ACC 423. 4-4 Case Study An Unholy Trinity
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
423
Subject
Accounting
Date
Nov 24, 2024
Type
docx
Pages
6
Uploaded by Barbara8289
1
An Unholy Trinity
Harriet Creyer
4-4 Case Study: An Unholy Trinity
Southern New Hampshire University
ACC 423 Detection/Prevention Fraud Financial Statements
2
An Unholy Trinity
An Unholy Trinity: Three Ways Employees Embezzle Cash
What schemes were committed by each fraudster?
•
Albert Miano
Miano was a supervisor and a long-term employee in a painting department and embezzled $1,057,000.00 and created “phony invoices for painting contractors who didn’t exist, forged the approval of a Vice President, and deposited the proceeds into his own bank account” (Wells, n.d). There are several red flags that were missed during this case; he was submitting falsified invoices to shell company which had ‘contactors’ who didn’t exist, he had also forged signatures from the Vice President to allow authorisation. This fraud could have been prevented with internal controls with would have allowed policies and procedures in place to ensure all invoices go through various channels, a segregation of duties and potentially a tip line. Someone would have seen the increased lavish lifestyle and would of potentially reported it. For this case I believe there were 2 parts of the fraud triangle that came into play with this, Opportunity, and Financial Pressure. The opportunity he says that the invoices weren’t being checked or reviewed for the payment to be authorized, as for the financial pressure, Miano saw that he could gain considerable money which would allow him to give him a lifestyle that he wouldn’t have necessarily had previously. •
Bill Guardo
Guardo was a “branch manager of a consuming loan finance company” (Wells, n.d), he stole approximately $22,000 during a cash larceny scheme that consisted of Theft of deposits. He “
he had been stealing money from the deposits he took to the bank on a daily basis” (Wells, n.d). It’s not clear within the report what Guardo did with the extra funds. It wasn’t until a fake idea of an internal audit that made Guardo panic and
3
An Unholy Trinity
therefore resign. The red flags from this case would have been the lack of funds within the banking deposits and possibly the increase lifestyle that Guardo started to live. There would have been several internal controls that could have prevented this, 1 of these would have been segregation of duties, allowing 1 person to prepare the deposits and another person to double check would of but a stop to this before it started. Also, another prevention method would have been regular internal audits, knowing that internal audits would have been a regular thing would have again prevented this before
it started. As for the fraud triangle I think there could be aspects of the triangle; Guardo
saw an opportunity of the lack of controls and allowed himself to adjust the deposits. It
is unsure if he was suffering from financial pressure or if it was done out of greed. •
Brian Lee
Dr. Lee was a “top-notch plastic surgeon….. took quiet pride in his beautification efforts, which included nose jobs, liposuction, face lifts, and breast enhancements. Lee worked for a large physician-owned clinic in the southwestern U.S.
” (Wells, n.d). Dr. Lee embezzled “several hundred thousand dollars” (Wells, n.d) by skimming customer payments that had not been recorded by the clinic. He was able to skim the customers by telling them to pay him directly without going through the clinic. Skimming from unrecorded sales is an extremely difficult fraud to detect. One of the biggest red flags from this case that the differences between the number of customers coming through Dr. Lee’s room and the surgical log, and the number of recorded clients. An internal control that may have prevented this fraud is having regular audits of the hospital's surgery logs to the cash receipts journal. Lack of internal controls gave Lee the opportunity to commit fraud. The motivating factor in this case admitted by Lee was pure
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
An Unholy Trinity
greed (Wells, n.d.). Finally, the rationalization and opportunity for this crime would most likely center around his ego and the thought that he wouldn’t get caught •
Bruce Livingstone
Livingstone started his fraudulent crime stint by creating fraudulent expense reimbursement after requesting to be reimbursed by the medical college after a personal trip. “
The situation came to light when the bogus travel expense voucher landed on the desk of that very same senior female auditor for approval.” (Wells, n.d). Livingstone was also caught selling the dental tools to the students at the medical college from the back door and keeping the funds obtained for himself. Some of the red flags for this scheme were the inconsistencies of the expenses from Livingstone and who actual went with him. The inventory scheme he ran with the dental tools were not discussed in detail within this report. Some of the ways this could have been prevented was internal controls and checks to ensure that the expense reports were actually checked rather than just signed for. The inventory scheme could have been prevented id an internal audit of inventory was done; it would have shown discrepencies within the inventory logged and the physical inventory. Like with the last cases the opportunity from the fraud triangle was there, Livingstone saw the opportunity to hide taking his girlfriend of work trips knowing that the expense reports were only signed and not reviewed. Rationalization that the dental tools wouldn’t have been missed allowed him to take the financial. Gain and sell them.
