Introduction to Fraud Examination

Slides:



Advertisements
Similar presentations
Chapter 14 Audit of the Sales and Collection Cycle
Advertisements

CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
Basic Fraud Audit Pertemuan X Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
The Office Procedures and Technology
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Chapter 5 Check Tampering.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
1 Expense Reimbursement Schemes Chapter 7. 2 Explain what constitutes expense reimbursement fraud. Discuss the data on expense reimbursement fraud from.
Cash Receipt Schemes and Other Asset Misappropriations
Chapter 2 Skimming.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 12 Cash Disbursement Schemes
Register Disbursement Schemes
Chapter 9 Non-Cash Assets.
Chapter 3 Cash Larceny.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
No Fraud Left Behind Fraud Risks and Prevention (Info gathered from the Association of Certified Fraud Examiners) Runyon Kersteen Ouellette.
Chapter 3 Cash Larceny.
Billing Schemes. O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Chapter 4 Billing Schemes.
Introduction to Fraud Examination
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
©2008 Pearson Prentice Hall. All rights reserved. 4-1 Internal Control & Cash Chapter 4.
Chapter 10 Cash and Financial Investments McGraw-Hill/Irwin
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
Chapter 5 – The Banking System Lesson 5-1: Checking Accounts
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
Expense Reimbursement Schemes
Chapter 8: Payroll and Expense Reimbursement Schemes
CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.
Chapter 5 Check Tampering.
CJ 125 UNIT TWO SKIMMING AND LARCENY. REVIEW THREE MAJOR CATEGORIES OF FRAUD WHAT ARE THEY?
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
Chapter 1 Introduction to Fraud Examination. 2 Learning Objectives Understand the fraud theory approach. Define occupational fraud. Define fraud. Define.
Chapter 6 Payroll Schemes.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
CJ 125 UNIT FOUR PAYROLL SCHEMES. THE MAIN CATEGORIES OF PAYROLL FRAUD Payroll Schemes Occupational frauds in which a person who works for an organization.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
7-1 FRAUD, INTERNAL CONTROL, AND CASH 7 Remember… people will lie, cheat and steal! Not everybody…. and not all the time.… but they do….
Willet C. Jim Financial Consultant Zenas Legal Practice (ACCA, B.Acc UZ)
Audit of the Sales and Collection Cycle. Identify the accounts and the classes of transactions in the sales and collection cycle. Describe the business.
Internal controls are steps taken to protect assets and keep reliable records. The bank reconciliation is an important internal control. Glencoe Accounting.
Audit of Cash Balances Chapter 22.
Fraud’s Hidden Cost.
Chapter 6 Audit of Cash Accounting 408 Chapter 6.
Accounts Receivable, Accounts Payable & Cash
Chapter 9 Non-Cash Assets.
Fraud & Internal Controls
Larry Brownfield, CPO, OHE – KOA, Inc.
Internal Control and Cash
Copyright © 2015 McGraw-Hill Education. All rights reserved
Reporting and Interpreting Sales Revenue, Receivables, and Cash
Chapter 9 Non-Cash Assets.
Financial Accounting, Fifth Edition
Internal Controls.
CHAPTER 4 Banking.
Types of Cash Accounts Imprest Payroll Account Branch Bank Account
Sarbanes-Oxley, Internal Control, and Cash
Sarbanes-Oxley, Internal Control, and Cash
Internal Controls The comments made by the presenter represent the presenter’s opinions only; these comments and opinions do not necessarily represent.
Daily Financial Practices
Chapter 21 Accounting Practices.
Ch. 5 Cash Control Systems
TESTING THE PAYROLL SYSTEM
Internal Controls.
Cash Handling Policies and Procedures
Internal Controls.
Presentation transcript:

Introduction to Fraud Examination Chapter 1 Introduction to Fraud Examination

Learning Objectives Define fraud examination and differentiate it from auditing. Understand the fraud theory approach. Define occupational fraud. Define fraud. Define abuse. Know the difference between fraud and abuse. Describe the criminological contributions of Edwin H. Sutherland. Understand Donald Cressey’s hypothesis. Give examples of non-shareable problems that contribute to fraud. Understand how perceived opportunity and rationalization contribute to fraud. Explain W. Steve Albrecht’s “fraud scale.” Summarize the conclusions of the Hollinger-Clark study. Summarize the results of the 2010 Report to the Nations on Occupational Fraud and Abuse.

Discipline of Fraud Examination Resolving allegations of fraud from tips, complaints, or accounting clues Documentary evidence Interviewing witnesses Writing investigative reports Testifying Assisting in the detection and prevention of fraud Forensic accounting vs. fraud examination

Auditing vs. Fraud Examination Issue Auditing Fraud Examination Timing Recurring Nonrecurring Scope General Specific Objective Opinion Affix blame Relationship Nonadversarial Adversarial Methodology Audit techniques Fraud examination techniques Presumption Professional Proof skepticism

Fraud Examination Methodology Predication Totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe a fraud has occurred, is occurring, and/or will occur Fraud examinations must be based on predication.

Fraud Theory Approach Analyze available data Create a hypothesis Test the hypothesis Refine and amend the hypothesis

Tools Used in Fraud Examination Document Analysis Neutral Third-Party Witnesses Corroborative Witnesses Co-Conspirators T Target Observation

Defining Occupational Fraud and Abuse The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s resources or assets

Elements of Fraud A material false statement Knowledge that the statement was false when it was uttered Reliance on the false statement by the victim Damages resulting from the victim’s reliance on the false statement

Occupational Fraud and Abuse Research Edward Sutherland Donald Cressey Cressey’s Hypothesis

Opportunity Fraud Triangle Pressure Rationalization

2010 Report to the Nations on Occupational Fraud & Abuse Global survey Measuring the costs of occupational fraud 5 percent lost to fraud $2.9 trillion worldwide

Position of Perpetrator

Median Loss by Position

Gender of Perpetrator

Median Loss by Gender

Department of Perpetrator

Median Loss by Department

Criminal History of Perpetrator

Median Loss per Number of Employees

Initial Detection of Frauds

Occupational Fraud and Abuse Corruption Asset Misappropriations Fraudulent Statements Conflicts of Interest Cash Financial Bribery Inventory & All Other Assets Nonfinancial Illegal Gratuities Economic Extortion

Frequency of Types of Occupational Fraud and Abuse

Median Loss of Types of Occupational Fraud and Abuse

Chapter 2 Skimming

Chapter Objectives Define skimming. List and understand the two principal categories of skimming schemes. Understand how sales skimming is committed and concealed. Understand schemes involving understated sales. Understand how cash register manipulations are used to skim currency. Be familiar with how sales are skimmed during non-business hours. Understand the techniques discussed for preventing and detecting sales skimming.

Chapter Objectives List and be able to explain the six methods typically used by fraudsters to conceal receivables skimming. Understand what “lapping” is and how it is used to hide skimming schemes. Be familiar with how fraudsters use fraudulent write-offs or discounts to conceal skimming. Understand the techniques discussed for preventing and detecting receivables skimming. Be familiar with proactive audit tests that can be used to detect skimming.

Skimming Schemes Skimming Sales Receivables Refunds & Other Write-off Unrecorded Write-off Schemes Understated Lapping Schemes Unconcealed

Skimming Theft of cash from a victim entity prior to its entry in an accounting system “Off-book” No direct audit trail Its principal advantage is its difficulty of detection.

Asset Misappropriations 2009 Global Fraud Survey Scheme Type % of Asset Misappropriation Cases Median Loss Cash Misappropriations 85.6% $120,000 Non-Cash Misappropriations 20.3% $90,000

Frequency of Cash Misappropriations

Median Loss of Cash Misappropriations

Sales Skimming Employee makes a sale of goods or services, collects the payment, and makes no record of the transaction. Employee pockets the proceeds of the sale. Without a record of the sale, there is no audit trail.

Sales Skimming After hours sales Skimming by off-site employees Cash register manipulation “No sale” or other non-cash transaction is recorded. Cash registers are rigged so that sales are not recorded on the register tapes. No receipt is issued. After hours sales Sales are conducted during non-business hours without the knowledge of the owners. Skimming by off-site employees Independent salespeople Employees at remote locations – branches or satellite offices away from the primary business site

Sales Skimming Poor collection procedures Understated sales Sale is recorded for a lower amount than was collected. Price of sales item is reduced. Quantity of items sold is reduced. Theft in the mail room – incoming checks Incoming checks are stolen and cashed. Customer’s account is not posted.

Preventing and Detecting Sales Skimming Maintain a viable oversight presence at any point. Create a perception of detection. Install video cameras. Utilize customers to detect and prevent fraud. All cash registers should record the log-in and log-out time of each user. Off-site sales personnel should also be required to maintain activity logs. Eliminate potential hiding places for stolen money. Incoming mail should be opened in a clear, open area free from blind spots and with supervisory presence.

