Foreword |
|
xiii | |
|
The Authors |
|
xv | |
|
1 An Introduction to the Red Flag System |
|
|
1 | (14) |
|
|
1 | (3) |
|
|
4 | (3) |
|
|
7 | (2) |
|
Can You Rely on Regulators or Law Enforcement? |
|
|
9 | (3) |
|
|
12 | (3) |
|
|
15 | (6) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Criminal Fraud and Civil Fraud |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
3 The Dynamics and Root Causes of Fraud |
|
|
21 | (8) |
|
|
21 | (1) |
|
|
21 | (1) |
|
The Fraud Triangle and the Fraud Diamond |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
The Underlying Dynamics of Fraud |
|
|
23 | (1) |
|
The Fraudster's Motivation |
|
|
24 | (1) |
|
The Fraudster's Rationalization |
|
|
25 | (1) |
|
|
25 | (2) |
|
|
27 | (2) |
|
|
29 | (8) |
|
|
29 | (1) |
|
|
29 | (3) |
|
|
32 | (1) |
|
The Four Phases of the Red Flag System |
|
|
33 | (1) |
|
Phase 1---Screening for Red Flags |
|
|
33 | (1) |
|
Phase 2---Scrutinizing for Red Flags |
|
|
34 | (1) |
|
Phase 3---In-Depth Examination |
|
|
34 | (1) |
|
Phase 4---Formal Reporting/Referral |
|
|
35 | (1) |
|
|
35 | (2) |
|
5 Financial Statement Fraud |
|
|
37 | (16) |
|
|
37 | (1) |
|
What Is Financial Statement Fraud? |
|
|
37 | (1) |
|
Scope and Extent of Financial Statement Fraud |
|
|
38 | (2) |
|
What Are Financial Statements? |
|
|
40 | (1) |
|
What Are the Most Frequent Types of Financial Reporting Fraud? |
|
|
41 | (1) |
|
What Is the Motivation for Financial Reporting Fraud? |
|
|
42 | (1) |
|
How Is Financial Reporting Fraud Usually Perpetrated? |
|
|
42 | (1) |
|
|
42 | (1) |
|
How Are Net Assets Typically Manipulated? |
|
|
43 | (1) |
|
How Are Fixed Assets Typically Manipulated? |
|
|
43 | (3) |
|
How Is Inventory Typically Manipulated? |
|
|
46 | (1) |
|
How Are Accounts Receivable Typically Manipulated? |
|
|
47 | (1) |
|
How Is Cash in the Bank”r; Typically Manipulated? |
|
|
47 | (1) |
|
How Are Liabilities and Accrued Liabilities Typically Manipulated? |
|
|
48 | (1) |
|
How Are Sales Typically Manipulated? |
|
|
49 | (1) |
|
How Are Expenses Typically Manipulated? |
|
|
50 | (1) |
|
How Are Notes to Financial Statements Typically Manipulated? |
|
|
50 | (1) |
|
How Are Management Discussion and Analysis Reports Typically Manipulated? |
|
|
50 | (1) |
|
|
51 | (2) |
|
6 Red Flags for Financial Statement Fraud |
|
|
53 | (10) |
|
|
53 | (1) |
|
Types of Financial Statement Fraud Red Flags |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
Empirical Evidence: Red Flags in Financial Statement Fraud Cases |
|
|
57 | (1) |
|
Prevention versus Detection |
|
|
58 | (1) |
|
Preventing Financial Statement Fraud |
|
|
58 | (2) |
|
Reduce the Situational Pressures That Encourage Statement Fraud |
|
|
60 | (1) |
|
Reduce the Opportunity to Commit Financial Statement Fraud |
|
|
61 | (1) |
|
Reduce Rationalization of Fraud---Strengthen Employee Personal Integrity |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (8) |
|
|
63 | (1) |
|
Overview of Procurement Fraud |
|
|
63 | (1) |
|
|
64 | (1) |
|
Competitive and Noncompetitive Contracts |
|
|
65 | (1) |
|
Methods for Pricing Procurement Contracts |
|
|
66 | (1) |
|
|
66 | (1) |
|
Stages of Procurement Contracts |
|
|
67 | (1) |
|
Requirements Definition Stage |
|
|
67 | (1) |
|
Key Control Features for the Requirements Definition Stage |
|
|
68 | (1) |
|
Bidding and/or Selection Stage |
|
|
68 | (1) |
|
Key Control Features in the Bidding and/or Selection Stage |
|
|
69 | (1) |
|
Contract Performance and Evaluation Stage |
|
|
69 | (1) |
|
Key Control Features in the Performance and Evaluation Stage |
|
|
70 | (1) |
|
|
70 | (1) |
|
8 Procurement Fraud Methods and Red Flags |
|
|
71 | (18) |
|
|
71 | (1) |
|
Procurement Fraud and Its Red Flags |
|
|
71 | (1) |
|
Procurement Manipulation Schemes |
|
|
72 | (1) |
|
Collusive Bidding or Bid Rigging |
|
|
72 | (1) |
|
Red Flags of Collusive Bidding or Bid Rigging |
|
|
73 | (1) |
|
Red Flags Indicating Corruption and Bribery in the Collusive Bidding Process |
|
|
74 | (5) |
|
|
79 | (1) |
|
|
80 | (1) |
|
Red Flags That Identify Billing Schemes Suggesting Corruption, Fraud, and Theft in the Procurement Process |
|
|
81 | (2) |
|
|
83 | (1) |
|
Front-End Loading or Advance Payment Fraud |
|
|
84 | (1) |
|
|
84 | (1) |
|
Local Purchase Order or Split Purchases |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
Purchases for Personal Use |
|
|
86 | (1) |
|
Time Limitations and Restricted Advertising |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (28) |
|
|
89 | (1) |
|
Economic Impact of Bribery |
|
|
90 | (1) |
|
Negative Impact of Corruption at the Global Level |
|
|
90 | (1) |
|
Negative Impact of Corruption---Internal |
|
|
91 | (1) |
|
Bribery of Public Officials |
|
|
92 | (2) |
|
Components of Antibribery Laws |
|
|
94 | (1) |
|
Bribery as a Criminal Offense |
|
|
94 | (1) |
|
Corporate Criminal Liability versus Individual Criminal Liability |
|
|
95 | (1) |
|
Legal Entity View versus Conglomerate View |
|
|
96 | (1) |
|
Criminalization of Facilitation Payments |
|
|
96 | (1) |
|
Application of Antibribery Laws |
|
|
96 | (1) |
|
Definition of a Public Official |
|
|
97 | (1) |
|
Extent of Monetary Penalties |
|
|
97 | (2) |
|
Money Laundering to Conceal Corrupt Payments |
|
|
99 | (1) |
|
Secret Commissions or Bribes to Nonpublic Officials |
|
|
100 | (2) |
|
Secret Commissions as a Criminal Offense |
|
|
102 | (2) |
|
Schemes Used to Pay Unlawful Benefits |
|
|
104 | (2) |
|
Bribes Paid with Funds under Direct Control of the Corporation---Using Secret Off-Book Funds |
|
|
106 | (2) |
|
Using Lawyers to Channel Corrupt Payments to Public Officials or Private-Sector Decision Makers |
|
|
108 | (4) |
|
Arrangements with Foreign Agents and Consultants |
|
|
112 | (1) |
|
Using Local Importers in Foreign Jurisdictions |
|
|
113 | (1) |
|
Bribes Paid with Funds under the Control of Intermediaries |
|
|
114 | (1) |
|
Using Foreign Subcontractors or Joint Venture Partners to Pay the Bribe |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
10 Fraud and Money Laundering |
|
|
117 | (10) |
|
|
117 | (1) |
|
|
117 | (1) |
|
Development of Money Laundering Laws |
|
|
118 | (3) |
|
What Is Money Laundering? |
|
|
121 | (2) |
|
Fraud and Money Laundering |
|
|
123 | (1) |
|
Creating and Operating Undisclosed or Offshore Corporations |
|
|
124 | (1) |
|
Creating and Operating Undisclosed or Offshore Trusts |
|
|
124 | (1) |
|
Creating and Operating Undisclosed or Offshore Bank Accounts |
|
|
124 | (1) |
|
Undisclosed Insider Beneficial Relationships |
|
|
125 | (1) |
|
Creating Fictitious Records to Enhance this Offshore Activity |
|
|
125 | (1) |
|
|
125 | (2) |
|
11 High-Risk Corporate Activities and Market Manipulation |
|
|
127 | (8) |
|
|
127 | (1) |
|
High Risk with Start-Up Corporations |
|
|
127 | (1) |
|
|
128 | (5) |
|
Market Manipulation and Start-Up Corporations---Red Flags |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (10) |
|
|
135 | (1) |
|
|
136 | (2) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
The Bennett Funding Group |
|
|
141 | (1) |
|
Why Pyramid Schemes Are a Concern |
|
|
141 | (1) |
|
Red Flags---Pyramid Schemes |
|
|
142 | (3) |
|
13 Fraud and the Absence of Good Governance |
|
|
145 | (8) |
|
|
145 | (1) |
|
Governance and Good Governance |
|
|
146 | (1) |
|
Duties and Responsibilities of a Board of Directors |
|
|
146 | (2) |
|
Good Governance and Tone at the Top |
|
|
148 | (3) |
|
Structure and Reliable Decision-Making Processes |
|
|
151 | (1) |
|
Accountability and Transparency |
|
|
151 | (1) |
|
|
151 | (2) |
|
14 The Board of Directors and Its Responsibility to Safeguard the Organization |
|
|
153 | (24) |
|
|
153 | (1) |
|
|
153 | (1) |
|
Directors' Duties and Responsibilities |
|
|
154 | (2) |
|
Common Law and Civil Law Systems |
|
|
156 | (2) |
|
Corporate Law---United States |
|
|
158 | (1) |
|
|
159 | (2) |
|
Corporate Law---European Union |
|
|
161 | (1) |
|
Duty of Care, Diligence, and Skill |
|
|
161 | (1) |
|
Roles and Responsibilities in Practice |
|
|
162 | (1) |
|
Due Diligence in Oversight Role |
|
|
163 | (2) |
|
Internal Control over Financial Reporting |
|
|
165 | (2) |
|
Fraud and Compliance Controls |
|
|
167 | (1) |
|
High-Risk Procurement and Sales Contracts |
|
|
168 | (1) |
|
|
169 | (2) |
|
|
171 | (4) |
|
|
175 | (2) |
|
15 Enterprise Risk Management, Fraud Risk Management, and Compliance Risk Management |
|
|
177 | (48) |
|
|
177 | (1) |
|
Enterprise Risk Management |
|
|
177 | (2) |
|
|
179 | (1) |
|
The Width Dimension of ERM |
|
|
179 | (1) |
|
The Height Dimension of ERM |
|
|
180 | (15) |
|
The Depth Dimension of ERM |
|
|
195 | (1) |
|
|
195 | (2) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (3) |
|
|
203 | (1) |
|
Fraud Risk Control Activities |
|
|
203 | (1) |
|
|
203 | (2) |
|
|
205 | (3) |
|
|
208 | (1) |
|
Information and Communication |
|
|
209 | (1) |
|
|
210 | (1) |
|
Compliance Risk Management |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
211 | (2) |
|
|
213 | (1) |
|
|
214 | (3) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
Information and Communication |
|
|
219 | (1) |
|
|
220 | (1) |
|
Reality Check---Coso ERM Implementation |
|
|
221 | (1) |
|
Status of ERM Implementation |
|
|
221 | (1) |
|
Risk Appetite and Residual Risk |
|
|
222 | (1) |
|
Inadequate Design of the Risk Management Process |
|
|
222 | (1) |
|
|
223 | (2) |
|
16 The Board of Directors---First Line of Defense against Fraud and Corruption |
|
|
225 | (12) |
|
|
225 | (1) |
|
Red Flags and Directors' Responsibilities |
|
|
225 | (5) |
|
Lessons from Enron and WorldCom |
|
|
230 | (5) |
|
|
235 | (2) |
|
17 Screening, Scrutinizing, and Investigating Red Flags |
|
|
237 | (12) |
|
|
237 | (1) |
|
When to Screen for Red Flags |
|
|
237 | (2) |
|
Screening for Red Flags---The Budget |
|
|
239 | (1) |
|
Screening for Red Flags---Financial Reports and Project Reports |
|
|
239 | (1) |
|
How to Ask Questions in the Right Manner |
|
|
240 | (4) |
|
|
244 | (1) |
|
Screening Complaints for Red Flags |
|
|
245 | (1) |
|
|
245 | (1) |
|
Role of Internal Auditors |
|
|
246 | (1) |
|
Incentives to Investigate Properly |
|
|
247 | (2) |
Conclusion |
|
249 | (4) |
Appendix A Summary of Red Flags |
|
253 | (12) |
Appendix B Glossary |
|
265 | (20) |
Index |
|
285 | |