Category Archives for "Asset Misappropriation"

Andy Griffith Steal
Dec 12

Receipt Fraud: Would Andy Griffith Steal?

By Charles Hall | Asset Misappropriation

In this article we take a look at receipt fraud. 

Would Andy Griffith steal? Maybe not. But other law officers do. Thankfully, most don’t.

The Theft: Receipt Fraud

If you’ve watched Andy Griffith as much as I have, you may find it hard to believe a (small town) officer would steal–but it happens.

Receipt fraud

A friend of mine (we’ll call him John) audits a small Georgia city (this is a true story). One year he was reviewing the planning analytics for the audit, reviewing five years of comparative data. In scanning the comparisons, he noticed the police fines had fallen off significantly. So John asked the police chief why the fines were down.

The police chief (we’ll call him Robert) responded, “I took it.”

John laughed and said, “I’m serious, why do you think the fine revenue dropped?”

“I said I took it.”

John was stunned. It was hard for him to absorb what he was hearing. After all, fraudsters don’t generally confess on the spot–but this one did. And the chief was well-known and well-liked, a man known for his integrity.

The discussion continued as John inquired about how the chief took the money. Here’s the deal.

Robert had two receipt books, one for cash and one for checks. When checks were received, he would write a receipt from the checks receipt book–those funds were turned over to the city clerk. When cash was received, he wrote receipts from the cash receipts book–those monies went into his pocket. Simple, but effective, as he stole over $50,000.

The Internal Control Weakness

So, what control weakness allowed this receipt fraud?

No one was controlling the issuance of the city receipt books. Also, the city clerk should have noticed the lack of cash payments being received for fines.

Correcting the Receipt Fraud Weakness

How can we remedy this receipt fraud problem?

When governments use physical receipt books, assign the duty of purchasing and issuing receipt books to a particular person. He or she should maintain a log of the receipt books and who has each one.

Surprise audits of those receiving funds is another way to combat theft. These reviews can be performed by the government’s internal audit staff or by an outside CPA or Certified Fraud Examiner.

White-collar crime is real, so stay vigilant. (Even so, I still can’t believe the real Andy Griffith would steal.)

Stealing unaccrued receivable checks
Dec 11

Stealing Unaccrued Receivable Checks is Easy

By Charles Hall | Asset Misappropriation

Stealing Unaccrued Receivable Checks

Some fraudsters steal unaccrued receivable checks and convert them to cash. In this article, I explain the mechanics of the theft and how you can prevent it.

The Theft

Susan is an hospital executive that has the authority to approve purchases of medical devices. She commonly receives rebate checks from vendors. Since she negotiates the purchase contracts, the vendors mail the rebate checks to her. Some of these checks are north of $50,000.

A while back she received a rebate check and placed it in her top left-hand drawer, thinking she would take it to accounting the next day. But she forgot.

Stealing unaccrued receivable checks

A month later she opened her drawer, and there it was. Oops! She hurriedly took the check to the receipting department and said, “Gosh, I must be losing my mind.” They all laughed, knowing it was an innocent mistake. But in the course of these events, she realized that no one knew she had the check. Why would they? Susan approves the purchases, and she provides the rebate information to no one. So, the rebates are not accrued in the general ledger.

Not long thereafter, Susan decides to retain two of the rebate checks totaling over $100,000. She places them in the same left-hand drawer, but this time, she does so on purpose. And then she waits—several weeks. No one calls about the checks. It’s obvious that no one knows she has them.

Susan converts the checks to cash by depositing them into a new bank account that she has opened in the name of the hospital. She is the sole authorized signer for the new bank account.

Now, let’s see what the control weaknesses are and how we can remedy this problem. 

The Weakness

The weakness is that no one is tracking or accruing the rebate checks.

The Fix

How can we cure this weakness?

Determine what companies provide rebates checks (and any other checks commonly received and not accrued). Send confirmations to the paying parties and compare the confirmed amounts with activity in the general ledger.

A master list of rebate companies should be maintained by someone in accounting, and the related activity should be monitored by comparing receipting information to this list. When possible, accrue rebate receivables.

White-Collar Crime

This is one more example of white-collar crime. Click here for many more articles about theft. For a detailed article about auditing receivables, click here.

splitting payments
Dec 07

Splitting Payments to Circumvent Approval Requirements

By Charles Hall | Asset Misappropriation

Some fraudsters split payments to circumvent approval requirements. In this article, I show you how this type of theft works and what you can do to prevent it.

The Theft

The maintenance supervisor, Billy, wants to make a fraudulent payment to ABC Hardware for $9,900. (ABC Hardware is owned by his cousin.) So, Billy wants to avoid his company’s review process. He knows that all checks over $5,000 require the physical signature of the finance director. All checks below $5,000 are signed by the computer. What’s a boy to do? Well, Billy can split the transaction–two checks for $4,950 each. That will work.

Billy asks his cousin for two ABC Hardware invoices of $4,950 rather than the one for $9,900. Afterwards, Billy approves each invoice, and the payments are made.

splitting payments

Picture is courtesy of AdobeStock.com

So, Billy tries the scheme again, and it works. Then, he does so repeatedly. His cousin rewards him with free trips to South Dakota, his favorite hunting destination.

The Weakness

No one is querying the check register for payments just below the threshold. Also, bids were not obtained.

The Fix

Download the check register into Excel (or any database package). Then, sort the payments and look for repeated payments–just below the threshold of $5,000–to the same vendor.