Receivables Skimming More difficult than skimming sales There is a record of the sale. Collection is expected. Customers are notified when payment is not received and will most likely complain. Lapping Force balancing Stolen statements Fraudulent write-offs or discounts Debiting the wrong account Document destruction

Receivables Skimming Lapping Force balancing Stolen statements Crediting one customer’s account with payment received from another customer Keeping track of payments becomes complicated. Second set of books is sometimes kept. Force balancing Posting to the customer’s account without depositing the check creates an imbalance condition. Cash account is overstated so the amount skimmed must be forced in order to balance the account. Stolen statements Employee steals or alters the account statement or produces counterfeit statements. May change the customer’s address in order to intercept the statement

Receivables Skimming Fraudulent write-offs or discounts Write off the account as bad debt. Post entries to a contra revenue account – “discounts and allowances.” Debiting the wrong account Debit an existing or fictitious A/R. Wait for the A/R to age and be written off. Destroying or altering records of the transaction Often a last ditch effort to conceal the fraud Makes it more difficult to prove the fraud

Preventing and Detecting Receivables Skimming Succeed when there is a breakdown in an organization’s controls Mandate vacations. Mandate supervisory approval. Train audit staff. Proactively search for accounting clues. Perform trend analysis on aging of customer accounts. Conduct audit tests.

Chapter 3 Cash Larceny

Pop Quiz What is the difference between larceny and skimming?  

Learning Objectives Define cash larceny. Understand how cash receipts schemes differ from fraudulent disbursements. Recognize the difference between cash larceny and skimming. Understand the relative frequency and cost of cash larceny schemes as opposed to other forms of cash misappropriations. Identify weaknesses in internal controls as inducing factors to cash larceny schemes. Understand how cash larceny is committed at the point of sale.

Learning Objectives Discuss measures that can be used to prevent and detect cash larceny at the point of sale. Understand and identify various methods used by fraudsters to conceal cash larceny of receivables. Understand schemes involving cash larceny from deposits including lapping and deposits in transit. Understand controls and procedures that can be used to prevent and detect cash larceny from bank deposits. Be familiar with proactive audit tests that can be used to detect cash larceny schemes.

Larceny Of Cash on Hand From the Deposit Other

Cash Larceny Intentional taking away of an employer’s cash without the consent and against the will of the employer Fraudulent disbursements Cash receipt schemes

Frequency – Cash Misappropriations

Median Loss – Cash Misappropriations

Cash Larceny Schemes Can occur under any circumstance in which an employee has access to cash At the point of sale From incoming receivables From the victim organization’s bank deposits

Larceny at The Point of Sale It’s where the money is Most common point of access to ready cash Results in an imbalance between the register tape and cash drawer

Larceny Schemes Theft from other registers Death by a thousand cuts Using another cashier’s register or access code Death by a thousand cuts Stealing small amounts over an extended period of time Reversing transactions Using false voids or refunds Causes the cash register tape to balance to the cash drawer Altering cash counts or cash register tapes Destroying register tapes

Preventing and Detecting Cash Larceny at the Point of Sale Enforce separation of duties Independent checks over the receipting and recording of incoming cash Upon reconciliation of cash and register tape, cash should go directly to the cashier’s office Discrepancies should be checked, especially if a pattern is identified Periodically run reports showing discounts, returns, adjustments, and write-offs by employee, department, and location to identify unusual patterns

Larceny of Receivables Theft occurs after the payment has been recorded Force balancing Having total control of the accounting system can overcome the problem of out-of-balance accounts Can make unsupported entries in the books to produce a fictitious balance between receipts and ledgers Reversing entries Post the payment and then reverse the entry through “discounts” Destruction of records Destroying the records can conceal the identity of the perpetrator even though the fraud has been discovered

Cash Larceny From The Deposit Whoever takes the deposit to the bank has an opportunity to steal a portion of it Having controls—such as matching the receipted deposit slip to the originally prepared slip—does not always prevent theft Failure to reconcile the slips can foster an environment leading to theft Lack of security over the deposit before it goes to the bank can also lead to theft

Cash Larceny From The Deposit Deposit lapping Day one’s deposit is stolen and is replaced by day two’s deposit . . . . Deposits in transit The missing money is carried as a deposit in transit but it never clears the bank statement

Preventing and Detecting Cash Larceny From The Deposit Separation of duties is the most important factor All incoming revenues should be delivered to a centralized department Compare the authenticated deposit slip with the company’s copy of the deposit slip, the remittance list, and the general ledger posting of the day’s receipts Two copies of the bank statement should be delivered to different persons in the organization Require that deposits be made at a night drop at the bank

Chapter 4 Billing Schemes

Pop Quiz What is a pass-through billing scheme?

Learning Objectives List the five major categories of fraudulent disbursements. Define the term “billing schemes.” List the three categories of billing schemes. Understand what a shell company is and how it is formed. List and understand the four ways false invoices are approved for payment. Understand why most shell company schemes involve the purchase of services rather than goods. Understand how a pass-through scheme differs from the usual shell company schemes. Be familiar with the methods identified in this chapter for preventing and detecting shell company schemes.

Learning Objectives Understand how pay-and-return schemes work. Understand how non-accomplice vendor schemes work. Be familiar with the methods identified in this chapter for preventing and detecting non-accomplice vendor schemes. Understand how personal purchases schemes work. Be familiar with the methods identified in this chapter for preventing and detecting personal purchases schemes. Be familiar with proactive audit tests that can be used to detect billing schemes.

Billing Schemes Shell Company Non-Accomplice Vendor Personal Purchases

Frequency of Fraudulent Disbursements

Median Loss of Fraudulent Disbursements

Billing Schemes The perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose Fraudulent disbursement is issued in same manner as a legitimate disbursement Schemes Shell company schemes Non-accomplice vendor schemes Personal purchases schemes

Shell Company Schemes Fictitious entities created for the sole purpose of committing fraud Bank account is usually set up in the company’s name Forming a shell company Certificate of incorporation or assumed-name certificate set up Shell company may be formed in someone else’s name Best way is to set up company under a fictitious name Set up entity’s address – home address, post office box, or friend/relative’s address

Shell Company Submitting false invoices Invoice is manufactured using a professional printer, personal computer, or typewriter Self-approval of fraudulent invoices Most fraudsters are in a position to approve payment Approvals may be forged “Rubber stamp” supervisors Don’t check the documentation Approve whatever is submitted Reliance on false documents Without approval authority, fraudster submits false documents – purchase order, invoice, and receiving report

Shell Company Collusion Purchases of services rather than goods Two or more employees conspire to steal More difficult to detect Circumvents controls implemented to prevent fraud Purchases of services rather than goods Purchases of service are preferable to purchases of goods Services are intangible and fraud is more difficult to detect Pass-through schemes Goods or services are purchased by the employee and resold to the victim company at an inflated price

Preventing and Detecting Shell Company Schemes Maintain and regularly update an approved vendor list Independently verify all vendors before payment Identifying shell company invoices Lack of detail on the fraudulent invoice Invoice that lacks detailed descriptions of the items billed Mailing address may be an indicator of fraud Consecutively numbered invoices over a period of time Reviewing payables and sorting payments by vendor and invoice number

Preventing and Detecting Shell Company Schemes Testing for shell company schemes Investigate budget overruns and departments that regularly exceed their budget Conduct horizontal analysis of expenses Investigate unexplained increases in “soft” accounts Investigate unexplained increases in quantity of items purchased

Preventing and Detecting Shell Company Schemes Testing for shell company schemes Monitor trends in average unit price Investigate goods and services that would not normally be purchased Compare vendor addresses to employee addresses Run reports of average turnaround time for invoices to look for unusual payment patterns

Preventing and Detecting Shell Company Schemes Verifying whether a shell company exists Use the phone book to verify the vendor Contact others in the industry Verify vendor’s address through a site visit or by using satellite imaging software Identifying the employee behind a shell company Conduct a public records search of the company’s registration Be alert for related names, addresses, phone numbers, Social Security numbers, and other identities Match vendor payments with payroll checks Conduct surveillance of mail drops to see who picks up the checks

Billing Schemes – Non-Accomplice Vendors Vendor is not a part of the scheme Pay-and-return schemes Payments owed to legitimate vendors intentionally mishandled Double pay an invoice Pay the wrong the vendor Overpay the invoice amount Purchase excess merchandise Overbilling with a non-accomplice vendor’s invoices Fake invoice is created for a vendor that regularly does business with victim organization Rerun an invoice already paid

Preventing and Detecting Non-Accomplice Vendor Fraud Incoming checks should be photocopied and attached to the remittance advice Regarding overpayments, banks should be instructed not to cash checks payable to an organization Spot check past accounts payable files when a pay-and-return scheme is suspected

