Video notes

advertisement
Lecture Notes for
How to Steal $500 Million
These notes will be in the form of questions that you should try to answer
while watching the video. The purpose is to make certain that you are
paying attention to what has happened and to assist you in figuring out why.
After watching the video, you should be able to answer the following
questions:
1. Who were the individuals involved in the fraud?
a. Chief Executive Officer
b. Chief Operating Officer
c. Chief Financial Officer
d. Accounting Manager
e. Controller
2. How big was the fraud at the following points in time?
a. June, 1989 (before using exclusivity fees)
b. June, 1990
c. June, 1991
3. Why was PharMor losing money originally?
4. Where were the true numbers kept?
5. How were the cash shortfalls covered?
6. How did PharMor hide the inflated inventory numbers from their auditors
(there were two things they did)?
a.
b.
7. What two critical errors did the auditors make in verifying inventory?
a.
b.
8. What happened to first alert David Shapira to the fraud?
9. What precipitated the discovery of the fraud?
10. What did Mickey Monus suggest that Pat Finn do about your answer in
8?
Lecture notes for:
Corporate Cons
This video covers internal fraud schemes (as opposed to management trying to defraud
investors - like the other two videos)
Internal fraud schemes:
• Cash
• Accounts receivable
• Inventory
• Expenses
• Purchasing
• Payroll
Cash frauds. Easy to steal and hard to trace.
Methods of embezzling cash:
1. Skimming
2. Under-ringing and voiding sales
3. Trading checks for cash
4. Alterations of cash receipts documents
5. Fictitious refunds and discounts
Video Store case (Pam)
Failed to ring up sales. She felt that she was underpaid (this is frequently the case
with small time fraudsters) (numbers 1 and 2 above)
This was an OFF-BOOK fraud in that she did not modify any documents or
journals. There would be no audit trail (no documents to indicate the fraud).
These are typically proven by circumstantial evidence.
Auto Parts store (Tony)
Also felt that he was underpaid
Fictitious refunds and discounts (forged refund slips)
This would be an ON-BOOK fraud since the accounting records are being
changed. The modified documents leave an audit trail that proves the fraud.
One theme that seems consistent is that the fraud seems to build. It
starts out small and then gets out of hand.
Detecting Cash frauds:
1. Bank reconciliations
2. Cut-off bank statements (a bank statement mailed directly to the CPAs
with accompanying checks)
3. Surprise cash counts
4. Customer complaints
5. Altered or missing documents
6. Financial trends (for larger frauds)
Evidence square:
Paper and physical evidence is always preferred to observational or
witness evidence.
Accounts Receivable fraud
John Faulkner - borrowed against other peoples’ life insurance policies
Four main account receivable frauds:
1. Borrowing
2. Lapping
a. Delay the posting of accounts
b. Take one payment on A/R - post the next payment to that account, etc.
3. Creating fictitious receivables (customers) - mainly for:
a. Commissions
b. To make income look better than it is (window dressing)
c. Premature recognition of legitimate orders
4. Write-offs of accounts receivable
Most every fraudster intends to pay the money back ------ at first!
Detecting Receivables fraud
1. Match deposit dates and customer payment dates
2. Trends in write offs
3. Dual endorsements required on all cash receipts
4. Confirmations of accounts receivable
In general, detection of internal fraud is obtained by:
1. Complaints and tips
2. Discrepancies in the books
3. Control weaknesses that indicate “possible” opportunities for frauds
4. Lifestyle changes of employees
Inventory fraud
Kaye Lemon
The fraud was to write checks to herself and then when paying legitimate
vendor bills, she would write down a larger number in the check register
than the check that she wrote for the merchandise. She balanced the
checkbook.
Inventory fraud is typically one of four types
1. Theft of inventory
2. Misappropriation of inventory for personal use
3. Selling inventory and pocketing the money
4. Charging cash embezzlement to inventory (this was what Kaye did)
Typically large inventory frauds are caught by tracking Cost of Sales and
ending inventory numbers.
In handling of assets, the three following activities should be performed by
different entities:
1. Custody
2. Recording transactions for
3. Authorization of transactions for
Expense fraud
McKinley Tabor
Would charge the bank for services expenses (from some bogus provider).
Would take the money that these expenses supposedly cost and
electronically wire it to his own account (by paying off a credit card).
Note that expenses get closed at the end of the year (and all are reset to
zero). That makes this a particularly dangerous fraud.
Payroll frauds
1. Having ghost employees (frequently detected because they forget IRS
deductions, etc.)
2. False overtime
Purchasing Fraud
Paul Cote
Typically, bogus purchases are made to a related party (or bogus party) and
the money is siphoned to the fraudster.
Five types of purchasing fraud:
1. Fictitious invoices
2. Over-billing (real product at an inflated price - requires cooperation of an
outsider)
3. Checks to relatives
4. Conflicts of interest (purchaser owns stock in the vendor)
5. Bribes, kickbacks, and corruption
Management attitude seemed to play an important role in Cote’s fraud as it
seems to in so many of these.
Also, it appears from these stories that it is easy to bury and hide files from
the auditors. They do not seem very tenacious when dealing with intentional
frauds.
Detection of purchase frauds
1. Check addresses and phone receipts of employees
2. Look for missing documentation (through reconciliations)
3. Compare prices of purchases over time and with others in the industry if
possible
4. Keep a watch for new (possibly bogus) vendors.
Corruption
John Edward Thomas
Kickbacks for risky loans (bribery)
This is an off book fraud since all of the paperwork is correct - it is only the
wisdom of authorization that is an issue.
There are three components to every fraud
1. Perceived need
2. Opportunity
3. Rationalization
To reduce the perceived need:
1. Management attitudes towards employees should be supportive
2. There should be support programs in place to help employees that have
true financial difficulties
3. There should be an open-door policy
To minimize opportunity, the company should have:
1. Proactive fraud procedures and policies
2. Good fraud reporting program
Proactive fraud procedures and policies would include:
1. Letting employees know that the auditor is watching
2. Encourage tips
3. Require mandatory vacations
A good reporting program would include
1. Encouraging tips
2. Providing rewards for info
3. Educating employees on fraud
Finally, corporate attitude (control environment) is essential to minimize
“rationalization” of fraud.
1. Corporate conduct (does the business conduct itself ethically)
2. Writen codes of ethics.
In summary:
Fraud causes:
Fraud can be detected by:
Best prevented by:
Frequently caused by excessive
spending
All employees are at risk
Audit clues and discrepancies in the
books
Tips and complaints
Ethical leadership
Proactive fraud policies
Lecture notes for:
Cooking the Books
This video will discuss three cases of fraud: how fraud was perpetrated, how it was
detected, and why it was perpetrated. Pay close attention to how (why) it got started.
There seems to be a similarity between the three cases and to the next video (PharMor).
Most of the notes that are in this document are information that is provided in overheads
shown in the video. These overheads go way too fast to be able to write down - so I am
writing it down for you.
Fraud is defined as the intentional misstatement of information for the purpose of
obtaining some advantage. The importance here is that fraud is misrepresentation. It is
not embezzlement except to the extent that embezzlement involves intentional
misstatement.
The video begins with a discussion of eight common methods of perpetrating fraud.
These are worth knowing:
The first four relate to the overstatement of revenues:
1. Premature revenue recognition (recognizing revenue before it is earned).
2. Improper treatment of sales (for example - recording a consignment as a sale - or
worse - making sales up)
3. Revenue substance versus form (for example - selling to a related party in a bogus
transaction)
4. Percentage of completion accounting (saying that more is earned than actually is)
Four other methods of perpetrating fraud are:
5. Deferral of costs and expenses (holding off recognizing an expense)
6. Improper asset valuation
7. Related party transactions
8. Inadequate disclosures
This list is not very concrete, but it is good to know (you will see it again in auditing)
ZZZ Best
They did a bunch of things to manufacture their fraud. Among these things were:
• Creating false accounts receivable and sales
• Creating false documents (using photocopies of real documents)
• Kiting checks (depositing a check in one bank account from second bank account and
then depositing a check into the second bank account from a third bank account to
cover that first check. Then they deposit a check in the third bank from the first bank
in order to cover the second check, etc.)
• Compromising the independence of the internal auditors (this is a theme that runs
through EVERY one of the major frauds we will discuss today).
• Create documents that made it appear receivables were being collected.
The video notes that auditors use two primary means of verifying that a company’s
reported Accounts receivable are in fact true:
1. Confirmations (sending a letter to the customer and asking if they do in fact owe
money)
2. Looking for subsequent collection of receivables.
Barry Minkow knew this and created fictitious collections on accounts receivable.
Barry Minkow also compromised the independence of the auditors by “making them feel
good” and diverting their attention from problem areas.
According to the AICPA (American Institute of Certified Public Accountants) Statement
on Auditing Standards (SAS) No. 53, the auditor’s responsibility for finding fraud
include:
1. Understanding the characteristics of errors and irregularities (fraud)
2. Assessing the risk of material (significant) fraud
3. Designing audit procedures to provide reasonable assurance that material fraud will
be detected.
4. Plan, perform, and evaluate the audit carefully.
5. Approach the audit with professional skepticism.
Barry Minkow offered the following as red flags that should alert auditors to an increased
likelihood of fraud:
1. The company is highly leveraged (a lot of debt relative to the assets)
2. A large proportion of the fixed assets are leased (and not owned).
3. Unbelievable growth (if it looks to good to be true, it probably is)
The first and third of these are common threads that run throughout many frauds.
There are two main stages in the auditor’s assessment of the risk of fraudulent financial
reporting:
1. Analyzing the company’s internal and external environment
2. Determining how these environments affect risk.
Note that in the ZZZ Best case, they are in a low-margin industry. How are they growing
so fast? This will also apply to PharMor, Regina Vacuum, and ESM Group.
Internal environment fraud risk factors include:
1. The strength of internal controls
2. The accounting system
3. Management’s attitude towards fraud
4. Administration and Operations
5. Business is dominated by a few individuals
The auditor should consider (in assessing the risk of fraud):
1. Liquidity (how much cash they have)
2. Profitability
3. Ability to borrow money
4. The quality of their receivables
Barry Minkow notes that if growth is essential, this should be a red flag to auditors.
Growth (perpetuating the fraud) is typically essential in a fraud. It may be desirable in a
high growth company - but it is not usually essential!
SAS No. 53 states that the auditor should consider:
1. Recent changes in operations or products (Regina)
2. New production techniques
3. Business with a few major customers (only)
4. Industry trends
5. Assets or inventory with valuation problems
6. Large or unusual adjustments at or near year-end.
For ZZZ Best, industry comparisons would have pointed to anomalies.
Also, past trends analysis would have indicated that something was now quite different.
Regina Vacuum
Premature revenue recognition can happen in several ways:
1. Holding books open past the end of a period (to get some extra sales in)
2. Bill and hold schemes (premature or bogus invoicing for a customer without sending
it)
3. Conditional sales counted as regular sales
4. Delayed posting of sales returns
For Regina Vacuum, sales returns were not posted, they created false invoices, and they
under-reported expenses.
ESM Group
Don’t worry too much about them - the fraud was fairly complicated. There are a few
features of this story that I think are important though:
1. What made them start engaging in fraud.
2. Notice that after they started it escalated to enormous proportions and the “original
reason” was not the only reason it was perpetuated and escalated.
3. Notice how the auditor got caught in a web
a. His independence was compromised
b. He was relatively inexperienced
c. Once he “didn’t catch” the fraud in year 1, he was afraid to turn them in once he
did. This is typical of auditors and employees.
Download