Download presentation
Presentation is loading. Please wait.
1
Introduction to Fraud Examination
Chapter 1 Introduction to Fraud Examination
2
Learning Objectives Define fraud examination and differentiate it from auditing. Understand the fraud theory approach. Define occupational fraud. Define fraud. Define abuse. Know the difference between fraud and abuse. Describe the criminological contributions of Edwin H. Sutherland. Understand Donald Cressey’s hypothesis. Give examples of non-shareable problems that contribute to fraud. Understand how perceived opportunity and rationalization contribute to fraud. Explain W. Steve Albrecht’s “fraud scale.” Summarize the conclusions of the Hollinger-Clark study. Summarize the results of the 2010 Report to the Nations on Occupational Fraud and Abuse.
3
Discipline of Fraud Examination
Resolving allegations of fraud from tips, complaints, or accounting clues Documentary evidence Interviewing witnesses Writing investigative reports Testifying Assisting in the detection and prevention of fraud Forensic accounting vs. fraud examination
4
Auditing vs. Fraud Examination
Issue Auditing Fraud Examination Timing Recurring Nonrecurring Scope General Specific Objective Opinion Affix blame Relationship Nonadversarial Adversarial Methodology Audit techniques Fraud examination techniques Presumption Professional Proof skepticism
5
Fraud Examination Methodology
Predication Totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe a fraud has occurred, is occurring, and/or will occur Fraud examinations must be based on predication.
6
Fraud Theory Approach Analyze available data Create a hypothesis
Test the hypothesis Refine and amend the hypothesis
7
Tools Used in Fraud Examination
Document Analysis Neutral Third-Party Witnesses Corroborative Witnesses Co-Conspirators T Target Observation
8
Defining Occupational Fraud and Abuse
The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s resources or assets
9
Elements of Fraud A material false statement
Knowledge that the statement was false when it was uttered Reliance on the false statement by the victim Damages resulting from the victim’s reliance on the false statement
10
Occupational Fraud and Abuse Research
Edward Sutherland Donald Cressey Cressey’s Hypothesis
11
Opportunity Fraud Triangle Pressure Rationalization
12
2010 Report to the Nations on Occupational Fraud & Abuse
Global survey Measuring the costs of occupational fraud 5 percent lost to fraud $2.9 trillion worldwide
13
Position of Perpetrator
14
Median Loss by Position
15
Gender of Perpetrator
16
Median Loss by Gender
17
Department of Perpetrator
18
Median Loss by Department
19
Criminal History of Perpetrator
20
Median Loss per Number of Employees
21
Initial Detection of Frauds
22
Occupational Fraud and Abuse
Corruption Asset Misappropriations Fraudulent Statements Conflicts of Interest Cash Financial Bribery Inventory & All Other Assets Nonfinancial Illegal Gratuities Economic Extortion
23
Frequency of Types of Occupational Fraud and Abuse
24
Median Loss of Types of Occupational Fraud and Abuse
25
Chapter 2 Skimming
26
Chapter Objectives Define skimming.
List and understand the two principal categories of skimming schemes. Understand how sales skimming is committed and concealed. Understand schemes involving understated sales. Understand how cash register manipulations are used to skim currency. Be familiar with how sales are skimmed during non-business hours. Understand the techniques discussed for preventing and detecting sales skimming.
27
Chapter Objectives List and be able to explain the six methods typically used by fraudsters to conceal receivables skimming. Understand what “lapping” is and how it is used to hide skimming schemes. Be familiar with how fraudsters use fraudulent write-offs or discounts to conceal skimming. Understand the techniques discussed for preventing and detecting receivables skimming. Be familiar with proactive audit tests that can be used to detect skimming.
28
Skimming Schemes Skimming Sales Receivables Refunds & Other Write-off
Unrecorded Write-off Schemes Understated Lapping Schemes Unconcealed
29
Skimming Theft of cash from a victim entity prior to its entry in an accounting system “Off-book” No direct audit trail Its principal advantage is its difficulty of detection.
30
Asset Misappropriations
2009 Global Fraud Survey Scheme Type % of Asset Misappropriation Cases Median Loss Cash Misappropriations 85.6% $120,000 Non-Cash Misappropriations 20.3% $90,000
31
Frequency of Cash Misappropriations
32
Median Loss of Cash Misappropriations
33
Sales Skimming Employee makes a sale of goods or services, collects the payment, and makes no record of the transaction. Employee pockets the proceeds of the sale. Without a record of the sale, there is no audit trail.
34
Sales Skimming After hours sales Skimming by off-site employees
Cash register manipulation “No sale” or other non-cash transaction is recorded. Cash registers are rigged so that sales are not recorded on the register tapes. No receipt is issued. After hours sales Sales are conducted during non-business hours without the knowledge of the owners. Skimming by off-site employees Independent salespeople Employees at remote locations – branches or satellite offices away from the primary business site
35
Sales Skimming Poor collection procedures Understated sales
Sale is recorded for a lower amount than was collected. Price of sales item is reduced. Quantity of items sold is reduced. Theft in the mail room – incoming checks Incoming checks are stolen and cashed. Customer’s account is not posted.
36
Preventing and Detecting Sales Skimming
Maintain a viable oversight presence at any point. Create a perception of detection. Install video cameras. Utilize customers to detect and prevent fraud. All cash registers should record the log-in and log-out time of each user. Off-site sales personnel should also be required to maintain activity logs. Eliminate potential hiding places for stolen money. Incoming mail should be opened in a clear, open area free from blind spots and with supervisory presence.
37
Receivables Skimming More difficult than skimming sales
There is a record of the sale. Collection is expected. Customers are notified when payment is not received and will most likely complain. Lapping Force balancing Stolen statements Fraudulent write-offs or discounts Debiting the wrong account Document destruction
38
Receivables Skimming Lapping Force balancing Stolen statements
Crediting one customer’s account with payment received from another customer Keeping track of payments becomes complicated. Second set of books is sometimes kept. Force balancing Posting to the customer’s account without depositing the check creates an imbalance condition. Cash account is overstated so the amount skimmed must be forced in order to balance the account. Stolen statements Employee steals or alters the account statement or produces counterfeit statements. May change the customer’s address in order to intercept the statement
39
Receivables Skimming Fraudulent write-offs or discounts
Write off the account as bad debt. Post entries to a contra revenue account – “discounts and allowances.” Debiting the wrong account Debit an existing or fictitious A/R. Wait for the A/R to age and be written off. Destroying or altering records of the transaction Often a last ditch effort to conceal the fraud Makes it more difficult to prove the fraud
40
Preventing and Detecting Receivables Skimming
Succeed when there is a breakdown in an organization’s controls Mandate vacations. Mandate supervisory approval. Train audit staff. Proactively search for accounting clues. Perform trend analysis on aging of customer accounts. Conduct audit tests.
41
Chapter 3 Cash Larceny
42
Pop Quiz What is the difference between larceny and skimming?
43
Learning Objectives Define cash larceny.
Understand how cash receipts schemes differ from fraudulent disbursements. Recognize the difference between cash larceny and skimming. Understand the relative frequency and cost of cash larceny schemes as opposed to other forms of cash misappropriations. Identify weaknesses in internal controls as inducing factors to cash larceny schemes. Understand how cash larceny is committed at the point of sale.
44
Learning Objectives Discuss measures that can be used to prevent and detect cash larceny at the point of sale. Understand and identify various methods used by fraudsters to conceal cash larceny of receivables. Understand schemes involving cash larceny from deposits including lapping and deposits in transit. Understand controls and procedures that can be used to prevent and detect cash larceny from bank deposits. Be familiar with proactive audit tests that can be used to detect cash larceny schemes.