Personal Purchases With Company Funds Employees make personal purchases for themselves, their businesses, their family, or their friends using company money Perpetrator causes the victim company to order and pay for an unneeded asset

Personal Purchases Through False Invoices The fraudster is authorizer of invoices Falsifying documents such as purchase orders to obtain authorization Altering existing purchase orders False purchase requisitions Misrepresent the nature of the purchase Change the delivery address of the purchase

Company cards may be stolen or “borrowed” from authorized users Personal Purchases on Credit Cards, Purchasing Cards, or Other Company Accounts Employees make purchases using their company credit cards, purchasing cards, or running accounts with vendors Company cards may be stolen or “borrowed” from authorized users Charge accounts Employees order items using an existing account with the vendor Returning merchandise for cash/credit Employee purchases a good or service, receives reimbursement, and then returns the item for a credit

Preventing and Detecting Personal Purchases Conduct a thorough review of each credit card or purchasing card statement independent of the signature authority Only original support for the reimbursement should be allowed Card issuer should send two copies of the statement to two different individuals within the organization Card statements should be compared with employee expense vouchers for duplications, and monitored for unexplained increases in purchasing levels

Chapter 5 Check Tampering

Learning Objectives Define check tampering. Understand the five principal categories of check tampering. Detail the means by which employees fraudulently obtain company checks. Understand how forged signatures are created on blank check stock. Be familiar with the methods identified in this chapter for preventing and detecting forged maker schemes. Differentiate between forged maker and forged endorsement schemes. Detail the methods employees use to intercept outgoing checks before they are delivered to the intended payee.

Learning Objectives Be able to discuss methods that can be used to prevent and detect the theft and/or alteration of outgoing company checks. Understand how authorized maker schemes work and why they are especially difficult to prevent. Understand how check tampering is hidden in a company’s accounting records. Describe measures companies can take to prevent and detect fraudulent electronic payments. Be familiar with proactive audit tests that can be used to detect check tampering.

Check Tampering Forged Maker Forged Endorsement Altered Payee Concealed Checks Authorized Maker

Frequency of Fraudulent Disbursements

Median Loss of Fraudulent Disbursements

Check Tampering Schemes Perpetrator physically prepares the fraudulent check Depend on: Access to check stock Access to bank statements Access to cash disbursements journal Ability to forge signatures or alter other information on the check

Forged Maker Schemes An employee misappropriates a check and fraudulently affixes the signature of an authorized maker Must have: Access to a blank check Convincing forgery of an authorized signature Ability to conceal the crime

Obtaining the Check Employees having access to company checks A/P clerks, office managers, bookkeepers Employees lacking access to company checks Checks poorly guarded Producing counterfeit checks

Safeguarding the Check Stock Maintained under lock and key Access limited to those with check preparation duties Boxes of blank checks should be sealed with security tape Periodically check the security of unused checks Voided check should be promptly destroyed Checks should be printed on watermark paper with security threads and distinctly marked paper Out-of-sequence canceled checks and duplicate check numbers should be investigated Each day the first check of the day should be reconciled to the last check written the previous day

To Whom Is The Check Made Payable? Perpetrator Accomplice “Cash” Vendors

Forging the Signature Free-hand forgery Photocopied forgeries May not need to be particularly accurate Photocopied forgeries Photocopies are made of legitimate signatures and affixed to the check Automatic check-signing mechanisms Produce perfect forgeries

Forged Maker Schemes Concealing the fraud Converting the check Miscode the check Converting the check Fake identification may be needed Checks made payable to “cash” require the endorsement of the person converting the check thus leaving a clue as to the identity of the forger

Preventing and Detecting Forged Maker Schemes Safeguard blank check stock Establish rules for custody of checks that have been prepared but not signed Separate duties of check preparer and check signers Rotate authorized check signers when possible and keep track of authorized signers Strictly limit access to signature stamps

Forged Endorsement Schemes Employee intercepts a company check intended for a third party Signs the third party’s name on the endorsement line of the check

Intercepting Checks Before Delivery Employee involved in delivery of checks Poor controls of signed checks Theft of returned checks Rerouting the delivery of checks Converting the stolen check

Preventing and Detecting the Theft of Outgoing Company Checks Separate the functions of cutting checks, check signing, and delivery of checks Employees should be trained to look for schemes involving check theft Investigate vendor and customer complaints Accounting system should identify duplicate payments

Preventing and Detecting the Theft of Outgoing Company Checks Authority to make changes to vendor records should be restricted Periodic report listing all changes to vendor records should be generated to determine if there is an unusual number of changes made Investigate canceled checks with dual endorsements and non-payroll checks signed by an employee Chart the date of mailing for every outgoing check so that if a check is stolen, you can determine who worked in the mailroom on the date it was stolen

Altered Payee Schemes Employee intercepts a company check intended for a third party Payee designation is altered so the check can be converted Less chance of discovery unless canceled checks are reviewed during reconciliation

Altering Checks Prepared by Others Inserting a new payee A false payee’s name is inserted in place of the true payee’s name Accounts payable system is manipulated and the payee’s name is changed “Tacking on” Letters or words are added to the end of the real payee designation

Altering Checks Prepared by the Fraudster Erasable ink Erasing typewriters Erasable pens Pencils Blank checks Authorized signer signs a check left blank to be filled in by the fraudster

Preventing and Detecting Altered Company Checks Separation of duties in the check writing process Check preparation, signing, and delivery Separation of duties of the check reconciliation process Check preparation and check reconciliation Check the canceled check against the entry in the books Consider using carbon copy checks to check against canceled checks for discrepancies

Concealed Check Schemes Employee prepares a fraudulent check and submits it along with legitimate checks Check is payable to the employee, an accomplice, a fictitious person, or a fictitious business Occurs when checks are signed without proper review or reviewer is busy In many cases, only the signature line is exposed and the payee is concealed

Authorized Maker Schemes Employee with signatory authority writes a fraudulent check Overriding controls through intimidation High-level managers can make employees afraid to question suspicious transactions Can happen when ownership is absent or inattentive Poor controls Failure to closely monitor accounts Lack of separation of duties

Preventing and Detecting Check Tampering by Authorized Makers Difficult to detect because check signer is relied on to serve as a control Separate the duties of the check writing function Check preparer and check signer Check signers should not have access to blank checks Require dual signatures for disbursements over a certain amount Maintain up-to-date vendor lists and confirm all disbursements to the lists, scrutinizing checks to unknown vendors

Concealing Check Tampering Forged endorsement schemes and altered payee schemes create a problem for the fraudster because the checks are intended for a legitimate recipient who will complain if a payment isn’t received An investigation could be triggered and the fraud discovered

Concealing Check Tampering Fraudster reconciling the bank statement Remove fraudulent check Doctor the bank statement Code check as “void” or don’t include it in the disbursements journal Re-alteration of checks Check is changed back to the rightful payee when returned from the bank Re-altered checks will match the names of the legitimate payees listed in the disbursements journal

Concealing Check Tampering Falsifying the disbursements journal Check made payable to the perpetrator but a different person is listed as the payee in the books Amount of the check can also be falsified in the disbursements journal Existing accounts that are rarely reviewed or are very active are preferred

Concealing Check Tampering Reissuing intercepted checks New checks are issued to replace the ones that the vendor did not receive The original invoice is changed in a manner that avoids a duplicate check for new check New check is issued and a stop payment is supposed to have been made Bogus supporting documents Fake documentation is needed to support the check False payment vouchers, invoices, purchase orders, receiving reports are submitted

Electronic Payment Tampering Electronic payments Alternative to paper checks Enable payer to transmit funds electronically over Internet or other medium Include ACH payments, online bill payments, and wire transfers

Electronic Payment Tampering Methods used to manipulate electronic payments include Abusing legitimate access to employer’s payment system Gaining access through social engineering or password theft Exploiting weaknesses in internal control or payment system

Prevention and Detection of Electronic Payment Tampering Internal controls Separation of duties; e.g., segregate duties for creating, approving, and releasing wires Segregating bank accounts; e.g., separate accounts for paper and electronic transactions Daily account monitoring and reconciliation Management and protection of user access and account information

Prevention and Detection of Electronic Payment Tampering Bank security services Set up ACH blocks/ACH filters Use positive pay for ACH Restrict banking software access to specific banking activities to enhance separation of duties; e.g., viewing bank statements or initiating electronic payments Customize banking software to incorporate dual authorization and daily or individual transaction limits Use bank’s multi-factor authentication tools; e.g., tokens, digital certificates, and smart cards

Chapter 6 Payroll Schemes

Learning Objectives List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds. Define a ghost employee. List and understand the four steps to making a ghost employee scheme work. Understand how separation of duties in payroll and human resources functions can reduce the threat of payroll fraud. Be familiar with methods identified in this chapter for preventing and detecting ghost employee schemes.

