Lecture Notes for How to Steal $500 Million

Similar documents
Lecture notes for: Corporate Cons

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE

1/3/2013. Months. Other $75,000. Government $81,000. Non-Profit $100,000. Dollars. Public Company $127,000. Private Company $200,000

FRAUD: A Web Of Deceit

Fraud Detection in Public Schools

Describe Fraud in the Context of Financial

Fraud & Forensic Accounting Update for CPAs

Financial Statement Fraud

Types of Fraud, Detection and Mitigation Presentation by: Isaac Mutembei Murugu CIA, CISA 23 rd November Uphold public interest

Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention

Chapter 2 Skimming. 2. To a fraudster, the principle advantage of skimming is the difficulty with which the scheme is detected. a. True b.

Fraud Prevention for Nonprofits

Finacial Statement Fraud. Peter N Munachewa, CFE Risk Management Consultant

Fraud in Nonprofits: Real Stories. Presented by: Mike Hablewitz, CPA, Senior Manager

FRAUD AWARENESS & PREVENTION

OCCUPATIONAL FRAUD 9/20/2018

An Expensive Problem. Fraud in Government A Growing Problem

Financial Accounting, 1e Chapter 6: Ethics, Internal Control, and IFRS Test Item File

INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

Chapter 2 Skimming 1

AGA Risk and Fraud Webinar

Financial Transactions and Fraud Schemes

Fraud Risk Assessment Awareness in Employee Benefit Plans

Fraud Prevention & Detection. Eric Conforti, CPA, CFE April 17, 2018

The Auditor s Responsibility to Consider Fraud in an Audit of Financial Statements

Employee Benefit Plan Fraud Examples

UNDERSTANDING FINANCIAL STATEMENTS

Managing Reputational Risk for Nonprofit Organizations. Best Practices for Fraud Prevention. July 14, Christopher W. Truman, CPA, Manager

COVERAGE FRAUD IN EMPLOYEE BENEFIT PLANS 5/15/2014. Where employee benefit fraud is likely. Internal controls that help prevent fraud

Its Not About If, Its About When! Learning how to protect your organization.

The Auditor s Responsibilities. Audit of Financial Statements

5/03/15. Module 8: Revenue and collection cycle, and acquisition and expenditure cycle

Fraud Risk Assessment CARRIE KENNEDY, PARTNER DUSTIN BIRASHK, PARTNER

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath

Fraud Examination. Prevention, Detection, and Investigation. Steven M. Bragg

information from which financial statements are prepared Deliberate misapplication of accounting principles, policies,

Safeguarding the Financial Assets of Your Church. Indiana Conference of the United Methodist Church

PREVENTING FRAUD IN THE HOSPITALITY INDUSTRY

Fraud Risk Assessment

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW!

An Overview of Fraud Risk. Presented by: Rick Potocek CPA MBA CFE

HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES

Mitigating Fraud. June 22, Sept. 21, 2014

International Standard on Auditing (Ireland) 240

Auditing and Assurance Standards Council

Good From The Inside Out. Saturday, April 8, 2017

7/21/2015. July 22, 2015 at 1 p.m. Central time FRAUD & EMBEZZLEMENT. Lessons from the Trenches. Angela Morelock Partner

FRAUD TRENDS TO WATCH FOR IN Presented by: Daniel J. Mahalak

Illustrate by way of some example how Fraudulent Financial Reporting and Misappropriation of Asset can be done?

INTERNAL FRAUD PREVENTION:

What do they investigate

Everything You Didn t Want To Know About Employee Crime

International Standard on Auditing (UK) 240 (Revised June 2016)

Fraud prevention for credit unions

Financial Statements. Financial Statement Analysis and Budget Tracking. What is Financial Statement Analysis? 3/20/2013

SXU Financial Statement Fraud

To Receive CPE Credit

Chapter 10. Cash and Financial Investments. McGraw-Hill/Irwin. Copyright 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

Auditing and Assurance Services, 15e

Delivering Confidence PAGE 1

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud

Fraud Prevention and Detection. Lisa dewit, Sr Project Manager (3-5631) Formation Review 20 Oct 17 Prepared for: IIA Annual Fraud Seminar

Using Data Analytics to Detect Fraud

5/15/2015. Using Financial Data and Ratios to Drive Performance and Detecting Fraud in the Workplace

Grant Fraud. Leslie Les Hollie Assistant Inspector General For Investigations

OAPT June 9, Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1

Internal Bank Fraud Schemes & Scams in an Economic Downturn. Fictitious Loans. Bank Fraud Investigations. Tracking spreadsheet Affidavit 1 Affidavit 2

FINANCIAL STATEMENT FRAUD: DETAILED LOOK AT UNCOVERING CREATIVE ACCOUNTING FRAUD: P R E S E N T E D B Y : J O H N E K A D A H

Securing Your Balance Sheet Fidelity/Crime Insurance. Presenter: Mary da Costa, Manager, Corporate Insurance

ACFE CFEX. Certified Fraud Examiner (CFEX)

Spotting Financial Distortions: A Primer for Attorneys

Fraud Prevention, Detection and Red Flags

Looking for Fraud Through Rose-Colored Glasses

Stop Fraud in Your Office. Presented by: Margaret A. (Peggy) McGarrity, Esq., CPA

A c f e. Report to. the Nation. on Occupational Fraud & Abuse

Insights Into Accounting Schemes and Scams

Solutions. I. Auditing Cash and Cash Equivalents. A. Learning Question Answers

WILLIAM I. ESKIN, CPA. Presentation to : Southeastern Accounting Show FINANCIAL STATEMENT ANALYSIS/FRAUD. August 18, 2011.

Fraud in Government. Mike Nolan, CPA, CFE, CGMA. CCACC & CCA&RMC Conference Monterey, CA September 2014

EXERCISES. The complete AICPA summary of Section 404 of Sarbanes-Oxley is as follows: Section 404: Management Assessment of Internal Controls.

Workbook 3. Borrowing Money

Financial Crime - Early Warning Signs the role of Internal Audit in recognizing red flags

Fraud: How to Get Your District Free Publicity

Delivering Financial Oversight: Strengthening Your Policies and Procedures

MIS 5208 Lecture 05 Recognizing the Symptoms of Fraud. Ed Ferrara, MSIA, CISSP Copyright 2018 Edward S.

CAREFUL STEPS TO TAKE WHEN YOU HAVE AN EGGSHELL AUDIT. By Frank J. Rooney, Esquire Offices CO, DC, MD, & VA

Financial Vulnerability & Fraud in Nonprofit Organizations. Financial Vulnerability in Nonprofit Organizations. Topics

FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION

November 2017 ICPAK FORENSIC AUDIT SEMINAR

Chapter 9. #17 is a bad question if it is changed as follows the answer is d

FOUNDATION SERIES ON DEMAND. Fraud Red Flags Workbook

Cash and Financial Investments

Presentation to. Forensic Investigations of Financial Statement Fraud: PBS&J A Case Study September 26, Mitchell E.

GLASA. Greater Los Angeles Softball Association. Accounting Policies & Procedures Manual

CHAPTER 7. Internal Control and Cash. Chapter Overview

Fraud Detection Brainstorming for the Auditor: Designing Fraud Protocols As Part of Audit Plan

Fraud Cases and Lessons Learned

Is Your Construction Project a Victim of Fraud?

Presented by: Michael Moreau, CFE, CIA, CFSA Manager, Credit Union Group Macpage LLC

IIA Fraud Conference. Case studies from recent investigations. 8 April 2015

Transcription:

Lecture Notes for How to Steal $500 Million These notes will be in the form of questions that you should try to answer while watching the video. The purpose is to make certain that you are paying attention to what has happened and to assist you in figuring out why. After watching the video, you should be able to answer the following questions: 1. Who were the individuals involved in the fraud? a. Chief Executive Officer b. Chief Operating Officer c. Chief Financial Officer d. Accounting Manager e. Controller 2. How big was the fraud at the following points in time? a. June, 1989 (before using exclusivity fees) b. June, 1990 c. June, 1991

3. Why was PharMor losing money originally? 4. Where were the true numbers kept? 5. How were the cash shortfalls covered? 6. How did PharMor hide the inflated inventory numbers from their auditors (there were two things they did)? a. b.

7. What two critical errors did the auditors make in verifying inventory? a. b. 8. What happened to first alert David Shapira to the fraud? 9. What precipitated the discovery of the fraud? 10. What did Mickey Monus suggest that Pat Finn do about your answer in 8?

Lecture notes for: Corporate Cons This video covers internal fraud schemes (as opposed to management trying to defraud investors - like the other two videos) Cash Internal fraud schemes: Accounts receivable Inventory Expenses Purchasing Payroll

Cash frauds. Easy to steal and hard to trace. Methods of embezzling cash: 1. Skimming 2. Under-ringing and voiding sales 3. Trading checks for cash 4. Alterations of cash receipts documents 5. Fictitious refunds and discounts

Video Store case (Pam) Failed to ring up sales. She felt that she was underpaid (this is frequently the case with small time fraudsters) (numbers 1 and 2 above) This was an OFF-BOOK fraud in that she did not modify any documents or journals. There would be no audit trail (no documents to indicate the fraud). These are typically proven by circumstantial evidence. Auto Parts store (Tony) Also felt that he was underpaid Fictitious refunds and discounts (forged refund slips) This would be an ON-BOOK fraud since the accounting records are being changed. The modified documents leave an audit trail that proves the fraud. One theme that seems consistent is that the fraud seems to build. It starts out small and then gets out of hand.

Detecting Cash frauds: 1. Bank reconciliations 2. Cut-off bank statements (a bank statement mailed directly to the CPAs with accompanying checks) 3. Surprise cash counts 4. Customer complaints 5. Altered or missing documents 6. Financial trends (for larger frauds) Evidence square: Paper and physical evidence is always preferred to observational or witness evidence.

Accounts Receivable fraud John Faulkner - borrowed against other peoples life insurance policies Four main account receivable frauds: 1. Borrowing 2. Lapping a. Delay the posting of accounts b. Take one payment on A/R - post the next payment to that account, etc. 3. Creating fictitious receivables (customers) - mainly for: a. Commissions b. To make income look better than it is (window dressing) c. Premature recognition of legitimate orders 4. Write-offs of accounts receivable

Most every fraudster intends to pay the money back ------ at first! Detecting Receivables fraud 1. Match deposit dates and customer payment dates 2. Trends in write offs 3. Dual endorsements required on all cash receipts 4. Confirmations of accounts receivable In general, detection of internal fraud is obtained by: 1. Complaints and tips 2. Discrepancies in the books 3. Control weaknesses that indicate possible opportunities for frauds 4. Lifestyle changes of employees

Inventory fraud Kaye Lemon The fraud was to write checks to herself and then when paying legitimate vendor bills, she would write down a larger number in the check register than the check that she wrote for the merchandise. She balanced the checkbook. Inventory fraud is typically one of four types 1. Theft of inventory 2. Misappropriation of inventory for personal use 3. Selling inventory and pocketing the money 4. Charging cash embezzlement to inventory (this was what Kaye did) Typically large inventory frauds are caught by tracking Cost of Sales and ending inventory numbers. In handling of assets, the three following activities should be performed by different entities: 1. Custody 2. Recording transactions for 3. Authorization of transactions for

Expense fraud McKinley Tabor Would charge the bank for services expenses (from some bogus provider). Would take the money that these expenses supposedly cost and electronically wire it to his own account (by paying off a credit card). Note that expenses get closed at the end of the year (and all are reset to zero). That makes this a particularly dangerous fraud. Payroll frauds 1. Having ghost employees (frequently detected because they forget IRS deductions, etc.) 2. False overtime Purchasing Fraud Paul Cote Typically, bogus purchases are made to a related party (or bogus party) and the money is siphoned to the fraudster.

Five types of purchasing fraud: 1. Fictitious invoices 2. Over-billing (real product at an inflated price - requires cooperation of an outsider) 3. Checks to relatives 4. Conflicts of interest (purchaser owns stock in the vendor) 5. Bribes, kickbacks, and corruption Management attitude seemed to play an important role in Cote s fraud as it seems to in so many of these. Also, it appears from these stories that it is easy to bury and hide files from the auditors. They do not seem very tenacious when dealing with intentional frauds. Detection of purchase frauds 1. Check addresses and phone receipts of employees 2. Look for missing documentation (through reconciliations) 3. Compare prices of purchases over time and with others in the industry if possible 4. Keep a watch for new (possibly bogus) vendors.

Corruption John Edward Thomas Kickbacks for risky loans (bribery) This is an off book fraud since all of the paperwork is correct - it is only the wisdom of authorization that is an issue. There are three components to every fraud 1. Perceived need 2. Opportunity 3. Rationalization To reduce the perceived need: 1. Management attitudes towards employees should be supportive 2. There should be support programs in place to help employees that have true financial difficulties 3. There should be an open-door policy To minimize opportunity, the company should have: 1. Proactive fraud procedures and policies 2. Good fraud reporting program

Proactive fraud procedures and policies would include: 1. Letting employees know that the auditor is watching 2. Encourage tips 3. Require mandatory vacations A good reporting program would include 1. Encouraging tips 2. Providing rewards for info 3. Educating employees on fraud Finally, corporate attitude (control environment) is essential to minimize rationalization of fraud. 1. Corporate conduct (does the business conduct itself ethically) 2. Writen codes of ethics. In summary: Fraud causes: Fraud can be detected by: Best prevented by: Frequently caused by excessive spending All employees are at risk Audit clues and discrepancies in the books Tips and complaints Ethical leadership Proactive fraud policies

Lecture notes for: Cooking the Books This video will discuss three cases of fraud: how fraud was perpetrated, how it was detected, and why it was perpetrated. Pay close attention to how (why) it got started. There seems to be a similarity between the three cases and to the next video (PharMor). Most of the notes that are in this document are information that is provided in overheads shown in the video. These overheads go way too fast to be able to write down - so I am writing it down for you. Fraud is defined as the intentional misstatement of information for the purpose of obtaining some advantage. The importance here is that fraud is misrepresentation. It is not embezzlement except to the extent that embezzlement involves intentional misstatement. The video begins with a discussion of eight common methods of perpetrating fraud. These are worth knowing: The first four relate to the overstatement of revenues: 1. Premature revenue recognition (recognizing revenue before it is earned). 2. Improper treatment of sales (for example - recording a consignment as a sale - or worse - making sales up) 3. Revenue substance versus form (for example - selling to a related party in a bogus transaction) 4. Percentage of completion accounting (saying that more is earned than actually is)

Four other methods of perpetrating fraud are: 5. Deferral of costs and expenses (holding off recognizing an expense) 6. Improper asset valuation 7. Related party transactions 8. Inadequate disclosures This list is not very concrete, but it is good to know (you will see it again in auditing) ZZZ Best They did a bunch of things to manufacture their fraud. Among these things were: Creating false accounts receivable and sales Creating false documents (using photocopies of real documents) Kiting checks (depositing a check in one bank account from second bank account and then depositing a check into the second bank account from a third bank account to cover that first check. Then they deposit a check in the third bank from the first bank in order to cover the second check, etc.) Compromising the independence of the internal auditors (this is a theme that runs through EVERY one of the major frauds we will discuss today). Create documents that made it appear receivables were being collected. The video notes that auditors use two primary means of verifying that a company s reported Accounts receivable are in fact true: 1. Confirmations (sending a letter to the customer and asking if they do in fact owe money) 2. Looking for subsequent collection of receivables. Barry Minkow knew this and created fictitious collections on accounts receivable.

Barry Minkow also compromised the independence of the auditors by making them feel good and diverting their attention from problem areas. According to the AICPA (American Institute of Certified Public Accountants) Statement on Auditing Standards (SAS) No. 53, the auditor s responsibility for finding fraud include: 1. Understanding the characteristics of errors and irregularities (fraud) 2. Assessing the risk of material (significant) fraud 3. Designing audit procedures to provide reasonable assurance that material fraud will be detected. 4. Plan, perform, and evaluate the audit carefully. 5. Approach the audit with professional skepticism. Barry Minkow offered the following as red flags that should alert auditors to an increased likelihood of fraud: 1. The company is highly leveraged (a lot of debt relative to the assets) 2. A large proportion of the fixed assets are leased (and not owned). 3. Unbelievable growth (if it looks to good to be true, it probably is) The first and third of these are common threads that run throughout many frauds. There are two main stages in the auditor s assessment of the risk of fraudulent financial reporting: 1. Analyzing the company s internal and external environment 2. Determining how these environments affect risk. Note that in the ZZZ Best case, they are in a low-margin industry. How are they growing so fast? This will also apply to PharMor, Regina Vacuum, and ESM Group.

Internal environment fraud risk factors include: 1. The strength of internal controls 2. The accounting system 3. Management s attitude towards fraud 4. Administration and Operations 5. Business is dominated by a few individuals The auditor should consider (in assessing the risk of fraud): 1. Liquidity (how much cash they have) 2. Profitability 3. Ability to borrow money 4. The quality of their receivables Barry Minkow notes that if growth is essential, this should be a red flag to auditors. Growth (perpetuating the fraud) is typically essential in a fraud. It may be desirable in a high growth company - but it is not usually essential!

SAS No. 53 states that the auditor should consider: 1. Recent changes in operations or products (Regina) 2. New production techniques 3. Business with a few major customers (only) 4. Industry trends 5. Assets or inventory with valuation problems 6. Large or unusual adjustments at or near year-end. For ZZZ Best, industry comparisons would have pointed to anomalies. Also, past trends analysis would have indicated that something was now quite different. Regina Vacuum Premature revenue recognition can happen in several ways: 1. Holding books open past the end of a period (to get some extra sales in) 2. Bill and hold schemes (premature or bogus invoicing for a customer without sending it) 3. Conditional sales counted as regular sales 4. Delayed posting of sales returns For Regina Vacuum, sales returns were not posted, they created false invoices, and they under-reported expenses.

ESM Group Don t worry too much about them - the fraud was fairly complicated. There are a few features of this story that I think are important though: 1. What made them start engaging in fraud. 2. Notice that after they started it escalated to enormous proportions and the original reason was not the only reason it was perpetuated and escalated. 3. Notice how the auditor got caught in a web a. His independence was compromised b. He was relatively inexperienced c. Once he didn t catch the fraud in year 1, he was afraid to turn them in once he did. This is typical of auditors and employees.