SlideShare a Scribd company logo
1 of 3
Download to read offline
Background This case study presents a fraud perpetrated by a mortgage counselor at a branch.
office of Southeastern Federal Savings & Loans (Southeastern) that resulted in Southeastern
losing $110 , 000 in cash outright and $93.149 in staff time investigating the fraud. The senior
management of Southeastern, the FBI, and the firm's attorneys incurred additional costs. This
fraud occurred because established policies and procedures were not followed and that additional
controls needed to be implemented. Description of the Fraud and the Parties Jane Davenport, the
perpetrator of the fraud, was initially hired as a teller, became a 5avings counselor, and lastly, a
mortgage counselor. In her five years of employment. at Southeastern, fellow employees and
customers trusted her. Ms. Davenport violated their trust by stealing from customers' accounts.
Ms. Davenport started the. fraud when she took money from an older couple's two accounts by
forging. signatures on withdrawal slips. She repaid the money to the accounts by taking money
from other customers' accounts in a classic lapping scheme. This fraud occurred because
established policies and procedures were not followed and that additional controls needed to be
implemented. Description of the Fraud and the Parties Jane Davenport, the perpetrator of the
fraud, was initially hired as a teller, became a savings counselor, and lastly, a mortgage
counselor. In her five years of employn at Southeastern, fellow employees and customers trusted
her. Ms. Davenport at Southeastern, fellow employees and customers trusted her. Ms. Davenport
violated their trust by stealing from customers' accounts. Ms. Davenport started the fraud when
she took money from an older couple's two accounts by forging signatures on withdrawal slips.
She repaid the money to the accounts by taking money from other customers' accounts in a
classic lapping scheme. The following year, Ms. Davenport targeted a customer, Ms. Sampson,
who had seventeen accounts with Southeastern. Ms. Sampson was a very busy lady, her accounts
were very disorganized, and her signature varied considerably. Ms. Davenport and Ms. Sampson
developed a trusting Sampson developed a trusting relationship. For instance, Ms. Sampson
would leave signed blank withdrawal tickets and/or call Ms. Davenport in order to transfer
money among accounts. Based on this trust, Ms. Davenport closed out three certificates of
deposits, taking penalties on two of them and placing the money into her personal account. Ms.
Sampson had two checking accounts with substantial activity and transferred much money
between them. Ms. Sampson made second mortgages to people and earned an excellent return on
her loans. Ms. Davenport processed a change of address for the checking accounts, so that the
statements were mailed to her. She would make a copy of the statements and eliminate the
fraudulent transactions. She inserted the altered balances and calculated the correct interest,
typed the correct address, and mailed the altered Tor the checking accounts, so that tne
statements were mailed to her. She would make a copy of the statements and eliminate the
fraudulent transactions. She inserted the altered balances and calculated the correct interest,
typed the correct address, and mailed the altered statement to Ms. Sampson so that she would not
detect the fraudulent transactions. Ms. Sampson suffered a total loss of $45 , 168.67 ; all of
which were reimbursed by Southeastern. Other Losses Ms. Davenport raided other customers'
accounts. One customer suffered a loss of $4 , 072.09 when Ms. Davenport diverted a check
payable to the customers to her own account. Another customer lost $30 , 884.62 when Ms.
Davenport prematurely closed the customer's certificate of deposit and fraudulently withdrew
money from the customer's account. Four additional customers lost $18 , 134 , 62 , $10 , 707 , 00
, $1 , 000.00 , and $151.97 respectively. the customer's account. Four additional customers lost
$18 , 134.62 , $10.707.00 . $1 , 000.00 , and $151.97 respectively. The Discovery The fraud was
discovered after three years when Ms. Sampson finally complained to the branch manager about
problems in her accounts. The branch manager immediately contacted the security manager and
Ms. Davenport was questioned. Eventually, Ms. Davenport signed a confession stating that she
had stolen Ms. Sampson's money to help her mother with financial problems. At that time, the
Internal Audit Department was asked to investigate the fraud and the record center began the
enormous task of gathering the documents for the investigation. Evidence and Work Papers
Internal audit investigation had the following objectives: 1. Determine the customers and the
amount lost by each to allow Southeast to reimburse customers' losses. 2. Identify violations of
existing policies and procedures and make recommendations for additional controls that could
prevent future frauds from occurring. 3. Supply the FEI with evidence in the case for them to
conduct their own investioation ennerially in the races not ronsiderend larop nnnush hu FRI 2.
Identify violations of existing policies and procedures and make recommendations for additional
controls that could prevent future frauds from occurring. 3. Supply the FBI with evidence in the
case for them to conduct their own investigation, especially in the cases not considered large
enough by FBI standards. Internal auditors assembled copies of withdrawal tickets, deposit
tickets, signature cards, and checks, and placed them in a file for each customer's accounts. For
each account, the internal auditor matched withdrawals against the copies of the signature cards
in order to determine if the withdrawal was a forgery. When there was a reference to another
account, the internal auditors requested from the Record Center information from the other
account. Among many irregularities, it was discovered that Ms. Davenport had signed her own
name on withdrawal tickets for other persons' accounts. A summary worksheet was prepared for
each account indicating the transactions not performed by the customer or those that appeared
questionable. In many accounts. it was simple to determine if the transactions were legitimate or
not, but in some accounts, such as Ms. Sampson's, it was impossible to make any determination
due to the diserepancies in the signatures on signature cards and the large activity of their
checking accounts. The FBI and Internal Auditors Interview Ms. Sampson In order to resolve the
above problem, the security manager arranged to meet with Ms. Sampson, the internal auditors
and the FBI, to determine which transactions were made by her. The volume of transactions was
so large that follow-up meetings were scheduled between Ms. Sampson and the internal auditors,
During the follow-up meetings, Ms. Sampson was shown copies of the transactions from her
various accounts and she was asked to identify whether she had actually performed them. A
certain level of confidence was established from the information supplied by Ms. Sampson. As a
final verification, the internal auditors compared the transactions in their worksheets to Ms.
Sampson's check register. The internal auditors prepared a detailed and complete list of
fraudulent withdrawals. Ms. Sampson's accountant verified the accuracy of the loss as presented
on the Internal Auditor's spreadsheet. The Conclusion of the Case The FBI requested the internal
auditor's spreadsheets documenting the total loss suffered by Southeastern customers. The FBI
and U.S. Attorneys used the worksheets to prosecute Ms. Davenport. The spreadsheets listed 241
fraudulent transactions totaling a $465 , 303.58 . Ms. Davenport pleaded guilty, was convicted,
and sentenced to five years probation, one month in jail, and no restitution. Required 1. How
would the auditors demonstrate that all the accounts that suffered losses (actual accounts and
potential accounts were reviewed? 2. What information should work babers contain to supoort a
fraud case? 1. How would the auditors demonstrate that all the accounts that suffered losses
(actual accounts and potential accounts were reviewed? 2. What information should work papers
contain to support a fraud case? 3. What information should work papers contain to support a
regular audit? Compare and contrast the differences in the information needed for a fraud case
and a regular audit 4. How would you review the work papers prepared for this case? 5. Prepare
an audit program that an internal auditor assigned to this case would use? 6. What changes in
internal controls would you recommend after reviewing the facts of the case? Clearly highlight
each question and use bullet points within the question ldo not include the quiz fact pattern with
your reply]. 1. How would the auditors demonstrate that all the accounts that suffered losses
(actual accounts and potential accounts were reviewed? 2. What information should work papers
contain to support a fraud case? 3. What information should work papers contain to support a
regular audit? Compare and contrast the differences in the information needed for a fraud case
and a regular audit 4. How would you review the work papers prepared for this case? 5. Prepare
an audit program that an internal auditor assigned to this case would use? 6. What changes in
internal controls would you recommend after reviewing the facts of the case? Clearly highlight
each question and use bullet points within the question [do not include the quiz fact pattern with
your reply].

More Related Content

Similar to Background This case study presents a fraud perpetrated by a mortgage.pdf

Chapter 4, Fundamentals of Accounting I (2).pptx
Chapter 4, Fundamentals of Accounting I (2).pptxChapter 4, Fundamentals of Accounting I (2).pptx
Chapter 4, Fundamentals of Accounting I (2).pptxKalkaye
 
Citrin Cooperman's Forensic, Litigation, and Valuation Services
Citrin Cooperman's Forensic, Litigation, and Valuation ServicesCitrin Cooperman's Forensic, Litigation, and Valuation Services
Citrin Cooperman's Forensic, Litigation, and Valuation ServicesCitrin Cooperman
 
Finding Hidden Assets in a Matrimonial Case - Tully Rinckey PLLC CLE
Finding Hidden Assets in a Matrimonial Case - Tully Rinckey PLLC CLEFinding Hidden Assets in a Matrimonial Case - Tully Rinckey PLLC CLE
Finding Hidden Assets in a Matrimonial Case - Tully Rinckey PLLC CLETully Rinckey
 
Payroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic AccountantPayroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic AccountantRushmore Forensic
 
The Week 8 Project must demonstrate an understanding and thorough .docx
The Week 8 Project must demonstrate an understanding and thorough .docxThe Week 8 Project must demonstrate an understanding and thorough .docx
The Week 8 Project must demonstrate an understanding and thorough .docxssusera34210
 
Forensic Accounting- Introduction
Forensic Accounting- IntroductionForensic Accounting- Introduction
Forensic Accounting- Introductioninfantemiliya
 
Fraud - Real Life Horror Stories
Fraud - Real Life Horror Stories Fraud - Real Life Horror Stories
Fraud - Real Life Horror Stories DecosimoCPAs
 
Part I Provide a short synopsis of your Course Assignment #1. P.docx
Part I Provide a short synopsis of your Course Assignment #1. P.docxPart I Provide a short synopsis of your Course Assignment #1. P.docx
Part I Provide a short synopsis of your Course Assignment #1. P.docxssuser562afc1
 
C24 Fraud In The Workplace (3 Mock Trials)
C24   Fraud In The Workplace (3 Mock Trials)C24   Fraud In The Workplace (3 Mock Trials)
C24 Fraud In The Workplace (3 Mock Trials)Pw Carey
 
From Yizhou HuangTo Professor BoyerSubject FRAUD INVESTIGATI.docx
From Yizhou HuangTo Professor BoyerSubject FRAUD INVESTIGATI.docxFrom Yizhou HuangTo Professor BoyerSubject FRAUD INVESTIGATI.docx
From Yizhou HuangTo Professor BoyerSubject FRAUD INVESTIGATI.docxhanneloremccaffery
 
False Invoices - Would you detect them
False Invoices - Would you detect themFalse Invoices - Would you detect them
False Invoices - Would you detect themMark Scales
 
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptxRandyKuswanto
 
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfShwethaAcharya20
 
Quickdinero Compliance Training Module 1
Quickdinero Compliance Training Module 1Quickdinero Compliance Training Module 1
Quickdinero Compliance Training Module 1Quickdinero_Inc
 
Accounting Principles, 12th Edition Ch08
Accounting Principles, 12th Edition Ch08Accounting Principles, 12th Edition Ch08
Accounting Principles, 12th Edition Ch08AbdelmonsifFadl
 

Similar to Background This case study presents a fraud perpetrated by a mortgage.pdf (20)

Chapter 4, Fundamentals of Accounting I (2).pptx
Chapter 4, Fundamentals of Accounting I (2).pptxChapter 4, Fundamentals of Accounting I (2).pptx
Chapter 4, Fundamentals of Accounting I (2).pptx
 
Acc102 chap07 publisher_power_point
Acc102  chap07 publisher_power_pointAcc102  chap07 publisher_power_point
Acc102 chap07 publisher_power_point
 
Howie's cafe caper
Howie's cafe caperHowie's cafe caper
Howie's cafe caper
 
Citrin Cooperman's Forensic, Litigation, and Valuation Services
Citrin Cooperman's Forensic, Litigation, and Valuation ServicesCitrin Cooperman's Forensic, Litigation, and Valuation Services
Citrin Cooperman's Forensic, Litigation, and Valuation Services
 
Finding Hidden Assets in a Matrimonial Case - Tully Rinckey PLLC CLE
Finding Hidden Assets in a Matrimonial Case - Tully Rinckey PLLC CLEFinding Hidden Assets in a Matrimonial Case - Tully Rinckey PLLC CLE
Finding Hidden Assets in a Matrimonial Case - Tully Rinckey PLLC CLE
 
Payroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic AccountantPayroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic Accountant
 
The Week 8 Project must demonstrate an understanding and thorough .docx
The Week 8 Project must demonstrate an understanding and thorough .docxThe Week 8 Project must demonstrate an understanding and thorough .docx
The Week 8 Project must demonstrate an understanding and thorough .docx
 
Forensic Accounting- Introduction
Forensic Accounting- IntroductionForensic Accounting- Introduction
Forensic Accounting- Introduction
 
Fraud - Real Life Horror Stories
Fraud - Real Life Horror Stories Fraud - Real Life Horror Stories
Fraud - Real Life Horror Stories
 
Auditing for fraud detection
Auditing for fraud detectionAuditing for fraud detection
Auditing for fraud detection
 
Part I Provide a short synopsis of your Course Assignment #1. P.docx
Part I Provide a short synopsis of your Course Assignment #1. P.docxPart I Provide a short synopsis of your Course Assignment #1. P.docx
Part I Provide a short synopsis of your Course Assignment #1. P.docx
 
C24 Fraud In The Workplace (3 Mock Trials)
C24   Fraud In The Workplace (3 Mock Trials)C24   Fraud In The Workplace (3 Mock Trials)
C24 Fraud In The Workplace (3 Mock Trials)
 
Forensic Audit.pptx
Forensic Audit.pptxForensic Audit.pptx
Forensic Audit.pptx
 
From Yizhou HuangTo Professor BoyerSubject FRAUD INVESTIGATI.docx
From Yizhou HuangTo Professor BoyerSubject FRAUD INVESTIGATI.docxFrom Yizhou HuangTo Professor BoyerSubject FRAUD INVESTIGATI.docx
From Yizhou HuangTo Professor BoyerSubject FRAUD INVESTIGATI.docx
 
Red flag plan
Red flag planRed flag plan
Red flag plan
 
False Invoices - Would you detect them
False Invoices - Would you detect themFalse Invoices - Would you detect them
False Invoices - Would you detect them
 
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
 
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
 
Quickdinero Compliance Training Module 1
Quickdinero Compliance Training Module 1Quickdinero Compliance Training Module 1
Quickdinero Compliance Training Module 1
 
Accounting Principles, 12th Edition Ch08
Accounting Principles, 12th Edition Ch08Accounting Principles, 12th Edition Ch08
Accounting Principles, 12th Edition Ch08
 

More from theyellowgold

(1 point) Suppose that X is normally distributed with mean 120 and sta.pdf
(1 point) Suppose that X is normally distributed with mean 120 and sta.pdf(1 point) Suppose that X is normally distributed with mean 120 and sta.pdf
(1 point) Suppose that X is normally distributed with mean 120 and sta.pdftheyellowgold
 
(1 point) Suppose we apply the Mix Columns operation to a -column- vec.pdf
(1 point) Suppose we apply the Mix Columns operation to a -column- vec.pdf(1 point) Suppose we apply the Mix Columns operation to a -column- vec.pdf
(1 point) Suppose we apply the Mix Columns operation to a -column- vec.pdftheyellowgold
 
#9 - Selective Repeat ARQ Protocol X attempts to send four frames (f0-.pdf
#9 - Selective Repeat ARQ Protocol X attempts to send four frames (f0-.pdf#9 - Selective Repeat ARQ Protocol X attempts to send four frames (f0-.pdf
#9 - Selective Repeat ARQ Protocol X attempts to send four frames (f0-.pdftheyellowgold
 
#2 A Treasury bond that matures in 10 years has a yield of 4-25-- A 10.pdf
#2 A Treasury bond that matures in 10 years has a yield of 4-25-- A 10.pdf#2 A Treasury bond that matures in 10 years has a yield of 4-25-- A 10.pdf
#2 A Treasury bond that matures in 10 years has a yield of 4-25-- A 10.pdftheyellowgold
 
(0) L Utunled er- fon Rouacin- Feceta Fenerm teretay pai ty Qustiona T.pdf
(0) L Utunled er- fon Rouacin- Feceta Fenerm teretay pai ty Qustiona T.pdf(0) L Utunled er- fon Rouacin- Feceta Fenerm teretay pai ty Qustiona T.pdf
(0) L Utunled er- fon Rouacin- Feceta Fenerm teretay pai ty Qustiona T.pdftheyellowgold
 
# -Gavin Lewis- # P9 - Employee Hash Table # The Hash Dictionary poi.pdf
# -Gavin Lewis- # P9 - Employee Hash Table   # The Hash Dictionary poi.pdf# -Gavin Lewis- # P9 - Employee Hash Table   # The Hash Dictionary poi.pdf
# -Gavin Lewis- # P9 - Employee Hash Table # The Hash Dictionary poi.pdftheyellowgold
 
!!Please answer all questions !! 1-Identify the important system compo (1).pdf
!!Please answer all questions !! 1-Identify the important system compo (1).pdf!!Please answer all questions !! 1-Identify the important system compo (1).pdf
!!Please answer all questions !! 1-Identify the important system compo (1).pdftheyellowgold
 
Based on what you know about Mitochondria and ER protein import- Think.pdf
Based on what you know about Mitochondria and ER protein import- Think.pdfBased on what you know about Mitochondria and ER protein import- Think.pdf
Based on what you know about Mitochondria and ER protein import- Think.pdftheyellowgold
 
Based on its appearance and features- what kind of fault is this- (Not.pdf
Based on its appearance and features- what kind of fault is this- (Not.pdfBased on its appearance and features- what kind of fault is this- (Not.pdf
Based on its appearance and features- what kind of fault is this- (Not.pdftheyellowgold
 
Based on the Gilbert paper regarding human embryonic development- take.pdf
Based on the Gilbert paper regarding human embryonic development- take.pdfBased on the Gilbert paper regarding human embryonic development- take.pdf
Based on the Gilbert paper regarding human embryonic development- take.pdftheyellowgold
 
Based on the above FSM- answer the following questions- 1- Write out s.pdf
Based on the above FSM- answer the following questions- 1- Write out s.pdfBased on the above FSM- answer the following questions- 1- Write out s.pdf
Based on the above FSM- answer the following questions- 1- Write out s.pdftheyellowgold
 
Based on the ANOVA table given- is there enough evidence at the 0-01 l.pdf
Based on the ANOVA table given- is there enough evidence at the 0-01 l.pdfBased on the ANOVA table given- is there enough evidence at the 0-01 l.pdf
Based on the ANOVA table given- is there enough evidence at the 0-01 l.pdftheyellowgold
 
based on healthcare workplace conduct s 1 and 7- Lawful and Honest Co.pdf
based on healthcare workplace conduct  s 1 and 7- Lawful and Honest Co.pdfbased on healthcare workplace conduct  s 1 and 7- Lawful and Honest Co.pdf
based on healthcare workplace conduct s 1 and 7- Lawful and Honest Co.pdftheyellowgold
 
Barter Auto Repair had the following account balances after adjustment.pdf
Barter Auto Repair had the following account balances after adjustment.pdfBarter Auto Repair had the following account balances after adjustment.pdf
Barter Auto Repair had the following account balances after adjustment.pdftheyellowgold
 
Based on a poll- 61- of Internet users are more careful about personal.pdf
Based on a poll- 61- of Internet users are more careful about personal.pdfBased on a poll- 61- of Internet users are more careful about personal.pdf
Based on a poll- 61- of Internet users are more careful about personal.pdftheyellowgold
 
b- tackine dercingrumer organismis- 21- The process of killing or nias.pdf
b- tackine dercingrumer organismis- 21- The process of killing or nias.pdfb- tackine dercingrumer organismis- 21- The process of killing or nias.pdf
b- tackine dercingrumer organismis- 21- The process of killing or nias.pdftheyellowgold
 
Bank reconciliation and entries The cash account for Stone Systems at.pdf
Bank reconciliation and entries The cash account for Stone Systems at.pdfBank reconciliation and entries The cash account for Stone Systems at.pdf
Bank reconciliation and entries The cash account for Stone Systems at.pdftheyellowgold
 
Banele had a taxable estate of $17-4 million when they died this year-.pdf
Banele had a taxable estate of $17-4 million when they died this year-.pdfBanele had a taxable estate of $17-4 million when they died this year-.pdf
Banele had a taxable estate of $17-4 million when they died this year-.pdftheyellowgold
 
b- Write two additional sentences using the superficial-deep relations.pdf
b- Write two additional sentences using the superficial-deep relations.pdfb- Write two additional sentences using the superficial-deep relations.pdf
b- Write two additional sentences using the superficial-deep relations.pdftheyellowgold
 
B- Monetary System- The monetary base of Moneyland is $700 million- Th.pdf
B- Monetary System- The monetary base of Moneyland is $700 million- Th.pdfB- Monetary System- The monetary base of Moneyland is $700 million- Th.pdf
B- Monetary System- The monetary base of Moneyland is $700 million- Th.pdftheyellowgold
 

More from theyellowgold (20)

(1 point) Suppose that X is normally distributed with mean 120 and sta.pdf
(1 point) Suppose that X is normally distributed with mean 120 and sta.pdf(1 point) Suppose that X is normally distributed with mean 120 and sta.pdf
(1 point) Suppose that X is normally distributed with mean 120 and sta.pdf
 
(1 point) Suppose we apply the Mix Columns operation to a -column- vec.pdf
(1 point) Suppose we apply the Mix Columns operation to a -column- vec.pdf(1 point) Suppose we apply the Mix Columns operation to a -column- vec.pdf
(1 point) Suppose we apply the Mix Columns operation to a -column- vec.pdf
 
#9 - Selective Repeat ARQ Protocol X attempts to send four frames (f0-.pdf
#9 - Selective Repeat ARQ Protocol X attempts to send four frames (f0-.pdf#9 - Selective Repeat ARQ Protocol X attempts to send four frames (f0-.pdf
#9 - Selective Repeat ARQ Protocol X attempts to send four frames (f0-.pdf
 
#2 A Treasury bond that matures in 10 years has a yield of 4-25-- A 10.pdf
#2 A Treasury bond that matures in 10 years has a yield of 4-25-- A 10.pdf#2 A Treasury bond that matures in 10 years has a yield of 4-25-- A 10.pdf
#2 A Treasury bond that matures in 10 years has a yield of 4-25-- A 10.pdf
 
(0) L Utunled er- fon Rouacin- Feceta Fenerm teretay pai ty Qustiona T.pdf
(0) L Utunled er- fon Rouacin- Feceta Fenerm teretay pai ty Qustiona T.pdf(0) L Utunled er- fon Rouacin- Feceta Fenerm teretay pai ty Qustiona T.pdf
(0) L Utunled er- fon Rouacin- Feceta Fenerm teretay pai ty Qustiona T.pdf
 
# -Gavin Lewis- # P9 - Employee Hash Table # The Hash Dictionary poi.pdf
# -Gavin Lewis- # P9 - Employee Hash Table   # The Hash Dictionary poi.pdf# -Gavin Lewis- # P9 - Employee Hash Table   # The Hash Dictionary poi.pdf
# -Gavin Lewis- # P9 - Employee Hash Table # The Hash Dictionary poi.pdf
 
!!Please answer all questions !! 1-Identify the important system compo (1).pdf
!!Please answer all questions !! 1-Identify the important system compo (1).pdf!!Please answer all questions !! 1-Identify the important system compo (1).pdf
!!Please answer all questions !! 1-Identify the important system compo (1).pdf
 
Based on what you know about Mitochondria and ER protein import- Think.pdf
Based on what you know about Mitochondria and ER protein import- Think.pdfBased on what you know about Mitochondria and ER protein import- Think.pdf
Based on what you know about Mitochondria and ER protein import- Think.pdf
 
Based on its appearance and features- what kind of fault is this- (Not.pdf
Based on its appearance and features- what kind of fault is this- (Not.pdfBased on its appearance and features- what kind of fault is this- (Not.pdf
Based on its appearance and features- what kind of fault is this- (Not.pdf
 
Based on the Gilbert paper regarding human embryonic development- take.pdf
Based on the Gilbert paper regarding human embryonic development- take.pdfBased on the Gilbert paper regarding human embryonic development- take.pdf
Based on the Gilbert paper regarding human embryonic development- take.pdf
 
Based on the above FSM- answer the following questions- 1- Write out s.pdf
Based on the above FSM- answer the following questions- 1- Write out s.pdfBased on the above FSM- answer the following questions- 1- Write out s.pdf
Based on the above FSM- answer the following questions- 1- Write out s.pdf
 
Based on the ANOVA table given- is there enough evidence at the 0-01 l.pdf
Based on the ANOVA table given- is there enough evidence at the 0-01 l.pdfBased on the ANOVA table given- is there enough evidence at the 0-01 l.pdf
Based on the ANOVA table given- is there enough evidence at the 0-01 l.pdf
 
based on healthcare workplace conduct s 1 and 7- Lawful and Honest Co.pdf
based on healthcare workplace conduct  s 1 and 7- Lawful and Honest Co.pdfbased on healthcare workplace conduct  s 1 and 7- Lawful and Honest Co.pdf
based on healthcare workplace conduct s 1 and 7- Lawful and Honest Co.pdf
 
Barter Auto Repair had the following account balances after adjustment.pdf
Barter Auto Repair had the following account balances after adjustment.pdfBarter Auto Repair had the following account balances after adjustment.pdf
Barter Auto Repair had the following account balances after adjustment.pdf
 
Based on a poll- 61- of Internet users are more careful about personal.pdf
Based on a poll- 61- of Internet users are more careful about personal.pdfBased on a poll- 61- of Internet users are more careful about personal.pdf
Based on a poll- 61- of Internet users are more careful about personal.pdf
 
b- tackine dercingrumer organismis- 21- The process of killing or nias.pdf
b- tackine dercingrumer organismis- 21- The process of killing or nias.pdfb- tackine dercingrumer organismis- 21- The process of killing or nias.pdf
b- tackine dercingrumer organismis- 21- The process of killing or nias.pdf
 
Bank reconciliation and entries The cash account for Stone Systems at.pdf
Bank reconciliation and entries The cash account for Stone Systems at.pdfBank reconciliation and entries The cash account for Stone Systems at.pdf
Bank reconciliation and entries The cash account for Stone Systems at.pdf
 
Banele had a taxable estate of $17-4 million when they died this year-.pdf
Banele had a taxable estate of $17-4 million when they died this year-.pdfBanele had a taxable estate of $17-4 million when they died this year-.pdf
Banele had a taxable estate of $17-4 million when they died this year-.pdf
 
b- Write two additional sentences using the superficial-deep relations.pdf
b- Write two additional sentences using the superficial-deep relations.pdfb- Write two additional sentences using the superficial-deep relations.pdf
b- Write two additional sentences using the superficial-deep relations.pdf
 
B- Monetary System- The monetary base of Moneyland is $700 million- Th.pdf
B- Monetary System- The monetary base of Moneyland is $700 million- Th.pdfB- Monetary System- The monetary base of Moneyland is $700 million- Th.pdf
B- Monetary System- The monetary base of Moneyland is $700 million- Th.pdf
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Background This case study presents a fraud perpetrated by a mortgage.pdf

  • 1. Background This case study presents a fraud perpetrated by a mortgage counselor at a branch. office of Southeastern Federal Savings & Loans (Southeastern) that resulted in Southeastern losing $110 , 000 in cash outright and $93.149 in staff time investigating the fraud. The senior management of Southeastern, the FBI, and the firm's attorneys incurred additional costs. This fraud occurred because established policies and procedures were not followed and that additional controls needed to be implemented. Description of the Fraud and the Parties Jane Davenport, the perpetrator of the fraud, was initially hired as a teller, became a 5avings counselor, and lastly, a mortgage counselor. In her five years of employment. at Southeastern, fellow employees and customers trusted her. Ms. Davenport violated their trust by stealing from customers' accounts. Ms. Davenport started the. fraud when she took money from an older couple's two accounts by forging. signatures on withdrawal slips. She repaid the money to the accounts by taking money from other customers' accounts in a classic lapping scheme. This fraud occurred because established policies and procedures were not followed and that additional controls needed to be implemented. Description of the Fraud and the Parties Jane Davenport, the perpetrator of the fraud, was initially hired as a teller, became a savings counselor, and lastly, a mortgage counselor. In her five years of employn at Southeastern, fellow employees and customers trusted her. Ms. Davenport at Southeastern, fellow employees and customers trusted her. Ms. Davenport violated their trust by stealing from customers' accounts. Ms. Davenport started the fraud when she took money from an older couple's two accounts by forging signatures on withdrawal slips. She repaid the money to the accounts by taking money from other customers' accounts in a classic lapping scheme. The following year, Ms. Davenport targeted a customer, Ms. Sampson, who had seventeen accounts with Southeastern. Ms. Sampson was a very busy lady, her accounts were very disorganized, and her signature varied considerably. Ms. Davenport and Ms. Sampson developed a trusting Sampson developed a trusting relationship. For instance, Ms. Sampson would leave signed blank withdrawal tickets and/or call Ms. Davenport in order to transfer money among accounts. Based on this trust, Ms. Davenport closed out three certificates of deposits, taking penalties on two of them and placing the money into her personal account. Ms. Sampson had two checking accounts with substantial activity and transferred much money between them. Ms. Sampson made second mortgages to people and earned an excellent return on her loans. Ms. Davenport processed a change of address for the checking accounts, so that the statements were mailed to her. She would make a copy of the statements and eliminate the fraudulent transactions. She inserted the altered balances and calculated the correct interest, typed the correct address, and mailed the altered Tor the checking accounts, so that tne statements were mailed to her. She would make a copy of the statements and eliminate the fraudulent transactions. She inserted the altered balances and calculated the correct interest, typed the correct address, and mailed the altered statement to Ms. Sampson so that she would not detect the fraudulent transactions. Ms. Sampson suffered a total loss of $45 , 168.67 ; all of which were reimbursed by Southeastern. Other Losses Ms. Davenport raided other customers' accounts. One customer suffered a loss of $4 , 072.09 when Ms. Davenport diverted a check
  • 2. payable to the customers to her own account. Another customer lost $30 , 884.62 when Ms. Davenport prematurely closed the customer's certificate of deposit and fraudulently withdrew money from the customer's account. Four additional customers lost $18 , 134 , 62 , $10 , 707 , 00 , $1 , 000.00 , and $151.97 respectively. the customer's account. Four additional customers lost $18 , 134.62 , $10.707.00 . $1 , 000.00 , and $151.97 respectively. The Discovery The fraud was discovered after three years when Ms. Sampson finally complained to the branch manager about problems in her accounts. The branch manager immediately contacted the security manager and Ms. Davenport was questioned. Eventually, Ms. Davenport signed a confession stating that she had stolen Ms. Sampson's money to help her mother with financial problems. At that time, the Internal Audit Department was asked to investigate the fraud and the record center began the enormous task of gathering the documents for the investigation. Evidence and Work Papers Internal audit investigation had the following objectives: 1. Determine the customers and the amount lost by each to allow Southeast to reimburse customers' losses. 2. Identify violations of existing policies and procedures and make recommendations for additional controls that could prevent future frauds from occurring. 3. Supply the FEI with evidence in the case for them to conduct their own investioation ennerially in the races not ronsiderend larop nnnush hu FRI 2. Identify violations of existing policies and procedures and make recommendations for additional controls that could prevent future frauds from occurring. 3. Supply the FBI with evidence in the case for them to conduct their own investigation, especially in the cases not considered large enough by FBI standards. Internal auditors assembled copies of withdrawal tickets, deposit tickets, signature cards, and checks, and placed them in a file for each customer's accounts. For each account, the internal auditor matched withdrawals against the copies of the signature cards in order to determine if the withdrawal was a forgery. When there was a reference to another account, the internal auditors requested from the Record Center information from the other account. Among many irregularities, it was discovered that Ms. Davenport had signed her own name on withdrawal tickets for other persons' accounts. A summary worksheet was prepared for each account indicating the transactions not performed by the customer or those that appeared questionable. In many accounts. it was simple to determine if the transactions were legitimate or not, but in some accounts, such as Ms. Sampson's, it was impossible to make any determination due to the diserepancies in the signatures on signature cards and the large activity of their checking accounts. The FBI and Internal Auditors Interview Ms. Sampson In order to resolve the above problem, the security manager arranged to meet with Ms. Sampson, the internal auditors and the FBI, to determine which transactions were made by her. The volume of transactions was so large that follow-up meetings were scheduled between Ms. Sampson and the internal auditors, During the follow-up meetings, Ms. Sampson was shown copies of the transactions from her various accounts and she was asked to identify whether she had actually performed them. A certain level of confidence was established from the information supplied by Ms. Sampson. As a final verification, the internal auditors compared the transactions in their worksheets to Ms. Sampson's check register. The internal auditors prepared a detailed and complete list of fraudulent withdrawals. Ms. Sampson's accountant verified the accuracy of the loss as presented on the Internal Auditor's spreadsheet. The Conclusion of the Case The FBI requested the internal auditor's spreadsheets documenting the total loss suffered by Southeastern customers. The FBI and U.S. Attorneys used the worksheets to prosecute Ms. Davenport. The spreadsheets listed 241 fraudulent transactions totaling a $465 , 303.58 . Ms. Davenport pleaded guilty, was convicted, and sentenced to five years probation, one month in jail, and no restitution. Required 1. How would the auditors demonstrate that all the accounts that suffered losses (actual accounts and
  • 3. potential accounts were reviewed? 2. What information should work babers contain to supoort a fraud case? 1. How would the auditors demonstrate that all the accounts that suffered losses (actual accounts and potential accounts were reviewed? 2. What information should work papers contain to support a fraud case? 3. What information should work papers contain to support a regular audit? Compare and contrast the differences in the information needed for a fraud case and a regular audit 4. How would you review the work papers prepared for this case? 5. Prepare an audit program that an internal auditor assigned to this case would use? 6. What changes in internal controls would you recommend after reviewing the facts of the case? Clearly highlight each question and use bullet points within the question ldo not include the quiz fact pattern with your reply]. 1. How would the auditors demonstrate that all the accounts that suffered losses (actual accounts and potential accounts were reviewed? 2. What information should work papers contain to support a fraud case? 3. What information should work papers contain to support a regular audit? Compare and contrast the differences in the information needed for a fraud case and a regular audit 4. How would you review the work papers prepared for this case? 5. Prepare an audit program that an internal auditor assigned to this case would use? 6. What changes in internal controls would you recommend after reviewing the facts of the case? Clearly highlight each question and use bullet points within the question [do not include the quiz fact pattern with your reply].