Learning Objectives List and understand the four ways that employees can obtain authorization for a falsified timecard in a manual system. Understand the role that payroll controls play in preventing falsified hours and salary schemes. Discuss the methods identified in this chapter for preventing and detecting falsified hours and salary schemes. Understand how employees commit commission schemes. Identify red flags that are typically associated with commission schemes. Be familiar with proactive audit tests that can be used to detect various forms of payroll fraud.

Payroll Schemes Ghost Employees Commission Schemes Workers Compensation Falsified Wages

Frequency of Fraudulent Disbursements

Median Loss of Fraudulent Disbursements

Payroll Schemes Occupational frauds in which a person who works for an organization causes that organization to issue a payment by making a false claim for compensation Ghost employee schemes Falsified hours and salary schemes Commission schemes

Ghost Employees Someone on the payroll who does not actually work for the victim company Fictitious person Friend or relative Accomplice Other

Ghost Employee Schemes Adding the ghost to the payroll Through the personnel department Through the hiring department Through the payroll department Using names similar to real employees Failing to remove terminated employees from the payroll

Ghost Employee Schemes Collecting timekeeping information Fake timecards Approval of timecards Computerized timekeeping systems Salaried workers vs. hourly workers

Ghost Employee Schemes Issuing the ghost’s paycheck Delivery of the paycheck Hand delivered Mailed to the employees address Direct deposited

Preventing and Detecting Ghost Employee Schemes Separate the hiring function from the payroll function Personnel records should be independently maintained from payroll and timekeeping functions Personnel department should verify any changes to payroll Background and reference checks should be made in advance of hire

Preventing and Detecting Ghost Employee Schemes Periodically check the payroll records against personnel records for terminated employees and unauthorized wage or deduction adjustments Periodically run computer reports for employees Without SSNs With no deductions - withholding taxes or insurance With no physical address or telephone number Compare payroll expenses to production schedules Keep signed checks in a secure location Verify proper distribution and require employee identification

Falsified Hours and Salary Overpayment of wages is the most common form of misappropriating payroll funds Increase number of hours or rate of pay Time clocks Computer tracking of employee time Manually prepared timecards

Manually Prepared Timecards Forging a supervisor’s signature Collusion with a supervisor Rubber stamp supervisors Poor custody procedures

Other Schemes Time clocks and other automated timekeeping systems Employee has someone else clock in for him/her when absent Rates of pay

Preventing and Detecting Falsified Hours and Salary Schemes Preparation, authorization, distribution, and reconciliation should be segregated Transfers of funds from general accounts to payroll accounts should be handled independently No overtime should be paid unless authorized in advance Sick leave and vacation time should not be granted without supervisory review and should be monitored for excessive time taken

Preventing and Detecting Falsified Hours and Salary Schemes A designated official should verify all wage rate changes Timecards should be taken directly to the payroll department after approval Time cards should be secured and monitored Run programs to actively seek out fraudulent payroll activity

Tests for Fraudulent Payroll Activity Review employees who have significantly more overtime than similar employees Trend analysis of budgeted vs. actual expenses Run exception reports for employees who have had disproportionately large increases in wages Verify payroll taxes equal federal return tax forms Compare net payroll to payroll checks issued

Commission Schemes Pay is based on an employee’s output rather than hours worked or a set salary Falsify the amount of sales made Create fraudulent sales orders, customer purchase orders, credit authorizations, packing slips, invoices, etc. Ring up a false sale on the cash register Overstate legitimate sales Fraudulently increase the rate of commission

Detecting Commission Schemes Run periodic reports to show an unusual relationship between sales figures and commission figures Run reports that compare commissions earned among salespersons Track uncollected sales generated by each salesperson Conduct random samples of customers to verify that the customer exists

Expense Reimbursement Schemes Chapter 7 Expense Reimbursement Schemes

Learning Objectives Explain what constitutes expense reimbursement fraud. Discuss the data on expense reimbursement fraud from the 2009 Global Fraud Survey. Understand how mischaracterized expense reimbursement schemes are committed. Be familiar with the controls identified in this chapter for preventing and detecting mischaracterized expense schemes. Identify the methods employees use to overstate otherwise legitimate expenses on their expense reports. Understand controls that can be used to prevent and detect overstated expense schemes.

Learning Objectives Explain what a fictitious expense reimbursement scheme is and differentiate it from other forms of expense reimbursement fraud. Identify red flags that are commonly associated with fictitious expense schemes. Discuss what a multiple reimbursement scheme is and how this kind of fraud is committed. Discuss the controls identified in this chapter for preventing and detecting multiple reimbursement schemes. Be familiar with proactive audit tests that can be used to detect various forms of expense reimbursement fraud.

Expense Reimbursement Schemes Mischaracterized Expenses Overstated Fictitious Expenses Multiple Reimbursements

Frequency of Fraudulent Disbursements

Median Loss Fraudulent Disbursements

Expense Reimbursement Schemes Employees are reimbursed for expenses paid on behalf of their employer Airfare, hotel bills, business meals, mileage, etc. Business purpose explained and receipts attached per the organization’s guidelines

Mischaracterized Expense Reimbursements Purpose of reimbursement request is misstated Fraudster seeks reimbursement for personal expenses Personal trips listed as a business trips Non-allowable meals with friends and family Perpetrators are usually high-level employees, owners, or officers Common element – lack of detailed expense reports

Preventing and Detecting Mischaracterized Expenses Establish and adhere to a system of controls Require detailed expense reports with original support documentation Require direct supervisory review of all travel and entertainment expenses Establish a policy that clearly states what will and will not be reimbursed

Preventing and Detecting Mischaracterized Expenses Scrutinize any expense report that is approved outside the requestor’s department Compare dates of claimed expenses to work schedules Compare prior year expenses to current year expenses and to budgeted expenses

Overstated Expense Reimbursements Altered receipts Overpurchasing Overstating another employee’s expenses Orders to overstate expenses

Preventing and Detecting Overstated Expense Reimbursements Require original receipts for all expense reimbursements If photocopied receipts are submitted, independently verify the expense Book travel through company travel agent using designated company credit card Compare employee’s expense reports with co-workers to identify inconsistencies Spot check expense reports with customers

Fictitious Expenses Producing fictitious receipts Personal computers Calculators Cut and paste Obtaining blank receipts from vendors Claiming the expenses of others

Preventing and Detecting Fictitious Expense Reimbursements Look for: High dollar items that were paid in cash Expenses that are consistently rounded off, ending with “0” or “5” Expenses that are consistently for the same amount Reimbursement requests that consistently fall at or just below the reimbursement limit Receipts that are submitted over an extended time that are consecutively numbered Receipts that do not look professional or that lack information about the vendor

Multiple Reimbursement Schemes A single expense item is submitted several times to receive multiple reimbursements Example: Airline ticket receipt and travel agency invoice Submit the credit card receipt for items charged to the company’s credit card account Submitting the same expenses to different budgets

Preventing and Detecting Multiple Reimbursement Schemes Enforce a policy against accepting photocopies Establish clearly what types of support documentation are acceptable Scrutinize expense reports that are approved by supervisors outside the requestor’s department Require that expense reimbursements be approved by the employee’s direct supervisor Establish a policy that expenses must be submitted within a certain time limit

Mid-term Exam Practice Questions

1. In a ______________ scheme, the perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose. Purchasing Skimming Larceny Billing

1. In a ______________ scheme, the perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose. Purchasing Skimming Larceny Billing

2. Mel Turner, the runner for a small bookstore, had a bad habit of helping himself to cash from the deposit on the way to the bank. He covered his tracks by substituting a check from the next day’s deposit for the amount he stole from the previous day. This is an example of what type of concealment? Deposit in transit Deposit lapping Force balance depositing None of the above

2. Mel Turner, the runner for a small bookstore, had a bad habit of helping himself to cash from the deposit on the way to the bank. He covered his tracks by substituting a check from the next day’s deposit for the amount he stole from the previous day. This is an example of what type of concealment? Deposit in transit Deposit lapping Force balance depositing None of the above

3. Which of the following is not considered to be a red flag for fictitious expenses? An employee repeatedly uses the company credit card for business travel expenses. An employee’s reimbursement requests are always for round-dollar amounts. An employee submits reimbursement requests that consistently fall just below the reimbursement limit. An employee frequently requests reimbursement for high-dollar items that he claims were paid for in cash.

3. Which of the following is not considered to be a red flag for fictitious expenses? An employee repeatedly uses the company credit card for business travel expenses. An employee’s reimbursement requests are always for round-dollar amounts. An employee submits reimbursement requests that consistently fall just below the reimbursement limit. An employee frequently requests reimbursement for high-dollar items that he claims were paid for in cash.

4. In order to prove that fraud occurred, four general elements must be present. Which of the following is not a general element of fraud? A material false statement Knowledge that the statement was false Reliance on the false statement by the victim Intent to cause the victim damages

4. In order to prove that fraud occurred, four general elements must be present. Which of the following is not a general element of fraud? A material false statement Knowledge that the statement was false Reliance on the false statement by the victim Intent to cause the victim damages

5. Check tampering includes both fraudulently preparing a company check for one’s own benefit and intercepting a company check that is intended for a third party and converting it for one’s own benefit. True False

5. Check tampering includes both fraudulently preparing a company check for one’s own benefit and intercepting a company check that is intended for a third party and converting it for one’s own benefit. True False

6. Which of the following procedures would not be useful in preventing and detecting sales skimming schemes? Comparing register tapes to the cash drawer and investigating discrepancies Summarizing the net sales by employee and extracting the top employees with low sales Installing video cameras at cash entry points Offering discounts to customers who do not get receipts for their purchases

6. Which of the following procedures would not be useful in preventing and detecting sales skimming schemes? Comparing register tapes to the cash drawer and investigating discrepancies Summarizing the net sales by employee and extracting the top employees with low sales Installing video cameras at cash entry points Offering discounts to customers who do not get receipts for their purchases

7. In the 2010 Report to the Nations on Occupational Fraud and Abuse, fraudulent financial statements schemes had a higher median loss than asset misappropriation and corruption schemes. True False

7. In the 2010 Report to the Nations on Occupational Fraud and Abuse, fraudulent financial statements schemes had a higher median loss than asset misappropriation and corruption schemes. True False

8. In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. How was the fraud caught? The auditors found a discrepancy in the invoices that were submitted. The new chief of internal audit found it by accident. A vendor received a check by mistake and called the accounts payable department. The external audit found it in an audit sample of canceled checks.

8. In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. How was the fraud caught? The auditors found a discrepancy in the invoices that were submitted. The new chief of internal audit found it by accident. A vendor received a check by mistake and called the accounts payable department. The external audit found it in an audit sample of canceled checks.

9. Which of the following is not a type of payroll scheme? Ghost employee schemes False deduction schemes Falsified hours and salary schemes Commission schemes

9. Which of the following is not a type of payroll scheme? Ghost employee schemes False deduction schemes Falsified hours and salary schemes Commission schemes

Multiple reimbursement scheme Shell company scheme 10. Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which of the following schemes is likely occurring? Multiple reimbursement scheme Shell company scheme Personal purchases scheme Forged maker scheme

Multiple reimbursement scheme Shell company scheme 10. Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which of the following schemes is likely occurring? Multiple reimbursement scheme Shell company scheme Personal purchases scheme Forged maker scheme

Register Disbursement Schemes Chapter 8 Register Disbursement Schemes

Pop Quiz According to the 2006 National Fraud Survey, register disbursement schemes have a higher median loss than payroll schemes. True or false?

Learning Objectives Explain what constitutes a register disbursement scheme. Differentiate register disbursements from skimming and cash larceny schemes. List the two basic categories of register disbursements. Explain how false refund schemes are committed. Explain how false void schemes are committed.

Learning Objectives Understand how register disbursement schemes cause shrinkage. Discuss the methods by which fraudulent register disbursements are concealed. Understand the methods identified in this chapter for preventing and detecting register disbursement schemes. Be familiar with proactive audit tests that can be used to detect register disbursement schemes.

Register Disbursements False Voids False Refunds

Frequency of Fraudulent Disbursements

Median Loss of Fraudulent Disbursements

Register Disbursement Schemes False refunds False voids

False Refunds A refund is processed when a customer returns an item of merchandise purchased from the store Merchandise is placed back into inventory Purchase price is returned to the customer

False Refunds Fictitious refunds Fraudster takes cash from the register in the amount of the false return Debit is made to the inventory system showing that the merchandise has been returned to the inventory

False Refunds Overstated refunds Fraudster overstates the amount of a legitimate refund and skims the excess money Customer is paid the actual amount owed for the returned merchandise and the excess is kept by the fraudster

False Refunds Credit card refunds Refunds appear as credits to the customer’s credit card rather than as cash disbursements Perpetrator does not have to physically take cash from the register Refunded to the perpetrator’s credit card

False Voids Also generate a disbursement from the register Copy of customer’s receipt is attached to the void slip Managers must generally approve voided sales Rubber stamp approvals allow the fraud to succeed Management and the employee may conspire

Concealing Register Disbursements Fraudsters typically do not make any effort to conceal the shrinkage Register disbursement schemes leave the victim organization’s books in balance Fraudster often takes no further action

Concealing Register Disbursements Small disbursements Keep the size of the disbursements low to where management review is not required Destroying records Employee has conceded that management will discover the theft Goal is to prevent management from discovering who the thief is

Preventing and Detecting Register Disbursement Schemes Maintain appropriate separation of duties Management approval should be required for all refunds and voided sales Closely guard access to the control key or management code Prohibit cashiers from reversing their own sales

Preventing and Detecting Register Disbursement Schemes Require proper documentation for voided transactions such as the original receipt Require cashiers to maintain a distinct login code Periodically generate reports of all reversing transactions

Preventing and Detecting Register Disbursement Schemes Look for large numbers of transactions just below the approval amount Institute store policies encouraging customers to ask for and examine their receipts Randomly call customers who have returned merchandise or voided sales

Chapter 9 Non-Cash Assets

Learning Objectives List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash misappropriations from the 2009 Global Fraud Survey. Explain how misuse of non-cash assets can negatively affect organizations. Understand how and why unconcealed larceny of non-cash assets occurs. Be familiar with internal controls and tests that can be used to prevent and detect non-cash larceny. Understand how weaknesses in internal asset requisition and transfer procedures can lead to the misappropriation of non-cash assets.

Learning Objectives Explain how purchasing and receiving schemes are used to misappropriate non-cash assets. Understand how the theft of non-cash assets through the use of fraudulent shipments is accomplished. Define the term “shrinkage.” Describe how fraudsters conceal the theft of non-cash assets on the victim organization’s books. Understand how fraudsters misappropriate intangible assets and how companies can protect themselves. Be familiar with proactive audit tests that can be used to detect misappropriations of non-cash assets.

Inventory and All Other Assets Misuse Larceny Asset Req. & Transfers False Sales & Shipping Purchasing & Receiving Unconcealed Larceny

Cash vs. Non-Cash Schemes 2009 Global Fraud Survey Scheme Type % of Asset Misappropriation Cases Median Loss Cash Misappropriations 85.6% $120,000 Non-Cash Misappropriations 20.3% $90,000

Non-Cash Cases by Type of Asset Misappropriated

Median Loss by Type of Asset in Non-Cash Schemes

Non-Cash Tangible Asset Misappropriations Misuse Unconcealed larceny Asset requisitions and transfers Purchasing and receiving schemes Fraudulent shipments

Misuse of Non-Cash Tangible Assets Typical misuse Company vehicles Company supplies Computers Other office equipment Doing personal work on company time Running side businesses

The Costs of Inventory Misuse Loss of productivity Need to hire additional employees to compensate Lost business if employee’s business competes Unauthorized use of equipment can mean additional wear and tear sooner or more often

Unconcealed Larceny Schemes Greater concern than misuse of assets Most schemes are not complex Some employees know their co-workers are stealing but refrain from reporting it Many of the employees who steal company property are highly trusted Assets misappropriated after-hours or mailed to perpetrator

The Fake Sale Needs an accomplice Sale is not rung up but the accomplice takes the merchandise Accomplice may return merchandise for cash

Preventing and Detecting Unconcealed Larceny of Non-Cash Tangible Assets Segregate the duties of requisitioning, purchasing, and receiving Segregate the duties of payables, purchasing, and receiving Maintain physical security of merchandise Track those who enter secure areas through access logs Install security cameras and let their presence be known

Preventing and Detecting Unconcealed Larceny of Non-Cash Tangible Assets Conduct inventory counts on a periodic basis by someone independent of the purchasing and warehousing functions Suspend shipping and receiving activities during physical counts Investigate significant discrepancies Independently follow-up on customer complaints

Asset Requisitions and Transfers Documentation enables non-cash assets to be moved from one location to another Internal documents can be used to fraudulently gain access to merchandise Basic scheme is to requisition materials to complete a work-related project, then steal the materials Inventory stored in multiple locations creates opportunities

Purchasing and Receiving Schemes Assets were intentionally purchased by the company but misappropriated Falsifying incoming shipments May also reject portion of the shipment as being substandard Perpetrator keeps the “substandard” merchandise

False Shipments of Inventory and Other Assets False shipping and sales documents are created to make it appear that the inventory was sold False packing slips can allow the inventory to be delivered to fraudster or accomplice To hide the theft a false sale is created Receivable is aged and written off Legitimate sale is understated

Other Schemes Assets are written off in order to make them available for theft Assets are declared as scrap and given to the employee New equipment is ordered for the company to replace old – new equipment is sent to employee’s home leaving old equipment in place

