Regardless of the amounts, CPAs are being asked to play an increasingly important role in helping organizations prevent and detect internal fraud and theft. Responding to these demands requires the auditor to have a thorough understanding of asset misappropriation. CPAs with unaudited clients can provide additional services by suggesting a periodic examination of the cash account only. Although “internal theft” and “employee fraud” are commonly used, a more encompassing term is “asset misappropriation.” For our purposes, asset misappropriation means more than theft or embezzlement. An employee who wrongly uses company equipment (for example, computers and software) for his or her own personal benefit has not stolen the property, but has misappropriated it. Employees—from executives to rank-and-file workers—can be very imaginative in the ways they scam their companies. But in a study of 2,608 cases of occupational fraud and abuse, we learned that asset misappropriation can be subdivided into specific types; the most prevalent are skimming and fraudulent disbursements. THE FRAUD TREE Over the years, the
asset misappropriation chart has become known as the “fraud
tree” for its numerous branches. The tree’s trunk consists
of two major asset types: cash, and inventory and all other
assets. Crooked employees clearly favor misappropriating the
former—nearly nine in 10 illegal schemes in the study
involved the cash account.
THE BRANCHES On the branches of the fraud tree are three main ways to embezzle cash: skimming, larceny and fraudulent disbursements. Skimming can be described as the removal of cash prior to its entry into the accounting system. Here are some examples:
Larceny is the removal of cash from the organization after it has been entered into the accounting records. Most of these schemes are detected through bank reconciliations and cash counts. Larceny is therefore not one of employees’ favorite illicit methods; it accounted for only 3% of the cases in the study and 1% of the losses. Here are some examples of cash larceny:
Additional research of 732 fraudulent disbursement cases showed they can be subdivided into at least six specific types: check tampering, false register disbursements, billing schemes, payroll schemes, expense reimbursement schemes and other fraudulent disbursements. Following are a few common examples:
Employees who set up dummy companies for fraudulent disbursements often give clues to their activities. They will use their own initials for the company name, rent a post office box or mail drop to receive checks, or use a dummy company name and their own home address. CASE STUDY: TOO TEMPTING, TOO EASY Regardless of the method or the asset involved, all asset misappropriation has the same effect on the books of account. Take the following actual case as an example: Kay Lemon, a seemingly prim-and-proper grandmother, stole $416,000 from a small Nebraska lighting store where she had been employed for 20 years as a bookkeeper. Lemon spent three years in the Nebraska Women’s Correctional Institute after confessing that she’d been hitting the books for eight years and had blown all the loot on herself and her family. Lemon’s crime is typical of the risk to small business: The lighting store’s CPA prepared only the company’s tax returns, so the business was not audited. Lemon also acted as the store’s “accounting department.” She made deposits, signed checks and reconciled the store’s bank account. Although any entry-level accountant could recognize this situation as an accident waiting to happen, the store’s owner did not. After 12 years of unrelenting temptation, Lemon finally gave in. Thereafter, for years, she systematically stole money from the lighting store using the same method. She would make out a company check to herself (in her own true name), sign it and deposit the proceeds in her personal checking account. To cover the theft, Lemon would do three simple things: First, she’d enter “void” on the check stub when she wrote the check to herself. Next, she would add the amount of the theft to the check stub when she paid for inventory. For example, if she took $5,000 and was paying a vendor $10,000, she would show $15,000 on the vendor’s check stub. That way, the cash account would always stay in balance. Finally, when the checks paid to Lemon were returned in the bank statement, she would tear them up and throw them in the trash. In looking at Lemon’s inelegant scheme from an accounting perspective, one can see that she had her choice of three techniques to cover her tracks: false debits, omitted credits or forced balances.
FALSE DEBITS Lemon chose the most logical (and common) method for covering a cash embezzlement: the false debit. When Lemon credited the bank account for the checks she made out to herself, the corresponding debit was false. Still, from the standpoint of the accounting equation, the books were in balance. Lemon and other embezzlers have two choices concerning the false debit: The transaction can be allocated to an asset account or an expense account. In Lemon’s case, she added her thefts to the inventory account--an asset. As we CPAs know, that false debit will stay on the books until some action is taken to remove it. In this situation, the lighting store’s inventory was overstated by $416,000 over eight years, as the store never performed a physical count of its inventory. As a result, when Lemon’s crime came to light, a huge writeoff was necessary, almost bankrupting the store. A less obvious move would have been for Lemon to charge the false debit to an expense account, which is written off every year. It doesn’t matter what the expense is, although these are some favorites: advertising, legal expense, consulting fees and other “soft expenses.” Here, the expense for fraud gets written off annually. If the fraud perpetrator can conceal the fraud long enough for the account to be closed to profit and loss, he or she has gone a long way toward avoiding detection—at least on a current basis. OMITTED CREDITS To understand how omitted credits affect the books, imagine Lemon had taken a different tack. Instead of writing checks to herself, she would instead intercept incoming cash receipts before they were posted. Presume further that Lemon would negotiate the checks by forging the endorsement of the lighting store, then endorsing her own name on the checks, subsequently depositing them in her checking account. The net effect would have been that Lemon stole the debit (the cash) and omitted the credit (sales or accounts receivable); in short, she skimmed the money. This is known as an “off-book fraud,” as evidenced by the omission of the transaction from the accounting records altogether. If Lemon had skimmed from sales, there would be only indirect proof of her crime through falling revenue and/or rising costs. But if she had skimmed from accounts receivable, she would need to create a fictitious entry to credit the customers’ accounts; otherwise, the books would be out of balance. FORCED BALANCES Another technique to conceal asset misappropriation is not the best choice. Lemon could have attempted to force the balance of the bank accounts and inventory to cover herself. In that situation, she would have forced the bank reconciliation to equal the amount she was stealing by purposely misadding the transactions. But that technique requires constant attention. Unless the company has lots of cash, forcing the bank balance will eventually result in bounced checks. A simple proof of cash that’s routinely done in an audit will usually catch this scheme. That’s not what happened to Lemon, though. She had a nervous breakdown because of the pressure from all those years of stealing and covering it up; she came forward and confessed. Her embezzlement points out one real benefit of an audit in a small business: Almost any degree of independent review by a CPA would have uncovered what Lemon was doing. Embezzlements can be
uncovered, but more importantly, people like Lemon will be
much less likely to steal knowing a CPA will be scrutinizing
their activities. JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified Fraud Examiners, Austin, Texas. Mr. Wells’ article “So That’s Why They Call It a Pyramid Scheme” ( JofA Oct.00, page 91) has won the Lawler Award for best article in the JofA in 2000. His e-mail address is joe@cfenet.com . |
Breaking News
- Feature
- FRAUD
Podcast
Most Read
SPONSORED REPORT
Leases standard: Tackling implementation — and beyond
The new accounting standard provides greater transparency but requires wide-ranging data gathering. Learn more by downloading this comprehensive report.
From The Tax Adviser