Nathan Mueller’s employer, ReliaStar was acquired by the large insurance company ING in 2000. Mueller had a deep understanding of accounting systems and was in charge of transitioning his old employer to the new ERP system. Mueller learned “all aspects of the ERP system including financial reporting, journal entries, and most importantly, checks and wire payment processing” (“Lessons Learned,” 2014). Mueller was an accounting manager of the reinsurance division at one of ING’s offices. He stole almost $8.5 million in a little over four years. Mueller’s department at ING was the reinsurance division, which gave him the ability to approve company checks of up to $250,000. He embezzled this significant amount of money from his employer by requesting …show more content…
checks paid out to made up vendors, then depositing the checks into either his own bank account or a dummy account. Mueller’s worked in the accounting department of his division. The accounting department consisted of 6 employees and Mueller was one of three in his division that could request checks. To add to the opportunity to embezzle, he could log-in as another employee and request a check, while approving it using his own account. This allowed Mueller and other employees to have access to each other’s computers and have the authorization to request checks. It was the subordinate’s job to collect the printed checks before being mailed off to clients. Mueller would request a check the day before the subordinate took a day off, or give the subordinate the day off, so he could collect the checks and remove the one written to pay off his credit card bills. In June 2003, Mueller had $88,000 of credit card debt. His credit card company had the name “Universal” in it, and Mueller came up with a strategy to write a check on behalf of his company paid out to “Universal” as a scheme to pay off his debt. The checks went undetected because one of ING’s customers had “Universal” as part of its name. Mueller started by embezzling small amounts then increased the amount as he became more confident that no one knew that he was defrauding the company. One of Mueller’s fraudulently approved checks was bounced back to the head accounts payable department in Atlanta because he forgot to put his personal credit card number on the check. The accounts payable department did not raise eyebrows, but sent the check back to the requester, which was Mueller. This event stopped Mueller temporarily, but financial pressures and opportunity triggered him to commit fraud again. Mueller knew he had to be smarter as to prevent a check being returned to the A/P department.
He created a dummy company so he could write checks out to that company and use the stolen money for his own purposes. Mueller did not have to create a client name in ING’s accounting system because ING already did a lot of business with a company with “Ace” in its name. Using this system, Mueller embezzled about $8 million in a four-year period. The fraud was concealed by hiding the debits in an expense-type ledger account with lots of reconciliation activity. Furthermore, Mueller was undervaluing the Canadian dollar when recording ING investment income from Canadian investments. Segregation of duties was severely lacking because Mueller was the only one reconciling this account for seven years. According to the article, ING’s accounting system had “thousands of journal entries and billions of dollars of transactions” (“Lesson’s Learned,” …show more content…
2014). Mueller needed an explanation for the money he used to buy luxury cars, trips, and watches. Employees at work noticed his lavish lifestyle beyond his pay grade, but did not raise suspicions. Employees trained in fraud awareness and having an effective fraud reporting system could have stopped this fraud earlier. Furthermore, the accounts payable department in Atlanta could have inspected the returned check. It should have looked odd that a credit card company was being billed to a single account with Mueller’s work address. Setting up the role for a risk management person to review “abnormal interactions with outside parties” (“Lessons Learned,” 2014) can help companies detect possibly fraudulent activities or at least detect abnormal interactions. Mueller rationalized his behavior because his income was not enough to pay all his and his pregnant wife’s bills. Also, college loans needed to be paid. Financial pressure and lack of internal controls and segregation of duties presented Mueller a huge opportunity to embezzle. Employees should He was not caught until a coworker became suspicious from talking with Mueller’s ex-wife about his “gambling winnings.” Mueller told his family, friends, and coworkers, that he was an extremely successful gambler, hitting several jackpots. He would first wire money to Vegas, then fly down there first class, carrying back up to $100,000 in so-called gambling winnings. His reluctance to confess to his wife triggered a divorce in 2006. The coworker who caught Mueller’s fraud performed a query running all the checks she supposedly approved. This query red-flagged ten “Ace” checks totally $1 million that she did not request. The coworker reported the finding to her supervisor. One morning in 2007, Mueller’s bossed asked him for the supporting vouchers for the Ace checks. Mueller was able to delay the meeting a day, but another meeting with the boss and subordinate exposed the fraud when Mueller ran out of the office. Fraud investigators ranged Mueller’s doorbell, ending with Mueller stating he needs to talk with his attorney. Mueller eventually pleaded guilty to fraud, sentenced to 8 years in prison.
