The grand scheme of things
Read Time: 6 mins
Written By:
Felicia Riney, D.B.A.
My passport was in order. No visa was necessary. And although a safety advisory had been issued to U.S. citizens heading to this small Latin American country, security had been arranged to accompany me from the moment I arrived at the airport. I had reviewed many documents and felt mentally prepared for the assignment – determine whether the foreign subsidiary of a U.S. corporation was misappropriating company funds.
Picture this as a welcoming scene: No lines painted on the roads, no pay phones on the street corners, military police with big guns posted at the airport, and a hotel room with a window facing a shanty town. I suddenly felt not-so well prepared. My only comfort was the security team that escorted me wherever I needed to go.
When traveling to other countries under potentially adverse situations, never underestimate the value of having security. (This may not be true for all foreign engagements, but I’ve found it to be beneficial during my assignments in Latin America.) If local management is under the microscope, chances are they don’t want you there. You’re invading their turf and they likely have connections that could make your life miserable or even put it in danger.
There were other factors I didn’t foresee either, such as a lack of what many of us would consider everyday technology and supplies – photocopiers, reliable telephone service, fax machines, or even an extension cord to set up equipment “in the field.” There also was a language barrier, of course, which impeded matters, not just with the actual business at hand, but also with the everyday routines of living abroad. (My Spanish was limited when I arrived in Latin America. It made even simple tasks, such as ordering lunch, difficult.)
Being aware of and prepared for issues like personal safety, office supply needs, technology, and language barriers will help you adapt more smoothly to a foreign environment. However, I’ve found even more important is understanding the business culture of the country you’re visiting. This will greatly assist you in knowing how to approach an investigation and how to deal with authorities, suspects, informants, and business associates n that country. Some of the cultural issues you may encounter are:
For example, in a case we investigated in Mexico, we asked an accountant upon our first meeting if she was aware of some unauthorized transactions. Her initial response was “no” due to her loyalty to local management; however, we knew her answer had to be “yes.” After continuing to establish relationships with the accountant and her co-workers over a period of weeks, she finally admitted she knew something was awry. We fostered a spirit of cooperation that eventually led to recovering thousands of dollars, which persuaded the authorities to file criminal charges against the local management. You may be able to facilitate such a result by conducting interviews off site.
How Well is “Big Brother” Watching?
Aside from cultural and logistical issues, another concern must be addressed when handling international fraud examinations: Are foreign operations being audited as thoroughly as those at headquarters? The answer is “perhaps.” If the entity is a joint venture or a “smaller piece of a big pie,” only local statutory reporting may be required. Statutory reporting may not be as comprehensive as an audit, and audit scope limitations may have established high-dollar thresholds that exempt many of the accounts from scrutiny.
Some of the red flags that prompted my past investigations into wayward foreign entities include:
I’ve learned that one of the best ways to identify fraudulent activity within foreign operations is to monitor the entity’s cash flow and payments to vendors. This technique isn’t foolproof, of course, but it may ferret out some of the more typical abuses occurring in foreign offices.
Examining the Cash Flow
Cash is an area of great exposure with foreign operations. Let’s focus on cash transfers. Unauthorized transactions may occur in the following situations:
In another case involving a foreign subsidiary, each week the foreign entity would request funds from corporate headquarters, which would then transfer funds into the entity’s “dollar” bank account (an account denominated in U.S. dollars rather than the local currency to maintain the “strength” of the dollar and to avoid currency exchange losses). These funds were held in the “dollar” account until transferred into the local currency account to pay local vendors and employee payroll, as required by local laws. An investigation showed that unauthorized withdrawals were occurring in the “dollar” account in addition to the valid transfers. These withdrawals, previously unknown to corporate headquarters, consisted of fraudulent payments to local management. The withdrawals were never recorded on the general ledger, but the bank account always reconciled. How was that possible?
