Chapter 5: Check Tampering Case Study # 2

advertisement
6/11/2014
Chapter 5: Check
Tampering
Case Study # 2
{ Lecture 4
{ “Shell Companies That Don’t Deliver”
“Shell Companies That Don’t
Deliver”
“Shell Companies That Don’t Deliver”
Has anyone in class ever set up an assumed
name – a d/b/a?
Do you think that something similar to this
could happen at your company?
What controls would you recommend to this
Company to assist them in preventing this
type of fraud from happening?
1.
2.
3.
What is Check Tampering?
Form of Fraudulent Disbursement
 Employee does one of two things:

Prepares a fraudulent check for own benefit
 Converts a check intended for someone else

4.
5.
What controls could be implemented to
ensure that an entity such as SRJ
Enterprises could not be authorized as a
vendor?
What systems controls could be utilized to
detect schemes such as this one?
Comparison of Median Loss
for Fraudulent Disbursements
$23,000
$25,000
$20,000
Register
Payroll
$72,000
$48,000
$50,000
$131,000
$131,000
Check Tamp
$120,000
$30,000
$26,000
$30,000
Expense
$128,000
Billing
$100,000
$100,000
$-
$20,000
$40,000
2010
$60,000
2012
$80,000
$100,000
$120,000
$140,000
2014
1
6/11/2014
Detection of
Check Tampering Schemes
Dollar Loss DistributionCheck Tampering Schemes
0.0%
1.4%
1-999
6.0%
12.3%
15.0%
1,000 - 9,999
10,000 - 49,999
22.8%
14.0%
12.9%
50,000 - 99,999
40.0%
100,000 - 499,999
500,000 - 999,999
6.8%
1,000,000 and up
0%
5%
29.2%
11.0%
13.0%
14.6%
10%
15%
20%
Check Tamp
25%
30%
35%
40%
18.1%
Internal Audit
Tip from Employee
By Accident
Internal Control
External Audit
Tip from Customer
Tip from Vendor
Anonymous Tip
Law Enforcement
45%
14.5%
10.8%
10.9%
4.8%
7.8%
4.8%
5.1%
0.0%
0.9%
0%
5%
18.4%
15.7%
10%
15%
20%
Check Tamp
Perpetrators of
Check Tampering Schemes
34.9%
21.3%
10.8%
6.2%
All Cases
23.8%
23.6%
25%
30%
All Cases
Size of Victim
Check Tampering Schemes
67.8%
30.0%
34.0%
Manager
10.0%
Owner
12.4%
0%
10%
20%
30%
40%
Check Tamp
50%
60%
70%
80%


1 - 99
Check tampering made up 18.2% of all
fraudulent disbursement cases.
The median loss in check tampering
cases was $120,000.
Third in popularity after billing schemes
and expense reimbursement schemes
45.8%
75.5%
12.2%
21.1%
100 - 999
8.2%
19.8%
1,000 - 9,999
4.1%
13.3%
10,000+
0%
10%
20%
30%
40%
Check Tamp
All Cases
Check Tampering Schemes

Number of Employees
75.0%
Employee
35%
50%
60%
70%
80%
All Cases
Check Tampering Schemes
Forged maker schemes
Forged endorsement schemes
 Altered payee schemes
 Concealed check schemes
 Authorized maker schemes


2
6/11/2014
Stolen Checks Countermeasures
Forged Maker Schemes


Perp forges name of authorized signer
Obtaining a blank check:
Perp usually has access to blank checks
Bookkeeper, a/p clerk, office manager, etc.
Checks not secured
Perp wrongly obtains key, combination,
password to gain access
Voided checks not destroyed
Print counterfeit company checks
Do not rely on the bank to catch forged
checks
Keep blank check stock secured
 Seal boxes of blank checks with security
tape
 Investigate out-of-sequence or duplicate
check numbers on bank statement
(indicates stolen or counterfeit check
stock)
 Promptly destroy any voided checks

Stolen Checks Countermeasures
Print check stock on watermark paper
supplied by company independent of
check printer
 Incorporate security threads in check
stock
 Periodically rotate check printers and/or
check stock (so counterfeits will stand
out)
 Use positive pay banking controls

Forged Maker Schemes

Positive Pay Banking

Company notifies the bank of the checks
that have been issued by the Company
Check number
Check amount
 Check payee



Checks are not cleared unless the payee,
check number and amount agree
Forged Maker Schemes
To whom is the check made payable?
To the perpetrator
To an accomplice
 To “cash”
 To legitimate vendors (purchasing
personal items)
 To fictitious person or entity


Forging the signature
Free-hand forgery
Photocopy legitimate signature onto check
 Signature stamps
 Computer-generated signatures


3
6/11/2014
Forged Signatures Countermeasures
Forged Endorsement Schemes
Intercept company check intended for
third party
 Convert check by forging endorsement
 This is not difficult at all

Strictly limit access to signature stamps
 Have authorized check signers verify
their signatures on canceled checks
 Investigate nsf checks or out of
balance conditions in checking account


Intercepted Checks Countermeasures
Forged Endorsement Schemes
Intercepting the check:
Perp’s duties involve handling signed checks
Signed company checks not secured
 Checks returned to company (incorrect
address)
 Alter delivery address – check mailed to perp


Separate functions of cutting, signing,
and delivering checks
 Surveillance cameras in mailroom
 Independently investigate customer
complaints that payments not received
 Investigate any returned check with a
dual endorsement
 Periodically lodge “test” checks in
payables system and follow their trail

Altered Payee Schemes
Intercept company check intended for
third party
 Change name of payee
 Method depends on who prepared the
checks

Example
Altered Payee Schemes
Checks not prepared by perpetrator:
Check washing
White-out payee name
 “Tacking On” (I.R.S. becomes I. R. Stevens)


4
6/11/2014
Altered Payees –
Countermeasures
Altered Payee Schemes
Checks prepared by the perpetrator
 Perp obtains signatures on blank checks (perp
highly trusted)
 Check typed or written in erasable ink
Require use of permanent ink on all checks
Strictly segregate check preparation from
delivery and bank statement reconciliation
 Use carbon copy checks (even if check is
altered, copy will have true payee, amount)
 Use computer-generated checks
 Consider eft’s in place of checks, where
practical


Perp gets authorized person to sign check
Signed check given to perp to mail
 Change payee and/or amount
 When cashed check returned with bank
statement, perp restores original name, amount


Authorized Maker
Schemes
Concealed Check Schemes
Very blatant, not very common
 Perp prepares check payable to self
 Gives check to authorized signer along
with stack of legitimate checks
 Check gets signed; signer not paying
attention, trusts perp.

Fraudulent checks written by perp with
check-signing authority
 Cash, pay personal bills, etc.
 Where controls prevent signer from
handling blank checks or bank
statements, perp uses influence to
override controls

Authorized Maker
Schemes
Authorized Maker
Schemes

Easy to do if the perpetrator also
reconciles the bank account
 Generally causes larger losses than the
other check tampering schemes
Case Study – 1993-1994


Victim – a Houston area physician




An M.D. Board Certified in Psychiatry
Ph.D. in Psychology
A Phi Beta Kappa
Perpetrator – the physician’s office manager



High school education
Employee of the management company the
doctor had hired to manage her practice
Had worked for the doctor for over 12 years
5
6/11/2014
Authorized Maker
Schemes


Authorized Maker
Schemes
Office Manager embezzled at least $1.5
million in a 16-month period
How was this fraud perpetrated?
1.
Office Manager (OM) wrote checks for
CASH or to other office employees to
take to the bank to obtain cash
2.
Office manager transferred cash from the
doctor’s security brokerage accounts (using
forged documents) to the doctor’s practice
bank accounts (where she had signature
authority)
Had office employees go to the bank and cash
these checks, allegedly cash for the doctor, and
bring the cash back to the office
Not small checks – ranged from $1,500 to
$9,800
Some days had several checks and some days
checks totaled over $25,000



Authorized Maker
Schemes
OM commandeered cash that was
intended for the doctor and kept it for
her personal use
3.
•
•
Insurance and other checks that were not actually
deposited to the doctor’s bank account
Cash payments from patients for insurance copayments
Authorized Maker
Schemes

What did I do?
Analyzed all bank activity from microfilm
bank records (all original documentation
had been destroyed by the OM)
Reviewed all checks for CASH or to office
employees and all checks to unusual
vendors to determine whether the check
was for a valid expense
1.
2.
Charged personal expenses to doctor’s
accounts (travel agency, etc.) and paid
the bills using the doctor’s funds
4.
Authorized Maker
Schemes
3.
Analyzed all checks to CASH and to office
employees to see how each was tendered –
done to see which tellers at the bank were
cashing the checks
–
4.
Authorized Maker
Schemes
5.
–
95% of all of these checks were cashed by 3
tellers (the branch had a total of 17 tellers)
Prepared analyses of the amount of
transactions in a 60-day window of liability
for the bank
Prepared additional analyses to estimate
the losses due to the actions (or lack of
actions) by:
–
6.
The management company
The securities brokerage firms (3 different
brokerage firms)
Traced cash taken from doctor’s accounts
directly into the personal/joint checking
account of the perpetrator
6
6/11/2014
Authorized Maker
Schemes
7.
Prepared analyses for Harris County
District Attorney to assist them in
bringing criminal charges against the
perpetrator
–
–
–
–
DA’s office took 2-1/2 years to take the
evidence to a grand jury
Grand jury did indict the perpetrator
DA’s office called the perpetrator to tell her of
the indictment and to schedule her arrest and
arraignment
Perpetrator committed suicide
7
6/11/2014
Cash Removed:
Checks in Nov. 1994 to Becky B.
11/02/94
 11/04/94
 11/07/94
 11/09/94
 11/10/94
 11/15/94
 11/16/94
 11/18/94
 11/21/94
 11/22/94
 11/28/94
 11/28/94
 11/29/94
 11/30/94
 TOTAL

$ 1,500.00
5,000.00
2,000.00
4,000.00
8,000.00
3,000.00
4,000.00
6,000.00
3,000.00
8,000.00
5,500.00
8,000.00
5,000.00
3,000.00
$66,000.00
Authorized Maker
Schemes

What could have been done to prevent
this type of theft from happening?
Checks to Cash
Cash removed from
deposits
Checks to employees:
 Lorraine M.
 Andrea L.
 Laurie B.
 Cheryl Z.
 Gene H.
 Christina F.
 Kay S.
 Becky B.
Totals -
$393,540.89

58,802.78

1,900.00
 15,100.00
 19,949.59
 12,470.00
 36,000.00
 37,700.00
 45,020.00
 372,347.35

 $992,830.61
Authorized Maker Schemes –
Countermeasures
Do not let check signers have access to blank
checks
 Require dual signatures over threshold amount
 Confirm all checks to current vendor list
 Spot-check cancelled checks for support
 Look for lifestyle changes in authorized signers
 Owner/Executive should review the unopened
bank statement, and look at all returned checks

8
6/11/2014
Concealing Check
Tampering

If perp reconciles the bank statement:
Code fraudulent check “void”
 When statement arrives, destroy bogus
checks
 Force totals on reconciliation (add wrong)


If payee/amount were altered:

Re-alter cancelled checks to match postings
Concealing Check
Tampering
Enter false info in disbursements journal
Code checks to very active or dormant
accounts
 If check to legitimate payee was
intercepted, perp may re-issue check so
payee doesn’t complain
 Create bogus support for check


General Check
Tampering Red Flags
Excessive number of voided checks
 Missing checks
 Non-payroll checks payable to employees
 Altered or dual endorsements on returned
checks
 Alterations to payee, amount on returned
checks
 Questionable payees or payee addresses
 Duplicate or out-of-sequence check numbers

