Remote working: Tackling timesheet fraud

With potentially the entire workforce logging on from home, many organisations will worry about timesheet fraud and consider electronic monitoring solutions. But this could be an own goal. More holistic, behavioural approaches may be a better way to both prevent fraud, and support staff.

man sitting down and using his laptop

I remember when ‘working from home’ was seen as a bit of a jolly, and greeted with wry smiles from colleagues. Now in the wake of COVID-19 it looks set to become the norm, at least for a while. Employers may worry about employees misrepresenting their time, and wonder whether they need to heighten monitoring through computers and smartphones.

There is a place for these kinds of technologies. Certain types of electronic monitoring can be prudent for certain types of work. But for many organisations – especially those new to remote working at scale – this could turn out to be a mistake. There are better ways for organisations to protect productivity and support their teams during crises like this.

Humans, not machines

MotivationThe fraud triangle, based on the work of Donald Cressey, is so robust we’re still using it 70 years after it first appeared. In this model of dishonest behaviour, a key component of fraud is rationalisation – the way that we make ourselves comfortable with what we want to do.

When I open my casebook of internal fraud investigations, a rationalisation that crops up repeatedly is the perpetrator’s sense that the organisation has wronged them – that the fraud would be retribution, justice, rebalancing the scales.

This is important. If an organisation adopts intrusive methods that leave employees feeling devalued and untrusted, then this can open up the possibility of that rationalisation. Combine that with financial or logistical pressure generated by the COVID-19 crisis (motivation) and the clear opportunity, and the fraud triangle is complete.

Instead, we need to think more broadly about the impact of home-working on fraud, and more carefully about human factors, before we jump to thinking about controls.

Start with a new fraud risk assessment

man and woman in a meeting

Sending the workforce home is a major change of circumstances – one big enough to affect your organisation’s internal fraud risk profile. Risks beyond timesheet fraud will be affected. For example:

  • What could be the effect on expenses fraud?
  • Will the rise in e-mail and online communication heighten vulnerability to cyber, data security, and privacy threats?
  • If a health and safety assessment hasn’t been carried out on a person’s home workstation, is there a risk of false claims for which organisations may be unable to defend themselves in some jurisdictions?

It’s time for a new fraud and corruption risk assessment.

Taking a human-centric approach

16404-a-woman-in-a-business-meeting-pvWith the risk assessment providing a clear picture of what could go wrong, there may be places in which technology can help. But there are others in which we need to think about humans.

In a time where our people feel frightened and stretched, it is nurturing, caring leadership that will both support them and help to prevent and detect fraud. It’s not only possible to do both, but vital. Managers are the key controls. In retail, smiling as a customer enters can make them feel welcome – and deter shoplifters by showing they’ve been noticed. The principle is the same here. Good day-to-day remote management of employees leaves them feeling empowered and enabled, but also helps to deter, prevent and detect internal fraud.

For example:

  • Train and develop managers in the potentially new task of supportive remote leadership;
  • Create nurturing, mutually-problem solving relationships within teams, reducing the likelihood that people will feel the need to hide things (which can help to generate the right conditions for fraud);
  • Consider online collaboration platforms. Some have amazing functionality to improve connections between remote workers, which also helps to preserve accountability;
  • Provide managers with clear guidance on fraud red flags.

drawing feedback logos critique

At the corporate level, review HR policies from an anti-fraud perspective. For example, flexible working is also about time, not just location. Business closures means that employees may now have to balance caring for children and the elderly, and seizing sudden opportunities to buy essentials, with their work-day. A flexi-time policy is a great way to prevent employees misrepresenting their work hours. Have an anti-fraud specialist examine your policies.

Meanwhile, with your employees now physically disconnected from the social norms, cues and wider internal culture that helps to regulate their behaviour, reassess how you will manage internal culture. How will you shape how employees think, feel and act in line with an anti-fraud culture when they’re not in your building? Now might be the time to step up behaviour-shaping online materials, and anti-fraud communication and awareness initiatives.

volkswagen-569315_1920There are a surprising number of organisations that already embrace remote working, especially in the humanitarian and global development sector. Reach out for advice. How are they managing the risks? What has worked and what hasn’t for them?