The subsidiary was in a country with a devaluing currency, thus the local accountant recorded an entry for “exchange loss” each month that equaled the total amount of unauthorized withdrawals. In some cases, there may be a series of accounting entries ultimately resulting in the following:
Debit: Foreign Currency Exchange Loss $XXX,XXX
Credit: Cash: “Dollar” Account $XXX,XXX
Corporate headquarters normally excluded the subsidiary’s “dollar” account from internal audits; however, all that changed after an anonymous call prompted headquarters to hire my company to investigate the subsidiary’s financial activities. The caller had claimed there was phony vendor activity going on at the subsidiary and that the local managers were leading excessive lifestyles. As investigators, our first move was to examine the subsidiary’s “dollar” account. We noticed checks, rather than wire transfers, in the “dollar” account’s bank statements and immediately became suspicious. The account was to be used mainly for wire transfer activity; checks were rarely used on the account to withdraw money.
The check copies we received from the bank confirmed that payments were going to local management rather than to operational expenses. This had gone undetected because corporate headquarters would transfer funds to the subsidiary without ever reconciling how the money was spent. Over the course of a year, nearly $2 million went to the benefit of company employees rather than to pay legitimate expenditures. The only prior testing of the “dollar” account consisted of comparing the subsidiary’s balance sheet to the bank statement. Because the subsidiary’s accountant ensured the two would reconcile with his “exchange loss” alterations, no further review or questions were asked. How could the fraud have been detected?
Generally, the best and most cost-effective weapon against fraud is to provide an ethics “hot-line,” a toll-free telephone number available to all employees, customers, and outside vendors. Other fraud-fighting measures include developing codes of conduct that communicate and sensitize employees to ethical values, and implementing internal controls within operations. Examples of specific internal controls are:
As shown in the earlier example, journal entry adjustments can force bank accounts (or other accounts) to balance. In many cases, corporate offices aren’t completely aware of the journal entry details in the monthly reporting packages sent by foreign operations. If the company doesn’t require the bank to forward canceled checks, the ability to perpetrate the scheme without detection increases. Depending on the situation, consider performing these procedures:
Tracking Vendors
Vendor fraud is common in any business, from establishing ownership in a supplier to creating bogus vendors with accompanying phony invoices or inflating invoices from valid vendors. This can be an area of frequent abuse with international companies due to weak internal controls in overseas operations. For entities that pride themselves on their inventory controls, non-inventory vendors – such as services, leases, credit cards, etc. – are frequent targets for unauthorized transactions.
While you may have a “tip” or anonymous letter alleging that certain vendors may be targets for unauthorized transactions, how can you identify issues when language barriers and cultural differences can impede your progress? In many cases, scanning canceled checks may not be practical, especially because canceled checks may not be returned from the bank, and obtaining copies can take time. Other than interviewing and looking through boxes of documents, are there other procedures that can be performed?
The answer is yes. The value of mining computerized data cannot be overstated especially when vendor fraud is a possibility. While each investigation is slightly different, there are computer queries that can be performed to assist you in determining a future course of action.
First, obtain the computerized vendor master file and computerized check register file for the period under review.
Reviewing computer files and business records prior to landing in the field – if you’re fortunate enough to obtain the information in advance – allows you to be more focused in your document requests and interviews once you arrive in the foreign country.
Keeping cultural differences and logistical issues in mind during international investigations can increase your awareness of the possible schemes covered in this article, as well as other scams, including:
Investigations of foreign entities can be challenging as well as rewarding. Increasing your awareness of issues associated with these types of investigations can reduce frustration and help you manage expectations with corporate headquarters, counsel, and foreign operations management. Good luck!
Mona Clayton, CFE, CPA, is a director in the investigations practice at PricewaterhouseCoopers LLP, serving clients in the Midwest. The views expressed in this article are those of the author.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 6 mins
Written By:
Felicia Riney, D.B.A.
Read Time: 18 mins
Written By:
David L. Cotton
Sandra Johnigan
Leslye Givarz
Read Time: 2 mins
Written By:
Read Time: 6 mins
Written By:
Felicia Riney, D.B.A.
Read Time: 18 mins
Written By:
David L. Cotton
Sandra Johnigan
Leslye Givarz
Read Time: 2 mins
Written By: