Fraud Auditing and Forensic Accounting

Similar documents
FRAUD AUDITING AND FORENSIC ACCOUNTING FRAUD AUDITING TOMMIE W. SINGLETON AARON J. SINGLETON AND FORENSIC ACCOUNTING FOURTH EDITION

HIGH INTEGRITY DIE CASTING PROCESSES

Corrosion Inspection and Monitoring

Intellectual Capital in Enterprise Success

ADVANCED POWER ELECTRONICS CONVERTERS

PRACTICAL RF SYSTEM DESIGN

P1: OTA/XYZ P2: ABC JWBT483-fm JWBT483-Mckinsey February 16, :11 Printer Name: Hamilton VALUATION WORKBOOK i

Douglas J. Cumming The Robert W. Kolb Series in Finance John Wiley & Sons, Inc.

THE JOHN DEERE WAY. Performance That Endures. David Magee. John Wiley & Sons, Inc.

AIRCRAFT CONTROL AND SIMULATION

Fundamentals of Global Positioning System Receivers

Professional Python Frameworks Web 2.0 Programming with Django and TurboGears

John Vance Fouad Zeidan Brian Murphy

Pulse-Width Modulated DC-DC Power Converters Second Edition

CREATING. Digital Animations. by Derek Breen

Words of Wisdom. from Women to Watch

FFIRS 03/20/2012 3:57:48 Page 1 Patent Valuation

RADIO-FREQUENCY AND MICROWAVE COMMUNICATION CIRCUITS

Control of Electric Machine Drive Systems. Seung-Ki Sul

HANDBOOK OF ADVANCED MATERIALS

BUILDING A MINECRAFT. City by Sarah Guthals, PhD

Breakthroughs in Decision Science and Risk Analysis

AutoCAD & AutoCAD LT The book you need to succeed! DVD Included! Ellen Finkelstein. Start drawing today with Quick Start tutorial

REFLECTARRAY ANTENNAS

Health Information Technology Standards. Series Editor: Tim Benson

THE POWER OF JAPANESE CANDLESTICK CHARTS

INTRODUCTION TO DIGITAL SIGNAL PROCESSING AND FILTER DESIGN

The Candlestick Course

CASE STUDIES & LESSONS FROM THE FIELD THREE BIG FRAUDS IN ONE SMALL TOWN

FUNDAMENTALS OF SIGNALS AND SYSTEMS

IMPLEMENTING THE WEALTH MANAGEMENT INDEX

HYPERSPECTRAL DATA EXPLOITATION

RISK MANAGEMENT APPLICATIONS IN PHARMACEUTICAL AND BIOPHARMACEUTICAL MANUFACTURING

TRANSMISSION LINES IN DIGITAL AND ANALOG ELECTRONIC SYSTEMS

Lynn E. Turner Managing Director

THE FIELDS OF ELECTRONICS

PROCESS ANALYZER SAMPLE-CONDITIONING SYSTEM TECHNOLOGY ROBERT E. SHERMAN

Sustainable Development

Tableau. by Molly Monsey and Paul Sochan

MEDICINE LICENSE TO PUBLISH

Embroidery Gatherings

EJ JANIK Principal

Encyclopedia of Candlestick Charts

MCPI Annual Conference Tuesday, September 19, 2017

The Scientist as Consultant BUILDING NEW CAREER OPPORTUNITIES

Canon EOS 7D. Learn to: IN FULL COLOR! Doug Sahlin. Making Everything Easier! Use the on-board controls, Live View, and playback mode

VALUE THE FOUR CORNERSTONES OF CORPORATE FINANCE

Troubleshooting Process Plant Control

Simple Business Plan. for SUCCESSFUL. Online Marketing. of your offline business. Workbook & Checklist. By Theresa Delgado of

Sheet Metal Design Guidelines

LINEAR POSITION SENSORS

Sheet Metal Design Guidelines

Physics of Semiconductor Devices

PREDICTIVE CONTROL OF POWER CONVERTERS AND ELECTRICAL DRIVES

Product Development Strategy

The EDR Aerial Photo Decade Package

Sheet Metal Design Guidelines

Fundamentals of Digital Forensics

Follow this and additional works at: Part of the Business Organizations Law Commons

Application of Evolutionary Algorithms for Multi-objective Optimization in VLSI and Embedded Systems

PROFESSIONAL EMBEDDED ARM DEVELOPMENT

Additive Manufacturing

ETHICS. ACFE Tampa Bay Chapter 13th Annual Fraud & Computer Crimes Seminar May 10-11, CPE Hours

Robert J. Cleary. Proskauer.com. Partner. New York

Fiverr Cash Secrets The Proven Formula To Cashing In With Fiverr

2015 IRC. Wood Wall. Bracing Provisions

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

CELLULAR TECHNOLOGIES FOR EMERGING MARKETS

This version has been archived. Find the current version at on the Current Documents page. Scientific Working Groups on.

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library.

The EDR Aerial Photo Decade Package

ANNUAL FRAUD PROFESSIONAL S CONFERENCE

UNIFIED OPTICAL SCANNING TECHNOLOGY

Plumber Hiring Guide. Everything You MUST Know Before Hiring a Plumber

The EDR Aerial Photo Decade Package

EDCP 481 Media Studies (Across the Curriculum) Major Topics S. Petrina (2015)

The Federal Prosecution of Trade Secret Theft

acoustic imaging cameras, microscopes, phased arrays, and holographic systems

Free Card Trick No. 2

Colorized. Mustang Wiring & Vacuum Diagrams. (with Electrical Illustrations)

Place of Birth: Bakersfield, California Born 1963 Other Places of Residency: Anaheim, California and Oakland, California Married with Family

SpringerBriefs in Space Development

SpringerBriefs in Space Development

Conference Agenda Arkansas Chapter of the Association of Certified Fraud Examiners

REAL ESTATE INVESTING IN CANADA

FORENSIC ACCOUNTING BY JOHN TAYLOR DOWNLOAD EBOOK : FORENSIC ACCOUNTING BY JOHN TAYLOR PDF

Nikon D3000. Digital Field Guide

Preface... Acknowledgments... Glossary Introduction Management Systems and the Management of Chemical Process Safety...

With Mary N. Daniel Gay C. Campbell

PACIFIC NORTHWEST CHAPTER / ACFE 2017 ANNUAL FRAUD CONFERENCE SPEAKERS AND TOPICS

BUSINESS PLANNING MADE EASY

Mustang Wiring & Vacuum Diagrams

Appendix B: Historic Aerial Photographs

The BioBrick Public Agreement. DRAFT Version 1a. January For public distribution and comment

INTERVIEW AND INTERROGATION:

INTERTEMPORAL PRODUCTION FRONTIERS: WITH DYNAMIC DEA

RFID HANDBOOK THIRD EDITION

BKD, LLP Forensics & Valuation Services Division. S. Todd Burchett CPA, ABV, ASA, CFF, CFE. Partner

THE DO S & DON TS OF THE JOB INTERVIEW

Transcription:

Fraud Auditing and Forensic Accounting

Fraud Auditing and Forensic Accounting Fourth Edition TOMMIE W. SINGLETON AARON J. SINGLETON John Wiley & Sons, Inc.

Copyright # 2010 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.wiley.com. Library of Congress Cataloging-in-Publication Data: Singleton, Tommie. Fraud auditing and forensic accounting/tommie W. Singleton, Aaron J. Singleton. 4th ed. p. cm. Rev. ed. of: Fraud auditing and forensic accounting. 3rd ed. 2006. Includes index. ISBN 978-0-470-56413-4; ISBN 978-0-470-87748-7 (ebk); ISBN 978-0-470-87790-6 (ebk); ISBN 978-0-470-87791-3 (ebk) 1. White collar crime investigation United States. 2. Forensic accounting United States. 3. Fraud investigation United States. I. Singleton, Aaron J., 1980- II. Fraud auditing and forensic accounting. III. Title. HV8079.W47B65 2010 364.16 3 dc22 2010013504 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 0

Contents Preface xi Acknowledgments xiii Chapter 1: Background of Fraud Auditing and Forensic Accounting 1 Introduction 1 Brief History of Fraud and the Antifraud Profession 3 The Fraud Cycle 7 Review of Technical Literature 9 Forensic Accountant and Audits 11 Forensic Accountants 20 Fraud Auditors 25 Keys to Effective Fraud Investigation 31 The Antifraud Professional s Career 33 Summary 36 Notes 37 Chapter 2: Fraud Principles 39 Introduction 39 Definition: What Is Fraud? 40 Synonyms: Fraud, Theft, and Embezzlement 42 Classic Fraud Research 42 Fraud Triangle 44 Scope of Fraud 47 Profile of Fraudsters 49 Who Is Victimized by Fraud Most Often? 53 Fraud Taxonomies 54 Fraud Tree 62 Evolution of a Typical Fraud 65 Summary 68 Notes 69 v

vi n Contents Chapter 3: Fraud Schemes 71 Introduction 71 ACFE Fraud Tree 73 Financial Statement Schemes 80 Corruption Schemes 83 Asset Misappropriation Schemes 84 Summary 94 Notes 94 Chapter 4: Red Flags 95 Introduction 95 Professional Standards 97 Common Red Flags 99 Specific Red Flags 101 Fraud Detection Model 110 Summary 111 Notes 112 Chapter 5: Fraud Risk Assessment 113 Introduction 113 Technical Literature and Risk Assessment 114 Risk Assessment Factors 115 Risk Assessment Best Practices 119 Risk Management Checklists and Documentation 125 Summary 129 Notes 129 Chapter 6: Fraud Prevention 131 Introduction 131 Prevention Environment 132 Perception of Detection 135 Classic Approaches 137 Other Prevention Measures 139 Accounting Cycles 141 Summary 143 Notes 143

Contents n vii Chapter 7: Fraud Detection 145 Introduction 145 Fraud Detection Axioms 146 Common Detection Methods 146 Specific Detection Methods 149 Summary 155 Appendix 7A: Beneish s Ratios 156 Chapter 8: Fraud Response 157 Introduction 157 Fraud Policy 157 Fraud Response Team 160 Recovery 164 Summary 165 Notes 166 Appendix 8A: ACFE Sample Fraud Policy 167 Appendix 8B: Sample Fraud Policy Decision Matrix 172 Chapter 9: Computer Crime 175 Introduction 175 History and Evolution of Computer Crimes 176 Computer Crime Theories and Categorizations 179 Characteristics of the Computer Environment 182 Information Security (INFOSEC) 185 Profiling Internet Fraudsters 186 Summary 192 Notes 193 Chapter 10: Fraud and the Accounting Information System 195 Introduction 195 Accounting Concepts 196 Segregation of Duties 202 Accounting Information Systems 203 Key Personnel 204 Computer Hardware 208 Computer Software 210 New Forms of Media 211 Audit Trail Concept 211 Summary 212

viii n Contents Chapter 11: Gathering Evidence 213 Introduction 213 Rules of Evidence 213 Hearsay Exceptions 217 Other Rules of Evidence 218 Summary 223 Notes 223 Chapter 12: Cyber Forensics 225 Introduction 225 Expectation of Privacy 226 Types of Investigations 227 Sources of Digital Data 230 Types of Cyber Data 231 Cyber Forensics Investigation Process 234 Variety of Specialists in Cyber Forensics 236 Summary 237 Notes 237 Chapter 13: Obtaining and Evaluating Nonfinancial Evidence in a Fraud Examination 239 Introduction 239 Interviews 240 Body Language 242 Deception Cues 243 Eye Language 244 Statement Analysis 245 SCAN 246 Summary 247 Notes 247 Chapter 14: General Criteria and Standards for Establishing an Expert Witness s Qualifications 249 Introduction 249 Credentials 250 Personal Qualities of the Expert 255 Sources for Locating Expert Witnesses 259 Distinguishing the Actual Area of Competence 261 Summary 261 Notes 262

Contents n ix Chapter 15: The Legal Role and Qualifications of an Expert Witness 263 Introduction 263 Role of a Forensic Accountant as a Witness in Court 264 Legal Qualifications for a Forensic Accountant as an Expert Witness 269 Qualification and Admissibility of Accounting Evidence 270 Expert s Role in the Litigation Team 272 Pretestimony Activities 272 Summary 273 Notes 274 Appendix 15A: Transcript of Typical Court Testimony of Expert Witness 275 Chapter 16: Effective Tactics and Procedures for the Expert Witness in Court 277 Introduction 277 Effective Profile 278 Being a Credible Expert Witness 278 Expert s Role in the Litigation Team 279 Pretestimony Activities 280 Trial and Testimony 281 Survival Techniques 288 Summary 290 Notes 290 Chapter 17: Fraud and the Public Accounting Profession 291 Introduction 291 History of Fraud and the Auditor: A Summary 291 Fraud and the Auditor s Liability 302 Fraud and the Auditor s Responsibility 303 Fraud and the Auditor s Role 306 Summary 308 Note 308 About the Authors 311 Index 313

Preface When times are good, people steal. When times are bad, people steal more! THISQUOTEWASMADEcasually in a conversation by Tommie to an academic colleague, but does represent the raison d ^etre for the new edition of this book. Since time immortal, there have always been a number of humans who are bent in their ethics, morals, sociological makeup, psychological makeup, or sense of justice, and are ready, willing, and able to commit crimes of all types, including white-collar crimes. But hard economic times seem to cause a few more than normal to crumble under the economic pressure and give in to the temptation to commit a fraud. The Association of Certified Fraud Examiners (ACFE) did an empirical study in 2009 on the effect of the weak economy on the number of frauds being detected by CFEs, entitled Occupational Fraud: A Study of the Impact of an Economic Recession. Based on the results of the responses of 507 CFEs, more than half indicated that the number of frauds had increased since the recession began (37.3 percent slight increase, 18.1 percent significant increase). About 49 percent also saw an increase in the dollar amount of the losses due to fraud. Obviously, and empirically evident in the ACFE study, pressure has increased on an increasing number of people due to the recession. And as all antifraud professionals know, pressure is a key to the occurrence of frauds. Therefore, there is a greater need than ever for corporations, companies, and government agencies to be vigilant to protect assets that are more precious than ever. We are proud to be a part of the fourth edition of this book. The book begins with a general background about fraud auditing and forensic accounting in xi

xii n Preface Chapter 1. Chapters 2 through 5 provide the basics of fraud such as fraud schemes, how they are perpetrated, what red flags (similar to fingerprints) exist for certain types of schemes, understanding the fraudster, and a fraud risk assessment to identify weak areas. Chapters 6 through 8 follow the PDC model for the antifraud profession: prevent, detect, and correct (respond). Chapters 9 though 12 cover the information technology (IT) aspects of fraud including the computer as an instrument of fraud, the target of fraud, and the fact systems are data warehouses that contain evidence of fraud. Chapter 13 focuses on the nonfinancial aspects of fraud investigation. Chapters 14 through 16 focus on the legal disposition of a fraud investigation and the major legal concepts, principles, and help for fraud auditors and forensic accountants, especially related to evidence and expert testimony. Chapter 17 is written specifically for public accounting and CPAs. The material has been slightly reorganized from the third edition to make reading and assimilation of the content easier. New material includes updates in fraud response (a new Chapter 8), computer-related fraud (Chapter 9), cyber forensics (Chapter 12), physiological aspects of the fraudster (a new Chapter 13), and fraud and the CPA (Chapter 17). We hope this book enables and empowers auditors, CPAs, law enforcement, risk and loss prevention professionals, and all others who have a responsibility related to fraud to better prevent, detect, and respond to fraud. Tommie W. Singleton Aaron J. Singleton August 2010

Acknowledgments IT ISTRUETHATanything or anyone visible to the public eye is actually standing on the shoulders of others who made that moment possible. So we would like to acknowledge a few shoulders. First, we want to thank Jack Bologna and Robert Lindquist, authors of the first two editions of this book. In 1992, Dr. Tommie Singleton interviewed Jack Bologna as part of his dissertation at the University of Mississippi on the topic of pioneers in electronic data processing (EDP) audit. Mr. Bologna was indeed a pioneer not only in EDP audit, but also in forensic accounting. Jack was involved with the Association of Certified Fraud Examiners (ACFE) in its early days, was editor for what may have been the first forensic accounting journal in the 1980s, and was an academic who taught forensic accounting. His contributions are a monument and testimony to his knowledge and abilities regarding fraud. Robert Lindquist has a strong reputation of being a fraud expert and is sought after as an expert witness in fraud cases. His work and efforts are stellar, and he is a well-respected professional in Canada and the United States. Second, we would like to thank some individuals who have helped us in our professional growth. Former FBI agent Alton Sizemore became a supporter and friend to Dr. Singleton about 14 years ago. He is a frequent guest lecturer in Tommie s classes, even when he was over 100 miles from the university where Dr. Singleton taught for many of those years. He has taught us much regarding the legal elements of fraud, digital evidence, and the law enforcement perspective of fraud. He also has taught us to have fun when circumstances allow it. Indeed, Alton is a favorite of former students for these reasons. Kevin Andrews has been a supporter, continually involving us in the local chapter of the ACFE. Like Alton, Kevin is a staple in Dr. Singleton s classes speaking to students about the antifraud profession and how to develop a career as a forensic accountant. He also had a vision of a local, high quality, xiii

xiv n Acknowledgments fraud seminar for Birmingham which he made happen two years ago, and of which we are pleased to be a part. Another great friend is Ralph Summerford of Forensic/Strategic Solutions in Birmingham, Alabama. He became a supporter of Dr. Singleton instantly at their first meeting, and has been a faithful, instrumental supporter over the last eight years. No one has been more inspiring or financially supportive of Dr. Singleton s academic programs than Mr. Summerford. Another person who has been instrumental in teaching, supporting, and modeling the antifraud profession to us is retired U.S. Treasury investigator Lynn Shobe. Lynn is a key leader in our area, especially for the local ACFE chapter. But he also is an adjunct professor for the forensic accounting program at UAB where Dr. Singleton is the director of that program and an associate professor. Third, we want to extend a special thank you to Sheck Cho, Wiley editor. He has been a wonderful supporter of our efforts not only on two editions of this book, but on another book as well. Stacey Rivera, our development editor on this edition, was professional throughout, patient and kind, and a joy to work with.