•
Cheryl Brown
Brown was Bruce Livingstone’s assistant at the medical college, and she was part of a billing scheme. She had set up a shell company and billed the college invoices to pay the shell company and allowing her to fraudulently claim “$63,000” (Wells, n.d).
5
An Unholy Trinity
Some of the red flags from Brown’s case was the number of invoices going to a PO Box, The lack of professionalism from the invoicing with either lack of information or the number of items. One of the ways this could have been prevented was the need for internal controls and vendor checks, if the vendors had been checked after say 2/3 recurring invoices then someone would have noticed the problems sooner. The biggest part of the fraud triangle within this case was financial pressure, Brown had admitted that her and her husband were drug addicts, and they needed the money to help fund their addiction.
6
An Unholy Trinity
References
Wells, J. T. (n.d.).
[PDF] an unholy trinity: The Three Ways Employees Embezzle cash - free download PDF
. [PDF] An Unholy Trinity: The Three Ways Employees Embezzle Cash - Free Download PDF. Retrieved January 29, 2023, from https://nanopdf.com/download/an-unholy-trinity-the-three-ways-
employees-embezzle-cash_pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Related Questions
Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?
arrow_forward
Answer multi choice question in photo please
arrow_forward
1. A local bank reported that it lost $150,000 as the result
of employee fraud. Ray Fairburn is not clear on what
is meant by "employee fraud." Explain the meaning of
fraud to Ray and give an example of fraud that might
occur at a bank.
arrow_forward
Situational(Accidental) vs Predatory Fraud
The two main categories of fraudsters are predatory and situational (accidental). Distinguish between these two categories of scammers.
Analyze the different instruments and methods that criminals frequently use to transfer funds related to money flow concealment.
Make sure to reply to a minimum of one post made by your peers.
arrow_forward
The fraud triangle asserts that the following three factors must exist for a person to commit fraud. A. Opportunity B. Pressure C. Rationalization. Identify the fraud risk factor (A, B, or C) in each of the following situations.
arrow_forward
Evidence collection process in a fraud case
Instructions
1. Analize the following information:
Indirect methods of income from unknown sources
Assume that the following information is derived from reliable sources:
Net Worth
Lifestyle Approach
Income from Known Sources
Description
Amount
Asset
Liability
Sources
Application
Boat
25,000
Boat Loan
20,000
Boat Loan Payments
5,000
Car
40,000
Car Loan
40,000
Car Loan Payments
2,000
Deposit to bank account
400,000
Dividends reported on Tax Retun
5,000
Down Payment Boat
12,000
Down payment Car
7,000
Down Payment Time share
6,000
Down Payment Vacation home
15,000
House
275,000
Home equity loan
35,000
Home Equity Loan Payments
4,000
Income on Tax Return
1,000
Mortgage
200,000
Mortgage payments
3,000
Mutual…
arrow_forward
Evidence collection process in a fraud case
Instructions
1. Analize the following information:
Indirect methods of income from unknown sources
Assume that the following information is derived from reliable sources:
Net Worth
Lifestyle Approach
Income from Known Sources
Description
Amount
Asset
Liability
Sources
Application
Boat
25,000
Boat Loan
20,000
Boat Loan Payments
5,000
Car
40,000
Car Loan
40,000
Car Loan Payments
2,000
Deposit to bank account
400,000
Dividends reported on Tax Retun
5,000
Down Payment Boat
12,000
Down payment Car
7,000
Down Payment Time share
6,000
Down Payment Vacation home
15,000
House
275,000
Home equity loan
35,000
Home Equity Loan Payments
4,000
Income on Tax Return
1,000
Mortgage
200,000
Mortgage payments
3,000
Mutual…
arrow_forward
Chapter 3 of the textbook discusses many methods individuals can use to communicate financial statement information to stakeholders in a fraudulent manner.
Choose one method and explain how perpetrators use it.
Which of the three “M’s of financial reporting fraud does this method fall under?
Cite a case related to the method.
arrow_forward
The Laundry Money Skim The case below tells the actual story of a cash embezzlement scheme. The case has two major parts: (1) problem and (2) audit approach. For the case, please consider how the auditor may have discovered the cash embezzlement scheme.ProblemAlbert owned and operated 40 coin laundries around town. As the business grew, he could no longer visit each one, empty the cash boxes, and deposit the receipts. Each location grossed about $140 to $160 per day, operating 365 days per year—gross receipts of about $2 million per year. Each of four part-time employees visited 10 locations, collecting the cash boxes and delivering them to Albert’s office where he would count the coins and currency (from the change machine) and prepare a bank deposit. One of the employees skimmed $5 to $10 from each location visited each day.The daily theft does not seem like much, but at an average of $7.50 per day from each of 10 locations, totaled about $27,000 per year. If all four of the…
arrow_forward
3. Billy Goodshoes
Billy Goodshoes is one of two Accounting Department assistant managers at Kvetch Textiles, Inc. Last week Billy noticed that Sam Clueless, the other assistant manager who is in charge of petty cash disbursements, among other things, withdrew what appeared to be a sizeable amount of currency from the fund without inserting a voucher to evidence withdrawal. Billy didn’t think much of it until the internal auditors detected a $100 discrepancy during their recent count of petty cash. Billy was told by one of the auditors that these discrepancies had been increasing in frequency and amount over a number of months. According to the auditor, Sam had explained the differences as due to lax documentation procedures on his part. Sam promised to begin a new program whereby funds would not be disbursed in the future until petty cash vouchers were submitted and approved in advance.
Question: Assume you are Billy Goodshoes. You have No obligations in this case.
Group of…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning

Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Related Questions
- Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardAnswer multi choice question in photo pleasearrow_forward1. A local bank reported that it lost $150,000 as the result of employee fraud. Ray Fairburn is not clear on what is meant by "employee fraud." Explain the meaning of fraud to Ray and give an example of fraud that might occur at a bank.arrow_forward
- Situational(Accidental) vs Predatory Fraud The two main categories of fraudsters are predatory and situational (accidental). Distinguish between these two categories of scammers. Analyze the different instruments and methods that criminals frequently use to transfer funds related to money flow concealment. Make sure to reply to a minimum of one post made by your peers.arrow_forwardThe fraud triangle asserts that the following three factors must exist for a person to commit fraud. A. Opportunity B. Pressure C. Rationalization. Identify the fraud risk factor (A, B, or C) in each of the following situations.arrow_forwardEvidence collection process in a fraud case Instructions 1. Analize the following information: Indirect methods of income from unknown sources Assume that the following information is derived from reliable sources: Net Worth Lifestyle Approach Income from Known Sources Description Amount Asset Liability Sources Application Boat 25,000 Boat Loan 20,000 Boat Loan Payments 5,000 Car 40,000 Car Loan 40,000 Car Loan Payments 2,000 Deposit to bank account 400,000 Dividends reported on Tax Retun 5,000 Down Payment Boat 12,000 Down payment Car 7,000 Down Payment Time share 6,000 Down Payment Vacation home 15,000 House 275,000 Home equity loan 35,000 Home Equity Loan Payments 4,000 Income on Tax Return 1,000 Mortgage 200,000 Mortgage payments 3,000 Mutual…arrow_forward
- Evidence collection process in a fraud case Instructions 1. Analize the following information: Indirect methods of income from unknown sources Assume that the following information is derived from reliable sources: Net Worth Lifestyle Approach Income from Known Sources Description Amount Asset Liability Sources Application Boat 25,000 Boat Loan 20,000 Boat Loan Payments 5,000 Car 40,000 Car Loan 40,000 Car Loan Payments 2,000 Deposit to bank account 400,000 Dividends reported on Tax Retun 5,000 Down Payment Boat 12,000 Down payment Car 7,000 Down Payment Time share 6,000 Down Payment Vacation home 15,000 House 275,000 Home equity loan 35,000 Home Equity Loan Payments 4,000 Income on Tax Return 1,000 Mortgage 200,000 Mortgage payments 3,000 Mutual…arrow_forwardChapter 3 of the textbook discusses many methods individuals can use to communicate financial statement information to stakeholders in a fraudulent manner. Choose one method and explain how perpetrators use it. Which of the three “M’s of financial reporting fraud does this method fall under? Cite a case related to the method.arrow_forwardThe Laundry Money Skim The case below tells the actual story of a cash embezzlement scheme. The case has two major parts: (1) problem and (2) audit approach. For the case, please consider how the auditor may have discovered the cash embezzlement scheme.ProblemAlbert owned and operated 40 coin laundries around town. As the business grew, he could no longer visit each one, empty the cash boxes, and deposit the receipts. Each location grossed about $140 to $160 per day, operating 365 days per year—gross receipts of about $2 million per year. Each of four part-time employees visited 10 locations, collecting the cash boxes and delivering them to Albert’s office where he would count the coins and currency (from the change machine) and prepare a bank deposit. One of the employees skimmed $5 to $10 from each location visited each day.The daily theft does not seem like much, but at an average of $7.50 per day from each of 10 locations, totaled about $27,000 per year. If all four of the…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub

Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning

Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub