Page 111 - JoFA_2022
P. 111

FRAUD




                          4.  You have been hired to audit the financial   a.  The financial statements do not include a dis-
                            statements of Notreal Industries, a large,   closure regarding a well-publicized, high-dollar-
                            multi-industry company that plans to go   value employment lawsuit that is currently under
                            public. Which of the following observations   settlement negotiations.
                            about Notreal’s financial statement disclosures   b.  The financial statements include a disclosure
                            might be a red flag of inappropriate      regarding a material transaction with an-
                            financial reporting?                      other company that is owned by one of Not-
                                                                      real’s directors.
                                                                    c.  The financial statements include a disclosure ex-
                                                                      plaining a large variance in depreciation expense
                                                                      as due to changes in the estimated lifetime of a
                                                                      major asset.
                                                                    d.  The financial statements do not include a disclo-
                                                                      sure regarding sales to a foreign government that
                                                                      make up 5% of Notreal’s total revenue.
                          5.  The fraud risk assessment should do all of the   a.  Analyze both internal and external fraud
                            following EXCEPT:                         risk factors.
                                                                    b.  Specifically consider the risk of management
                                                                      override of controls.
                                                                    c.  Determine the personnel or departments most
                                                                      likely to commit fraud.
                                                                    d.  Be conducted independent of organization-
                                                                      al management.

                          ANSWERS
                          1. (d) Business identity theft occurs when a   same building and on the same floor as the victim
                          fraudster hijacks a business’s identity to commit   organization; then fraudulently obtain credit, loans,
                          financial fraud. Small businesses are especially at risk   goods, and services using its name; and finally vacate
                          for this type of fraud because they have assets that   the space once credit maximums have been reached.
                          fraudsters are seeking to obtain (e.g., lines of credit,
                          capital) but often lack the necessary resources to   2. (b) In a fraud investigation, interviews should
                          protect themselves.                       take a bull’s-eye approach, moving from the outer
                            One way this type of fraud can be perpetrated   rings — those individuals with knowledge related
                          is by a fraudster’s using a business’s EIN, which is   to the allegations but who are not complicit in the
                          generally public information, to report false income   suspected scheme — inward based on how likely
                          and withholding on an individual tax return. The   the individuals are to be involved in the offense.
                          fraudster then receives a tax refund, even though he   In general, that typically results in the following
                          or she never worked for the victim organization.  interview order:
                            Another method involves fraudulently reg-  1.  Neutral third-party witnesses, or individuals who
                          istering an existing business in a different state   might have relevant information but who are not
                          to conduct fraudulent activities unbeknownst to   directly involved in the specific instance under
                          the original, authentic business. Although busi-  investigation, such as Henry.
                          ness registrations are public information, original   2.  Corroborative witnesses, or individuals who can
                          business owners are not automatically notified when   corroborate facts related to the offense under
                          their business has been registered in another state.   investigation, but who are not suspected to be
                          This allows fraudsters to easily impersonate an   directly involved, such as Katrina.
                          authentic company and conduct fraudulent business   3.  Co-conspirators, or individuals who are sus-
                          on its behalf.                              pected of playing a role in the scheme but who
                            Fraudsters can also commit business identity   are likely not the primary suspect, such as James.
                          theft by closely mirroring an organization’s address   4.  The primary suspect, or the individual who is
                          in a bid to confuse creditors and inventory suppliers.   suspected of being the most complicit in the
                          In this scheme, fraudsters rent office space in the   scheme, such as Mary-Ellen.

         18    |   Journal of Accountancy                                                           March 2022
   106   107   108   109   110   111   112   113   114   115   116