Chris Wyatt
All books
Cover of Agentic Payables

2025 · By Chris Wyatt

Agentic Payables

The Dawn of Autonomous Finance

Chapter 1: The $3 Trillion Ghost in the Machine · ~6 min read

Chapter 1: The $3 Trillion Ghost in the Machine

Mark, the Accounts Payable manager at Legacy Corp, liked to say his department was the firm's engine room. Down in the windowless back office, his team of twelve clerks made the gears of commerce turn. They were diligent, loyal, and exceptionally good at their jobs as they had been defined a decade ago. Every month, they processed over 10,000 invoices, ensuring the company's suppliers were paid. In Mark's view, it was a well-oiled machine, built on a foundation of process, control, and the comforting, rhythmic clatter of keyboard strokes and rubber stamps.

This was the illusion of control. The belief that because a process is familiar, it is therefore effective; that because it has always been done this way, it is therefore safe. The reality of Legacy Corp's engine room was not one of well-oiled machinery, but of a dozen people frantically managing the vulnerabilities of a dated system. They were the highly-paid human middleware in a process that had not evolved with the modern world.

The story of the modern back office is this story. It is a story of a ghost in the machine: a silent, persistent drain on capital, trust, and human potential. This ghost is occupational fraud, and its cost is significant. According to the Association of Certified Fraud Examiners (ACFE), the typical organization loses an estimated 5% of its annual revenue to this issue. For Legacy Corp, with annual revenues of $400 million, that 5% represents a potential $20 million leak, a figure that never appeared as a line item on any budget.

It is a natural response for leaders to believe 'this doesn't apply to us.' They trust their people and their processes. But this loss rarely appears as a single, catastrophic event. Instead, it is the sum of a thousand tiny cuts. The ACFE's 2024 global study, which analyzed 1,921 real cases, tallied direct losses of over $3.1 billion. When you extrapolate that data across the global economy, the total cost swells to trillions of dollars, a hidden tax on commerce so vast it demands to be treated not as a petty crime problem, but as a C-suite-level strategic imperative.

This challenge is composed of two distinct but related issues. The first is the dramatic, headline-grabbing problem of Fraud. The second is its quieter, more insidious twin: the colossal weight of Inefficiency. At a company like Legacy Corp, both issues were prevalent, and the organization had normalized the cost.

The Inefficiency Tax

Before addressing criminal fraud, we must first look at the environment that allows it to flourish. It is a world defined not by malice, but by manual, monotonous work; a world that creates the perfect camouflage for malfeasance. This is the world of the Inefficiency Tax.

Let's spend a day with Sarah, Legacy Corp's star AP clerk. Her day begins with a stack of paper invoices and a separate folder of PDFs that have been printed from a shared email address. For each one, the ritual is the same. She manually keys in the vendor ID, invoice number, date, purchase order number, and each line-item amount. A single typo could result in a duplicate payment or a costly vendor dispute, so she double-checks her work. Next, she stands up, walks to a massive filing cabinet, pulls the corresponding documents, and staples them together into a "packet" for her manager's review. From mailroom to payment, the journey for a single, routine invoice took, on average, 18 days.

This is the Inefficiency Tax in action. According to industry benchmarks from firms like Ardent Partners, a truly automated, best-in-class system can process an invoice for as little as $3.18. At Legacy Corp, an internal study pegged their all-in cost at a staggering $19.83 per invoice. The difference, a stunning $16.65 per invoice, is the tax. For Mark's department, this tax amounts to over $1.9 million annually, not spent on innovation or talent, but on the operational friction of a broken process.

This inefficiency does more than just waste money. It creates the perfect environment for fraud. The sheer volume of manual work creates a "process hypnosis" among the staff. When your job is to approve thousands of legitimate transactions, your brain becomes conditioned to approve. A fraudulent transaction that looks 99% like a real one is almost guaranteed to slip through the cracks, because the cracks are wide enough to drive a truck through.

Anatomy of the Heist

The AP department is a primary crime scene for a simple reason: it's where the money leaves the building. The ACFE's data is stark: asset misappropriation schemes are the most frequent type of fraud by an overwhelming margin, present in 89% of all cases. These schemes are not always the work of shadowy hackers, but often of trusted insiders and clever impostors who know precisely which process gaps to exploit.

The Shell Company: The Enemy Within

Let's meet David, a marketing director at Legacy Corp. He knows that while product-related purchases are scrutinized, invoices for "marketing services" are often approved with less rigor. David establishes a shell company and begins to bill his own employer for "Strategic Brand Consulting." In the AP queue, Sarah receives the invoice. It has no PO number, but for a consulting retainer, that's not a red flag. She routes it for payment. For eighteen consecutive months, David quietly siphons off $324,000 before an anonymous tip triggers an investigation. The data reveals a chilling pattern: the median loss for a fraudster with more than ten years of service is a quarter of a million dollars, five times that of a new employee. David was the statistical archetype of the trusted insider threat.

The Impostor: The Enemy Without

The internal threat is now amplified by an even more dangerous external one. PwC's Global Economic Crime Survey found that in nearly 70% of disruptive fraud incidents, the attack came from an external actor or, more alarmingly, from collusion between an insider and an outsider. This is how Legacy Corp lost $4.8 million, as detailed in the introduction. But that was not the only attack they suffered. Six months earlier, a fraudster, posing as a legitimate supplier, convinced a junior AP clerk to update their bank details over the phone. There was no independent verification. The next payment for $72,000 was wired to the fraudster.

The Slow Bleed: The Cultural Rot

Not all fraud is a dramatic heist. At Legacy Corp, the expense reimbursement process was a known weakness. A top salesperson submitted reports that consistently included weekend meals with "clients" that were actually family dinners. Another padded every mileage claim by 20%. Expense reimbursement schemes, found in 15% of ACFE cases, can go undetected for an average of 18 months. For Legacy Corp, the leakage from this channel alone was estimated to be over half a million dollars a year.

The immediate temptation is to blame these failures on individual employees. But this view misses the deeper truth. These schemes did not succeed because the people were foolish; they succeeded because the system is designed in a way that makes smart people vulnerable.

The Reckoning

The ghost that haunted Legacy Corp's engine room was not an intruder. It was a resident. It was an emergent property of a system that treated fraud as a rare anomaly and inefficiency as an unavoidable cost of doing business. For Mark, the AP Manager, a reckoning came the day he had to explain the significant fraud loss to the CFO and the board. As he stood before them, he realized the catastrophic event wasn't a single failure, but the culmination of a thousand unaddressed vulnerabilities. It was enabled by the same manual data entry that caused the Inefficiency Tax. It was covered by the same lack of visibility that allowed David's shell company to thrive.

The system wasn't just leaking. It was hemorrhaging. And the people in the engine room, for all their loyalty and hard work, had been given nothing but buckets to bail out the flood. They didn't need more buckets. They needed a new engine.

Related thinking

Want the full book?

The full book picks up where this chapter ends. Available on Amazon.