For good behavior and completing a drug abuse for alcohol, he is due released only after about five and a half years in prison. A lot of systems were missing or manipulated to commit the fraud. ING top management should be aware that Mueller knows all the inner workings of his division’s ERP system and that the opportunity for fraud is stronger. He also had full authority to request and approve checks, while simultaneously writing associated journal entries to conceal the embezzlement. Segregating the operational duties from the recordkeeping responsibilities is a way that could have prevented this fraud. Authentication controls put in place to restrict access to other employer’s computers would have prevented Mueller from impersonating the subordinate or coworker. A lower limit should have also been placed on Mueller’s approval authority of
$250,000. A new-hire procedure for a credit check could have highlighted that he was strapped for cash. Also, an effective tip-line where is ex-wife could have called in an expressed her thoughts about her former husband’s abnormal behavior may have drawn some red-flags that a fraud was occurring. It may have been hard for an internal audit or outside audit to catch the fraud because Mueller did not make up dummy names in the system and hid the change in debits to a reconciliation account. Also, the entries did not look unusual because the account had thousands of journal entries. Having a strong tone at the top for fraud prevention could have eliminated or stifled the opportunity Mueller had for embezzlement. Procedures were simply missing to prevent embezzlement. Management at IGN should have conducted an interview or had a transition process after the acquisition highlighting Mueller’s deep understanding of the company ERP system. A segregation of duties and strong internal controls, including preventing an employee to log-in as another employee, would have prevented the fraud. Furthermore, an analytical procedure reviewing variances in the reconciliation account may have potentially red-flagged some abnormal activity. Moving forward, IGN can implement these procedures in the division that was victim to the fraud and communicate the importance of creating a culture that is not scared to report fraud and punish those who commit fraud criminally and civilly.
Debra became the assistant vice-president and manager of energy lending of a Canadian Western Bank on January 31, 2006. Within a month Debra set up her embezzlement scam by creating two corporations that the embezzled funds would be funnelled too. Debra set up an account in a woman’s name using the woman’s GIC (guaranteed investment certificate) which was worth 8 million dollars. Debra started with 100,000 dollars in a line of credit using the woman’s name and increased it 6 times until the line of credit reached $950,0000 on November 6, 2007. Additionally, Debra arranged for 5 new accounts in the same woman’s name with a total deposit of $16.4 million. Debra made 72 unauthorized withdrawals from the fake account in the two year time frame of the scam. She kept the scam going by transferring money from the
So just how did Scott Welch fit the profile of the average perpetrator? Based off the information reported by the Association of Certified Fraud Examiners’ (ACFE) 2010 Report to the Nation, Welch fit directly into the median for a perpetrator – he was male, between the ages of 46 – 50, had a tenure of at least 6 – 10 years, an executive position as a Vice President. According to the ACFE’s report a perpetrator’s position within the company, age, tenure, gender and education level all have a have consideration in a fraud. In the 2010 report, it is noted that 66.7% of all frauds are perpetrated by men, more than likely due to the fact that more men hold a position of authority. Of the cases studied, 74% of all managers and 88% of all owners/executives were men (Association of Certified Fraud Examiners (ACFE), 2010). The combination of Welch’s tenure and authoritative position may have exacerbated the losses suffered by Wachovia and may also have helped him hide the fraud from detection for an extended period of time of eight years (“Former Wachovia,” 2011). This period is well above and beyond the 24 months reported by the ACFE as the median time frame in which frauds perpetrated by executives/owners were detected (ACFE, 2010). Taking into consideration all the kn...
I believe that asset misappropriation by accounts payable fraud is occurring at Wayland Manufacturing Company due to a lack of proper internal controls. Making the company’s Chief Accountant responsible for additional day-to-day functions provides him with opportunity to commit by creating fictitious vendors with his information and then creating fictitious invoices. Newbaker can then conceal his fraud by approving the invoices for payment. Employees working at an organization for more than five years are more likely to commit fraud. Therefore, Newbaker’s six-year history with the company has made him trustworthy and very knowledgeable, which could indicate involvement in asset misappropriation. The high employee turnover could represent a past fraudster leaving before getting caught or employees refusing to continue with the asset misappropriation. In addition, the varying monthly accounts payable transactions ranging from the lowest being April 2014 and
I don’t want them here if they don’t represent the culture of the company,” says John Stumpf, the company’s longtime chief executive, in an interview with The Washington Post. It is obvious that simple employees and managers could not break the law if someone from the top did not allow them to do so. But the executive board of Wells Fargo claimed that they only fired 1 percent of below employees and some managers for fraudulent accounts, but they also might be involved in that business crime, although to build a case against a company executive, prosecutors would have to show “they knew there was a plan to create false accounts to drive up sales,” said Brandon L. Garret, a professor at the University of Virginia School of Law. Even if it appears that the executive purposefully attempted to avoid knowing about the fraud, prosecutors may be able to build a case. Because they don’t have to participate if there is willful negligence.
Weld, L. G., Bergevin, P. M., & Magrath, L. (2004). Anatomy of a financial fraud. The CPA
Madura, Jeff. What Every Investor Needs to Know About Accounting Fraud. New York: McGraw-Hill, 2004. 1-156
Today, worldwide, there are several thousands of crimes being committed. Some don’t necessarily require a lethal weapon but are associated with various types of sophisticated fraud, this also known as a white-collar crime. These crimes involve a few different methods that take place within a business setting. While ethical business practices add money to the bottom line, unethical practices are ultimately leading to business failure and impacting the U.S. financially.
Perri, J.D., CFE, CPA, F. (2011, January/February). White-collar crime punishment too much or not enough?. FRAUDMAGAZINE, Retrieved from http://www.all-about-forensic-science.com/support-files/white-collar-crime-punishment.pdf
In modern day business, there can be so many pressures that can cause managers to commit fraud, even though it often starts as just a little bit at first, but will spiral out of control with time. In the case of WorldCom, there were several pressures that led executives and managers to “cook the books.” Much of WorldCom’s initial growth and success was due to acquisitions. Over time, WorldCom discovered that there were no more opportunities for growth through acquisitions when the U.S. Department of Justice disallowed the acquisition of Sprint.
Ivan Boesky pleaded guilty to the biggest insider-trading scheme discovered by the United States Securities and Exchange Commission (SEC). He made 200 million dollars by profiting from stock-price volatility on corporate mergers. What he actually did was cheat by using illegally obtained secret information about impending mergers to buy and sell stock before mergers became public knowledge/ Although insider trading is nothing new, the SEC knows it has become a threat to the public’s confidence, and they must enforce regulations to stop criminal activity. The SEC has put pressure on managers to regulate information leaks, promising strict legal enforcement if a business fails to police misuse of privileged employee information.
Unethical accounting practices involving Enron date back to 1987. Enron’s use of creative accounting involved moving profits from one period to another to manipulate earnings. Anderson, Enron’s auditor, investigated and reported these unusual transactions to Enron’s audit committee, but failed to discuss the illegality of the acts (Girioux, 2008). Enron decided the act was immaterial and Anderson went along with their decision. At this point, the auditor’s should have reevaluated their risk assessment of Enron’s internal controls in light of how this matter was handled and the risks Enron was willing to take The history of unethical accounting practic...
The Tyco accounting scandal is an ideal illustration of how individuals who hold key positions in an organization are able to manipulate accounting practices and financial reports for personal gain. The few key individuals involved in the Tyco Scandal (CEO Kozlowski and CFO Swartz), used a number of clever and unique tactics in order to accomplish what they did; including spring loading, manipulating their ‘key-employee loan’ program, and multiple ‘hush money’ payouts.
Prior to 2000, Enron was an American energy, commodities and service international company. Enron claimed that revenue is more than 102 millions (Healy & Palepu 2003, p.6). Fortune named Enron “American most innovative company” for six consecutive years (Ehrenberg 2011, paragraph 3). That is the reason why Enron became an admired company before 2000. Unfortunately, most of the net income for the years 1997-2000 is overstated because of unethical accounting errors (Benston & Hartgraves 2002, p. 105). In the next paragraph, three main accounting issues will identify for what led to the fall of Enron.
The quantity of accounting fraud cases keeps on rising. Fraud is a consistent thing that will reliably be around, and in a bigger number of routes than just a single. An extensive apportion of organizations out there fight with fraud, either from within the organization, or from outside the organization. Knowing how to manage this is essential for an organization to be productive over a drawn out extended period of time. The investigation regarding the matter of accounting fraud will utilize sources from the web and the DeVry school library. The principle territory we are planning to address is accounting fraud and how it could impact an organization by answering, the who, what, when and how. Its goal is to increase the awareness
Champion, D 2011, ‘White-collar crimes and organizational offending: An integral approach’, International Journal of Business, Humanities, and Technology, vol. 1 no. 3, pp. 34-35.