SlideShare a Scribd company logo
1 of 5
Investigation 6
Fraud Investigation Paper
Name
Class
Date
Professor
Fraud Investigation Paper
The investigation of allegations against a plant employee of
an acquired corporation, Lakes Inc has resulted in the discovery
of falsely submitted expense claims. The investigation began
after an anonymous tip was sent to officials in the company.
The tip was received by the company on June 12, 2007. The tip
stated the purchase for a computer server was fraudulent and a
television had actually been purchased in its place. Upon further
investigation, the company discovered there was no new
computer server bought and in fact the purchase had been for a
high definition television. The company hired an investigator
and began to search for the culprit of this known fraud.
It is important for companies to have protection in place to
protect against acts of theft or fraud. It is estimated that one
third of employees will commit an act of fraud against their
place of employment (Wells, 2001). Smaller companies are
more directly affected by these acts. Responding to these
demands requires the auditor to have a thorough understanding
of the misappropriation of the assets and fraudulent
disbursement schemes.
Although "internal theft" and "employee fraud" are
commonly used, a more encompassing term is "asset
misappropriation"(Wells, 2001). Asset misappropriation occurs
when an employee uses company supplies or equipment to
commit acts of fraud or for personal usage. Fraudulent
disbursement schemes are any ploy that is used to steal or
misuse the assets of the organization. The assets can be stolen
in the form of cash, falsifying expense claims, and stealing
inventory. Disbursement fraud is crimes were an employee
manipulates receipts in order to have the company pay for a
personal item for the employee.
In the case of the fraud being committed at Lakes Inc, the
investigator began the investigation in August of 2007 and the
investigation was completed by November of 2009. During this
time the investigator discovered the purchasing officer, Bob
Smith, and his administrative assistant, Mary Bad, had
developed a scheme to create false invoices that were masked as
company purchases but were in fact personal items purchased
for the purchasing agent and their assistant. The scheme
involved purchasing the item with a company credit card and
then creating a false invoice for the purchase and discarding the
original copy. Once the investigator made these discoveries he
contacted the vendor, Sterns, and verified that the invoice
number on the file copy matched on the invoice they had for the
sale of a high definition television.
The investigator examined the physical assets database.
Lakes, Inc. maintains a physical asset database in which all
non-disposable items with a purchase price of $1,000 or more
are recorded. Each item is assigned a unique ID number and
barcode label, which are used to track the item. The database is
maintained by the administrative assistant. The investigator did
not find a record of the purchase of the computer server in the
database and an id number had not been assigned to this
particular type of office equipment.
The investigators next step was to do a face to face
interview with the manager of the vendor, Stern. Stern was a
trusted vendor who had been an approved by the company since
May of 2005. The manager of Stern, Ted Jones, advised the
investigator of the suspicious behavior of Bob Smith over the
last six months. He claimed Smith had made several orders over
the last six months that he insisted only be picked up by himself
or his assistant, Mary Bad. Of the five fraudulent acts, two were
committed by Smith and three additional purchases were made
by Bad. Ms. Bad had used the purchase card assigned to Bob
Smith to make these additional purchases.
After reviewing the records of the vendor, the investigator
discovered five additional purchases that were made by Smith
or his assistant before August of 2007. Mr. Jones provided the
investigator with copies of the five invoices which contained
purchases for a notebook computer, a digital camera, a digital
camcorder, a GPS system, and a home theater system. The
investigator took the invoices and matched them to the physical
assets database and discovered there were only copies of the
purchases and no original copy or assigned ID number. All of
the purchases were purchased with Smith purchasing card and
approved by the purchasing agent. Mr. Smith and Ms. Bad were
fired.
The scheme involved the two employees creating false
invoices that appeared to be for company purchases but where
in fact for personal items for the two offenders. The company
purchases were designed to cover up the misappropriation of
company assets. Smith and Bad worked together to cover up
their fraudulent scheme and used company equipment to commit
the frauds. They manipulated the invoices and the information
being entered into the physical assets database.
Asset misappropriation makes up about eight out of ten of
the occupational frauds that occur in organizations (Coenen,
2008). Most asset misappropriations are fairly straightforward
and can be recognized by accountants with proper training.
According to the Association of Certified Fraud Examiners,
more than 91% of all internal fraud schemes involved an asset
misappropriation element, and the median loss from an asset
misappropriation was $150,000 (Coenen, 2008). This crime is
defined as a white collar crime and is extremely common in
companies and organizations.
The investigation determined that $8,795.60 in false
invoices had been submitted for reimbursement through the
purchasing department. The offenders should be punished for
their crimes and face criminal consequences. The two criminal
offenders should be charged with fraud and the attempt to
commit fraud. The large dollar amount of the crime would make
it a felony and under federal statutes the offenders would face
six to ten years for their first offense and eight to fourteen years
for the second offense (Berman, 2010).
The company, Lakes Inc, should make an example of the two
employees that committed asset misappropriation acts against
the company. These acts cause great financial harm to the
company and affect the attitude of the organization. Bob Smith
used his position of authority in the company to commit acts of
fraud and encouraged an employee to engage in these acts with
him. The company should have a better system of controls and
develop better predictive measures for stopping acts of theft.
Employees should be trained to recognize acts of fraud and to
report these acts to the company. By reporting and pressing
charges against the purchasing agent and his assistance, the
company has shown current and future employees they will not
tolerate act of theft.
References
Berman, D. (2010). Sentencing Law and Policy. Retrieved
October 24, 2010 from
http://sentencing.typepad.com/sentencing_law_and_policy/feder
al_sentencing_guidelines/
Coenen, T. (2008). Asset Misappropriation. Retrieved October
24, 2010 from
http://www.fraudessentials.com/index.php?option=com_content
Wells, J. (2001). Enemies Within: Asset Misappropriation
Comes in Many Forms. (The Fraud
Beat). Journal of Accountancy. P. 2-5. Retrieved October
24, 2010 from
http://www.allbusiness.com/human-resources/workplace-health-
safety/828482-1.html

More Related Content

Similar to Investigation 6Fraud Investigation Paper.docx

Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docxChapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
cravennichole326
 
WhiteCollarCrime+SocialUpheaval - Grace, Marisa, Lyric, Auria, Ashley, Milly,...
WhiteCollarCrime+SocialUpheaval - Grace, Marisa, Lyric, Auria, Ashley, Milly,...WhiteCollarCrime+SocialUpheaval - Grace, Marisa, Lyric, Auria, Ashley, Milly,...
WhiteCollarCrime+SocialUpheaval - Grace, Marisa, Lyric, Auria, Ashley, Milly,...
ashleynicolepinon
 
RespondThe brokerage firm of E. F. Hutton was charged with fe.docx
RespondThe brokerage firm of E. F. Hutton was charged with fe.docxRespondThe brokerage firm of E. F. Hutton was charged with fe.docx
RespondThe brokerage firm of E. F. Hutton was charged with fe.docx
wilfredoa1
 
Types of Mortgage Fraud
Types of Mortgage FraudTypes of Mortgage Fraud
Types of Mortgage Fraud
financedude
 
Read the following accounting case and then answer the questions tho.pdf
Read the following accounting case and then answer the questions tho.pdfRead the following accounting case and then answer the questions tho.pdf
Read the following accounting case and then answer the questions tho.pdf
petercoiffeur18
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docx
vrickens
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
ogglili
 
Chapter Six White-Collar Crime and the Business CommunityAmids.docx
Chapter Six White-Collar Crime and the Business CommunityAmids.docxChapter Six White-Collar Crime and the Business CommunityAmids.docx
Chapter Six White-Collar Crime and the Business CommunityAmids.docx
spoonerneddy
 
Chapter Six White-Collar Crime and the Business CommunityAmids.docx
Chapter Six White-Collar Crime and the Business CommunityAmids.docxChapter Six White-Collar Crime and the Business CommunityAmids.docx
Chapter Six White-Collar Crime and the Business CommunityAmids.docx
mccormicknadine86
 

Similar to Investigation 6Fraud Investigation Paper.docx (20)

Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docxChapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
 
WhiteCollarCrime+SocialUpheaval - Grace, Marisa, Lyric, Auria, Ashley, Milly,...
WhiteCollarCrime+SocialUpheaval - Grace, Marisa, Lyric, Auria, Ashley, Milly,...WhiteCollarCrime+SocialUpheaval - Grace, Marisa, Lyric, Auria, Ashley, Milly,...
WhiteCollarCrime+SocialUpheaval - Grace, Marisa, Lyric, Auria, Ashley, Milly,...
 
RespondThe brokerage firm of E. F. Hutton was charged with fe.docx
RespondThe brokerage firm of E. F. Hutton was charged with fe.docxRespondThe brokerage firm of E. F. Hutton was charged with fe.docx
RespondThe brokerage firm of E. F. Hutton was charged with fe.docx
 
Types of Mortgage Fraud
Types of Mortgage FraudTypes of Mortgage Fraud
Types of Mortgage Fraud
 
Sample FRAUD EXAMINATION REPORT by Brian Erbis
Sample FRAUD EXAMINATION REPORT by Brian ErbisSample FRAUD EXAMINATION REPORT by Brian Erbis
Sample FRAUD EXAMINATION REPORT by Brian Erbis
 
Sample FRAUD EXAMINATION REPORT by Brian Erbis
Sample FRAUD EXAMINATION REPORT by Brian ErbisSample FRAUD EXAMINATION REPORT by Brian Erbis
Sample FRAUD EXAMINATION REPORT by Brian Erbis
 
Read the following accounting case and then answer the questions tho.pdf
Read the following accounting case and then answer the questions tho.pdfRead the following accounting case and then answer the questions tho.pdf
Read the following accounting case and then answer the questions tho.pdf
 
10 General Counsel Charged This Year
10 General Counsel Charged This Year 10 General Counsel Charged This Year
10 General Counsel Charged This Year
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
The Unlucky 13: Lessons Learned from Companies Caught in the Act
The Unlucky 13: Lessons Learned from Companies Caught in the ActThe Unlucky 13: Lessons Learned from Companies Caught in the Act
The Unlucky 13: Lessons Learned from Companies Caught in the Act
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docx
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims Insight
 
法律倫理專論(一版) 大學用書系列一品
法律倫理專論(一版) 大學用書系列一品法律倫理專論(一版) 大學用書系列一品
法律倫理專論(一版) 大學用書系列一品
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
 
C:\Fakepath\Floydpowerpoint
C:\Fakepath\FloydpowerpointC:\Fakepath\Floydpowerpoint
C:\Fakepath\Floydpowerpoint
 
Floydpowerpoint
FloydpowerpointFloydpowerpoint
Floydpowerpoint
 
Floydpowerpoint
FloydpowerpointFloydpowerpoint
Floydpowerpoint
 
Accounting Theory Course
Accounting Theory CourseAccounting Theory Course
Accounting Theory Course
 
Chapter Six White-Collar Crime and the Business CommunityAmids.docx
Chapter Six White-Collar Crime and the Business CommunityAmids.docxChapter Six White-Collar Crime and the Business CommunityAmids.docx
Chapter Six White-Collar Crime and the Business CommunityAmids.docx
 
Chapter Six White-Collar Crime and the Business CommunityAmids.docx
Chapter Six White-Collar Crime and the Business CommunityAmids.docxChapter Six White-Collar Crime and the Business CommunityAmids.docx
Chapter Six White-Collar Crime and the Business CommunityAmids.docx
 

More from mariuse18nolet

IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docxIRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
mariuse18nolet
 
Ironwood Company manufactures cast-iron barbeque cookware. During .docx
Ironwood Company manufactures cast-iron barbeque cookware. During .docxIronwood Company manufactures cast-iron barbeque cookware. During .docx
Ironwood Company manufactures cast-iron barbeque cookware. During .docx
mariuse18nolet
 
IRM 3305 Risk Management Theory and PracticeGroup Project.docx
IRM 3305 Risk Management Theory and PracticeGroup Project.docxIRM 3305 Risk Management Theory and PracticeGroup Project.docx
IRM 3305 Risk Management Theory and PracticeGroup Project.docx
mariuse18nolet
 
Iranian Women and GenderRelations in Los AngelesNAYEREH .docx
Iranian Women and GenderRelations in Los AngelesNAYEREH .docxIranian Women and GenderRelations in Los AngelesNAYEREH .docx
Iranian Women and GenderRelations in Los AngelesNAYEREH .docx
mariuse18nolet
 
IRB HANDBOOK IRB A-Z Handbook E.docx
IRB HANDBOOK IRB A-Z Handbook  E.docxIRB HANDBOOK IRB A-Z Handbook  E.docx
IRB HANDBOOK IRB A-Z Handbook E.docx
mariuse18nolet
 
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docxIQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
mariuse18nolet
 
iPython 2For Beginners OnlyVersion 1.0Matthew .docx
iPython 2For Beginners OnlyVersion 1.0Matthew .docxiPython 2For Beginners OnlyVersion 1.0Matthew .docx
iPython 2For Beginners OnlyVersion 1.0Matthew .docx
mariuse18nolet
 
Iranian Journal of Military Medicine Spring 2011, Volume 13, .docx
Iranian Journal of Military Medicine  Spring 2011, Volume 13, .docxIranian Journal of Military Medicine  Spring 2011, Volume 13, .docx
Iranian Journal of Military Medicine Spring 2011, Volume 13, .docx
mariuse18nolet
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
 
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docxIP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
mariuse18nolet
 
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docxIranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
mariuse18nolet
 
ipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docxipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docx
mariuse18nolet
 
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docxIn Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
mariuse18nolet
 
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily –  Investors.comBloomberg Business – Blo.docxInvestor’s Business Daily –  Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
mariuse18nolet
 
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docxInvitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
mariuse18nolet
 
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docxInvitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
mariuse18nolet
 
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docxIOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
mariuse18nolet
 
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO  Computer Science 1 1 Chapter 17 Making .docxINVITATION TO  Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
mariuse18nolet
 
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docxInvestment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
mariuse18nolet
 
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
Investment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docxInvestment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docx
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
mariuse18nolet
 

More from mariuse18nolet (20)

IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docxIRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
 
Ironwood Company manufactures cast-iron barbeque cookware. During .docx
Ironwood Company manufactures cast-iron barbeque cookware. During .docxIronwood Company manufactures cast-iron barbeque cookware. During .docx
Ironwood Company manufactures cast-iron barbeque cookware. During .docx
 
IRM 3305 Risk Management Theory and PracticeGroup Project.docx
IRM 3305 Risk Management Theory and PracticeGroup Project.docxIRM 3305 Risk Management Theory and PracticeGroup Project.docx
IRM 3305 Risk Management Theory and PracticeGroup Project.docx
 
Iranian Women and GenderRelations in Los AngelesNAYEREH .docx
Iranian Women and GenderRelations in Los AngelesNAYEREH .docxIranian Women and GenderRelations in Los AngelesNAYEREH .docx
Iranian Women and GenderRelations in Los AngelesNAYEREH .docx
 
IRB HANDBOOK IRB A-Z Handbook E.docx
IRB HANDBOOK IRB A-Z Handbook  E.docxIRB HANDBOOK IRB A-Z Handbook  E.docx
IRB HANDBOOK IRB A-Z Handbook E.docx
 
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docxIQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
 
iPython 2For Beginners OnlyVersion 1.0Matthew .docx
iPython 2For Beginners OnlyVersion 1.0Matthew .docxiPython 2For Beginners OnlyVersion 1.0Matthew .docx
iPython 2For Beginners OnlyVersion 1.0Matthew .docx
 
Iranian Journal of Military Medicine Spring 2011, Volume 13, .docx
Iranian Journal of Military Medicine  Spring 2011, Volume 13, .docxIranian Journal of Military Medicine  Spring 2011, Volume 13, .docx
Iranian Journal of Military Medicine Spring 2011, Volume 13, .docx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docxIP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
 
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docxIranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
 
ipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docxipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docx
 
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docxIn Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
 
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily –  Investors.comBloomberg Business – Blo.docxInvestor’s Business Daily –  Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
 
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docxInvitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
 
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docxInvitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
 
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docxIOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
 
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO  Computer Science 1 1 Chapter 17 Making .docxINVITATION TO  Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
 
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docxInvestment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
 
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
Investment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docxInvestment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docx
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 

Investigation 6Fraud Investigation Paper.docx

  • 1. Investigation 6 Fraud Investigation Paper Name Class Date Professor Fraud Investigation Paper The investigation of allegations against a plant employee of an acquired corporation, Lakes Inc has resulted in the discovery of falsely submitted expense claims. The investigation began after an anonymous tip was sent to officials in the company. The tip was received by the company on June 12, 2007. The tip stated the purchase for a computer server was fraudulent and a
  • 2. television had actually been purchased in its place. Upon further investigation, the company discovered there was no new computer server bought and in fact the purchase had been for a high definition television. The company hired an investigator and began to search for the culprit of this known fraud. It is important for companies to have protection in place to protect against acts of theft or fraud. It is estimated that one third of employees will commit an act of fraud against their place of employment (Wells, 2001). Smaller companies are more directly affected by these acts. Responding to these demands requires the auditor to have a thorough understanding of the misappropriation of the assets and fraudulent disbursement schemes. Although "internal theft" and "employee fraud" are commonly used, a more encompassing term is "asset misappropriation"(Wells, 2001). Asset misappropriation occurs when an employee uses company supplies or equipment to commit acts of fraud or for personal usage. Fraudulent disbursement schemes are any ploy that is used to steal or misuse the assets of the organization. The assets can be stolen in the form of cash, falsifying expense claims, and stealing inventory. Disbursement fraud is crimes were an employee manipulates receipts in order to have the company pay for a personal item for the employee. In the case of the fraud being committed at Lakes Inc, the investigator began the investigation in August of 2007 and the investigation was completed by November of 2009. During this time the investigator discovered the purchasing officer, Bob Smith, and his administrative assistant, Mary Bad, had developed a scheme to create false invoices that were masked as company purchases but were in fact personal items purchased for the purchasing agent and their assistant. The scheme involved purchasing the item with a company credit card and then creating a false invoice for the purchase and discarding the original copy. Once the investigator made these discoveries he contacted the vendor, Sterns, and verified that the invoice
  • 3. number on the file copy matched on the invoice they had for the sale of a high definition television. The investigator examined the physical assets database. Lakes, Inc. maintains a physical asset database in which all non-disposable items with a purchase price of $1,000 or more are recorded. Each item is assigned a unique ID number and barcode label, which are used to track the item. The database is maintained by the administrative assistant. The investigator did not find a record of the purchase of the computer server in the database and an id number had not been assigned to this particular type of office equipment. The investigators next step was to do a face to face interview with the manager of the vendor, Stern. Stern was a trusted vendor who had been an approved by the company since May of 2005. The manager of Stern, Ted Jones, advised the investigator of the suspicious behavior of Bob Smith over the last six months. He claimed Smith had made several orders over the last six months that he insisted only be picked up by himself or his assistant, Mary Bad. Of the five fraudulent acts, two were committed by Smith and three additional purchases were made by Bad. Ms. Bad had used the purchase card assigned to Bob Smith to make these additional purchases. After reviewing the records of the vendor, the investigator discovered five additional purchases that were made by Smith or his assistant before August of 2007. Mr. Jones provided the investigator with copies of the five invoices which contained purchases for a notebook computer, a digital camera, a digital camcorder, a GPS system, and a home theater system. The investigator took the invoices and matched them to the physical assets database and discovered there were only copies of the purchases and no original copy or assigned ID number. All of the purchases were purchased with Smith purchasing card and approved by the purchasing agent. Mr. Smith and Ms. Bad were fired. The scheme involved the two employees creating false invoices that appeared to be for company purchases but where
  • 4. in fact for personal items for the two offenders. The company purchases were designed to cover up the misappropriation of company assets. Smith and Bad worked together to cover up their fraudulent scheme and used company equipment to commit the frauds. They manipulated the invoices and the information being entered into the physical assets database. Asset misappropriation makes up about eight out of ten of the occupational frauds that occur in organizations (Coenen, 2008). Most asset misappropriations are fairly straightforward and can be recognized by accountants with proper training. According to the Association of Certified Fraud Examiners, more than 91% of all internal fraud schemes involved an asset misappropriation element, and the median loss from an asset misappropriation was $150,000 (Coenen, 2008). This crime is defined as a white collar crime and is extremely common in companies and organizations. The investigation determined that $8,795.60 in false invoices had been submitted for reimbursement through the purchasing department. The offenders should be punished for their crimes and face criminal consequences. The two criminal offenders should be charged with fraud and the attempt to commit fraud. The large dollar amount of the crime would make it a felony and under federal statutes the offenders would face six to ten years for their first offense and eight to fourteen years for the second offense (Berman, 2010). The company, Lakes Inc, should make an example of the two employees that committed asset misappropriation acts against the company. These acts cause great financial harm to the company and affect the attitude of the organization. Bob Smith used his position of authority in the company to commit acts of fraud and encouraged an employee to engage in these acts with him. The company should have a better system of controls and develop better predictive measures for stopping acts of theft. Employees should be trained to recognize acts of fraud and to report these acts to the company. By reporting and pressing charges against the purchasing agent and his assistance, the
  • 5. company has shown current and future employees they will not tolerate act of theft. References Berman, D. (2010). Sentencing Law and Policy. Retrieved October 24, 2010 from http://sentencing.typepad.com/sentencing_law_and_policy/feder al_sentencing_guidelines/ Coenen, T. (2008). Asset Misappropriation. Retrieved October 24, 2010 from http://www.fraudessentials.com/index.php?option=com_content Wells, J. (2001). Enemies Within: Asset Misappropriation Comes in Many Forms. (The Fraud Beat). Journal of Accountancy. P. 2-5. Retrieved October 24, 2010 from http://www.allbusiness.com/human-resources/workplace-health- safety/828482-1.html