Finally, manage your own cognitive errors, biases and heuristics. Fraud and corruption love availability bias, for example, the phenomenon in which we focus on the most visibly present issues and risks. Because fraud hides and masquerades, that bias allows it to shuffle off into the darkness. Don’t let that happen. Fraud is agile and will already be adapting to this new world, you need to think about how your organisational efforts to deter, prevent, detect and respond to it will too.

Towards organisational health

Some employee monitoring solutions – especially those at the leading edge – are exciting, minimally intrusive and potentially very useful. But organisations should take care not to panic-buy. Just as with COVID-19, fighting the virus that is fraud starts with careful, risk-based preparation.

Did you find this article useful? Why not check out Oliver May’s books on tackling fraud and corruption?

Content at Second Marshmallow does not necessarily reflect the views of the author’s employer, clients or others. Check out our Disclaimer for more information.

Mean Distribution: Fraud in beneficiary distribution lists

in this guest post, Najwa Whistler offers some insights into preventing and detecting fraud in beneficiary distribution lists. Experiences have been anonymised. Images are used for illustration only, and there is no suggestion that the events shown involved any of the issues discussed in Najwa’s article.

800px-Red_Cross_aid_distribution_in_Port-au-Prince_2010-01-25_2
NFI distribution in Port-au-Prince, Haiti (Red Cross, 2010)

A common form of evidence that a distribution of food or Non-Food Items (NFIs, such as hygiene kits), a training event, or any other service actually took place is a list of named recipients. This might be either pre-printed or handwritten, and featuring the signature or fingerprint of the recipients. In principle this should work – but does it work in practice?

From the experience of my colleagues and I in different NGOs, in both emergency and non-emergency contexts, here are some real-life examples.

One organisation was distributing NFIs in a very insecure location to the most vulnerable population. The organisation relied on its local staff for the distribution, beneficiaries were asked for a fingerprint as the unique identifier of receipt, and the senior managers were satisfied upon receipt of all the distribution lists. But when an audit was conducted by the donor, the auditors became concerned about the lists and sent them to a forensic laboratory. The results came back that all the prints belonging to just five individuals, and not all were finger prints. I couldn’t remove the image from my head of someone dipping their toes in ink!

800px-Patiently_waiting_for_food_aid_in_Bamako,_Mali_(8509960593)
Food distribution in Bamako, Mali (WFP/DFID, 2013)

While the organisation went the extra mile to reach the unreachable and ensure no beneficiary was left behind, five people were going the extra mile to spend hours faking records to steal from them.

Another example is when these records come back crisp, clean and as good as new. You can be almost sure that the papers have never left the desk of the supervisor. Other things to watch out for closely are signatures that are easily recognised as being signed by the same person, signatures with repetitive recipient names, or family names that alternate with first names.

Of course, these red flags do not necessarily mean fraud has taken place. Sometimes, for example, one person signs on behalf of other beneficiaries because they couldn’t all travel to the point of distribution. Or maybe the supervisor signs on behalf of the beneficiaries because it is not practical to collect a signature or fingerprint during the distribution. These situations are different to the creation of phantom beneficiaries, or falsely confirming that a service or item has been delivered.

What can we do about it?

In acute emergencies, the efforts should be focused on reaching people, eliminating their suffering, and treating them with dignity and respect. Collecting recipients’ confirmation can be impractical at times.

drone-1142182_1920In these situations, organisations can rely on alternative evidence of the delivery, such as the evidence of the supplies’ transport to, and arrival at, the point of distribution. Distributions can also be recorded with modern technologies such as biometrics, body cameras on the distributors, or even mini-drones which can be deployed to record at a set altitude above a person wearing a transmitter.

Organisations can also consider:

  • Conducting individual interviews with the staff involved in the distribution. Don’t exclude drivers and guards. They can be good witnesses, giving their experience of the distribution to enable organisations to compare stories for any inconsistencies or reasons for suspicion;
  • Keeping photographs and videos from cell phones if no other technology is available;
  • Ensuring that the delivery team is from different departments in the organisation, where possible;
  • Ensuring that emergency response personnel are trained on the counter-fraud, anti-corruption and whistleblowing policies that the organisation has in place.

pexels-photo-210647In non-emergency activities such as training, incorporating fraud detection into post-event monitoring and evaluation is key. Organisations can randomly select a sample of recipients, contact them for feedback, and verify receipt of the items or service.

Monitoring questions of a training delivery might be:

  • Your name?
  • Did you receive any training in the last 6 months?
  • Who was the provider?
  • Where was the training?
  • What was the subject of the training?
  • What session did you find most useful?
  • How did the training that you’ve received helped you improve in your daily work?
  • Who else attended the training?
  • How do you rate the trainer’s skills?
  • Give one recommendation to improve future trainings, what can be done differently?
  • What is your feedback on the venue? Was lunch provided? Did you receive a per-diem or transport cost? How much did you receive?
  • Any comments/other feedback?

In summary, these days technology has made monitoring and evaluation much easier and more efficient. But even so, we must be careful not to exchange one set of risks for another. The key to successful prevention and detection of fraud in beneficiary lists is to think creatively, both about how we apply controls in difficult circumstances – and how we catch those who collude to overcome them.

passport photoNajwa Whistler is a finance director with 18 years of experience working for several international NGOs around the world. Growing up in a small village in Lebanon in poverty during the civil war built her resilience and determination to work in international development. She enjoys cooking and dancing. You can reach her via naj.whistler@gmail.com

Cover photo: During the crisis in Yemen, ECHO funded a second phase of a cash distribution programme to help 4,000 families meet their basic needs during the pre-harvest lean season between July and December 2012. Close monitoring ensured that money was spent on essential items (ECHO/T. Bertouille, 2012).

 

The Enemy Within: Can whistleblowers rely on you?

Not so long ago, I was remotely managing an investigation into corruption allegations in a country pretty far down TI’s Corruption Perceptions Index.* The allegations had come from a whistleblower, and were serious and complex.

pexels-photo-587063The lead investigator had just returned, fresh off the plane and into our update meeting with the rest of the team. We sat down in a comfortable meeting room, thousands of miles away from the dusty, hectic and often frightening city in which the allegations had arisen. The city was one of those places that was sort-of a conflict zone, sort-of a disaster zone, sort-of a global city and sort-of none of these things. Development specialists and humanitarians worked shoulder-to-shoulder, and projects evolved quickly in response to an endlessly changing local environment.

“Yeah, so, I interviewed the snitch,” she began, with a cheeky smirk.

I stopped the meeting.

“The what?” I said.

Portrait of two beautiful young girlfriends sitting in modern co

‘Snitch’, ‘grass’, ‘squealer’ – this was not the first time that I’d heard investigators themselves using pejorative euphemisms for whistleblowers, informants and sources. It is bizarre; often, without such sources, there would be no investigation. So where does this attitude come from?

There is another dimension of anti-corruption work that’s similarly full of euphemisms, and might offer an answer –  and that’s the act of bribery itself. As Richard Bistrong memorably said, “the language of bribery has many words – except ‘bribery’.”

A ‘drink’, ‘gravy’, ‘tea-money’, ‘consultation fees’ – such language is often an exercise in re-framing, a way to alleviate discomfort with bribery by using words that carry different (and lighter) connotations. So, is the truth that some investigators are uncomfortable with whistleblowers – that there is a deep aversion, perhaps culturally-rooted, to people who ‘tell on others’?

Fortunately, I don’t think many investigators fit into this category, but there are enough that we need to talk about the tension here. Firstly, the truth is that whistleblowers and their reports are the lifeblood not just of an investigation, but of an entire fraud and corruption control framework. Without these reports, we would not necessarily be able to:

  • Gain prior warning of materialising fraud and corruption risks;
  • Conduct trend analysis of risk areas (especially where reports did not contain sufficient data for full action);
  • Plug whistleblower data back into our risk assessment, honing our deterrence and prevention controls;
  • Evaluate the quality of our anti-fraud and corruption culture.

pexels-photo-568027Secondly, whistleblowers face enough challenges already. From stakeholders obsessed with identifying them, to those who try to use the whistleblower’s motivations as a shortcut for judging their credibility (and no – just because a whistleblower is motivated by reward or revenge, it does not mean that their allegations are untrue). Investigators play a critical role in mitigating these risks to them.

Thirdly, and this might come as a surprise to some investigators – whistleblowers don’t just talk to you. So if you fail in your management of them, chances are people will find out – and that impacts upon the chances of anybody else sharing information with you in future. There are more whistleblower horror stories than success stories. After all, if we handle a whistleblower really well, who ever really finds out that there was one?

What kind of investigator are you?

pexels-photo-356079Every so often, I hear investigators at conferences speculating (or riffing online) about what sort of people become whistleblowers. I wonder if a more pertinent question is, what sort of investigator are you? And in particular, how much attention do you give to your eternal, internal battle against cognitive biases, heuristics and errors – a battle critical to maintaining your objective investigative mindset?

Whistleblowers are real people, who for whatever reason, have placed themselves at some risk. I have seen these risks materialise, and it is not pretty. So, how can we ensure that our investigative practice sees whistleblowers as constructively as possible?

16404-a-woman-in-a-business-meeting-pvReflect on your own attitudes. What assumptions do you make, and bring to work? Are they valid, or are they biases? How might they affect your work? What could the consequences be?

Treat whistleblowers as an asset. Although an investigator is not necessarily there to be an ‘advocate’ for a whistleblower, they should ensure that the whistleblower’s material is treated objectively and securely, that they are treated fairly, and that the risks to them are properly identified, considered and managed as far as possible.

Business agreement deal at coffee shopEmbrace hot and cold debriefs. (Or ‘immediate and delayed’ debriefs.) Adopt a cycle of evaluating your own performance and incorporate how you handle whistleblowers into it. Handling a whistleblower includes how you interact with them, treat their information, manage the investigation around them, and manage other stakeholders.

Challenge the litany of euphemisms. Language affects how we think and act. Let’s call whistleblowers by their proper designations – confidential sources, confidential informants, confidential reporters, whatever the term your organisation or local regulatory environment uses. Don’t let investigators call them ‘snitches’.

The way that we allow ourselves to think about those who participate in our investigations can be the enemy within us. We need to manage it as we would manage any other risk.

FFCHGDS* Details have been changed. Images do not necessarily represent the locale or persons described.

Find out more about handling whistleblowers, building a meaningful fraud and corruption control framework, and more for humanitarian and development organisations in Fighting Fraud and Corruption in the Humanitarian and Global Development Sector (Routledge, 2016).

It’s out now – treat your office!

Aid diversion to terrorists: 3 things NGOs need to know

This week I’ve been in Nairobi, Kenya, delivering workshops for local NGOs on minimising the risk of money-laundering and terrorist financing. Preparing the material led me to reflect on some of the conversations I’ve had with NGO managers about reducing the risk that physical assets, funds and stock might fall into the hands of those designated as terrorists, or subject to financial sanctions.

Diversion_11This presents a very challenging issue for NGOs that work in high-risk areas, and one with significant tensions at its heart. These include the tension between minimising the risk of diversion versus disrupting the delivery of aid, competing obligations on the ground, and the wider balancing act between regulation and enforcement versus guidance and capacity building.

It does not help that the international regulatory picture and sectoral response are far from coherent, and subsequently it is understandable that there are widespread misunderstandings. This is not an exhaustive article, of course,  but we’ll explore (in no particular order) some of the most common areas that have popped up in my conversations around the sector.

Audit may be unlikely to pick up incidents.

16811751576_856ea1d5f2_oAudit is a helpful process that assists managers to meet their organisational goals and minimise risks. It is not its purpose to detect financial crime (less than 20% of detected fraud cases are identified this way). That’s assuming, of course, that systematic and independent audit even happens – in remote programmes, conflict zones or humanitarian emergencies, whole projects in some organisations may see little or no independent review at all.

NGO managers need to avoid the errors of assuming that a detection-free audit is an all-clear, or that it is solely the duty of auditors to prevent and detect financial crime, rather than everybody’s responsibility. ‘Protection money’ or ‘taxes’ paid to terrorist groups can be masked as vague costs, such as ‘transport’ or ‘security.’ If identity and sanctions list checks of partners, contractors, consultants, staff and volunteers were not conducted, auditors won’t necessarily pick up positive hits either. Audit may help identify vulnerabilities, but it cannot be relied upon to spot incidents.

Instead, according to FATF, factors that might elevate an NGO’s risk include programmes in close proximity to terrorist groups, and/or those that are ‘service’-oriented; these could include construction and distributions (i.e. operations more likely to involve the movement of physical assets, funds or stock). An NGO in this position needs to ensure that it implements a meaningful risk management cycle, creating space to look for vulnerabilities and taking reasonable precautions. Risk assessment is only a bureaucratic ‘tick-box exercise’ if we let it be – it can be a powerful method to spot what could go wrong and do our best to prepare for it.

Transferring all the risk to local partners isn’t fair.

afghanistan-90761_1920In my book, I suggest that a chain of unbridled risk transfer from back-donors to INGOs to local partners has the opposite effect of protecting funds – it increases the risk of fraud and corruption. In the end, too much risk derived from decisions taken in coffee-laced, air-conditioned meetings in Brussels, London and Kabul sits on the shoulders of one Afghan worker standing in the sun at a checkpoint in Badakhshan. This is poor risk management, poor partnership-working, and poor diversion prevention.

The flow needs to be inverted. Rather than just responsibility flowing from back-donor to local organisation, communication about the nature of the risks needs to flow the other way, and provoke increased investment in capacity-building and shared responsibility. There are difficulties with reconciling programmatic objectives and terrorism risk (‘what if we really can’t access that population without a payment?’), but we will not start to address these if agencies hide behind risk transfer to avoid the conversation.

Relying on assurances of non-prosecution is dangerous.

getoutofjailIn 2015, the UK government issued guidance describing the risk of a prosecution for a terrorism offence as a result of involvement in humanitarian efforts or conflict resolution as ‘low.’ This was encouraging in terms of the British government’s recognition of the vital need for humanitarian work in conflict zones and the difficult circumstances in which it occurs. However, we need to be cautious about how we respond to this in terms of our investment in minimising the risk – we might have been here before.

In 2010, the Bribery Act led to a flurry of compliance activity amongst NGOs keen to avoid prosecution for failing to prevent bribery. According to some, however, unnamed British officials apparently indicated to nervous NGOs that their organisations were not the focus of this legislation and appeared to imply that they would not be paid much attention. Some perceive that, sadly, this well-intentioned move contributed to a dwindling of effort amongst some NGOs in developing meaningful compliance frameworks. (Ironically, in this regulation with strong ‘prevention’ requirements, it is the dwindling of effort and its consequences that could potentially elevate the chances of prosecution!)

Save_the_Children,_Westport,_CT,_USA_2012Implied assurance of non-prosecution is always caveated, is not always made by those with the correct authority, and might not relate to that which is perceived. The British guidance note, for example, does not indicate whether it is referring to placing resources in the hands of terrorists (potentially s15-18 Terrorism Act offences), failing to have sufficient systems to prevent sanctions breaches (potentially a s34 Terrorist Asset Freezing Act offence of neglect), failing to report a suspected funding offence (s19 Terrorism Act), or some of those, or none – and so on. In any event, any decisions would be made on the basis of the prevailing circumstances of the case and it is worth noting that Save the Children International were investigated by the Metropolitan Police for allegedly failing to report a suspected incident of theft by a terrorist group in Somalia.

This situation also comes with an ethical choice – if we are not to be prosecuted, is it okay to commit the offence? Our donors and supporters may have something to say about that.

Assurances of the low probability of prosecution are not literal Get Out Of Jail Free cards. Instead, a pragmatic response for NGOs might be to continue to do all that is reasonable to comply with regulations, invest in proper systems to reduce the risk of both incidents and non-compliance, and maintain dialogue with authorities on the implications for humanitarian operations generated by the intricacies of their regulatory regimes. And there is no substitute, of course, for professional legal advice.

Conclusion

As with many of the corruption risks facing NGOs, the issues are complex and difficult. NGOs require the understanding – and patience – of the public, their donors and host governments. However, there is much that NGOs can do to reduce these risks.

Many of the systems and approaches that minimise the risk of diversion represent good governance and management – creating space for proper planning and monitoring of operations, ensuring that open internal communication channels exist, investing in the coherent verification of outputs, the diligent management of third parties, and so on. Getting these things right in areas where we are more able to do so reduces overall exposure, allowing us to focus our problem-solving on the areas where things are more challenging.

Improving transparency – or, in old money, having the conversation – will start the ball rolling.

Going round in circles: Do NGOs and fraud hide from each other?

In the Foreword to my book, Fighting Fraud and Corruption in the Humanitarian and Global Development Sector, fraud expert Jim Gee mentions the ‘un-virtuous’ circle of fraud detection in the third sector.

I thought I’d draw up what this circle might look like. The starting point, as previous blog posts have mentioned, is that fraud and corruption hide. So, in essence, the un-virtuous circle means that NGOs, nonprofits and charities can lose physical assets, funds, and stock regularly and in potentially significant quantities without any red lights appearing on management’s dashboard. It is fuelled by a fear of the consequences of detection – the potential impact on public reputation, donor relationships, staff morale, and project delivery.

The un-virtuous circle might look like this:

Slide1

water-783355_1920Another way to think of this concealed drainage is like corrosion under your car – unless you go looking for it, you won’t ever realise its presence, scale and danger… until your car falls apart in the middle of the motorway. You may fear the consequences (e.g. costs involved) of detecting the corrosion and needing to deal with it, but these costs in the long run are less than those that the motorway incident might involve.

Concealed drainage vs squeezing every drop from our resources

background-906145_1920As public scrutiny of the sector rises, together with increased recognition of the scale of fraud and corruption risk facing such organisations, we need to move to a virtuous circle, fuelled by a desire to secure donor, public and staff trust by evidencing accountability and transparency. A virtuous circle might look like this:

Slide2

In this circle, global development organisations invest in a counter-fraud framework that detects incidents, allowing them to take an evidence-based approach to developing ever-more effective counter-measures and therefore reduce their exposure to fraud and corruption.

Improving the detection of fraud and corruption

‘But what if my organisation really doesn’t have any fraud?’ one might ask. Possibly, but given the scale and nature of the risk factors affecting humanitarian and global development organisations, wider under-detection is a better explanation of low detection.

A holistic approach means that countering fraud and corruption is not just about detecting suspicious matters, but detection is an important strand. In addition to effective and embedded detective controls (such as inventories and reconciliations), key detective methods for humanitarian and global development organisations should include:

  • Clear ‘overt’ reporting mechanisms for staff and third parties to raise concerns with line management;
  • Confidential reporting mechanisms for staff and third parties to report with an expectation of confidentiality and safety;
  • Dedicated work to build trust in ‘overt’ and confidential systems amongst staff, and to communicate and promote these systems;
  • Beneficiary feedback mechanisms;
  • The use of electronic systems to identify ‘red flags’, anomalies and patterns;
  • Proactive examinations of records (‘fraudits’);
  • Information-sharing with third parties, such as other INGOs or information exchange services;
  • Methods to provide early-warnings of incidents, or rising risk, in local partners;
  • Investment in the wider components (deterrence, prevention, response, strategic management, cultural development, and enabling activities) of a holistic counter-fraud and corruption framework that support the detection agenda.

FFCHGDSFind out more about the risk that fraud and corruption pose to humanitarian and global development organisations, and how they can better deter, prevent, detect and respond to it, in my book! Click here to get your copy of Fighting Fraud and Corruption in the Humanitarian and Global Development Sector from the Routledge website or Amazon!

Mind your head: How the push for low overheads in charities raises the risk of fraud

Caution ticker

Caution ticker

In December, an outfit called the True and Fair Foundation drew the ire of the UK third sector with a report attacking the amount spent on ‘charitable activities’ versus other spending such as ‘overhead.’ The analysis was flawed (Pesh Framjee comprehensively dismantles it here), but the incident was notable as yet another attack on NGOs which played to the idea that costs not seen as directly related to delivery are wasteful at best and, at worst, self-serving. It is a notion that some researchers have argued leads to a ‘non-profit starvation cycle,’ pushing non-profits into a race to the bottom for lower and lower declared overheads.

Proponents of the drive for ever-lower ‘overhead,’ ‘administration’ or ‘support’ costs are often unclear (or contradictory) about what expenditure is actually meant. The impact of the drive is that many NGOs are incentivised to cut to the bare bone anything with a whiff of ‘support cost,’ and which cannot be said to directly relate to delivery. This can include finance, human resources, IT, investment in systems, supply chain management, procurement, wider logistics and other costs.

This has a range of consequences for the effective operation and development of NGOs, but a particular ramification is the increased vulnerability to fraud. Anecdotally, my NGO counter-fraud colleagues and I rarely see a case of fraud or corruption where significant improvements to prevention – that is, having policies, procedures and systems,  proper management oversight, the independent review of both, and a coherent riskLiberia map management framework – would not have significantly reduced the chances of it happening.  An example might be World Vision’s experience in Liberia, where staff stole approximately $1m of food and construction materials. World Vision’s statement following the case listed a number of changes in the wake of the fraud.

Key ways that NGOs can more effectively prevent fraud and corruption, thus living out the stewardship that their donors and supporters expect, include:

  • Conducting fraud and corruption risk assessment before and throughout a project;
  • Performing due diligence on new staff, contractors, consultants and local partners;
  • Designing,  implementing and complying with robust systems of financial control;
  • Conducting proper checks before authorising expenditure, and keeping accurate records of stock movement;
  • Utilising electronic systems where possible, making funds and stock easier to track;
  • Properly monitoring and evaluating projects;
  • Training staff and managers in how to identify and respond to the signs of fraud and corruption.

What becomes clear, of course, is that many – if not all – of these require investment in what some might think of as overhead, administration or support costs. Conducting checks before authorising payments, for example, requires staff to do it. As they say in the theatrical industry, it’s about ‘bums on seats.’ Both the bum, and the seat, are support costs.

This narrative, and the resultant dynamic, can leave NGOs who respond to it more vulnerable to fraud and corruption. The damage is not just limited to prevention, either – it also impacts upon detection. Because fraud and corruption are designed to hide, they are unlikely to be picked up without investment in the systems and functions to do so. This contributes to the ideal conditions for fraud. The idea that low overhead, administration or support costs automatically mean greater resource for delivery is immediately debunked – because without them, at least some of that delivery can be happily and secretly stolen.

firefighterIronically, of course, a driver behind the flawed narrative is a desire to see good stewardship in NGOs. But in the same way that it would not represent good stewardship for a fire department to send firefighters into burning houses without protective clothing, it does not represent good stewardship for charities to move resources around without sufficient protective systems clothing those resources. Although there is, of course, a balance to strike – enormous overhead, administrative and support costs are a red flag – under-investment in prevention, and the infrastructure that makes prevention happen, is a key enabler of fraud and corruption for NGOs.

Five suggestions to change the dynamic

  • Reduce the extent to which your NGO fuels the paradigm. Avoid semantic games and creative reporting about what costs are, and are not, ‘delivery’ or ‘administration.’ Be clear in reports about what broad terms mean;
  • Celebrate the value of ‘support-side’ work. Supporter marketing usually focuses on delivery activities – consider promoting and explaining the powerful contribution made by what might be thought of as ‘administration’. Delivery happens because of support costs – not in spite of them;
  • Educate courageously in the public space. The Charity Defense Council (of which Dan Pallotta is a director) in the US is a good example of clear and determined voices tackling the pressure on charities;
  • Take every opportunity to claim ‘support-side’ funding. Where institutional donors make funds available for support costs, use them. If funding is available for a compliance officer, for example, employ one!
  • Invest in ‘overhead’, ‘administration’ or ‘support’ in the first place. These expenditures may not come with the inspiring business cases or immediate sense of reward that programmes might, but they are no less vital for making sure that those programmes happen, and that they are the best and most sustainable they could possibly be.

 

FFCHGDSFind out more about the risk that fraud and corruption pose to humanitarian and global development organisations, and how they can better deter, prevent, detect and respond to it, in my book! Click here to get your copy of Fighting Fraud and Corruption in the Humanitarian and Global Development Sector from the Routledge website or Amazon!

 

Welcome!

file00099997224.jpg

Welcome to the blog devoted to helping humanitarian and global development organisations to reduce fraud and corruption.

Posts are filed according to the different components of the holistic approach and some of the key issues in tackling fraud and corruption in development today.

Click on the category of your choice to get started!