Require bids for significant expenses, and retain the bids as support for the payments.

Difference in Bribes and Gratuities

Learning tip: The hunting trip is referred to as a gratuity rather than a bribe. Why? Bribes are inducement payments made before the purchase decision. Gratuities–free trips in this example–are given after the vendor payments. The purpose of the gratuity is to reward the complicit person (Billy). Then, in the future, Billy knows the drill and expects more of the same.

White-Collar Crime

Splitting payments is a form of white-collar crime. There are many ways that professionals steal. Click here for more fraud-related examples (some of which are hard to believe).

steal with company credit cards
Dec 04

How Employees Steal with Company Credit Cards

By Charles Hall | Asset Misappropriation

Some people wonder Is using a company credit card for personal use embezzlement? It can be. Employees sometimes steal with company credit cards. Today, we look at a case where one employee was able to steal over $300,000 by misusing college credit cards.

The Theft

Donna Gamble made fraudulent purchases of over $300,000 using Georgia Tech purchase cards (credit cards).

Gamble was employed by Georgia Tech in the Parker H. Petit Institute for Bioengineering and Bioscience. As part of her job, she had access to Georgia Tech credit cards.

Gamble used the purchase cards to buy over 3,800 personal items. How did she hide her theft? She submitted false receipts to her supervisor and made fraudulent accounting entries. The thefts–taken from grant money provided to Georgia Tech by the National Science Foundation–occurred from April 2002 through April 2007. So money designed to advance educational learning was spent on personal items such:

  • A popcorn machine
  • Football tickets
  • A wave runner
  • Video games

Ms. Gamble was sentenced to two years and eight months in federal prison.

The Weakness

The internal control weakness that led to the theft was a lack of appropriate monitoring.

steal with company credit cards

Credit cards provide a simple means to bypass normal purchasing policies. Most purchasing policies require the issuance of a purchase order prior to the purchase. Such purchase orders are provided by a second person–someone other than the purchaser. So, the authorization to purchase is separate from the bookkeeping. In other words, at least two people are involved in the purchase transaction. Having multiple people involved in such transactions strengthens the controls. Why? A single person can’t make purchases alone. Consequently, theft–when such controls are in place–requires collusion. Now, it’s more difficult to steal.

Many organizations don’t require purchase orders for credit card purchases. Therefore, one person can purchase without a second person’s involvement. Even when a second person authorizes purchases, theft can occur if that person doesn’t pay sufficient attention to purchase requests (and the related documentation).

The Fix

What’s the fix? The monitoring of credit card use. Persons using company credit cards must know that someone else sees their purchases. For instance, internal auditors should routinely audit credit card activity. And the users should know that such audits occur.

Theft, like the one above, occurs when the fraudster knows no one is looking–they believe they can steal, and no one will notice.

Here are some ideas to lessen the possibility of credit card fraud:

  • Limit the number of cards issued
  • Assign each card to one person
  • Set low credit limits
  • Keep all cards in a secure location
  • Restrict card usage to particular vendors (which can be done with a purchase card)
  • Require the person to provide support for each purchase
  • If appropriate support is not provided, disallow the use of the card
  • Reconcile monthly credit card statements to supporting documentation
  • Audit personnel (internal or external) should review credit card activity
  • Provide a summary credit card activity report for each employee to the governing body or owners of the company

For more information about white-collar crime, click here.

Payroll Fraud
Dec 01

Payroll Fraud: Easy Ways to Steal

By Charles Hall | Asset Misappropriation

Payroll fraud is quite common. Sometimes the theft occurs as a payroll department employee secretly inflates payments to family and friends.

Payroll Fraud

One Friday evening, Jimmy and Rachel are sitting on the back porch drinking a cool lemonade and chatting about how long it’s been since the business gave them a raise–three years and counting. And everyone knows the owners just bought a beautiful cabin in Aspen. The cost: $10 million. Meanwhile, Jimmy and Rachel (cousins) are wiling away their time discussing what they could do to make more money.

Payroll Fraud
“Don’t you control what people make,” Jimmy starts. Rachel laughs and says, “I may be in payroll, but I can’t give anyone a raise.”

Jimmy pauses and says, “I didn’t ask if you give raises? I mean, can’t you change pay rates, like you could increase mine. You know, quietly.” He grunts, “After all, the owners sure don’t need the money.”

Rachel ponders the request and replies, “I think I could. No one ever reviews what I do. I doubt anyone would ever notice. Come to think of it, I could do the same for myself. With over 300 employees, no one would know. The supervisors never look at the computer payroll files, only the physical personnel files.

The next day Rachel increases her pay rate and Jimmy’s by 10%, just to test the waters. If anyone notices, she’ll say it was a mistake. But no one does. And after six months, she moves the rates even higher–another 30%. Easy money. Even if she’s caught, white collar crime is often lightly punished.

Payroll Fraud Control Weakness

No one is comparing–on a test basis–the pay rates in the payroll master file to the approved rates in the personnel files.

Correcting Payroll Fraud Weaknesses

Have someone in internal audit or an external CPA or CFE randomly select employees, comparing the master pay rates for each person to the personnel files. Let the payroll and human resources employees know that this test will be performed once a year. The knowledge of the test will be a deterrent to fraudulent increases in the master pay rate file. In particular, pay rates for payroll personnel should be reviewed.

How to Audit Payroll

For a detailed article about how to audit payroll, check out my post here.

>