Concealing Inventory Theft Key concealment issue is shrinkage Inventory shrinkage is the unaccounted-for reduction in the company’s inventory due to theft Since shrinkage signals fraud, the fraudster must prevent anyone from looking for the missing assets Physical count of inventory detects shrinkage

Concealing Inventory Theft Altered inventory records Forced reconciliation Deleting or covering up the correct totals and entering new totals Fictitious sales and accounts receivable Charge sale to existing account Write-off to discounts and allowances or bad debt expense

Concealing Inventory Theft Write off inventory and other assets Eliminates the problem of shrinkage Physical padding Make it appear that there are more assets present that there actually are

Preventing and Detecting Thefts of Non-Cash Tangible Assets Separate the duties of: Ordering goods Receiving goods Maintaining perpetual inventory records Issuing payments Match the invoices to receiving reports before payments are issued Match the packing slip to an approved purchase order

Preventing and Detecting Thefts of Non-Cash Tangible Assets Match outgoing shipments to sales orders before merchandise goes out Periodically match inventory shipments to sales records Investigate shipments that cannot be traced to a sale Check out unexplained increases in bad debt expense

Preventing and Detecting Thefts of Non-Cash Tangible Assets Compare shipping addresses to employee addresses Review unexplained entries in perpetual inventory records Reconcile materials ordered for specific projects with actual work done Perform trend analysis on scrap inventory Check to make sure that inventory removed from inventory is properly approved

Misappropriation of Intangible Assets Misappropriation of information Includes theft of competitively sensitive information, (e.g., trade secrets, customer lists, marketing strategies) Can undermine value, reputation, and competitive advantage Can result in legal liabilities Identify most valuable information and take steps to protect it Misappropriation of securities Proper internal controls over investment portfolio

Chapter 10 Corruption

Pop Quiz What are the two principle schemes involving bribery?  

Learning Objectives Define corruption. Identify the four categories of corruption. Define bribery. Compare and contrast bribery, extortion, and illegal gratuities. Identify the two categories of bribery schemes. Understand kickback schemes and how they are committed. Understand bid-rigging schemes and explain how they are categorized.

Learning Objectives Describe the types of abuses that are committed at each stage of the competitive bidding process. Be familiar with the controls and techniques that can be used to prevent and detect bribery. Define conflicts of interest. Differentiate conflicts of interest from bribery schemes and billing schemes. List and understand the two major categories of conflicts of interest. Be familiar with proactive audit tests that can be used to detect corruption schemes.

Corruption Conflicts of Interest Bribery Illegal Gratuities Economic Extortion Purchase Schemes Invoice Kickbacks Sales Schemes Bid Rigging Other Other

Frequency of Types of Occupational Fraud and Abuse

Median Loss of Types of Occupational Fraud and Abuse

Frequency of Corruption Schemes

Bribery Offering, giving, receiving, or soliciting any thing of value to influence an official act Buys influence of the recipient Commercial bribery Kickbacks Bid-rigging schemes

Kickback Schemes Involve submission of invoices for goods and services that are either overpriced or completely fictitious Involve collusion between employees and vendors Almost always attack the purchasing function of the victim company

Kickback Schemes Diverting business to vendors Vendor pays the kickbacks to ensure a steady stream of business from the purchasing company No incentive to provide quality merchandise or low price Almost always leads to overpaying for goods or services

Overbilling Schemes Employees with approval authority Vendor submits inflated invoices to the victim company Overstates the cost of actual goods or services or reflects fictitious sales Ability to authorize purchases is key to the scheme

Overbilling Schemes Employees lacking approval authority Circumvent purchasing controls May prepare false vouchers to make it appear that the invoice is legitimate May forge an approval signature or have access to a restricted password in a computerized system Difficult to detect since the victim company is being attacked from two directions

Other Kickback Schemes Discounts are given in exchange for bribes Slush funds Other side of the transaction Funds can be paid from other accounts or paid as “consulting fees”

Detecting Kickbacks Normal controls may not detect kickback schemes Look for price inflation Monitor trends in cost of goods sold and services purchased Often start small but increase over time

Detecting Kickbacks Look for excessive quantities purchased Investigate inventory shortages Look for inferior goods purchased Compare actual amounts to budgeted amounts

Preventing Kickbacks Assign an employee independent of the purchasing department to routinely review buying patterns Make sure that all contracts have a “right to audit” clause Establish written policies prohibiting employees from soliciting or accepting any gift or favor from a customer or supplier Expressly forbid any employee from engaging in any transaction, on behalf of the company, in which he or she has an undisclosed personal interest Implement an ethics policy that clearly explains what improper behavior is and provides grounds for termination if an employee accepts a bribe or kickback

Bid-Rigging Schemes All bidders are expected to be on an even playing field – bidding on the same specifications The more power a person has over the bidding process, the more influence he or she can exert over the selection of the winning bid Potential targets include: Buyers Contracting officials Engineers and technical representatives Quality or produce assurance representatives Subcontractor liaison employees

Pre-Solicitation Phase Need recognition schemes Employee of the purchasing company convinces the company that a particular project is necessary Has the specifications tailored to the strengths of a particular supplier Trends indicating a need recognition scheme is occurring Higher requirements for stock and inventory levels Writing off large numbers of surplus items to scrap Defining a need that can only be met by a certain supplier Failure to develop a satisfactory list of backup suppliers

Specification Schemes Specifications include a list of the elements, materials, dimensions, and other relevant requirements Set the specifications to a particular vendor’s capabilities Use“prequalification” procedures to eliminate certain vendors Sole-source or noncompetitive procurement justifications Deliberately writes vague specifications requiring amendments at a later date Bid splitting Gives a vendor the right to see the specifications before his competitors get the specs

The Solicitation Phase Restricting the pool of vendors from which to choose Bid pooling Fictitious suppliers Restricting the time for submitting bids Soliciting bids in obscure publications Publicizing the bid during holiday periods

The Submission Phase Fraud in the sealed bid process Last bid submitted is the one that is awarded the contract Winning bidder finds out what the other competitors are bidding Winning bidder may see the other competitors’ bids before submitting his bid Gets help on preparing the bid

Detecting Bid-Rigging Schemes Look for: Unusual bidding patterns Low bids followed by change orders A very large unexplained price difference among bidders Contractors who bid last and repeatedly receive the contract A predictable rotation of bidders Losing bidders who become subcontractors Vendors with the same address and phone number Fewer bidders than expected for the project Projects that have been split into smaller ones

Something of Value Cash Promises of future employment Promise of ownership in the supplier’s firm Gifts Liquor and meals Free travel and accommodations Cars and other merchandise Payment of credit card bills Loans on very favorable terms Transfers of property

Other Corruption Schemes Illegal gratuities Given to reward a decision rather than influence it Decision made to benefit a person or company but is not influenced by any sort of payment May influence future decisions Economic extortion “Pay up or else” Employee demands payment from a vendor in order to make a decision in the vendor’s favor

Conflicts of Interest Employee, manager, or executive has an undisclosed economic or personal interest in a transaction that adversely affects the company Victim organization is unaware of the employee’s divided loyalties Distinguished from bribery–in conflicts of interest, the fraudster approves the invoice because of his own hidden interest in the vendor Purchasing schemes Sales schemes

Purchasing Schemes Overbilling schemes Turnaround sales Bill originates from a real company in which the fraudster has an undisclosed economic or personal interest Fraudster uses influence to ensure the victim company does business with this particular vendor Does not negotiate in good faith or attempt to get the best price for the employer Turnaround sales The employee knows that the company is seeking to purchase a particular asset and purchases it himself Turns around and sells it to the company at an inflated price

Sales Schemes Underbillings Writing off sales Goods are sold below fair market value to a customer in which the perpetrator has a hidden interest Writing off sales Purchases are made from the victim company and credit memos are later issued

Other Conflict of Interest Schemes Business diversions Siphoning off clients of the victim company to the employee’s own business Resource diversions Diverting funds and other resources for the development of the employee’s own company Financial disclosures Inadequate disclosures of related-party transactions to the company

Preventing and Detecting Conflicts of Interest Implement, communicate, and enforce an ethics policy that addresses conflicts of interest offenses Require employees to complete an annual disclosure statement Establish an anonymous reporting mechanism to receive tips and complaints Compare vendor address and telephone files to employee address and telephone files for matches

Fraudulent Financial Statement Schemes Chapter 12 Fraudulent Financial Statement Schemes

Pop Quiz Name at least three of the five principal financial statement fraud schemes.  

Learning Objectives Define financial statement fraud and related schemes. Understand and identify the five classifications of financial statement fraud. Explain how fictitious revenues schemes are committed, as well as the motivation for, and result of, committing this fraud. Explain how timing difference schemes are committed, as well as the motivation for, and result of, committing this fraud. Describe the methods by which concealed liabilities and expenses are used to fraudulently improve a company’s balance sheet.

Learning Objectives Understand how improper disclosures may be used to mislead potential investors, creditors, or any other users of financial statements. Recognize how improper asset valuation may inflate the current ratio. Identify detection and deterrence procedures that may be instrumental in dealing with fraudulent financial statement schemes. Understand financial statement analysis for detecting fraud. Identify and characterize current professional and legislative actions that have sought to improve corporate governance, enhance the reliability and quality of financial reports, and foster the credibility and effectiveness of audit functions.

Financial Statement Fraud Defined Deliberate misstatements or omissions of amounts or disclosures of financial statements to deceive financial statement users, particularly investors and creditors.

Defining Financial Statement Fraud Falsification, alteration, or manipulation of material financial records, supporting documents, or business transactions Material intentional omissions or misrepresentations of events, transactions, accounts, or other significant information from which financial statements are prepared Deliberate misapplication of accounting principles, policies, and procedures used to measure, recognize, report, and disclose economic events and business transactions Intentional omissions of disclosures, or presentation of inadequate disclosures, regarding accounting principles and policies and related financial amounts (Rezaee 2002)

Costs of Financial Statement Fraud In addition to the direct economic losses of fraud are Legal costs; increased insurance costs; loss of productivity; adverse impacts on employees’ morale, customers’ goodwill, and suppliers’ trust; and negative stock market reactions These costs are impossible to measure

Costs of Financial Statement Fraud Undermines the reliability, quality, transparency, and integrity of the financial reporting process Jeopardizes the integrity and objectivity of the auditing profession, especially of auditors and auditing firms Diminishes the confidence of the capital markets, as well as of market participants, in the reliability of financial information Makes the capital markets less efficient

Costs of Financial Statement Fraud Adversely affects the nation’s economic growth and prosperity Results in huge litigation costs Destroys careers of individuals involved Causes bankruptcy or substantial economic losses by the company engaged in financial statement fraud

Costs of Financial Statement Fraud Encourages regulatory intervention Causes devastation in the normal operations and performance of alleged companies Raises serious doubt about the efficacy of financial statement audits Erodes public confidence and trust in the accounting and auditing profession

Methods of Financial Statement Fraud Fictitious revenues Timing differences Improper asset valuations Concealed liabilities and expenses Improper disclosures

Fictitious Revenues Recording of goods or services that did not occur Fake or phantom customers Legitimate customers Sales with conditions Pressures to boost revenues

Red Flags – Fictitious Revenues Rapid growth or unusual profitability, especially compared to that of other companies in the same industry Recurring negative cash flows from operations or an inability to generate cash flows from operations while reporting earnings and earnings growth Significant transactions with related parties or special purpose entities not in the ordinary course of business or where those entities are not audited or are audited by another firm

Red Flags – Fictitious Revenues Significant, unusual, or highly complex transactions, especially those close to period-end that pose difficult “substance over form” questions Unusual growth in the number of days’ sales in receivables A significant volume of sales to entities whose substance and ownership are not known An unusual surge in sales by a minority of units within a company, or of sales recorded by corporate headquarters

Timing Differences Recording revenue and/or expenses in improper periods Shifting revenues or expenses between one period and the next, increasing or decreasing earnings as desired

Timing Differences Matching revenues with expenses Premature revenue recognition Long-term contracts Channel stuffing Recording expenses in the wrong period

Red Flags – Timing Differences Rapid growth or unusual profitability, especially compared to that of other companies in the same industry Recurring negative cash flows from operations, or an inability to generate cash flows from operations, while reporting earnings and earnings growth Significant, unusual, or highly complex transactions, especially those close to period-end that pose difficult “substance over form” questions Unusual increase in gross margin or margin in excess of industry peers Unusual growth in the number of days’ sales in receivables Unusual decline in the number of days’ purchases in accounts payable

Concealed Liabilities Liability/expense omissions Capitalized expenses Failure to disclose warranty costs and liabilities

Red Flags – Concealed Liabilities Recurring negative cash flows from operations or an inability to generate cash flows from operations while reporting earnings and earnings growth Assets, liabilities, revenues, or expenses based on significant estimates that involve subjective judgments or uncertainties that are difficult to corroborate Nonfinancial management’s excessive participation in or preoccupation with the selection of accounting principles or the determination of significant estimates

Red Flags – Concealed Liabilities Unusual increase in gross margin or margin in excess of industry peers Allowances for sales returns, warranty claims, and so on that are shrinking in percentage terms or are otherwise out of line with industry peers Unusual reduction in the number of days’ purchases in accounts payable Reducing accounts payable while competitors are stretching out payments to vendors

Improper Disclosures Liability omissions Subsequent events Management fraud Related-party transactions Accounting changes

Red Flags – Improper Disclosures Domination of management by a single person or small group (in a non-owner managed business) without compensating controls Ineffective board of directors or audit committee oversight over the financial reporting process and internal control Ineffective communication, implementation, support, or enforcement of the entity’s values or ethical standards by management, or the communication of inappropriate values or ethical standards Rapid growth or unusual profitability, especially compared to that of other companies in the same industry

Red Flags – Improper Disclosures Significant, unusual, or highly complex transactions, especially those close to period-end that pose difficult “substance over form” questions Significant related-party transactions not in the ordinary course of business, or with related entities not audited or audited by another firm Significant bank accounts, or subsidiary or branch operations, in tax haven jurisdictions for which there appears to be no clear business justification Overly complex organizational structure involving unusual legal entities or managerial lines of authority

Red Flags – Improper Disclosures Known history of violations of securities laws or other laws and regulations; or claims against the entity, its senior management, or board members, alleging fraud or violations of laws and regulations Recurring attempts by management to justify marginal or inappropriate accounting on the basis of materiality Formal or informal restrictions on the auditor that inappropriately limit access to people or information or the ability to communicate effectively with the board of directors or audit committee

Improper Asset Valuation Inventory valuation Accounts receivable Business combinations Fixed assets

Red Flags – Improper Asset Valuation Recurring negative cash flows from operations or an inability to generate cash flows from operations while reporting earnings and earnings growth Significant declines in customer demand and increasing business failures in either the industry or overall economy Assets, liabilities, revenues, or expenses based on significant estimates that involve subjective judgments or uncertainties that are difficult to corroborate Nonfinancial management’s excessive participation in or preoccupation with the selection of accounting principles or the determination of significant estimates Unusual increase in gross margin or margin in excess of industry peers

Red Flags – Improper Asset Valuation Unusual growth in the number of days’ sales in receivables Unusual growth in the number of days’ purchases in inventory Allowances for bad debts, excess and obsolete inventory, and so on that are shrinking in percentage terms or are otherwise out of line with industry peers Unusual change in the relationship between fixed assets and depreciation Adding to assets while competitors are reducing capital tied up in assets

Detection of Fraudulent Financial Statement Schemes SAS 99 (AU 316) – Consideration of Fraud in a Financial Statement Audit “The auditor has a responsibility to plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement, whether caused by error or fraud.”

SAS 99 (AU 316) Description and characteristics of fraud Misstatements arising from fraudulent financial reporting Misstatements arising from misappropriation of assets Importance of exercising professional skepticism Discussion among engagement personnel regarding risk of material misstatement due to fraud Brainstorming Internal and external pressures

SAS 99 (AU 316) Obtaining information needed to identify risks of material misstatement due to fraud Make inquiries of management about the risks of fraud and how they are addressed Consider any unusual or unexpected relationships that have been identified in performing analytical procedures in planning the audit Consider whether one or more fraud risk factors exist Consider other information that may be helpful in the identification of risks of material misstatement due to fraud

SAS 99 (AU 316) The type of risk that may exist Identifying risks that may result in material misstatement due to fraud The type of risk that may exist The significance of the risk The likelihood of the risk The pervasiveness of the risk Assessing the identified risks after taking into account an evaluation of the entity’s programs and controls Specific controls designed to mitigate specific risks of fraud Broader programs designed to deter and detect fraud

SAS 99 (AU 316) Responding to the results of the assessment Overall responses to the risk of material misstatement Responses involving the nature, timing, and extent of procedures to be performed to address the identified risks Responses to further address risk of management override of controls Examining journal entries and other adjustments for evidence of possible material misstatement due to fraud Reviewing accounting estimates for biases that could result in material misstatement due to fraud Evaluating the business rationale for significant unusual transactions

SAS 99 (AU 316) Evaluating audit evidence Assessing risks of material misstatement due to fraud throughout the audit Evaluating whether analytical procedures indicate a previously unrecognized risk of fraud Evaluating risks of material misstatement at or near the completion of fieldwork Responding to misstatements that may be the result of fraud

SAS 99 (AU 316) Communicating about fraud to management, the audit committee, and others If fraud may exist, the matter should be brought to the attention of an appropriate level of management even the matter is considered inconsequential Fraud involving senior management should be reported directly to the audit committee If risks that have been identified have continuing control implications, consider communicating these risks to senior management Disclosing possible fraud to outside parties Documenting the auditor’s consideration of fraud

Financial Statement Analysis Vertical analysis Analyzes relationships between items on an income statement, balance sheet, or statement of cash flows by expressing components as percentages Horizontal analysis Analyzes the percentage change in individual financial statement items Ratio analysis Measures the relationship between two different financial statement amounts

Deterrence of Financial Statement Fraud Reduce pressures to commit financial statement fraud Reduce the opportunity to commit financial statement fraud Reduce rationalization of financial statement fraud

Reduce Pressures to Commit Financial Statement Fraud Establish effective board oversight of the “tone at the top” created by management Avoid setting unachievable financial goals Avoid applying excessive pressure on employees to achieve goals Change goals if changed market conditions require it Ensure compensation systems are fair and do not create incentive to commit fraud Discourage excessive external expectations of future corporate performance Remove operational obstacles blocking effective performance

Reduce the Opportunity to Commit Financial Statement Fraud Maintain accurate and complete internal accounting records Carefully monitor the business transactions and interpersonal relationships of suppliers, buyers, purchasing agents, sales representatives, and others who participate in the transactions between financial units Establish a physical security system to secure company assets, including finished goods, cash, capital equipment, tools, and other valuable items Maintain accurate personnel records, including background checks on new employee. Encourage strong supervisory and leadership relationships within groups to ensure enforcement of accounting procedures Establish clear and uniform accounting procedures with no exception clauses

Reduce Rationalization of Financial Statement Fraud Promote strong values, based on integrity, throughout the organization Have policies that clearly define prohibited behavior with respect to accounting and financial statement fraud Provide regular training to all employees, communicating prohibited behavior

Reduce Rationalization of Financial Statement Fraud Have confidential advice and reporting mechanisms to communicate inappropriate behavior Have senior executives communicate to employees that integrity takes priority and that goals must never be achieved through fraud Ensure management practices what it preaches and sets an example by promoting honesty in the accounting area Clearly communicate the consequences of violating the rules and the punishment for violators

Interviewing Witnesses Chapter 15 Interviewing Witnesses

Learning Objectives List the five types of interview questions. Understand how to ask introductory questions. Explain how to construct informational questions. Understand the differences between open, closed, and leading questions. Explain how to close an interview.

Learning Objectives Define and explain the purpose of assessment questions. List some nonverbal clues to deception. List some verbal clues to deception. Discuss the methodology of admission-seeking questions. List the elements of a signed statement.

Interviewing Questions Introductory Informational Assessment Closing Admission-seeking

Introductory Questions Provides an introduction Establishes rapport Establishes the theme of the interviews Observes the person’s reactions

General Rules for Introductory Questions Don’t interview more than one person at a time Conduct interviews under conditions of privacy Ask nonsensitive questions Instead of: Use: Investigation Inquiry Audit Review Interview Ask a few questions Embezzlement Shortage or paperwork problems

General Rules for Introductory Questions Get a commitment for assistance Make a transitional statement Seek continuous agreement Do not promise confidentiality Negotiations Discussing the source of allegations

Informational Questions Open questions Closed questions Leading questions Question sequences

Informational Question Techniques Begin by asking questions that are not likely to cause the respondent to become defensive or hostile. Ask the questions in a manner that will develop the facts in the order of their occurrence, or in some other systematic order. Ask only one question at a time, and frame the question so that only one answer is required. Ask straightforward and frank questions; generally avoid shrewd approaches. Keep interruptions to a minimum, and do not stop the subject’s narrative without good reason.

Informational Question Techniques Give the respondent ample time to answer; do not rush the respondent. Try to help the respondent remember, but do not suggest answers; be careful not to imply any particular answer by facial expressions, gestures, methods of asking questions, or types of questions asked. Repeat or rephrase questions, if necessary, to get the desired facts. Be sure you understand the answers, and if they are not perfectly clear, have the subject interpret them at that time instead of saving this for later. Give the subject an opportunity to qualify his/her answers.

Informational Question Techniques Separate facts from inferences. Have the subject give comparisons by percentages, fractions, estimates of time and distance, and other such methods to ensure accuracy. After the respondent has given a narrative account, ask follow-up questions about every key issue that has been discussed. Upon conclusion of the direct questioning, ask the respondent to summarize the information given; then summarize the facts, and have the respondent verify that these conclusions are correct.

Methodology Informational Phase Begin with background questions Observe verbal and nonverbal behavior Ask nonleading (open) questions Approach sensitive questions carefully

Dealing with Difficult People Do not react Disarm the person Change tactics

Volatile Interviews An interview that has the potential to bring about strong emotional reactions in the respondent There should be two interviewers Should be conducted on a surprise basis The order of questions should be out of sequence Use hypothetical questions

Closing Questions Reconfirming facts Gathering additional facts Concluding the interview

Assessment Questions Establishes the credibility of the respondent Norming or calibrating Process of observing behavior before critical questions are asked Physiology of deception People lie for one of two reasons: to receive rewards or to avoid punishment The human body will attempt to relieve stress through verbal and nonverbal clues

Verbal Clues to Deception Changes in speech patterns Repetition of the question Comments regarding the interview Selective memory Making excuses Oaths Character testimony Answering with a question

Verbal Clues to Deception Overuse of respect Increasingly weaker denials Failure to deny Avoidance of emotive words Refusal to implicate other suspects Tolerant attitudes Reluctance to terminate interview Feigned unconcern

Nonverbal Clues Full-body motions Anatomical physical responses Illustrators Hands over the mouth Manipulators Fleeing positions Crossing the arms Reaction to evidence Fake smiles

Methodology Interviewer: “Most of them aren’t criminals at all. A lot of times, they’re just trying to save their jobs or just trying to get by because the company is so cheap that they won’t pay people what they are worth. Do you know what I mean?” Interviewer: “Why do you think someone around here might be justified in making a secret arrangement with one of the company’s vendors?” Interviewer: “How do you think we should deal with someone who got in a bind and did something wrong in the eyes of the company?” Interviewer: “Do you think someone in your department might have done something wrong because they thought they were justified?”

Methodology Interviewer: “Have you ever felt justified—even though you didn’t go through with it—in taking advantage of your position?” Interviewer: “Who in your department do you think would feel justified in doing something against the company?” Interviewer: “Do you believe that most people will tell their manager if they believed a colleague was doing something wrong, like committing fraud against the company?” Interviewer: “Is there any reason why someone who works with you would say they thought you might feel justified in doing something wrong?” Interviewer: “What would concern you most if you did something wrong and it was discovered?”

Admission-Seeking Questions Distinguish the innocent from the culpable Obtain a valid confession Obtain from the confessor a written statement acknowledging the facts

Admission-Seeking Questions Presence of outsiders Miranda warnings Theme development People will confess if they perceive that the benefits outweigh the penalties. Offer a morally acceptable reason for the confessor’s behavior. Convey absolute confidence in the premise of the admission you seek from the subject.

Accusing an Innocent Person The accuser has reasonable suspicion or predication to believe the accused has committed an offense. The accusation is made under conditions of privacy. The accuser does not take any action likely to make an innocent person confess. The accusation is conducted under reasonable conditions.

Steps in the Admission-Seeking Interview Direct accusation Observe reaction Repeat accusation Interrupt denials Delays Interruptions Reasoning

Steps in the Admission-Seeking Interview Establish rationalization Unfair treatment Inadequate recognition Financial problems Aberration of conduct Family problems Accuser’s actions Stress, drugs, alcohol Revenge Depersonalizing the victim Minor moral infraction Altruism Genuine need

Steps in the Admission-Seeking Interview Diffuse alibis Display physical evidence Discuss witnesses Discuss deceptions Present alternative Benchmark admission Reinforce rationalization

Steps in the Admission-Seeking Interview Verbal confession That the accused knew the conduct was wrong Facts known only to the perpetrator An estimate of the number of instances or amounts A motive for the offense When the misconduct began

Steps In The Admission-Seeking Interview Verbal confession When/if the misconduct was terminated Others involved Physical evidence Disposition of proceeds Location of assets Specifics of each offense

Taking a Signed Statement Voluntary confessions Intent Instead of: Use: Lied I knew the statement/action was untrue. Stole I wrongfully took the property of ______ for my own benefit. Embezzled I wrongfully took ______’s property, which had been entrusted to me, and used it for my own benefit. Defrauded I knowingly told ______ an untrue statement and he/she/they relied on it.

Taking a Signed Statement Approximate dates of the offense Approximate amounts of losses Approximate number of instances Willingness to cooperate Excuse clause Have the confessor read the statement Truthfulness of statement Preparing the statement