizing this information, analysts can quickly get to the bottom of an investigation.

Learn more about fraud and network analytics

Network analytics and visualization is a powerful solution for detecting not only procurement fraud, but many other types of complex fraud. See how graph analytics can speed up fraud investigations and improve fraud detection in our in-depth ebook

(1) https://www.financierworldwide.com/procurement-fraud-an-old-fraud-flourishing-in-emerging-markets-and-costing-businesses-billions#.Y1Jp9S8RppR

Subscribe to our newsletter

A spotlight on graph technology directly in your inbox.

TOP