45
Larceny Of Cash on Hand From the Deposit Other
46
Cash Larceny Intentional taking away of an employer’s cash without the consent and against the will of the employer Fraudulent disbursements Cash receipt schemes
47
Frequency – Cash Misappropriations
48
Median Loss – Cash Misappropriations
49
Cash Larceny Schemes Can occur under any circumstance in which an employee has access to cash At the point of sale From incoming receivables From the victim organization’s bank deposits
50
Larceny at The Point of Sale
It’s where the money is Most common point of access to ready cash Results in an imbalance between the register tape and cash drawer
51
Larceny Schemes Theft from other registers Death by a thousand cuts
Using another cashier’s register or access code Death by a thousand cuts Stealing small amounts over an extended period of time Reversing transactions Using false voids or refunds Causes the cash register tape to balance to the cash drawer Altering cash counts or cash register tapes Destroying register tapes
52
Preventing and Detecting Cash Larceny at the Point of Sale
Enforce separation of duties Independent checks over the receipting and recording of incoming cash Upon reconciliation of cash and register tape, cash should go directly to the cashier’s office Discrepancies should be checked, especially if a pattern is identified Periodically run reports showing discounts, returns, adjustments, and write-offs by employee, department, and location to identify unusual patterns
53
Larceny of Receivables
Theft occurs after the payment has been recorded Force balancing Having total control of the accounting system can overcome the problem of out-of-balance accounts Can make unsupported entries in the books to produce a fictitious balance between receipts and ledgers Reversing entries Post the payment and then reverse the entry through “discounts” Destruction of records Destroying the records can conceal the identity of the perpetrator even though the fraud has been discovered
54
Cash Larceny From The Deposit
Whoever takes the deposit to the bank has an opportunity to steal a portion of it Having controls—such as matching the receipted deposit slip to the originally prepared slip—does not always prevent theft Failure to reconcile the slips can foster an environment leading to theft Lack of security over the deposit before it goes to the bank can also lead to theft
55
Cash Larceny From The Deposit
Deposit lapping Day one’s deposit is stolen and is replaced by day two’s deposit Deposits in transit The missing money is carried as a deposit in transit but it never clears the bank statement
56
Preventing and Detecting Cash Larceny From The Deposit
Separation of duties is the most important factor All incoming revenues should be delivered to a centralized department Compare the authenticated deposit slip with the company’s copy of the deposit slip, the remittance list, and the general ledger posting of the day’s receipts Two copies of the bank statement should be delivered to different persons in the organization Require that deposits be made at a night drop at the bank
57
Chapter 4 Billing Schemes
58
Pop Quiz What is a pass-through billing scheme?
59
Learning Objectives List the five major categories of fraudulent disbursements. Define the term “billing schemes.” List the three categories of billing schemes. Understand what a shell company is and how it is formed. List and understand the four ways false invoices are approved for payment. Understand why most shell company schemes involve the purchase of services rather than goods. Understand how a pass-through scheme differs from the usual shell company schemes. Be familiar with the methods identified in this chapter for preventing and detecting shell company schemes.
60
Learning Objectives Understand how pay-and-return schemes work.
Understand how non-accomplice vendor schemes work. Be familiar with the methods identified in this chapter for preventing and detecting non-accomplice vendor schemes. Understand how personal purchases schemes work. Be familiar with the methods identified in this chapter for preventing and detecting personal purchases schemes. Be familiar with proactive audit tests that can be used to detect billing schemes.
61
Billing Schemes Shell Company Non-Accomplice Vendor Personal Purchases
62
Frequency of Fraudulent Disbursements
63
Median Loss of Fraudulent Disbursements
64
Billing Schemes The perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose Fraudulent disbursement is issued in same manner as a legitimate disbursement Schemes Shell company schemes Non-accomplice vendor schemes Personal purchases schemes
65
Shell Company Schemes Fictitious entities created for the sole purpose of committing fraud Bank account is usually set up in the company’s name Forming a shell company Certificate of incorporation or assumed-name certificate set up Shell company may be formed in someone else’s name Best way is to set up company under a fictitious name Set up entity’s address – home address, post office box, or friend/relative’s address
66
Shell Company Submitting false invoices
Invoice is manufactured using a professional printer, personal computer, or typewriter Self-approval of fraudulent invoices Most fraudsters are in a position to approve payment Approvals may be forged “Rubber stamp” supervisors Don’t check the documentation Approve whatever is submitted Reliance on false documents Without approval authority, fraudster submits false documents – purchase order, invoice, and receiving report
67
Shell Company Collusion Purchases of services rather than goods
Two or more employees conspire to steal More difficult to detect Circumvents controls implemented to prevent fraud Purchases of services rather than goods Purchases of service are preferable to purchases of goods Services are intangible and fraud is more difficult to detect Pass-through schemes Goods or services are purchased by the employee and resold to the victim company at an inflated price
68
Preventing and Detecting Shell Company Schemes
Maintain and regularly update an approved vendor list Independently verify all vendors before payment Identifying shell company invoices Lack of detail on the fraudulent invoice Invoice that lacks detailed descriptions of the items billed Mailing address may be an indicator of fraud Consecutively numbered invoices over a period of time Reviewing payables and sorting payments by vendor and invoice number
69
Preventing and Detecting Shell Company Schemes
Testing for shell company schemes Investigate budget overruns and departments that regularly exceed their budget Conduct horizontal analysis of expenses Investigate unexplained increases in “soft” accounts Investigate unexplained increases in quantity of items purchased
70
Preventing and Detecting Shell Company Schemes
Testing for shell company schemes Monitor trends in average unit price Investigate goods and services that would not normally be purchased Compare vendor addresses to employee addresses Run reports of average turnaround time for invoices to look for unusual payment patterns
71
Preventing and Detecting Shell Company Schemes
Verifying whether a shell company exists Use the phone book to verify the vendor Contact others in the industry Verify vendor’s address through a site visit or by using satellite imaging software Identifying the employee behind a shell company Conduct a public records search of the company’s registration Be alert for related names, addresses, phone numbers, Social Security numbers, and other identities Match vendor payments with payroll checks Conduct surveillance of mail drops to see who picks up the checks
72
Billing Schemes – Non-Accomplice Vendors
Vendor is not a part of the scheme Pay-and-return schemes Payments owed to legitimate vendors intentionally mishandled Double pay an invoice Pay the wrong the vendor Overpay the invoice amount Purchase excess merchandise Overbilling with a non-accomplice vendor’s invoices Fake invoice is created for a vendor that regularly does business with victim organization Rerun an invoice already paid
73
Preventing and Detecting Non-Accomplice Vendor Fraud
Incoming checks should be photocopied and attached to the remittance advice Regarding overpayments, banks should be instructed not to cash checks payable to an organization Spot check past accounts payable files when a pay-and-return scheme is suspected
74
Personal Purchases With Company Funds
Employees make personal purchases for themselves, their businesses, their family, or their friends using company money Perpetrator causes the victim company to order and pay for an unneeded asset
75
Personal Purchases Through False Invoices
The fraudster is authorizer of invoices Falsifying documents such as purchase orders to obtain authorization Altering existing purchase orders False purchase requisitions Misrepresent the nature of the purchase Change the delivery address of the purchase
76
Company cards may be stolen or “borrowed” from authorized users
Personal Purchases on Credit Cards, Purchasing Cards, or Other Company Accounts Employees make purchases using their company credit cards, purchasing cards, or running accounts with vendors Company cards may be stolen or “borrowed” from authorized users Charge accounts Employees order items using an existing account with the vendor Returning merchandise for cash/credit Employee purchases a good or service, receives reimbursement, and then returns the item for a credit
77
Preventing and Detecting Personal Purchases
Conduct a thorough review of each credit card or purchasing card statement independent of the signature authority Only original support for the reimbursement should be allowed Card issuer should send two copies of the statement to two different individuals within the organization Card statements should be compared with employee expense vouchers for duplications, and monitored for unexplained increases in purchasing levels
78
Chapter 5 Check Tampering
79
Learning Objectives Define check tampering.
Understand the five principal categories of check tampering. Detail the means by which employees fraudulently obtain company checks. Understand how forged signatures are created on blank check stock. Be familiar with the methods identified in this chapter for preventing and detecting forged maker schemes. Differentiate between forged maker and forged endorsement schemes. Detail the methods employees use to intercept outgoing checks before they are delivered to the intended payee.
80
Learning Objectives Be able to discuss methods that can be used to prevent and detect the theft and/or alteration of outgoing company checks. Understand how authorized maker schemes work and why they are especially difficult to prevent. Understand how check tampering is hidden in a company’s accounting records. Describe measures companies can take to prevent and detect fraudulent electronic payments. Be familiar with proactive audit tests that can be used to detect check tampering.
81
Check Tampering Forged Maker Forged Endorsement Altered Payee
Concealed Checks Authorized Maker
82
Frequency of Fraudulent Disbursements
83
Median Loss of Fraudulent Disbursements
84
Check Tampering Schemes
Perpetrator physically prepares the fraudulent check Depend on: Access to check stock Access to bank statements Access to cash disbursements journal Ability to forge signatures or alter other information on the check
85
Forged Maker Schemes An employee misappropriates a check and fraudulently affixes the signature of an authorized maker Must have: Access to a blank check Convincing forgery of an authorized signature Ability to conceal the crime
86
Obtaining the Check Employees having access to company checks
A/P clerks, office managers, bookkeepers Employees lacking access to company checks Checks poorly guarded Producing counterfeit checks
87
Safeguarding the Check Stock
Maintained under lock and key Access limited to those with check preparation duties Boxes of blank checks should be sealed with security tape Periodically check the security of unused checks Voided check should be promptly destroyed Checks should be printed on watermark paper with security threads and distinctly marked paper Out-of-sequence canceled checks and duplicate check numbers should be investigated Each day the first check of the day should be reconciled to the last check written the previous day
88
To Whom Is The Check Made Payable?
