Finding fraud in bankruptcy cases
Read Time: 12 mins
Written By:
Roger W. Stone, CFE
A city clerk/treasurer supervising cashiers misappropriated $800,000 over an eight-year period of time by laundering local improvement district payments through the daily bank deposit. While a stand-alone computer maintained account balances for citizen accounts, it wasn't used for billing purposes. The supervisor sent manual statements to citizens each year billing them for current period assessments only. The city didn't foreclose on delinquent accounts. The fraud was detected during verification procedures for a new bond issue. She was sentenced to 8 1/2 years in the state penitentiary.
A supervisory account clerk of a water utility district misappropriated $357,000 over many years by laundering miscellaneous revenue from the sale of a vehicle and operating a lapping scheme for customer payments in an accounts receivable system. This supervisor received all customer feedback and circumvented internal controls to conceal this activity from managers. The fraud was detected during a routine audit. The supervisor was sentenced to 2 3/4 years in the state penitentiary.
A hospital supervisory cashier misappropriated $213,000 over many years by laundering unrecorded revenue checks from sources throughout the hospital through the daily bank deposit. The fraud was detected during a routine audit. The supervisor was sentenced to one year in the state penitentiary.
A property tax accountant misappropriated $185,000 over three years by laundering personal property tax payments from citizens through the daily bank deposit. He manipulated the content of the deposit while delivering it to the bank. The fraud was detected during a routine audit. He committed suicide during the investigation.
Internal controls
When we study the systems of internal controls during audits, we find that cashiers at an organization's central treasury function collect funds from customers and receive funds transmitted from decentralized departments in the organization. Accountability for the funds associated with these transactions is then established when the cashiers issue manual cash receipts or record the activity on manual or computer cash registers. Finally, a supervisor reviews the work of the cashiers and prepares the daily bank deposit. It's at this final step that we often miss the whole point of this process. We make a big mistake if we assume that all is well once the supervisor takes control of the money. But it's simply not true. This flow chart depicts the cash receipting flow from time of receipt until time of bank deposit.
CASH RECEIPTING
|
BANK
|
A check-for-cash substitution fraud occurs here when the
supervisor's work is not monitored by an independent party.
|
SUPERVISORY CASHIER
(prepares the daily bank deposit) |
The supervisory cashier verifies the work of subordinate cashiers here.
|
CASHIERS
(records transactions from customers and from decentralized departments) |
Not only should a manager independently monitor the work of the supervisory cashier but auditors and fraud examiners should perform audit tests of the daily bank deposits prepared by this supervisor. We should ask at least three important questions when evaluating if the organization is adequately protecting its resources from loss:
| Who monitors the work of the supervisor that prepares the daily bank deposit? | |
| How frequently does this monitoring take place? | |
| What steps are taken during the review? |
An independent party should periodically monitor the work of the supervisor by comparing the check-and-cash composition of the actual bank deposit with the mode of payment of the cash receipts issued each business day. Variances must be promptly investigated. If employees are cashing checks from cash receipts, correct this internal control weakness immediately. And if employees are misappropriating your organization's revenue checks by using the daily bank deposit to convert stolen checks into cash, you should stop the fraud promptly to keep losses low.
But how does an organization actually do this? Here are at least five ways in priority order.
| Obtain a bank-validated deposit slip showing the actual check-and-cash composition of the daily bank deposit. If your bank provides only the total amount of the bank deposit, ask the bank to validate a duplicate deposit slip showing this information or periodically obtain a sample of the bank deposit slips from the bank's microfilm records. | |
| If your bank provides on-line banking services, access your depository bank account information and verify the check-and-cash composition of the actual bank deposit using the bank's records. Print a copy of the bank deposit slip from the on-line banking system to provide evidence of your monitoring activity. | |
| Visit the supervisor's office location periodically and unannounced after the bank deposit has been prepared but before it has been taken to the bank. | |
| Make arrangements with your bank to have the bank deposit returned to the organization unopened. The bank could return the bank deposit to an independent party at a designated location, or the organization could pick up the bank deposit at the bank. Either procedure will work. | |
| Make arrangements with your bank to process the daily bank deposit normally, but make copies of the deposit slip as well as the checks and any other documents included with the deposit for the organization. |
Learning objectives
| (1) | Ensure that all miscellaneous income sources are included in the budget. |
| (2) | Require that cashiers record all transactions immediately upon receipt by mode of payment and prepare the daily activity report in the same way. |
| (3) | Ensure that the work of supervisory cashiers is independently monitored. |
More to come
We're just beginning an interesting study. I'll be illustrating learning objectives from additional fraud schemes where perpetrators skim cash receipts from the organization. Stay tuned for more bulletins.
The Association of Certified Fraud Examiners assumes sole copyright of any article published on www.Fraud-Magazine.com or ACFE.com. Permission of the publisher is required before an article can be copied or reproduced.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 12 mins
Written By:
Roger W. Stone, CFE
Read Time: 10 mins
Written By:
Tom Caulfield, CFE, CIG, CIGI
Sheryl Steckler, CIG, CICI
Read Time: 2 mins
Written By:
Emily Primeaux, CFE
Read Time: 12 mins
Written By:
Roger W. Stone, CFE
Read Time: 10 mins
Written By:
Tom Caulfield, CFE, CIG, CIGI
Sheryl Steckler, CIG, CICI
Read Time: 2 mins
Written By:
Emily Primeaux, CFE