Check Tampering
Controls

Separate the following duties




Require proper support for all checks
 Mail checks immediately after signing
 Watch for duplicate payments

Check Tampering
Controls
Check Tampering
Controls
Keep accounts payable records secure from
tampering
 Have bank statements delivered, unopened, to two
or more independent employees
 Bank statements reconciled by more than one
person
 Periodically rotate personnel who handle and code
checks
 Review both sides of the images of cancelled
checks
Check cutting and posting
Check signing
Check delivery
Bank statement reconciliation


Bank-Assisted Controls
Establish maximum dollar limits for checks
drawn on accounts
 Use positive pay system


Purchase company checks from reputable
producers
9
6/11/2014
Payroll Schemes
Chapter 6

{ Payroll Schemes
Occupational frauds in which a person
who works for an organization causes
that organization to issue a payment by
making false claims for compensation
Ghost employee schemes
Falsified hours and salary schemes
 Commission schemes


Ghost Employee Schemes
Ghost Employee Schemes
What do you think a ghost employee is?
Ghost employee: someone on the company
payroll who does not actually work for the
company
 Four steps to ghost employee scheme:
Adding the ghost to the payroll






Add ghost to payroll
Document time worked
Issue payroll
Deliver payroll
Ghost Employee Schemes

Documenting time worked
Only required for hourly employees
 Time must be calculated and approved
 Perp usually has authority to approve timecard
 Approval can also be forged


Once timecard approved, paycheck issued
Perp either has hiring authority or access to
payroll records
 Common methods:




Add completely fictitious person
Leave former employee on payroll
Add relative or friend of current employee
Ghost Employee Schemes
Delivery of paycheck
On-site delivery of paychecks: perp physically
misappropriates check
 Checks mailed: perp uses home address or mail
drop for ghost
 Direct deposit: perp uses own account or shell
account to collect deposits
 If ghost is an accomplice, checks delivered
directly to ghost

10
6/11/2014
Ghost Employee Schemes

Things to watch for in ghost employee
schemes:
Watch for employees that have a large number
of dependents
 Watch for employees that do not take part in
any benefits offered by the employer
 These things take cash out of the payroll for
insurance, taxes, etc., so the perp does not
want any of these taken out

Ghost Employee Schemes
Auditors performed a payroll check handout at
the New Orleans location
 Three checks left - one person left
 Last employee was the supervisor, who
requested the checks for the two employees
that were "absent” that day
 When auditor said he could not give the
supervisor the checks
 He showed that he was carrying a gun
Ghost Employee Schemes

Case Study – 1985
Victim – Elevator maintenance subsidiary of
a real estate developer
 Perp – Supervisor at the New Orleans, LA
location
 Financial analysis of New Orleans location
showed higher payroll costs as a % of
revenues than any other location

Ghost Employee Schemes


Ghost Employee Schemes




Victim – a family-owned laboratory glassware
manufacturing company
 Perpetrator – former corporate controller
 Controller did not show up for work when he
was due back from his vacation
Armed robbery
What procedures could have been
followed to prevent this type of theft?
Ghost Employee Schemes
Another Case Study – 1975

Auditor gave the supervisor the checks
Supervisor went to cash the checks and
was arrested for the theft

President of company called the
controller on the telephone
Did not reach the controller, but instead got
a recording -- “I’m sorry, the number you have reached
has been disconnected or is no longer in
service.”

11
6/11/2014
Ghost Employee Schemes
Ghost Employee Schemes


Controller had left everything in his office
locked –




File cabinets
Desk drawers
Credenza
Locksmith was required to obtain access to the
company’s records
Ghost Employee Schemes


This additional payroll did not show up in
“Salaries & wages” in the general ledger or the
financial statements
Started going over all company records:


Found that the controller had been writing
himself 7 – 25 paychecks each payday
 The extra checks were never registered in the
company payroll register and no taxes were
withheld

Ghost Employee Schemes

Controller had used the “Divide and
Conquer” Method of hiding the theft 

Further investigation of records provided the
“how” this deception was carried out -


Ghost Employee Schemes

Theft had been occurring for 18 months

Company loss - $385,000
Payroll bank statements – found checks on
statement that were not included in cancelled
checks – in every month
Requested copies of all missing checks from
microfilm
Had used journal entries, some as small as only
several dollars, to spread the amounts throughout
the G/L accounts
Largest charge to any account was less than $50
Small amounts meant that the auditors did not worry
about the entries
Most of the amounts ended up in various inventory
accounts
Ghost Employee Schemes
One more case – 2000
 Victim – Landscape Maintenance Company
 Perpetrator – Supervisor
 How –


Significant loss to a company with total assets of only
$2.5 million

Recovery - $ -0-


What procedures could have prevented this theft?


Supervisor kept former employee on the payroll after
employee left to go back to Mexico
Continued to report hours for over 2 years
Ghost employee scheme
12
6/11/2014
Ghost Employee Schemes Countermeasures
Ghost Employee Schemes
Payroll department did not question
this employee until the W-2 was
returned “ADDRESSEE UNKNOWN”
for the third year in a row
 Employee did not complain about the
additional income because he was no
longer in the USA
 Loss – Near $90,000

Separate hiring function from other payroll
duties
 Maintain personnel records independently of
payroll, and periodically compare the two
 Look for employees with no ssn, withholding
taxes, or other deductions from paychecks
 Periodically check for employees with same
address, ssn, bank account, etc.

Falsified Hours and
Salary
Ghost Employee Schemes Countermeasures
Keep paychecks secure until distribution
Distribution of paychecks should be independent
of those with hiring authority
 Investigate any returned paychecks with dual
endorsements
 Conduct proper background and reference
checks for all new hires


Overstate hours worked
Underreport leave time
 Overstate salary/rate of pay



This is the most common payroll scheme
Falsified Hours and
Salary
Falsified Hours and
Salary
Manually prepared timecards

Perp overstates hours worked
 Must get timecard approved:

Forge supervisor’s signature
Conspire with supervisor, kickback
Supervisor “rubber stamps” timecards
Poor custody procedures:


Perp gets timecard back after it is signed
Alters timecard to reflect extra hours
Automated timekeeping systems (usually very
simple schemes)



Accomplice “clocks in” absent employee
Employee clocks in, then leaves work
Instead of overstating hours, employees may
increase rate of pay


Requires alteration to payroll records
Perp or accomplice has access to payroll
13
6/11/2014
Falsified Hours and Salary –
Countermeasures
Tests for Fraudulent Payroll
Activity
Separate functions of payroll preparation,
distribution, and reconciliation
 Transfer of funds from general accts to payroll
should be handled independently of other
payroll functions
 Look for individuals with excessive overtime
 Look for payroll expenses that exceed budget
projections or prior years

Review employees who have significantly more
overtime than similar employees
 Trend analysis of budgeted vs. actual expenses
 Run exception reports for employees who have
had disproportionately large increases in wages
 Verify payroll taxes equal federal return tax forms
 Compare net payroll-to-payroll checks issued

Commission Schemes
Falsified Hours and Salary –
Countermeasures
All wage rate changes must be verified
by designated official and administered
through central HR department
 No sick leave/vacation without
management approval
 Compare payroll to production schedules

Salesperson fraudulently increases commissions
by overstating sales generated



Commission Schemes Countermeasures
Detecting Commission Schemes
Run periodic reports to show an unusual
relationship between sales figures and
commission figures
 Run reports that compare commissions
earned among salespersons
 Track uncollected sales generated by each
salesperson
 Conduct random samples of customers to
verify that the customer exists

Create fictitious sales
Alter price on existing sales
Claim sales made by other employees
Verify linear correlation of sales to commission
Look for high levels of uncollected sales
 Track commission earned per salesperson;
investigate unreasonably high levels
 Randomly contact customers to verify sales
 Commissions should be handled independently of
sales department


14
Download