Perpetrator Accomplice “Cash” Vendors
89
Forging the Signature Free-hand forgery Photocopied forgeries
May not need to be particularly accurate Photocopied forgeries Photocopies are made of legitimate signatures and affixed to the check Automatic check-signing mechanisms Produce perfect forgeries
90
Forged Maker Schemes Concealing the fraud Converting the check
Miscode the check Converting the check Fake identification may be needed Checks made payable to “cash” require the endorsement of the person converting the check thus leaving a clue as to the identity of the forger
91
Preventing and Detecting Forged Maker Schemes
Safeguard blank check stock Establish rules for custody of checks that have been prepared but not signed Separate duties of check preparer and check signers Rotate authorized check signers when possible and keep track of authorized signers Strictly limit access to signature stamps
92
Forged Endorsement Schemes
Employee intercepts a company check intended for a third party Signs the third party’s name on the endorsement line of the check
93
Intercepting Checks Before Delivery
Employee involved in delivery of checks Poor controls of signed checks Theft of returned checks Rerouting the delivery of checks Converting the stolen check
94
Preventing and Detecting the Theft of Outgoing Company Checks
Separate the functions of cutting checks, check signing, and delivery of checks Employees should be trained to look for schemes involving check theft Investigate vendor and customer complaints Accounting system should identify duplicate payments
95
Preventing and Detecting the Theft of Outgoing Company Checks
Authority to make changes to vendor records should be restricted Periodic report listing all changes to vendor records should be generated to determine if there is an unusual number of changes made Investigate canceled checks with dual endorsements and non-payroll checks signed by an employee Chart the date of mailing for every outgoing check so that if a check is stolen, you can determine who worked in the mailroom on the date it was stolen
96
Altered Payee Schemes Employee intercepts a company check intended for a third party Payee designation is altered so the check can be converted Less chance of discovery unless canceled checks are reviewed during reconciliation
97
Altering Checks Prepared by Others
Inserting a new payee A false payee’s name is inserted in place of the true payee’s name Accounts payable system is manipulated and the payee’s name is changed “Tacking on” Letters or words are added to the end of the real payee designation
98
Altering Checks Prepared by the Fraudster
Erasable ink Erasing typewriters Erasable pens Pencils Blank checks Authorized signer signs a check left blank to be filled in by the fraudster
99
Preventing and Detecting Altered Company Checks
Separation of duties in the check writing process Check preparation, signing, and delivery Separation of duties of the check reconciliation process Check preparation and check reconciliation Check the canceled check against the entry in the books Consider using carbon copy checks to check against canceled checks for discrepancies
100
Concealed Check Schemes
Employee prepares a fraudulent check and submits it along with legitimate checks Check is payable to the employee, an accomplice, a fictitious person, or a fictitious business Occurs when checks are signed without proper review or reviewer is busy In many cases, only the signature line is exposed and the payee is concealed
101
Authorized Maker Schemes
Employee with signatory authority writes a fraudulent check Overriding controls through intimidation High-level managers can make employees afraid to question suspicious transactions Can happen when ownership is absent or inattentive Poor controls Failure to closely monitor accounts Lack of separation of duties
102
Preventing and Detecting Check Tampering by Authorized Makers
Difficult to detect because check signer is relied on to serve as a control Separate the duties of the check writing function Check preparer and check signer Check signers should not have access to blank checks Require dual signatures for disbursements over a certain amount Maintain up-to-date vendor lists and confirm all disbursements to the lists, scrutinizing checks to unknown vendors
103
Concealing Check Tampering
Forged endorsement schemes and altered payee schemes create a problem for the fraudster because the checks are intended for a legitimate recipient who will complain if a payment isn’t received An investigation could be triggered and the fraud discovered
104
Concealing Check Tampering
Fraudster reconciling the bank statement Remove fraudulent check Doctor the bank statement Code check as “void” or don’t include it in the disbursements journal Re-alteration of checks Check is changed back to the rightful payee when returned from the bank Re-altered checks will match the names of the legitimate payees listed in the disbursements journal
105
Concealing Check Tampering
Falsifying the disbursements journal Check made payable to the perpetrator but a different person is listed as the payee in the books Amount of the check can also be falsified in the disbursements journal Existing accounts that are rarely reviewed or are very active are preferred
106
Concealing Check Tampering
Reissuing intercepted checks New checks are issued to replace the ones that the vendor did not receive The original invoice is changed in a manner that avoids a duplicate check for new check New check is issued and a stop payment is supposed to have been made Bogus supporting documents Fake documentation is needed to support the check False payment vouchers, invoices, purchase orders, receiving reports are submitted
107
Electronic Payment Tampering
Electronic payments Alternative to paper checks Enable payer to transmit funds electronically over Internet or other medium Include ACH payments, online bill payments, and wire transfers
108
Electronic Payment Tampering
Methods used to manipulate electronic payments include Abusing legitimate access to employer’s payment system Gaining access through social engineering or password theft Exploiting weaknesses in internal control or payment system
109
Prevention and Detection of Electronic Payment Tampering
Internal controls Separation of duties; e.g., segregate duties for creating, approving, and releasing wires Segregating bank accounts; e.g., separate accounts for paper and electronic transactions Daily account monitoring and reconciliation Management and protection of user access and account information
110
Prevention and Detection of Electronic Payment Tampering
Bank security services Set up ACH blocks/ACH filters Use positive pay for ACH Restrict banking software access to specific banking activities to enhance separation of duties; e.g., viewing bank statements or initiating electronic payments Customize banking software to incorporate dual authorization and daily or individual transaction limits Use bank’s multi-factor authentication tools; e.g., tokens, digital certificates, and smart cards
111
Chapter 6 Payroll Schemes
112
Learning Objectives List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds. Define a ghost employee. List and understand the four steps to making a ghost employee scheme work. Understand how separation of duties in payroll and human resources functions can reduce the threat of payroll fraud. Be familiar with methods identified in this chapter for preventing and detecting ghost employee schemes.
113
Learning Objectives List and understand the four ways that employees can obtain authorization for a falsified timecard in a manual system. Understand the role that payroll controls play in preventing falsified hours and salary schemes. Discuss the methods identified in this chapter for preventing and detecting falsified hours and salary schemes. Understand how employees commit commission schemes. Identify red flags that are typically associated with commission schemes. Be familiar with proactive audit tests that can be used to detect various forms of payroll fraud.
114
Payroll Schemes Ghost Employees Commission Schemes Workers
Compensation Falsified Wages
115
Frequency of Fraudulent Disbursements
116
Median Loss of Fraudulent Disbursements
117
Payroll Schemes Occupational frauds in which a person who works for an organization causes that organization to issue a payment by making a false claim for compensation Ghost employee schemes Falsified hours and salary schemes Commission schemes
118
Ghost Employees Someone on the payroll who does not actually work for the victim company Fictitious person Friend or relative Accomplice Other
119
Ghost Employee Schemes
Adding the ghost to the payroll Through the personnel department Through the hiring department Through the payroll department Using names similar to real employees Failing to remove terminated employees from the payroll
120
Ghost Employee Schemes
Collecting timekeeping information Fake timecards Approval of timecards Computerized timekeeping systems Salaried workers vs. hourly workers
121
Ghost Employee Schemes
Issuing the ghost’s paycheck Delivery of the paycheck Hand delivered Mailed to the employees address Direct deposited
122
Preventing and Detecting Ghost Employee Schemes
Separate the hiring function from the payroll function Personnel records should be independently maintained from payroll and timekeeping functions Personnel department should verify any changes to payroll Background and reference checks should be made in advance of hire
123
Preventing and Detecting Ghost Employee Schemes
Periodically check the payroll records against personnel records for terminated employees and unauthorized wage or deduction adjustments Periodically run computer reports for employees Without SSNs With no deductions - withholding taxes or insurance With no physical address or telephone number Compare payroll expenses to production schedules Keep signed checks in a secure location Verify proper distribution and require employee identification
124
Falsified Hours and Salary
Overpayment of wages is the most common form of misappropriating payroll funds Increase number of hours or rate of pay Time clocks Computer tracking of employee time Manually prepared timecards
125
Manually Prepared Timecards
Forging a supervisor’s signature Collusion with a supervisor Rubber stamp supervisors Poor custody procedures
126
Other Schemes Time clocks and other automated timekeeping systems
Employee has someone else clock in for him/her when absent Rates of pay
127
Preventing and Detecting Falsified Hours and Salary Schemes
Preparation, authorization, distribution, and reconciliation should be segregated Transfers of funds from general accounts to payroll accounts should be handled independently No overtime should be paid unless authorized in advance Sick leave and vacation time should not be granted without supervisory review and should be monitored for excessive time taken
128
Preventing and Detecting Falsified Hours and Salary Schemes
A designated official should verify all wage rate changes Timecards should be taken directly to the payroll department after approval Time cards should be secured and monitored Run programs to actively seek out fraudulent payroll activity
129
Tests for Fraudulent Payroll Activity
Review employees who have significantly more overtime than similar employees Trend analysis of budgeted vs. actual expenses Run exception reports for employees who have had disproportionately large increases in wages Verify payroll taxes equal federal return tax forms Compare net payroll to payroll checks issued
130
Commission Schemes Pay is based on an employee’s output rather than hours worked or a set salary Falsify the amount of sales made Create fraudulent sales orders, customer purchase orders, credit authorizations, packing slips, invoices, etc. Ring up a false sale on the cash register Overstate legitimate sales Fraudulently increase the rate of commission
131
Detecting Commission Schemes
Run periodic reports to show an unusual relationship between sales figures and commission figures Run reports that compare commissions earned among salespersons Track uncollected sales generated by each salesperson Conduct random samples of customers to verify that the customer exists
132
Expense Reimbursement Schemes
Chapter 7 Expense Reimbursement Schemes
133
Learning Objectives Explain what constitutes expense reimbursement fraud. Discuss the data on expense reimbursement fraud from the 2009 Global Fraud Survey. Understand how mischaracterized expense reimbursement schemes are committed. Be familiar with the controls identified in this chapter for preventing and detecting mischaracterized expense schemes. Identify the methods employees use to overstate otherwise legitimate expenses on their expense reports. Understand controls that can be used to prevent and detect overstated expense schemes.
134
Learning Objectives Explain what a fictitious expense reimbursement scheme is and differentiate it from other forms of expense reimbursement fraud. Identify red flags that are commonly associated with fictitious expense schemes. Discuss what a multiple reimbursement scheme is and how this kind of fraud is committed. Discuss the controls identified in this chapter for preventing and detecting multiple reimbursement schemes. Be familiar with proactive audit tests that can be used to detect various forms of expense reimbursement fraud.
135
Expense Reimbursement Schemes Mischaracterized Expenses Overstated
Fictitious Expenses Multiple Reimbursements
136
Frequency of Fraudulent Disbursements
137
Median Loss Fraudulent Disbursements
138
Expense Reimbursement Schemes
Employees are reimbursed for expenses paid on behalf of their employer Airfare, hotel bills, business meals, mileage, etc. Business purpose explained and receipts attached per the organization’s guidelines
139
Mischaracterized Expense Reimbursements
Purpose of reimbursement request is misstated Fraudster seeks reimbursement for personal expenses Personal trips listed as a business trips Non-allowable meals with friends and family Perpetrators are usually high-level employees, owners, or officers Common element – lack of detailed expense reports
140
Preventing and Detecting Mischaracterized Expenses
Establish and adhere to a system of controls Require detailed expense reports with original support documentation Require direct supervisory review of all travel and entertainment expenses Establish a policy that clearly states what will and will not be reimbursed
141
Preventing and Detecting Mischaracterized Expenses
Scrutinize any expense report that is approved outside the requestor’s department Compare dates of claimed expenses to work schedules Compare prior year expenses to current year expenses and to budgeted expenses
142
Overstated Expense Reimbursements
Altered receipts Overpurchasing Overstating another employee’s expenses Orders to overstate expenses
143
Preventing and Detecting Overstated Expense Reimbursements
Require original receipts for all expense reimbursements If photocopied receipts are submitted, independently verify the expense Book travel through company travel agent using designated company credit card Compare employee’s expense reports with co-workers to identify inconsistencies Spot check expense reports with customers
144
Fictitious Expenses Producing fictitious receipts
Personal computers Calculators Cut and paste Obtaining blank receipts from vendors Claiming the expenses of others
145
Preventing and Detecting Fictitious Expense Reimbursements
Look for: High dollar items that were paid in cash Expenses that are consistently rounded off, ending with “0” or “5” Expenses that are consistently for the same amount Reimbursement requests that consistently fall at or just below the reimbursement limit Receipts that are submitted over an extended time that are consecutively numbered Receipts that do not look professional or that lack information about the vendor
146
Multiple Reimbursement Schemes
A single expense item is submitted several times to receive multiple reimbursements Example: Airline ticket receipt and travel agency invoice Submit the credit card receipt for items charged to the company’s credit card account Submitting the same expenses to different budgets
147
Preventing and Detecting Multiple Reimbursement Schemes
Enforce a policy against accepting photocopies Establish clearly what types of support documentation are acceptable Scrutinize expense reports that are approved by supervisors outside the requestor’s department Require that expense reimbursements be approved by the employee’s direct supervisor Establish a policy that expenses must be submitted within a certain time limit
148
Mid-term Exam Practice Questions
149
1. In a ______________ scheme, the perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose. Purchasing Skimming Larceny Billing
150
1. In a ______________ scheme, the perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose. Purchasing Skimming Larceny Billing
151
2. Mel Turner, the runner for a small bookstore, had a bad habit of helping himself to cash from the deposit on the way to the bank. He covered his tracks by substituting a check from the next day’s deposit for the amount he stole from the previous day. This is an example of what type of concealment? Deposit in transit Deposit lapping Force balance depositing None of the above
152
2. Mel Turner, the runner for a small bookstore, had a bad habit of helping himself to cash from the deposit on the way to the bank. He covered his tracks by substituting a check from the next day’s deposit for the amount he stole from the previous day. This is an example of what type of concealment? Deposit in transit Deposit lapping Force balance depositing None of the above
153
3. Which of the following is not considered to be a red flag for fictitious expenses?
An employee repeatedly uses the company credit card for business travel expenses. An employee’s reimbursement requests are always for round-dollar amounts. An employee submits reimbursement requests that consistently fall just below the reimbursement limit. An employee frequently requests reimbursement for high-dollar items that he claims were paid for in cash.
154
3. Which of the following is not considered to be a red flag for fictitious expenses?
An employee repeatedly uses the company credit card for business travel expenses. An employee’s reimbursement requests are always for round-dollar amounts. An employee submits reimbursement requests that consistently fall just below the reimbursement limit. An employee frequently requests reimbursement for high-dollar items that he claims were paid for in cash.
155
4. In order to prove that fraud occurred, four general elements must be present. Which of the following is not a general element of fraud? A material false statement Knowledge that the statement was false Reliance on the false statement by the victim Intent to cause the victim damages
156
4. In order to prove that fraud occurred, four general elements must be present. Which of the following is not a general element of fraud? A material false statement Knowledge that the statement was false Reliance on the false statement by the victim Intent to cause the victim damages
157
5. Check tampering includes both fraudulently preparing a company check for one’s own benefit and intercepting a company check that is intended for a third party and converting it for one’s own benefit. True False
158
5. Check tampering includes both fraudulently preparing a company check for one’s own benefit and intercepting a company check that is intended for a third party and converting it for one’s own benefit. True False
159
6. Which of the following procedures would not be useful in preventing and detecting sales skimming schemes? Comparing register tapes to the cash drawer and investigating discrepancies Summarizing the net sales by employee and extracting the top employees with low sales Installing video cameras at cash entry points Offering discounts to customers who do not get receipts for their purchases
160
6. Which of the following procedures would not be useful in preventing and detecting sales skimming schemes? Comparing register tapes to the cash drawer and investigating discrepancies Summarizing the net sales by employee and extracting the top employees with low sales Installing video cameras at cash entry points Offering discounts to customers who do not get receipts for their purchases
161
7. In the 2010 Report to the Nations on Occupational Fraud and Abuse, fraudulent financial statements schemes had a higher median loss than asset misappropriation and corruption schemes. True False
162
7. In the 2010 Report to the Nations on Occupational Fraud and Abuse, fraudulent financial statements schemes had a higher median loss than asset misappropriation and corruption schemes. True False
163
8. In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. How was the fraud caught? The auditors found a discrepancy in the invoices that were submitted. The new chief of internal audit found it by accident. A vendor received a check by mistake and called the accounts payable department. The external audit found it in an audit sample of canceled checks.
164
8. In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. How was the fraud caught? The auditors found a discrepancy in the invoices that were submitted. The new chief of internal audit found it by accident. A vendor received a check by mistake and called the accounts payable department. The external audit found it in an audit sample of canceled checks.
165
9. Which of the following is not a type of payroll scheme?
Ghost employee schemes False deduction schemes Falsified hours and salary schemes Commission schemes
166
9. Which of the following is not a type of payroll scheme?
Ghost employee schemes False deduction schemes Falsified hours and salary schemes Commission schemes
167
Multiple reimbursement scheme Shell company scheme
10. Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which of the following schemes is likely occurring? Multiple reimbursement scheme Shell company scheme Personal purchases scheme Forged maker scheme
168
Multiple reimbursement scheme Shell company scheme
10. Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which of the following schemes is likely occurring? Multiple reimbursement scheme Shell company scheme Personal purchases scheme Forged maker scheme
169
Register Disbursement Schemes
Chapter 8 Register Disbursement Schemes
170
Pop Quiz According to the 2006 National Fraud Survey, register disbursement schemes have a higher median loss than payroll schemes. True or false?
171
Learning Objectives Explain what constitutes a register disbursement scheme. Differentiate register disbursements from skimming and cash larceny schemes. List the two basic categories of register disbursements. Explain how false refund schemes are committed. Explain how false void schemes are committed.
172
Learning Objectives Understand how register disbursement schemes cause shrinkage. Discuss the methods by which fraudulent register disbursements are concealed. Understand the methods identified in this chapter for preventing and detecting register disbursement schemes. Be familiar with proactive audit tests that can be used to detect register disbursement schemes.
173
Register Disbursements False Voids False Refunds
174
Frequency of Fraudulent Disbursements
175
Median Loss of Fraudulent Disbursements
176
Register Disbursement Schemes
False refunds False voids
177
False Refunds A refund is processed when a customer returns an item of merchandise purchased from the store Merchandise is placed back into inventory Purchase price is returned to the customer
178
False Refunds Fictitious refunds
Fraudster takes cash from the register in the amount of the false return Debit is made to the inventory system showing that the merchandise has been returned to the inventory
179
False Refunds Overstated refunds
Fraudster overstates the amount of a legitimate refund and skims the excess money Customer is paid the actual amount owed for the returned merchandise and the excess is kept by the fraudster
180
False Refunds Credit card refunds
Refunds appear as credits to the customer’s credit card rather than as cash disbursements Perpetrator does not have to physically take cash from the register Refunded to the perpetrator’s credit card
181
False Voids Also generate a disbursement from the register
Copy of customer’s receipt is attached to the void slip Managers must generally approve voided sales Rubber stamp approvals allow the fraud to succeed Management and the employee may conspire
182
Concealing Register Disbursements
Fraudsters typically do not make any effort to conceal the shrinkage Register disbursement schemes leave the victim organization’s books in balance Fraudster often takes no further action
183
Concealing Register Disbursements
Small disbursements Keep the size of the disbursements low to where management review is not required Destroying records Employee has conceded that management will discover the theft Goal is to prevent management from discovering who the thief is
184
Preventing and Detecting Register Disbursement Schemes
Maintain appropriate separation of duties Management approval should be required for all refunds and voided sales Closely guard access to the control key or management code Prohibit cashiers from reversing their own sales
185
Preventing and Detecting Register Disbursement Schemes
Require proper documentation for voided transactions such as the original receipt Require cashiers to maintain a distinct login code Periodically generate reports of all reversing transactions
186
Preventing and Detecting Register Disbursement Schemes
Look for large numbers of transactions just below the approval amount Institute store policies encouraging customers to ask for and examine their receipts Randomly call customers who have returned merchandise or voided sales
187
Chapter 9 Non-Cash Assets
188
Learning Objectives List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash misappropriations from the 2009 Global Fraud Survey. Explain how misuse of non-cash assets can negatively affect organizations. Understand how and why unconcealed larceny of non-cash assets occurs. Be familiar with internal controls and tests that can be used to prevent and detect non-cash larceny. Understand how weaknesses in internal asset requisition and transfer procedures can lead to the misappropriation of non-cash assets.
189
Learning Objectives Explain how purchasing and receiving schemes are used to misappropriate non-cash assets. Understand how the theft of non-cash assets through the use of fraudulent shipments is accomplished. Define the term “shrinkage.” Describe how fraudsters conceal the theft of non-cash assets on the victim organization’s books. Understand how fraudsters misappropriate intangible assets and how companies can protect themselves. Be familiar with proactive audit tests that can be used to detect misappropriations of non-cash assets.
190
Inventory and All Other Assets Misuse Larceny Asset Req. & Transfers
False Sales & Shipping Purchasing & Receiving Unconcealed Larceny
191
Cash vs. Non-Cash Schemes
2009 Global Fraud Survey Scheme Type % of Asset Misappropriation Cases Median Loss Cash Misappropriations 85.6% $120,000 Non-Cash Misappropriations 20.3% $90,000
192
Non-Cash Cases by Type of Asset Misappropriated
193
Median Loss by Type of Asset in Non-Cash Schemes
194
Non-Cash Tangible Asset Misappropriations
Misuse Unconcealed larceny Asset requisitions and transfers Purchasing and receiving schemes Fraudulent shipments
195
Misuse of Non-Cash Tangible Assets
Typical misuse Company vehicles Company supplies Computers Other office equipment Doing personal work on company time Running side businesses
196
The Costs of Inventory Misuse
Loss of productivity Need to hire additional employees to compensate Lost business if employee’s business competes Unauthorized use of equipment can mean additional wear and tear sooner or more often
197
Unconcealed Larceny Schemes
Greater concern than misuse of assets Most schemes are not complex Some employees know their co-workers are stealing but refrain from reporting it Many of the employees who steal company property are highly trusted Assets misappropriated after-hours or mailed to perpetrator
198
The Fake Sale Needs an accomplice
Sale is not rung up but the accomplice takes the merchandise Accomplice may return merchandise for cash
199
Preventing and Detecting Unconcealed Larceny of Non-Cash Tangible Assets
Segregate the duties of requisitioning, purchasing, and receiving Segregate the duties of payables, purchasing, and receiving Maintain physical security of merchandise Track those who enter secure areas through access logs Install security cameras and let their presence be known
200
Preventing and Detecting Unconcealed Larceny of Non-Cash Tangible Assets
Conduct inventory counts on a periodic basis by someone independent of the purchasing and warehousing functions Suspend shipping and receiving activities during physical counts Investigate significant discrepancies Independently follow-up on customer complaints
201
Asset Requisitions and Transfers
Documentation enables non-cash assets to be moved from one location to another Internal documents can be used to fraudulently gain access to merchandise Basic scheme is to requisition materials to complete a work-related project, then steal the materials Inventory stored in multiple locations creates opportunities
202
Purchasing and Receiving Schemes
Assets were intentionally purchased by the company but misappropriated Falsifying incoming shipments May also reject portion of the shipment as being substandard Perpetrator keeps the “substandard” merchandise
203
False Shipments of Inventory and Other Assets
False shipping and sales documents are created to make it appear that the inventory was sold False packing slips can allow the inventory to be delivered to fraudster or accomplice To hide the theft a false sale is created Receivable is aged and written off Legitimate sale is understated
204
Other Schemes Assets are written off in order to make them available for theft Assets are declared as scrap and given to the employee New equipment is ordered for the company to replace old – new equipment is sent to employee’s home leaving old equipment in place
205
Concealing Inventory Theft
Key concealment issue is shrinkage Inventory shrinkage is the unaccounted-for reduction in the company’s inventory due to theft Since shrinkage signals fraud, the fraudster must prevent anyone from looking for the missing assets Physical count of inventory detects shrinkage
206
Concealing Inventory Theft
Altered inventory records Forced reconciliation Deleting or covering up the correct totals and entering new totals Fictitious sales and accounts receivable Charge sale to existing account Write-off to discounts and allowances or bad debt expense
207
Concealing Inventory Theft
Write off inventory and other assets Eliminates the problem of shrinkage Physical padding Make it appear that there are more assets present that there actually are
208
Preventing and Detecting Thefts of Non-Cash Tangible Assets
Separate the duties of: Ordering goods Receiving goods Maintaining perpetual inventory records Issuing payments Match the invoices to receiving reports before payments are issued Match the packing slip to an approved purchase order
209
Preventing and Detecting Thefts of Non-Cash Tangible Assets
Match outgoing shipments to sales orders before merchandise goes out Periodically match inventory shipments to sales records Investigate shipments that cannot be traced to a sale Check out unexplained increases in bad debt expense
210
Preventing and Detecting Thefts of Non-Cash Tangible Assets
Compare shipping addresses to employee addresses Review unexplained entries in perpetual inventory records Reconcile materials ordered for specific projects with actual work done Perform trend analysis on scrap inventory Check to make sure that inventory removed from inventory is properly approved
211
Misappropriation of Intangible Assets
Misappropriation of information Includes theft of competitively sensitive information, (e.g., trade secrets, customer lists, marketing strategies) Can undermine value, reputation, and competitive advantage Can result in legal liabilities Identify most valuable information and take steps to protect it Misappropriation of securities Proper internal controls over investment portfolio
212
Chapter 10 Corruption
213
Pop Quiz What are the two principle schemes involving bribery?
214
Learning Objectives Define corruption.
Identify the four categories of corruption. Define bribery. Compare and contrast bribery, extortion, and illegal gratuities. Identify the two categories of bribery schemes. Understand kickback schemes and how they are committed. Understand bid-rigging schemes and explain how they are categorized.
215
Learning Objectives Describe the types of abuses that are committed at each stage of the competitive bidding process. Be familiar with the controls and techniques that can be used to prevent and detect bribery. Define conflicts of interest. Differentiate conflicts of interest from bribery schemes and billing schemes. List and understand the two major categories of conflicts of interest. Be familiar with proactive audit tests that can be used to detect corruption schemes.
216
Corruption Conflicts of Interest Bribery Illegal Gratuities Economic
Extortion Purchase Schemes Invoice Kickbacks Sales Schemes Bid Rigging Other Other
217
Frequency of Types of Occupational Fraud and Abuse
218
Median Loss of Types of Occupational Fraud and Abuse
219
Frequency of Corruption Schemes
220
Bribery Offering, giving, receiving, or soliciting any thing of value to influence an official act Buys influence of the recipient Commercial bribery Kickbacks Bid-rigging schemes
221
Kickback Schemes Involve submission of invoices for goods and services that are either overpriced or completely fictitious Involve collusion between employees and vendors Almost always attack the purchasing function of the victim company
222
Kickback Schemes Diverting business to vendors
Vendor pays the kickbacks to ensure a steady stream of business from the purchasing company No incentive to provide quality merchandise or low price Almost always leads to overpaying for goods or services
223
Overbilling Schemes Employees with approval authority
Vendor submits inflated invoices to the victim company Overstates the cost of actual goods or services or reflects fictitious sales Ability to authorize purchases is key to the scheme
224
Overbilling Schemes Employees lacking approval authority
Circumvent purchasing controls May prepare false vouchers to make it appear that the invoice is legitimate May forge an approval signature or have access to a restricted password in a computerized system Difficult to detect since the victim company is being attacked from two directions
225
Other Kickback Schemes
Discounts are given in exchange for bribes Slush funds Other side of the transaction Funds can be paid from other accounts or paid as “consulting fees”
226
Detecting Kickbacks Normal controls may not detect kickback schemes
Look for price inflation Monitor trends in cost of goods sold and services purchased Often start small but increase over time
227
Detecting Kickbacks Look for excessive quantities purchased
Investigate inventory shortages Look for inferior goods purchased Compare actual amounts to budgeted amounts
228
Preventing Kickbacks Assign an employee independent of the purchasing department to routinely review buying patterns Make sure that all contracts have a “right to audit” clause Establish written policies prohibiting employees from soliciting or accepting any gift or favor from a customer or supplier Expressly forbid any employee from engaging in any transaction, on behalf of the company, in which he or she has an undisclosed personal interest Implement an ethics policy that clearly explains what improper behavior is and provides grounds for termination if an employee accepts a bribe or kickback
229
Bid-Rigging Schemes All bidders are expected to be on an even playing field – bidding on the same specifications The more power a person has over the bidding process, the more influence he or she can exert over the selection of the winning bid Potential targets include: Buyers Contracting officials Engineers and technical representatives Quality or produce assurance representatives Subcontractor liaison employees
230
Pre-Solicitation Phase
Need recognition schemes Employee of the purchasing company convinces the company that a particular project is necessary Has the specifications tailored to the strengths of a particular supplier Trends indicating a need recognition scheme is occurring Higher requirements for stock and inventory levels Writing off large numbers of surplus items to scrap Defining a need that can only be met by a certain supplier Failure to develop a satisfactory list of backup suppliers
231
Specification Schemes
Specifications include a list of the elements, materials, dimensions, and other relevant requirements Set the specifications to a particular vendor’s capabilities Use“prequalification” procedures to eliminate certain vendors Sole-source or noncompetitive procurement justifications Deliberately writes vague specifications requiring amendments at a later date Bid splitting Gives a vendor the right to see the specifications before his competitors get the specs
232
The Solicitation Phase
Restricting the pool of vendors from which to choose Bid pooling Fictitious suppliers Restricting the time for submitting bids Soliciting bids in obscure publications Publicizing the bid during holiday periods
233
The Submission Phase Fraud in the sealed bid process
Last bid submitted is the one that is awarded the contract Winning bidder finds out what the other competitors are bidding Winning bidder may see the other competitors’ bids before submitting his bid Gets help on preparing the bid
234
Detecting Bid-Rigging Schemes
Look for: Unusual bidding patterns Low bids followed by change orders A very large unexplained price difference among bidders Contractors who bid last and repeatedly receive the contract A predictable rotation of bidders Losing bidders who become subcontractors Vendors with the same address and phone number Fewer bidders than expected for the project Projects that have been split into smaller ones
235
Something of Value Cash Promises of future employment
Promise of ownership in the supplier’s firm Gifts Liquor and meals Free travel and accommodations Cars and other merchandise Payment of credit card bills Loans on very favorable terms Transfers of property
236
Other Corruption Schemes
Illegal gratuities Given to reward a decision rather than influence it Decision made to benefit a person or company but is not influenced by any sort of payment May influence future decisions Economic extortion “Pay up or else” Employee demands payment from a vendor in order to make a decision in the vendor’s favor
237
Conflicts of Interest Employee, manager, or executive has an undisclosed economic or personal interest in a transaction that adversely affects the company Victim organization is unaware of the employee’s divided loyalties Distinguished from bribery–in conflicts of interest, the fraudster approves the invoice because of his own hidden interest in the vendor Purchasing schemes Sales schemes
238
Purchasing Schemes Overbilling schemes Turnaround sales
Bill originates from a real company in which the fraudster has an undisclosed economic or personal interest Fraudster uses influence to ensure the victim company does business with this particular vendor Does not negotiate in good faith or attempt to get the best price for the employer Turnaround sales The employee knows that the company is seeking to purchase a particular asset and purchases it himself Turns around and sells it to the company at an inflated price
239
Sales Schemes Underbillings Writing off sales
Goods are sold below fair market value to a customer in which the perpetrator has a hidden interest Writing off sales Purchases are made from the victim company and credit memos are later issued
240
Other Conflict of Interest Schemes
Business diversions Siphoning off clients of the victim company to the employee’s own business Resource diversions Diverting funds and other resources for the development of the employee’s own company Financial disclosures Inadequate disclosures of related-party transactions to the company
241
Preventing and Detecting Conflicts of Interest
Implement, communicate, and enforce an ethics policy that addresses conflicts of interest offenses Require employees to complete an annual disclosure statement Establish an anonymous reporting mechanism to receive tips and complaints Compare vendor address and telephone files to employee address and telephone files for matches
242
Fraudulent Financial Statement Schemes
Chapter 12 Fraudulent Financial Statement Schemes
243
Pop Quiz Name at least three of the five principal financial statement fraud schemes.
244
Learning Objectives Define financial statement fraud and related schemes. Understand and identify the five classifications of financial statement fraud. Explain how fictitious revenues schemes are committed, as well as the motivation for, and result of, committing this fraud. Explain how timing difference schemes are committed, as well as the motivation for, and result of, committing this fraud. Describe the methods by which concealed liabilities and expenses are used to fraudulently improve a company’s balance sheet.
245
Learning Objectives Understand how improper disclosures may be used to mislead potential investors, creditors, or any other users of financial statements. Recognize how improper asset valuation may inflate the current ratio. Identify detection and deterrence procedures that may be instrumental in dealing with fraudulent financial statement schemes. Understand financial statement analysis for detecting fraud. Identify and characterize current professional and legislative actions that have sought to improve corporate governance, enhance the reliability and quality of financial reports, and foster the credibility and effectiveness of audit functions.
246
Financial Statement Fraud Defined
Deliberate misstatements or omissions of amounts or disclosures of financial statements to deceive financial statement users, particularly investors and creditors.
247
Defining Financial Statement Fraud
Falsification, alteration, or manipulation of material financial records, supporting documents, or business transactions Material intentional omissions or misrepresentations of events, transactions, accounts, or other significant information from which financial statements are prepared Deliberate misapplication of accounting principles, policies, and procedures used to measure, recognize, report, and disclose economic events and business transactions Intentional omissions of disclosures, or presentation of inadequate disclosures, regarding accounting principles and policies and related financial amounts (Rezaee 2002)
248
Costs of Financial Statement Fraud
In addition to the direct economic losses of fraud are Legal costs; increased insurance costs; loss of productivity; adverse impacts on employees’ morale, customers’ goodwill, and suppliers’ trust; and negative stock market reactions These costs are impossible to measure
249
Costs of Financial Statement Fraud
Undermines the reliability, quality, transparency, and integrity of the financial reporting process Jeopardizes the integrity and objectivity of the auditing profession, especially of auditors and auditing firms Diminishes the confidence of the capital markets, as well as of market participants, in the reliability of financial information Makes the capital markets less efficient
250
Costs of Financial Statement Fraud
Adversely affects the nation’s economic growth and prosperity Results in huge litigation costs Destroys careers of individuals involved Causes bankruptcy or substantial economic losses by the company engaged in financial statement fraud
251
Costs of Financial Statement Fraud
Encourages regulatory intervention Causes devastation in the normal operations and performance of alleged companies Raises serious doubt about the efficacy of financial statement audits Erodes public confidence and trust in the accounting and auditing profession
252
Methods of Financial Statement Fraud
Fictitious revenues Timing differences Improper asset valuations Concealed liabilities and expenses Improper disclosures
253
Fictitious Revenues Recording of goods or services that did not occur
Fake or phantom customers Legitimate customers Sales with conditions Pressures to boost revenues
254
Red Flags – Fictitious Revenues
Rapid growth or unusual profitability, especially compared to that of other companies in the same industry Recurring negative cash flows from operations or an inability to generate cash flows from operations while reporting earnings and earnings growth Significant transactions with related parties or special purpose entities not in the ordinary course of business or where those entities are not audited or are audited by another firm
255
Red Flags – Fictitious Revenues
Significant, unusual, or highly complex transactions, especially those close to period-end that pose difficult “substance over form” questions Unusual growth in the number of days’ sales in receivables A significant volume of sales to entities whose substance and ownership are not known An unusual surge in sales by a minority of units within a company, or of sales recorded by corporate headquarters
256
Timing Differences Recording revenue and/or expenses in improper periods Shifting revenues or expenses between one period and the next, increasing or decreasing earnings as desired
257
Timing Differences Matching revenues with expenses
Premature revenue recognition Long-term contracts Channel stuffing Recording expenses in the wrong period
258
Red Flags – Timing Differences
Rapid growth or unusual profitability, especially compared to that of other companies in the same industry Recurring negative cash flows from operations, or an inability to generate cash flows from operations, while reporting earnings and earnings growth Significant, unusual, or highly complex transactions, especially those close to period-end that pose difficult “substance over form” questions Unusual increase in gross margin or margin in excess of industry peers Unusual growth in the number of days’ sales in receivables Unusual decline in the number of days’ purchases in accounts payable
259
Concealed Liabilities
Liability/expense omissions Capitalized expenses Failure to disclose warranty costs and liabilities
260
Red Flags – Concealed Liabilities
Recurring negative cash flows from operations or an inability to generate cash flows from operations while reporting earnings and earnings growth Assets, liabilities, revenues, or expenses based on significant estimates that involve subjective judgments or uncertainties that are difficult to corroborate Nonfinancial management’s excessive participation in or preoccupation with the selection of accounting principles or the determination of significant estimates
261
Red Flags – Concealed Liabilities
Unusual increase in gross margin or margin in excess of industry peers Allowances for sales returns, warranty claims, and so on that are shrinking in percentage terms or are otherwise out of line with industry peers Unusual reduction in the number of days’ purchases in accounts payable Reducing accounts payable while competitors are stretching out payments to vendors
262
Improper Disclosures Liability omissions Subsequent events
Management fraud Related-party transactions Accounting changes
263
Red Flags – Improper Disclosures
Domination of management by a single person or small group (in a non-owner managed business) without compensating controls Ineffective board of directors or audit committee oversight over the financial reporting process and internal control Ineffective communication, implementation, support, or enforcement of the entity’s values or ethical standards by management, or the communication of inappropriate values or ethical standards Rapid growth or unusual profitability, especially compared to that of other companies in the same industry
264
Red Flags – Improper Disclosures
Significant, unusual, or highly complex transactions, especially those close to period-end that pose difficult “substance over form” questions Significant related-party transactions not in the ordinary course of business, or with related entities not audited or audited by another firm Significant bank accounts, or subsidiary or branch operations, in tax haven jurisdictions for which there appears to be no clear business justification Overly complex organizational structure involving unusual legal entities or managerial lines of authority
265
Red Flags – Improper Disclosures
Known history of violations of securities laws or other laws and regulations; or claims against the entity, its senior management, or board members, alleging fraud or violations of laws and regulations Recurring attempts by management to justify marginal or inappropriate accounting on the basis of materiality Formal or informal restrictions on the auditor that inappropriately limit access to people or information or the ability to communicate effectively with the board of directors or audit committee
266
Improper Asset Valuation
Inventory valuation Accounts receivable Business combinations Fixed assets
267
Red Flags – Improper Asset Valuation
Recurring negative cash flows from operations or an inability to generate cash flows from operations while reporting earnings and earnings growth Significant declines in customer demand and increasing business failures in either the industry or overall economy Assets, liabilities, revenues, or expenses based on significant estimates that involve subjective judgments or uncertainties that are difficult to corroborate Nonfinancial management’s excessive participation in or preoccupation with the selection of accounting principles or the determination of significant estimates Unusual increase in gross margin or margin in excess of industry peers
268
Red Flags – Improper Asset Valuation
Unusual growth in the number of days’ sales in receivables Unusual growth in the number of days’ purchases in inventory Allowances for bad debts, excess and obsolete inventory, and so on that are shrinking in percentage terms or are otherwise out of line with industry peers Unusual change in the relationship between fixed assets and depreciation Adding to assets while competitors are reducing capital tied up in assets
269
Detection of Fraudulent Financial Statement Schemes
SAS 99 (AU 316) – Consideration of Fraud in a Financial Statement Audit “The auditor has a responsibility to plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement, whether caused by error or fraud.”
270
SAS 99 (AU 316) Description and characteristics of fraud
Misstatements arising from fraudulent financial reporting Misstatements arising from misappropriation of assets Importance of exercising professional skepticism Discussion among engagement personnel regarding risk of material misstatement due to fraud Brainstorming Internal and external pressures
271
SAS 99 (AU 316) Obtaining information needed to identify risks of material misstatement due to fraud Make inquiries of management about the risks of fraud and how they are addressed Consider any unusual or unexpected relationships that have been identified in performing analytical procedures in planning the audit Consider whether one or more fraud risk factors exist Consider other information that may be helpful in the identification of risks of material misstatement due to fraud
272
SAS 99 (AU 316) The type of risk that may exist
Identifying risks that may result in material misstatement due to fraud The type of risk that may exist The significance of the risk The likelihood of the risk The pervasiveness of the risk Assessing the identified risks after taking into account an evaluation of the entity’s programs and controls Specific controls designed to mitigate specific risks of fraud Broader programs designed to deter and detect fraud
273
SAS 99 (AU 316) Responding to the results of the assessment
Overall responses to the risk of material misstatement Responses involving the nature, timing, and extent of procedures to be performed to address the identified risks Responses to further address risk of management override of controls Examining journal entries and other adjustments for evidence of possible material misstatement due to fraud Reviewing accounting estimates for biases that could result in material misstatement due to fraud Evaluating the business rationale for significant unusual transactions
274
SAS 99 (AU 316) Evaluating audit evidence
Assessing risks of material misstatement due to fraud throughout the audit Evaluating whether analytical procedures indicate a previously unrecognized risk of fraud Evaluating risks of material misstatement at or near the completion of fieldwork Responding to misstatements that may be the result of fraud
275
SAS 99 (AU 316) Communicating about fraud to management, the audit committee, and others If fraud may exist, the matter should be brought to the attention of an appropriate level of management even the matter is considered inconsequential Fraud involving senior management should be reported directly to the audit committee If risks that have been identified have continuing control implications, consider communicating these risks to senior management Disclosing possible fraud to outside parties Documenting the auditor’s consideration of fraud
276
Financial Statement Analysis
Vertical analysis Analyzes relationships between items on an income statement, balance sheet, or statement of cash flows by expressing components as percentages Horizontal analysis Analyzes the percentage change in individual financial statement items Ratio analysis Measures the relationship between two different financial statement amounts
277
Deterrence of Financial Statement Fraud
Reduce pressures to commit financial statement fraud Reduce the opportunity to commit financial statement fraud Reduce rationalization of financial statement fraud
278
Reduce Pressures to Commit Financial Statement Fraud
Establish effective board oversight of the “tone at the top” created by management Avoid setting unachievable financial goals Avoid applying excessive pressure on employees to achieve goals Change goals if changed market conditions require it Ensure compensation systems are fair and do not create incentive to commit fraud Discourage excessive external expectations of future corporate performance Remove operational obstacles blocking effective performance
279
Reduce the Opportunity to Commit Financial Statement Fraud
Maintain accurate and complete internal accounting records Carefully monitor the business transactions and interpersonal relationships of suppliers, buyers, purchasing agents, sales representatives, and others who participate in the transactions between financial units Establish a physical security system to secure company assets, including finished goods, cash, capital equipment, tools, and other valuable items Maintain accurate personnel records, including background checks on new employee. Encourage strong supervisory and leadership relationships within groups to ensure enforcement of accounting procedures Establish clear and uniform accounting procedures with no exception clauses
280
Reduce Rationalization of Financial Statement Fraud
Promote strong values, based on integrity, throughout the organization Have policies that clearly define prohibited behavior with respect to accounting and financial statement fraud Provide regular training to all employees, communicating prohibited behavior
281
Reduce Rationalization of Financial Statement Fraud
Have confidential advice and reporting mechanisms to communicate inappropriate behavior Have senior executives communicate to employees that integrity takes priority and that goals must never be achieved through fraud Ensure management practices what it preaches and sets an example by promoting honesty in the accounting area Clearly communicate the consequences of violating the rules and the punishment for violators
282
Interviewing Witnesses
Chapter 15 Interviewing Witnesses
283
Learning Objectives List the five types of interview questions.
Understand how to ask introductory questions. Explain how to construct informational questions. Understand the differences between open, closed, and leading questions. Explain how to close an interview.
284
Learning Objectives Define and explain the purpose of assessment questions. List some nonverbal clues to deception. List some verbal clues to deception. Discuss the methodology of admission-seeking questions. List the elements of a signed statement.
285
Interviewing Questions
Introductory Informational Assessment Closing Admission-seeking
286
Introductory Questions
Provides an introduction Establishes rapport Establishes the theme of the interviews Observes the person’s reactions
287
General Rules for Introductory Questions
Don’t interview more than one person at a time Conduct interviews under conditions of privacy Ask nonsensitive questions Instead of: Use: Investigation Inquiry Audit Review Interview Ask a few questions Embezzlement Shortage or paperwork problems
288
General Rules for Introductory Questions
Get a commitment for assistance Make a transitional statement Seek continuous agreement Do not promise confidentiality Negotiations Discussing the source of allegations
289
Informational Questions
Open questions Closed questions Leading questions Question sequences
290
Informational Question Techniques
Begin by asking questions that are not likely to cause the respondent to become defensive or hostile. Ask the questions in a manner that will develop the facts in the order of their occurrence, or in some other systematic order. Ask only one question at a time, and frame the question so that only one answer is required. Ask straightforward and frank questions; generally avoid shrewd approaches. Keep interruptions to a minimum, and do not stop the subject’s narrative without good reason.
291
Informational Question Techniques
Give the respondent ample time to answer; do not rush the respondent. Try to help the respondent remember, but do not suggest answers; be careful not to imply any particular answer by facial expressions, gestures, methods of asking questions, or types of questions asked. Repeat or rephrase questions, if necessary, to get the desired facts. Be sure you understand the answers, and if they are not perfectly clear, have the subject interpret them at that time instead of saving this for later. Give the subject an opportunity to qualify his/her answers.
292
Informational Question Techniques
Separate facts from inferences. Have the subject give comparisons by percentages, fractions, estimates of time and distance, and other such methods to ensure accuracy. After the respondent has given a narrative account, ask follow-up questions about every key issue that has been discussed. Upon conclusion of the direct questioning, ask the respondent to summarize the information given; then summarize the facts, and have the respondent verify that these conclusions are correct.
293
Methodology Informational Phase
Begin with background questions Observe verbal and nonverbal behavior Ask nonleading (open) questions Approach sensitive questions carefully
294
Dealing with Difficult People
Do not react Disarm the person Change tactics
295
Volatile Interviews An interview that has the potential to bring about strong emotional reactions in the respondent There should be two interviewers Should be conducted on a surprise basis The order of questions should be out of sequence Use hypothetical questions
296
Closing Questions Reconfirming facts Gathering additional facts
Concluding the interview
297
Assessment Questions Establishes the credibility of the respondent
Norming or calibrating Process of observing behavior before critical questions are asked Physiology of deception People lie for one of two reasons: to receive rewards or to avoid punishment The human body will attempt to relieve stress through verbal and nonverbal clues
298
Verbal Clues to Deception
Changes in speech patterns Repetition of the question Comments regarding the interview Selective memory Making excuses Oaths Character testimony Answering with a question
299
Verbal Clues to Deception
Overuse of respect Increasingly weaker denials Failure to deny Avoidance of emotive words Refusal to implicate other suspects Tolerant attitudes Reluctance to terminate interview Feigned unconcern
300
Nonverbal Clues Full-body motions Anatomical physical responses
Illustrators Hands over the mouth Manipulators Fleeing positions Crossing the arms Reaction to evidence Fake smiles
301
Methodology Interviewer: “Most of them aren’t criminals at all. A lot of times, they’re just trying to save their jobs or just trying to get by because the company is so cheap that they won’t pay people what they are worth. Do you know what I mean?” Interviewer: “Why do you think someone around here might be justified in making a secret arrangement with one of the company’s vendors?” Interviewer: “How do you think we should deal with someone who got in a bind and did something wrong in the eyes of the company?” Interviewer: “Do you think someone in your department might have done something wrong because they thought they were justified?”
302
Methodology Interviewer: “Have you ever felt justified—even though you didn’t go through with it—in taking advantage of your position?” Interviewer: “Who in your department do you think would feel justified in doing something against the company?” Interviewer: “Do you believe that most people will tell their manager if they believed a colleague was doing something wrong, like committing fraud against the company?” Interviewer: “Is there any reason why someone who works with you would say they thought you might feel justified in doing something wrong?” Interviewer: “What would concern you most if you did something wrong and it was discovered?”
303
Admission-Seeking Questions
Distinguish the innocent from the culpable Obtain a valid confession Obtain from the confessor a written statement acknowledging the facts
304
Admission-Seeking Questions
Presence of outsiders Miranda warnings Theme development People will confess if they perceive that the benefits outweigh the penalties. Offer a morally acceptable reason for the confessor’s behavior. Convey absolute confidence in the premise of the admission you seek from the subject.
305
Accusing an Innocent Person
The accuser has reasonable suspicion or predication to believe the accused has committed an offense. The accusation is made under conditions of privacy. The accuser does not take any action likely to make an innocent person confess. The accusation is conducted under reasonable conditions.
306
Steps in the Admission-Seeking Interview
Direct accusation Observe reaction Repeat accusation Interrupt denials Delays Interruptions Reasoning
307
Steps in the Admission-Seeking Interview
Establish rationalization Unfair treatment Inadequate recognition Financial problems Aberration of conduct Family problems Accuser’s actions Stress, drugs, alcohol Revenge Depersonalizing the victim Minor moral infraction Altruism Genuine need
308
Steps in the Admission-Seeking Interview
Diffuse alibis Display physical evidence Discuss witnesses Discuss deceptions Present alternative Benchmark admission Reinforce rationalization
309
Steps in the Admission-Seeking Interview
Verbal confession That the accused knew the conduct was wrong Facts known only to the perpetrator An estimate of the number of instances or amounts A motive for the offense When the misconduct began
310
Steps In The Admission-Seeking Interview
Verbal confession When/if the misconduct was terminated Others involved Physical evidence Disposition of proceeds Location of assets Specifics of each offense
311
Taking a Signed Statement
Voluntary confessions Intent Instead of: Use: Lied I knew the statement/action was untrue. Stole I wrongfully took the property of ______ for my own benefit. Embezzled I wrongfully took ______’s property, which had been entrusted to me, and used it for my own benefit. Defrauded I knowingly told ______ an untrue statement and he/she/they relied on it.
312
Taking a Signed Statement
Approximate dates of the offense Approximate amounts of losses Approximate number of instances Willingness to cooperate Excuse clause Have the confessor read the statement Truthfulness of statement Preparing the statement
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.