Using Lifestyle Analysis to Find Hidden Income and Assets

Forensic accountants have many tools to help them find evidence of hidden assets or fraud. But one of the most effective, particularly in divorce matters or legal disputes with former business partners, is using lifestyle analysis to find hidden income and assets. This method involves developing a financial profile of a subject and then examining mismatches between the person’s known resources and lifestyle. Financial profiling Forensic accountants develop a financial profile of a subject by examining: Bank deposits. The expert reconstructs the subject’s income by analyzing bank deposits, canceled checks and currency transactions, as well as accounts for cash payments from undeposited receipts and non-income cash sources, such as gifts and insurance proceeds. Expenditures. Here, the expert analyzes the subject’s personal income sources and uses of cash during a...

Getting the Goods on Inventory Theft

Maybe the numbers didn’t add up during your company’s recent inventory count. You know that most inventory discrepancies are the result of honest mistakes, such as when employees return items to the wrong shelves or customer returns are flubbed. It’s even possible that you’ve made a mistake and need to perform a recount. But if you suspect something more sinister — such as employee theft — don’t hesitate to call in reinforcements. A forensic accountant can assist in getting the goods on inventory theft.  Where the clues are  When fraud experts can’t find “innocent” explanations for missing inventory, they look at the business’s culture and environment. Poor controls over purchasing, receiving and cash disbursement puts companies at higher risk of employee theft. And if one person performs...

Factoring Fraud Risk into a Business Valuation

Business value is a function of risk and return. This is why, when appraising companies, valuation experts are always factoring fraud risk into a business valuation. Although valuations typically aren’t designed to unearth dishonest behavior, experts may expand the scope of their engagement if they spot something suspicious — particularly if they believe financial statements are inaccurate. Possible risks  A valuator’s fraud risk assessment starts with the subject company’s internal controls. When interviewing management, experts ask about the business’s policies and procedures to protect assets, improve operating efficiency and ensure reliable financial statements. For example, they look for risk-reducing controls such as: Physical and digital controls (for example, locks, passwords, cameras and security systems),  Fraud training programs,  Job descriptions that call for segregation of duties and job...

How Online Sellers Use Brushing

Reports started trickling into state agricultural agencies in July: Consumers were worried about strange seed packets they had received in the mail. The unsolicited goods weren’t labeled and appeared to be sent from China. In a year already fraught with anxiety and paranoia, the story quickly made headlines. Perhaps this was the first you’d heard of a scam known as “brushing,” in which some third-party e-commerce sellers set up fake buyer accounts and ship unordered goods (in this case, seeds) to “customers.” Why would they do this? Read on.  A growing fraud  Brushing scammers set up fake accounts with Amazon, eBay and other online platforms so that they can order their own merchandise, ship it to a real address and then post glowing reviews that bolster their ratings....

3 Steps Experts Follow When Investigating Fraud

When business owners suspect that an employee is stealing assets or manipulating financial results, it’s time to call a fraud expert to investigate. Although the complexity of the incident will determine the investigation’s scope, there are 3 steps experts follow to build a fraud case that can stand up in court. Conducting interviews Fraud interviewers know how to spot warning signs, detect deception and pin down suspicions when talking with suspects and their coworkers. But they usually start with management interviews, by asking owners, executives and audit committee members what they know about: Possible fraud ploys, The company’s fraud risks, and Internal controls that have been implemented to mitigate specific fraud risks or to generally help prevent, deter and detect fraud.  An expert may interview not...

Unmasking Fraud During This Economic Downturn

Fraud tends to flourish during periods of prosperity. The reason is simple: When companies experience fast-growing revenues and rising net profits, they may lack a strong incentive to divert resources to preventing and detecting fraud. Fraud schemes can go undetected for months, even years. Furthermore, the sheer volume of legitimate transactions during thriving economic times makes it harder to detect fraudulent transactions. Normally, an economic slowdown correlates with increased fraud detection. But the COVID-19 pandemic has upended normal expectations. Companies may need to find new methods of unmasking fraud. Fraud continues … and even grows  With millions of employees working from their homes, there are fewer people in the office to notice and report irregularities. And many managers are too distracted with crisis-related activities to perform the proper...

Journal Entries May Signal Financial Statement Fraud

With a median loss of $954,000, financial statement fraud is the costliest type of white-collar crime, according to the Association of Certified Fraud Examiners. Fortunately, auditors and forensic accountants may be able to detect inflated income and other financial manipulation by testing journal entries. Unearthing suspicious entries  Financial statement frauds come in many forms. For example, out-of-period revenue can be recorded to inflate revenue. Repair costs can be improperly capitalized as fixed assets to boost earnings. Accounts payable can be understated by recording post-closing journal entries to income. Or expenses can be reclassified to reserves and intercompany accounts, thereby increasing earnings. To detect these types of scams, auditors: Learn about the company’s financial reporting process and controls over journal entries,   Identify and select journal entries and other adjustments...

How to Protect Your Investment Accounts from Fraud

Because the average investment account boasts a much larger balance that a typical checking or savings account, cybercriminals are particularly interested in hacking them. Financial institutions are largely responsible for ensuring the security of these accounts, but business customers and consumers also should adopt defensive measures. Here are five recommendations for how to protect your investment accounts from fraud. Select two-step authentication. Most financial service providers give customers the option of using a two-step verification process to prevent unauthorized access to their accounts. A two-step approach requires you both to log in to your account with a password and to verify your identity with, for example, a one-time code sent to your mobile phone. Choose complex and unique passwords. Criminals often gain access to bank...

How Fraudsters Steal Unemployment Benefits

When Congress authorized an additional $600 in monthly unemployment benefits as part of the CARES Act, out-of-work Americans weren’t the only ones it helped. Criminals have descended like locusts on state unemployment insurance agencies.  How fraudsters steal unemployment benefits is by using stolen identities to fraudulently claim both standard benefits and the additional funds administered by the Pandemic Unemployment Assistance (PUA) program. States have lost hundreds of millions of dollars. Individuals have also suffered, as government efforts to control fraud have clogged up benefit systems and delayed payments to the jobless. States struggle Washington state was the first to experience a COVID-19 outbreak and has since estimated losses of $650 million to unemployment insurance fraud. According to the Secret Service, a scam was detected when someone noticed...

Protect Customer Data When Working Virtually

With cyberthieves active during COVID-19, the Internal Revenue Service and its Security Summit partners today urged tax professionals and other business owners to review critical security steps to ensure they protect customer data when working virtually.  Many tax professionals and other businesses have expanded telework options this year as firms and other businesses work to keep personnel safe, practice recommended safety guidelines and use technology to serve their clients/customer virtually. (This post is excerpted from IRS Information Release (IR) 2020-167 issued 7/21/20.) During this period, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) have urged organizations to maintain a heightened state of alert as cybercriminals seek to exploit Covid-19 concerns. To assist businesses with the security basics, the IRS, state tax agencies and nation's tax...