Professional Documents
Culture Documents
Semester 07
Subject:
Forensic Accounting
Submitted to:
Prof. Mr. Hameed Asghar
Submitted by:
(Group 01)
Introduction
Business can be a victim of both internal and external fraud. Internal fraud is
perpetrated by employees at any level from bookkeepers writing checks to them,
to the complex collusion to steal inventory by manipulating computer data and
shipping the stolen goods to off-site locations. External fraud is deception
committed by an outsider against the company. Insurance companies are
common victims of this type of fraud through false applications and false claims.
Banks also are frequently victimized, as are government agencies.
The key factor is to recognize the warning sign of fraud; to understand how fraud
is committed is to understand how to minimize its possibility. Unfortunately, the
statistics still show that many businesses do not understand the red flags of fraud.
You only pay a nuclear physicist two million dollars for one thing these
days and it wasn't to build a better mousetrap.
Employee Thefts
Case Study: Simple Payroll Fraud
However, it took a prolonged illness and enforced absence from the office for
a temporary bookkeeper to question why nonemployees were still on the payroll.
Ultimately, the company recovered just about all of its lost funds, including
refunds from the union and the IRS together with recoveries from the bank and
the fraudulent bookkeeper.
The developer did not press charges against either the architect or the
contractor, but he did report the architect to the licensing board. At the hearing,
the investigators produced the evidence they had discovered for the developer,
and the architect received a written reprimand. This effectively put the architect
on an industry blacklist, which made it difficult for him to find well-paying jobs. As
with other fraudsters, the consequences of the dishonest architect's fraud
affected his family. He was no longer his wife keep his children in private school,
and he had to drop a club membership he had enjoyed with. Life went on, but not
at the carefree level the family had enjoyed before.
With the building destroyed and the insurer refusing to pay the claim, the
clothing manufacturing business was worthless. The only value lay in the land on
which it had stood. The fraudsters had taken a huge risk and lost everything. They
now had to lay off warehouse staff and bookkeepers as well as cutters and other
skilled employees. Suppliers lost a customer and were forced to lay off part of
their workforce.
Management Thefts
Fraud by management can be extremely serious since senior personnel can
override the controls that have been put in place to prevent the very fraud they
are committing. The effects of management misconduct also can have severe
consequences for the company's overall morale and set a negative model for
employees farther down the company ladder.
Those at the publishing company lost a friend and colleague. The company
was now faced with the expense of an executive search and the prospect of hiring
an unknown for a sensitive position. Everyone was shocked that such a trusted
person should have committed fraud. The company incurred the additional
expense of developing an educational program for employees in fraud prevention
and detection and of reviewing its accounting controls.
Corporate Thefts
Corporate fraud is committed by senior management to benefit the
corporation as a whole. This type of fraud includes financial statement fraud,
antitrust violations, securities fraud, tax evasion, false advertising, environmental
crimes, and the production of unsafe products. Financial statement fraud usually
is committed in order to improve the earnings and hence the stock price of
publicly traded companies or the ratios supporting loan covenants at private
companies. Generally accepted accounting principles (GAAP) provide accountants
with a certain amount of interpretive leeway in creating their accounts. What can
be justified as a liberal but understandable interpretation of GAAP can easily
become a policy of deliberate earnings management and ultimately slip across
the line into fraudulent manipulation. Managements of publicly traded companies
are often under pressure from Wall Street analysts to meet earnings expectations
by showing steady growth despite any downturns in the economy. Antitrust laws,
starting with the Sherman Antitrust Act of 1890, are designed to encourage
competition by preventing monopolies or conspiracies to monopolize. The
willingness to enforce these laws has varied from administration to
administration. The principal instrument of monopoly power is price fixing.
Although price fixing has been discovered in many industries, one of the most
outstanding recent cases was that of Archer Daniels Midland. The company paid a
$100 million fine after pleading guilty to felony charges alleging a conspiracy with
other producers of citric acid, lysine, and other commodities. It was estimated
that makers of soft drinks, processed foods, detergents, and other products paid
$400 million extra to buy citric acid from ADM and its co-conspirators between
1992 and 1995. Poultry, swine, and other livestock producers paid an extra $100
million in the same period for lysine, a growth additive used in feed. During the
late 1940s through the 1950s, electric equipment manufacturers, including
General Electric, Westinghouse, Allis-Chalmers, and Federal Pacific, conspired to
fix prices in a market worth $1.75 billion annually. Utilities, all levels of
government, the military, and industry were victimized by prices that rose by
double and sometimes even triple digits, despite slow growth in the wholesale
price index. Four grand juries handed down 20 indictments against 45 individuals
and 29 companies. The power of rationalization and "neutralization" referred to
in Chapter 2 is well exemplified in the remarks of some of the industry executives.
One company president defended his actions this way: "It is the only way a
business can be run. It is free enterprise." Another, in a statement worthy of Yogi
Berra, said: "Sure, collusion was illegal, but it wasn't unethical,"
Identity Theft
Identity theft is one of the fastest growing crimes. As much as the Internet has
made access to our personal information a lot quicker, from almost anywhere in
the world, so has it made such information accessible to the criminal element.
Between January and December 2010, Consumer Sentinel, the complaint
database developed and maintained by the FTC, received 1.3 million consumer
fraud and identity theft complaints. Consumers reported paying over 1.7 billion in
those fraud complaints. Of these, percent were fraud-related and 19 % were
identity theft.
One solution that has been offered to the bogus e-mail/website scam is for
companies to ensure they own various permutations of their online name as well
as educating individuals as to what a legitimate s mail looks like, versus a bogus e-
mail. Additionally, companies, especially banks and credit card companies, are
reminding their customers about submitting personal data online and warning
them of suspected scams.
Guard your Social Security number. Author's note: This also applies to a
company's EIN (employer identification number).
Monitor your credit report.
Shred old bank statements and credit card statements.
Take bill payments and checks to the post office to mail, to avoid having
these items stolen from a mailbox outside your home or office. Examine
credit card charges before paying the bill.
Never give credit card numbers or personal information over the phone
unless you have initiated the call and trust that business.