The Importance and Implications of Forensic Accounting in The

Total Page:16

File Type:pdf, Size:1020Kb

The Importance and Implications of Forensic Accounting in The Long Island University Digital Commons @ LIU Undergraduate Honors College Theses 2016- LIU Post 2018 The mpI ortance and Implications of Forensic Accounting in the Financial World Mackenzie Hitchcock Long Island University, [email protected] Follow this and additional works at: https://digitalcommons.liu.edu/post_honors_theses Recommended Citation Hitchcock, Mackenzie, "The mporI tance and Implications of Forensic Accounting in the Financial World" (2018). Undergraduate Honors College Theses 2016-. 35. https://digitalcommons.liu.edu/post_honors_theses/35 This Thesis is brought to you for free and open access by the LIU Post at Digital Commons @ LIU. It has been accepted for inclusion in Undergraduate Honors College Theses 2016- by an authorized administrator of Digital Commons @ LIU. For more information, please contact [email protected]. The Importance and Implications of Forensic Accounting in the Financial World An Honors Program Thesis by Mackenzie Hitchcock Spring 2018 School of Professional Accountancy Michael Abatemarco, advisor Carol Boyer, reader Table of Contents Introduction ................................................................................................................ 1 Forensic Accounting .................................................................................................. 3 What is it? ............................................................................................................... 3 What is Fraud? ........................................................................................................ 4 Why does Fraud Occur? The Fraud Triangle ......................................................... 4 The Forensic Accounting Process .......................................................................... 6 Differences Between Auditing and Forensic Accounting ...................................... 8 The Education and Training of Forensic Accountants .............................................. 9 Important Skills ....................................................................................................... 9 Education ..............................................................................................................10 Certificates ............................................................................................................11 Training .................................................................................................................11 Where and How Forensic Accountants Work ......................................................12 Ideas for Improvement ..........................................................................................13 Forensic Accounting Techniques .............................................................................14 Analytical Procedures and Ratio Analysis ...........................................................14 Direct/Transaction Method ...................................................................................18 Cash T Method ......................................................................................................18 Source and Application of Funds Method ............................................................19 Net Worth Method ................................................................................................20 Bank Deposit Method ...........................................................................................21 Benford’s Law ......................................................................................................21 Theory of Relative Size Factor (RSF) ..................................................................23 Types of Frauds ........................................................................................................23 Ponzi Scheme ........................................................................................................23 Affinity Scheme ....................................................................................................25 Advance Fee Fraud ...............................................................................................25 Pump and Dump Scheme ......................................................................................26 Internet and Social Media Fraud ...........................................................................26 Famous Frauds .........................................................................................................27 The Enron Scandal ................................................................................................27 WorldCom .............................................................................................................28 The Bernie Madoff Scandal ..................................................................................29 The 2008 Financial Crisis .....................................................................................31 Equifax ..................................................................................................................33 Internal Controls ......................................................................................................33 Types of Internal Controls ....................................................................................33 Steps for a Successful System of Internal Control ...............................................35 Cybersecurity ...........................................................................................................39 What is it? .............................................................................................................39 Common Types of Cybercrime ............................................................................40 Preventing Cybercrime .........................................................................................43 Steps Toward a Better Future ..................................................................................44 The Sarbanes-Oxley Act of 2002 and the Public Company Accounting Oversight Board .....................................................................................................................44 Generally Accepted Auditing Standards ..............................................................44 Prohibited Services ...............................................................................................45 Recent Changes to the Auditor’s Report ..............................................................47 The Importance of Forensic Accounting .................................................................48 Conclusion ...............................................................................................................49 Works Cited .............................................................................................................52 Abstract This thesis thoroughly explores fraud and the forensic accounting profession. It details the education, training, and careers of forensic accountants; and why demand for this profession has suddenly spiked. The necessary skills of forensic accountants and why these skills are valuable is explored; a need for better education and training is also proposed. It also details popular forensic accounting methods and how these may be used to detect fraud. This thesis explains several fraud schemes and famous frauds that were contributors to the growing demand of forensic accountants. The fraud triangle and other contributing factors are explored. This thesis also emphasizes the importance of strong internal controls and explains the COSO internal control framework; several important internal controls are listed and explained. Cybersecurity is also explained; including why it has become an absolute necessity and how businesses can better enforce cybersecurity measures. This thesis also explains the changes that were made following the Enron and WorldCom scandals and details the Sarbanes-Oxley Act of 2002. Explanations for the relevant changes and why they were necessary are included. The purpose of this thesis is to demonstrate the importance of forensic accounting and to thoroughly explain the facets of fraud and forensic accounting. Introduction Forensic accounting is a relatively new career field that has expanded rapidly since its inception. It is now widely demanded and is continuing to grow. But why? Several events and developments have prompted this change in the financial world. Forensic accountants are highly talented individuals who possess thorough knowledge in several areas. These areas include general accounting principles, the law, criminal behavior, frauds, and computerized systems. This once random combination of skills has been made necessary by several high-profile frauds and accounting scandals that led to billion-dollar losses—and even the loss of several lives. People take money seriously and personally; it is both our means of survival and our key to luxury. There are endless incentives for employees and managers to take advantage of a flawed system. And for years, they have. Before the financial world was so big—and before technology was so advanced—fraud was not such a big issue. But because corporations now control trillions of dollars and wield a great amount of power—it is. It is the responsibility of forensic accountants to detect frauds and to protect the assets of common people. There are many types of frauds, including Ponzi schemes and social media frauds, that affect normal people. These people
Recommended publications
  • Business Valuation and Financial Forensics
    HUNTSVILLE ATHENS FLORENCE 101 Lowe Avenue 213 South Houston 201 S. Court Street Suite 2-B Street Florence, AL 35630 Huntsville, AL 35801 Athens, AL 35611 Phone: 256.768.5040 Phone: 256.539.3555 Phone: 256.232.2260 Fax: 256.232.1881 Fax: 256.536.6818 Fax: 256.232.1881 WEB www.cdpapc.com Presenter: © 2015 Jeremy Blackburn, CPA, CVA, MAFF [email protected] Jeremy Blackburn, CPA, CVA, MAFF Practice Specializations Business Valuations Litigation Support Services Financial Forensics Management Consulting Attestation Services (Audits & Reviews) Wealth Management Mergers & Acquisitions Personal Financial Planning Employee Benefit Plan Services & Audits Experience Jeremy joined CDPA in 2010 and manages the firms litigation support, financial forensics, valuation, audit and review practice. He is the firm’s Certified Valuation Analyst and Master Analyst in Financial Forensics. He is also a licensed Certified Public Accountant in both Alabama and Tennessee. Jeremy has over thirteen years of experience working in the finance and accounting industries, including auditing multi-national companies, income and estate tax issues along with general business consulting, individual financial planning, fraud examinations, litigation support and business valuation. Prior to joining CDPA, Jeremy was a manager with a large multi-national accounting firm (PricewaterhouseCoopers) auditing benefit plans, large multi-national corporations, investment firms, hedge funds, and private equity firms. Prior to that, he worked in the audit and tax department in the
    [Show full text]
  • Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
    Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable Gibson Mba Jeremiah Onaolapo Royal Holloway University College London University of London Gianluca Stringhini Lorenzo Cavallaro University College London Royal Holloway University of London ABSTRACT ans living in Nigeria. While the long history and advanced Most of cyberscam-related studies focus on threats perpe- use of Information and Communication Technology (ICT) trated against the Western society, with a particular atten- in the Western societies justify the large body of literature tion to the USA and Europe. Regrettably, no research has dealing with its misuse, the absence of detailed studies on been done on scams targeting African countries, especially other regions, such as Africa, creates the impression that Nigeria, where the notorious and (in)famous 419 advanced- these societies are immune from cyber attacks. On the con- fee scam, targeted towards other countries, originated. How- trary, there is more happening out there that has not been ever, as we know, cybercrime is a global problem affecting brought to the attention of the concerned public. Our study all parties. In this study, we investigate a form of advance aims at bridging this gap, i.e., the paucity of African unique fee fraud scam unique to Nigeria and targeted at Nigerians, contribution to the global cybercrime, by studying in de- but unknown to the Western world. For the study, we rely tail a form of 419 (advance fee fraud) scam unknown to the substantially on almost two years worth of data harvested West but unique to Africa|Nigeria in particular|targeted from an online discussion forum used by criminals.
    [Show full text]
  • Distressed Company Financial Reporting Considerations
    Distressed Company Financial Reporting Considerations Insights from a Forensic Accountant MAY 2020 | Floyd Advisory "A common problem for distressed companies is the failure to maintain Filing for bankruptcy protection doesn’t just happen. It involves a process that takes proper books and weeks and in some cases several months of planning and preparation. Unfortunately, records. Sometimes this process sometimes involves inappropriate actions for the benefit of those in control this is due to high and to the detriment and harm of other stakeholders. turnover in the accounting and While the schemes may vary, investigating the wrongdoing and reporting the facts all finance group while involve forensic accounting and financial reporting expertise. As forensic accountants other times it is who have investigated numerous issues that occurred in the period before a bankruptcy attributable to budget filing, we have learned a tremendous amount from our experiences. We have followed pressures and other the accounting trail to locate assets off the books, identified actions outside the priorities." ordinary course of business, and notably, reported on the misapplication of generally accepted accounting principles (“GAAP”) and the presentation of misleading financial statements. Based on these experiences, we prepared this report to highlight our expert accounting insights and considerations for legal counsel and others who may be investigating a debtor’s financial reporting and accounting treatments. Did the Debtor Keep Proper Books and Records? Before discussing other matters, it’s important to understand the quality of the company’s recordkeeping. A common problem for distressed companies is the failure to maintain proper books and records. Sometimes this is due to high turnover in the accounting and finance group while other times it is attributable to budget pressures and other priorities.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • 2016 Wrap-Up Cybercrime Tactics and Techniques
    Cybercrime tactics and techniques 2016 wrap-up TABLE OF CONTENTS 01 Executive summary 02 Windows malware 05 Early 2017 Windows malware predictions 06 Mac malware 06 Early 2017 OS X malware predictions 07 Exploit kits 08 Early 2017 exploit kit predictions 09 Phishing and malspam 10 Early 2017 phishing and malspam predictions 11 Potentially Unwanted Programs 11 Early 2017 PUP predictions 12 Tech support scams 13 Early 2017 tech support scam predictions 14 Conclusion Introduction Last year was interesting for malware distribution and development. While we still experienced a flood of ransomware and immense distribution of malware using malspam/phishing/exploit kits, some major players, such as TeslaCrypt and Angler EK, vanished, while some new names dominated. In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, take an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts. Executive summary Ransomware dominated in 2016 and continued to do so However, it’s market share and capabilities are not quite into 2017. We expect to see very little variation in this at par with Angler, though this is likely going to change in early 2017, and if anything, it is getting worse. The as we expect to observe an increase in exploit kit most notable ransomware families of the end of 2016 activity by the middle of 2017. While late 2016 showed were Locky and Cerber, two very similar ransomware a decrease in the amount of malicious spam/phishing families that took the number one slot multiple times attacks targeting users in the wild, we are seeing greater during the last part of the year.
    [Show full text]
  • Financial Crime in the Twenty-First Century: the Rise of the Virtual Collar Criminal
    Financial crime in the twenty-first century: the rise of the virtual collar criminal REID, Alan <http://orcid.org/0000-0003-2019-5629> Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/22836/ This document is the author deposited version. You are advised to consult the publisher's version if you wish to cite from it. Published version REID, Alan (2018). Financial crime in the twenty-first century: the rise of the virtual collar criminal. In: RYDER, Nic, (ed.) White collar crime and risk: Financial crime, corruption and the financial crisis. Palgrave Studies in Risk, Crime and Society . London, Palgrave Macmillan, 231-251. Copyright and re-use policy See http://shura.shu.ac.uk/information.html Sheffield Hallam University Research Archive http://shura.shu.ac.uk Financial crime in the 21st Century: The rise of the Virtual Collar Criminal Alan S Reid, Senior Lecturer in Law, Sheffield Hallam University Abstract This chapter introduces the phenomenon of virtual collar crime, that is quintessentially white collar crimes that are perpetrated entirely in cyberspace. Trust, trust dependency, high skill base criminals and opportunity zones were, and are, the hallmarks of white collar crime. The emerging paradigm of virtual collar crimes negates the requirement that perpetrators be highly skilled. Computer sagacity is no longer the sine qua non for cybercriminals - the phenomenon of 'Crime as a Service' has outsourced the skill requirement to third party providers of the required technological knowhow. Alongside the cascading down of such technical knowledge, twenty-first century society has driven headlong down the information superhighway, with hardly any area of human activity left unexposed to the effects of the ether.
    [Show full text]
  • Cyber Frauds, Scams and Their Victims
    4 ‘NOT A VICTIMLESS CRIME’ The impact of fraud upon victims Distribution Introduction1 for It is surprising to note that despite extensive research on crime victimisation there has only been a very small amount of research on fraud victims (Croall, 2001; Fraud Advisory Panel, 2006; Ganzini et al., 1990; Levi, 2001; Levi, 1999; Not Levi and Pithouse, 1992; Spalek, 1999). This literature highlights some of the devastating consequences and impacts of fraud on the victim. For some, such is the severity of the harm they experience, it has been likened to that of violent crime (Marsh, 2004). Further to this, there is evidence from some victims who express feelings in the aftermath of online fraud that they have been ‘mentally raped’ (Whitty and Buchanan, 2016: 180; see also Deem, 2000: 37). While the Francis: most obvious consequence is financial harm, it is important to recognise that the impacts of fraud go far beyond that of pure monetary losses. However, the & financial loss can be significant. For some victims, such is the loss that they are re- quired to sell assets (often their home), go back to work (if they were retired), or are unable to secure credit or sometimes in the worst case scenario they may even become bankrupt. This chapter will explore the impact of fraud on the victims, examining both the financial and non-financial harms experienced by these vic- Taylor tims, and in doing so it will draw upon some of the latest research from around the world. The chapter will start with an examination of the impact of crime in general, before exploring some of the specific impacts of fraud, which have been noted in the research.
    [Show full text]
  • Secureworks State of Cybercrime Report 2017
    REPORT State2017 of Cybercrime Exposing the threats, techniques and markets that fuel the economy of cybercriminals Contents Foreword 3 Introduction 4 Key Findings 5 Cybercrime 1. Business Email Compromise 7 2. Ransomware 9 3. Banking Malware 12 4. Mobile Malware 20 Criminal Landscape 5. Organized Cybercrime 22 6. Diverse Roles 23 7. Gap Between Criminality and Nation-States 25 8. Money Muling 27 Online Crime — A Market Economy 9. Commodities 30 10. Spam Botnet Usage 34 11. Exploit Kit Activity Decline 37 Conclusion 39 Glossary of Terms 40 About Secureworks 41 2 © 2017 Secureworks, Inc. All rights reserved. Foreword Foreword Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016. The unique and valuable intelligence shared in this report stems from the visibility gained from our thousands of clients, the machine learning and automation from our industry-leading Counter Threat Platform™, and the actionable insights from our team of elite Counter Threat Unit™ (CTU) researchers, analysts and consultants. We call this the Network Effect, and it is the unparalleled power and protection of this Network Effect which enables us to prevent security breaches, detect malicious activity in real time, respond rapidly and predict emerging threats. Secureworks’ goal in publicly sharing this report’s findings is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become Collectively Smarter.
    [Show full text]
  • Online Security and Safety Cybercrime and Internet Fraud
    Online Security and Safety While the Internet makes many everyday tasks faster and more convenient, like shopping, banking, and communicating on the go, it's important to be safe, secure, and responsible online. Protect Your Privacy and Security You can protect your computer and personal data from theft, misuse, and destruction with some basic precautions. Scams - Learn how to recognize scams and what you can do to avoid them. Computer and online security - Defend yourself against scammers, hackers, and identity thieves by protecting your information and your computer while online. If you are a parent, you should also talk to your kids about being safe and responsible online. Visit OnGuardOnline.gov for more tips for parents and children on being safe and smart online. Cybercrime and Internet Fraud Scam artists in the U.S. and around the world defraud millions of people each year by using the Internet to trick victims into sending money or giving out personal information. Types of Internet Fraud Internet crime schemes target victims using various methods. Internet auction fraud - This scheme involves the misrepresentation of a product advertised for sale on an Internet auction site or non-delivery of merchandise. Credit card fraud - Through the unauthorized use of a credit/debit card, or card number, scammers fraudulently obtain money or property. Investment fraud - This is an offer using false claims to solicit investments or loans, or providing for the purchase, use, or trade of forged or counterfeit securities. Nigerian letter or "419" fraud - Named for the violation of Section 419 of the Nigerian Criminal Code, it combines the threat of impersonation fraud with a variation of an advance fee scheme in which a letter, e-mail, or fax is received by the victim.
    [Show full text]
  • Sherlock Holmes and Forensic Accounting D. Larry Crumbley “Accounting +Intrigue= Lenny Cramer.”2 Most Accountants Are Consid
    Sherlock Holmes and Forensic Accounting * D. Larry Crumbley Sherlock Holmes is probably the most famous forensic practitioner, being a forensic chemist.1 Well at least Arthur Conan Doyle's writings were full of ideas on forensic chemistry! Another famous practitioner of forensic science was Quincy, a television pathologist who used autopsies and pathology to find murder clues. There are a number of CSI series today. A future television series may feature a forensic accountant as discussed in the Dallas Times Herald: 2 “Accounting +Intrigue= Lenny Cramer.” Most accountants are considered to be dull bean counters without many original ideas. “After all, everyone knows that bean counters are bespectacled, pale-skinned wretches who spend mind-numbing lives in dreary cubicles poring over faint computer printouts and dusty ledgers. Right?”3 Yet within recent years a bolder accountant has evolved with a suspicious mind. This forensic accountant looks behind the facade and does not accept records at their face value. Some accounting firms have built entire practices around forensic accounting. Executive recruiter Robert Half International reports increased client requests for CPAs with fraud examining skills and FBI experience.4 Some novels are using a forensic accountant as the main character. Definition of Forensic Accounting Forensic accounting covers two broad areas: litigation support and investigative accounting. The AICPA describes litigation services as "any professional assistance non- * Dr. Crumbley, CPA, CFF, MAFF, CRFAC, FCPA, is Emeritus Professor at Louisiana State University. 1 S.M. Gerber, Chemistry and Crime, American Chemical Society, 1985, preface. 2 Robert Dietz, "Accounting + Intrigue= Lenny Cramer," Dallas Times Herald, September 29, 1991, p.
    [Show full text]
  • Management - Accounting
    UNIVERSITY OF PITTSBURGH AT GREENSBURG Management - Accounting undergraduate program Management - Accounting 54 credits Bachelor of Science Core Management Courses 4 courses - 12 credits The Management - Accounting major provides a firm MGMT 0022 Financial Accounting foundation in Management as MGMT 0023 Managerial Accounting well as extensive training in MGMT 1818 Management Science INFSCI 0010 Introduction to Information Systems and Society Accounting. Accounting students are well-prepared Area Courses 2 courses - 6 credits and eligible to sit for the MGMT 1821 Introduction to Finance (required) Certified Public Accounting Choose one additional area course from the following list: exam immediately following graduation. Students are MGMT 1819 Introduction to Marketing encouraged to schedule full MGMT 1820 Operations Management MGMT 1832 Human Resources Management terms throughout their college career enabling them to Advanced Accounting Courses 6 courses - 18 credits graduate with 130-144 credit MGMT 1138 Corporate Financial Accounting hours, graduating in a position MGMT 1140 Accounting Information Systems and Financial Statement Analysis to easily obtain the 150 credit MGMT 1835 Intermediate Accounting 1 hours required for certification MGMT 1836 Intermediate Accounting 2 after passing the CPA exam. MGMT 1837 Advanced Accounting MGMT 1838 Standard Costs, Budgets, and Profit Planning Accounting Electives 2 courses - 6 credits Employment: Select two from the following list of Accounting and Management courses: MGMT 1839 Federal Income Tax Accounting 1 * Auditing/assurance MGMT 1840 Federal Income Tax Accounting 2 services MGMT 1841 Auditing * Tax services MGMT 1898 Accounting Internship * Environmental accounting Electives 3 courses - 9 credits * Forensic accounting * International accounting Take an additional three courses in Management, Accounting, Healthcare Management, or another course from the approved elective list.
    [Show full text]
  • Cybercrime: an Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
    Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Charles Doyle Senior Specialist in American Public Law October 15, 2014 Congressional Research Service 7-5700 www.crs.gov 97-1025 Cybercrime: An Overview of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008). In their present form, the seven paragraphs of subsection 1030(a) outlaw • computer trespassing (e.g., hacking) in a government computer, 18 U.S.C. 1030(a)(3); • computer trespassing (e.g., hacking) resulting in exposure to certain governmental, credit, financial, or computer-housed information, 18 U.S.C. 1030(a)(2); • damaging a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce (e.g., a worm, computer virus, Trojan horse, time bomb, a denial of service attack, and other forms of cyber attack, cyber crime, or cyber terrorism), 18 U.S.C.
    [Show full text]