8/3/2019 Accounting Information Systems - Computer Fraud
1/84
Chapter 5
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
2/84
1. Describe fraud and describe the process one follows to
perpetuate a fraud.
2. Discuss why fraud occurs, including the pressures,
opportunities, and rationalizations that are present in
most frauds.
3. Compare and contrast the approaches and techniques
that are used to commit computer fraud.4. Describe how to deter and detect computer fraud.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
3/84
Jason Scott finished his tax return.
Everything was in order except his
withholding amount. For some reason, the federal income tax
withholdings on his final paycheck was $5higher than on his W-2 form.
What did he discover?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
4/84
Most of the 1,500 company employees had a$5 discrepancy between their reported
withholdings and the actual amountwithheld.
The W-2 ofDon Hawkins, one of the
programmers in charge of the payroll system,showed that thousands of dollars more inwithholding had been reported to the IRSthan had been withheld from his paycheck.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
5/84
What constitutes a fraud, and is the
withholding problem a fraud?
If this is indeed a fraud, how was it
perpetrated?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
6/84
Why did the company not catch these mistakes
earlier?
Was there a breakdown in controls? What can the company do to detect and prevent
fraud?
Just how vulnerable are computer systems to
fraud?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
7/84
This chapter describes the fraud process.
It also explores the reasons that fraud occurs.
The chapter also describes the approaches tocomputer fraud and the specific techniquesused to commit it.
Finally, several methods to deter and detectfraud are analyzed.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
8/84
Understand what fraud is
and the process onefollows to perpetuate afraud.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
9/84
What is the definition of fraud?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
10/84
What is the definition of fraud?
an intentional deception made for personal gain or todamage another individual
Fraud is a crime
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
11/84
What is computer fraud?
"Conduct which involves the manipulation of a computeror computer data, by whatever method, in order todishonestly obtain money, property or some otheradvantage ofvalue, or to cause loss."
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
12/84
Since fraudsters dont make journal entries to
record their frauds, we can only estimate the
amount of losses caused by fraudulent acts: Total fraud losses in theU.S. run around 6% of annual
revenues or approximately $660 billion in 2004.
Income tax fraud (the difference between what
taxpayers owe and what they pay to the government)is estimated to be over $200 billion per year.
Fraud in the healthcare industry is estimatedtoexceed $100 billion a year.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
13/84
Fraud perpetrators are often referred to as
white-collar criminals.
Distinguishes them from violent criminals,although some white-collar crime can ultimatelyhave violent outcomes, such as:
Perpetrators or their victims committing suicide.
Healthcare patients killed because of alteration ofinformation, etc., that can result in their deaths.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
14/84
Three types of occupational fraud: Misappropriation of assets
Corruption
Fraudulent statements
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
15/84
Employee fraud characteristics: They gain the trust and confidence of the company or
people being defrauded to commit and conceal thefraud. They use weapons of deceit and misinformation. Frauds usually begin from a need then become greed
later on. They grow careless and overconfident over time. Over time, the size of the fraud usually leads to
detection.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
16/84
Fraudulent financial reporting
Financial Statements can be falsified to: Deceive investors and creditors Cause a companys stock price to rise Meet cash flow needs
Hide company losses and problems
Example Enron?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
17/84
Fraudulent financial reporting is of great
concern to independent auditors, because
undetected frauds lead to half of the lawsuitsagainst auditors.
In the case ofEnron, a financial statement fraud
led to the total elimination of Arthur Andersen,a premiere international public accounting firm.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
18/84
Most frauds involve three steps.
The theft of
something
The conversionto cash
Theconcealment
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
19/84
What is a common way to hide a theft?
What is a payroll example?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
20/84
What is a common way to hide a theft?
to charge the stolen item to an expense account
What is a payroll example?
to add a fictitious name to the companys payroll
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
21/84
What is lapping?
In a lapping scheme, the perpetrator stealscash received from customer A to pay its
accounts receivable.
Funds received at a later date from customer Bare used to pay off customer As balance, etc.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
22/84
What is kiting? In a kiting scheme, the perpetrator covers up
a theft by creating cash through the transferof money between banks.
The perpetrator deposits a check from bank A
to bank B and then withdraws the money.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
23/84
Since there are insufficient funds in bank A to coverthe check, the perpetrator deposits a check frombank C to bank A before his check to bank B clears.
Since bank C also has insufficient funds, money mustbe deposited to bank C before the check to bank Aclears.
The scheme continues to keep checks from bouncing.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
24/84
A cashier was stealing money from daily cash receiptsand making up the shortages with the following dayscash receipts.The fraud was discovered during areview of the bank reconciliation when the officemanager noticed that the exact same deposit wasmade on two consecutive days. Suggested controlprocedure that could have prevented this is a simplesegregation of duties the cashier was also preparingthe daily deposit slip, and no one was responsible forreconciling it with the daily cash report.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
25/84
During the 1990s, WorldCom was deeply involved inacquisitions and completed several mega-deals
Purchased over 60 firms in 2nd
half of the 90s
WorldCom moved into Internet and data traffic
Handled 50% ofUS Internet traffic
Handled 50% of e-mails worldwide
PurchasedMCI for $37 billion in 1997 By 2001 owned a third of theUS data cables
WasU.S. 2nd largest long-distance operator in 1998 and 2002
Had over 20 million customers in 2002
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
26/84
From 1998-2000, WorldCom reduced reserve accounts heldto cover liabilities of acquired companies
WorldCom added $2.8 billion to the revenue line from
these reserves
Reserves didnt cut it; An e-mail was sent in December 2000to a division inTexas directing misclassification of expenses.
CFO told key staff members to mark operating costs aslong-term investments.
To the tune of $3.85 billion.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
27/84
Operating Expenses to Assets
-CFOs directions affected the income statement:
Revenues xxx (no change)
COGS xxx (no change)
Operating Expenses:
Fees paid to lease other
companies phone networks: xxx (HugeDecrease)
Computer expenses: xxx (HugeDecrease)
NET INCOME xxx (Huge Increase)
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
28/84
Operating Expenses to Assets
-CFOs directions affected the balance sheet:
Assets:
Computer assets xxx (Huge Increase)
Leasing assets xxx (Huge Increase)
Liabilities xxx (no change)
StockholdersEquity:
Retained Earnings xxx (Huge Increase)
=HAPPY INVESTORS
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
29/84
Huge losses turned into enormous profits.
$1.38 billion in net income in 2001
Inflated the companys value in its assets
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
30/84
8/3/2019 Accounting Information Systems - Computer Fraud
31/84
4. March 7, 2002 - the SEC requests information from WorldCom
How could WorldCom make so much when AT&T is losing money?
5. The Internal audit started digging Found $2 billion company announced for capital expenditures
(Internal Auditors found it was never authorized for capitalexpenditures.)
Found the undocumented $500 million in computer expenses that
were recorded as assets. Searching WorldComs computers,Mr.Morse found $2 billion in
questionable entries
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
32/84
June 25, 2002 - WorldCom announces it inflated profits by$3.8 billion over the previous five quarters
June 26, 2002 - civil suit filed, stock trading halted
Ultimately, stock was delisted by Nasdaq
July 21, 2002 - WorldCom filed for bankruptcy
17,000 jobs cut to save $1 billion.
WorldCom was renamedMCI in 2004 when it emergedfrom bankruptcy
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
33/84
Compared to other financial statement frauds,Enron was a very complicated fraud. (WorldCom,for example, was a $7 billion fraud that involved
simply capitalizing expenses (line costs) that shouldhave been expensed (Accounting 200 topic.) Enroninvolved many complex transactions andaccounting issues.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
34/84
Enron delivered smoothly growing earnings (but not cash flows.)Wall Street took Enron on its word but didnt understand itsfinancial statements.
It was all about the price of the stock. Enron was a trading
company and Wall Street normally doesnt reward volatileearnings of trading companies. (Goldman Sacks is a tradingcompany. Its stock price was 20 times earnings while Enrons was70 times earnings.)
In its last 5 years, Enron reported 20 straight quarters ofincreasing income.
Enron, that had once made its money from hard assets likepipelines, generated more than 80% of its earnings from avaguer business known as wholesale energy operations and
services.2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
35/84
Was devoid of any boundary system Enrons core business was losing moneyshifted its focus
from bricks-and-mortar energy business to trading ofderivatives (most derivatives profits were more imagined
than real with many employees lying and misstatingsystematically their profits and losses in order to make theirtrading businesses appear less volatile than they were)
During 2000, Enrons derivatives-related assets increasedfrom $2.2 billion to $12 billion and derivates-relatedliabilities increased from $1.8 billion to $10.5 billion
Enrons top management gave its managers a blank order tojust do it
Deals in unrelated areas such as weather derivatives, waterservices, metals trading, broadband supply and power plantwere all justified.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
36/84
Because Enron believed it was leading arevolution, it pushed the rules. Employees
attempted to crush not just outsiders but
each other. Enron was built to maximizevalue by maximizing the individual parts.
Enron traders were afraid to go to the
bathroom because the guy sitting next tothem might use information off their screen
to trade against them.
2/10/2012
Enron took more risk than othersit swung for the fences.
8/3/2019 Accounting Information Systems - Computer Fraud
37/84
Jeff Skilling left in Augustgave no reason for his departure. By mid-August 2001, the stock price began falling Former CEO, Kenneth Lay, came back in August O
ct.1
6announced $618
million loss but not that it hadwritten down equity by $1.2 billion OctoberMoodys downgraded Enrons debt Nov.8Told investors they were restating earnings for the
past 4 and years Dec.2Filed bankruptcy
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
38/84
In early 2001, Jim Chanos, who runs KynikosAssociates, a highly regarded firm specializing inshort selling said publicly that no one could explainhow Enron actually made money. He noted thatEnron had completed transactions with relatedparties that were run by a senior officer ofEnronand assumed it was a conflict of interest. (Enronwouldnt answer questions about LJM and otherpartnerships.)
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
39/84
Was paid $52 million in 2000, the majority of which was fornon-audit related consulting services.
Failed to spot many ofEnrons losses Should have assessed Enron managements internal controls
on derivates tradingexpressed approval of internal controlsduring 1998 through 2000
Kept a whole floor of auditors assigned at Enron year around Enron was Andersens second largest client Did both external and internal audits CFOs and controllers were former Andersen executives
Accused of document destructionwas criminally indicted Went out of business My partner friend I had $4 million in my retirement account
and I lost it all. Some partners who transferred to other firmsnow have two equity loans and no retirement savings.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
40/84
1.Denmark
2.Finland 3. Sweden
4. New Zealand
5.Iceland
6.Canada
7.Singapore 8. Netherlands, Norway
16. Hong Kong 17. United States
Austria 25. Japan
29. Taiwan 43. South Korea 52. China 81. Nigeria 84. Paraguay
85. Cameroon
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
41/84
Good economy was masking many problems Moral decay in society Executive incentives
Wall Street expectationsrewards for short-termbehavior Nature of accounting rules Behavior of CPA firms Greed by investment banks, commercial banks, and
investors Educator failures
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
42/84
Meeting Wall Streets Expectations
Stock prices are tied to meeting Wall Streets earningsforecasts
Focus is on short-term performance only
Companies are heavily punished for not meeting forecasts
Executives have been endowed with hundreds of millionsof dollars worth of stock optionsfar exceeds
compensation (tied to stock price)
Performance is based on earnings & stock price
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
43/84
Discuss why fraud occurs,
including the pressures,
opportunities, andrationalizations that are
present in most frauds.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
44/84
Researchers have compared the psychological and
demographic characteristics of three groups of people:
White-collarcriminals
Violentcriminals
General
public
Few differencesSignificant
differences
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
45/84
What are some common characteristics offraud perpetrators?
Most spend their illegal income rather than investor save it.
Once they begin the fraud, it is very hard for them
to stop. They usually begin to rely on the extra income.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
46/84
Perpetrators of computer fraud tend to be youngerand possess more computer knowledge,experience, and skills.
Some computer fraud perpetrators are moremotivated by curiosity and the challenge ofbeating the system.
Others commit fraud to gain stature among othersin the computer community.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
47/84
Three conditions are necessary for fraud to
occur:
1 A pressure or motive2 An opportunity
3 A rationalization
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
48/84
The FraudTriangle
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
49/84
What are somefinancialpressures?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
50/84
What are somefinancialpressures?
living beyond means
high personal debt inadequate income
poor credit ratings
heavy financial losses
large gambling debts
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
51/84
What are somefinancial statementpressures?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
52/84
What are somefinancial statementpressures?
Prop up earnings or stock priceOR to reduce
earnings Cover the inability to generate cash flow
Obtain financing
Appear to comply with bond covenants or other
agreements
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
53/84
What are some work-relatedpressures?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
54/84
What are some work-relatedpressures?
low salary
nonrecognition of performance job dissatisfaction
fear of losing job
overaggressive bonus plans
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
55/84
What are otherpressures?
challenge
family/peer pressure emotional instability
need for power or control
excessive pride or ambition
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
56/84
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
57/84
An opportunity is the condition or situationthat allows a person to commit and conceal adishonest act.
What are the ways fraud can be concealedthat we discussed?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
58/84
Opportunities often stem from a lack ofinternal controls.
However, the most prevalent opportunity forfraud results from a companys failure toenforce its system of internal controls.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
59/84
Most perpetrators have an excuse or a
rationalization that allows them to justify theirillegal behavior.
What are some rationalizations?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
60/84
Most perpetrators have an excuse or arationalization that allows them to justify theirillegal behavior.
What are some rationalizations? The perpetrator is just borrowing the stolen assets.
The perpetrator is not hurting a real person, just a
computer system.
No one will ever know.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
61/84
Fraud occurs when: People have perceived, non-shareablepressures;
The opportunitygateway is left open; and
They can rationalize their actions to reduce themoral impact in their minds (i.e., they have lowintegrity).
Fraud is much less likely to occur when There is low pressure, low opportunity, and high
integrity.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
62/84
Compare and contrast the
approaches and techniquesthat are used to commitcomputer fraud.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
63/84
TheU.S.Department ofJustice defines
computer fraud as any illegal act for which
knowledge of computer technology is essentialfor its perpetration, investigation, or
prosecution.
What are examples of computer fraud? unauthorized use, access, modification, copying, and
destruction of software or data
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
64/84
theft of money by altering computer records or thetheft of computer time
theft or destruction of computer hardware
use or the conspiracy to use computer resources tocommit a felony
intent to illegally obtain information or tangibleproperty through the use of computers
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
65/84
Organizations that track computer fraud
estimate that 80% ofU.S. businesses have
been victimized by at least one incident ofcomputer fraud.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
66/84
No one knows for sure exactly how muchcompanies lose to computer fraud.Why?
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
67/84
No one knows for sure exactly how muchcompanies lose to computer fraud.Why?There is disagreement on what computer fraud is.
Many computer frauds go undetected, or unreported.
Most networks have a low level of security.
Many Internet pages give instructions on how to perpetrate
computer crimes. Law enforcement is unable to keep up with fraud.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
68/84
Computerinstruction fraud
Processor fraud
Data fraud
Inputfraud
Outputfraud
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
69/84
Processor Fraud Involves unauthorized system use
Includes theft of computer time and services.
Computer Instructions Fraud Involves tampering with software that processes
company data
May include:Modifying the software
Making illegal copies
Using it in an unauthorized manner
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
70/84
Data Fraud
Involves: Altering or damaging a companys data files; or
Copying, using, or searching the data files withoutauthorization.
Sale of stolen data
Output Fraud Stealing or misusing system output.
Use computers and peripheral devices to createcounterfeit outputs
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
71/84
What are some of the more common
techniques to commit computer fraud?
Cracking Data diddling
Data leakage
Denial of service attack
Eavesdropping
E-mail forgery and threats
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
72/84
Hacking
Internet misinformation and terrorism
Logic time bomb Masquerading or impersonation
Password cracking
Piggybacking
Round-down
Salami technique
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
73/84
Software piracy
Scavenging
Social engineering Superzapping
Trap door
Trojan horse
Virus
Worm
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
74/84
Describe how to deter anddetect computer fraud.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
75/84
What are some measures that can decreasethe potential of fraud?
1 Make fraud less likely to occur.
2 Increase the difficulty of committing fraud.
3 Improve detection methods.
4 Reduce fraud losses.5 Prosecute and incarcerate fraud perpetrators.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
76/84
1 Make fraud less likely to occur.
Use proper hiring and firing practices.
Manage disgruntled employees.
Train employees in security and fraud prevention.
Manage and track software licenses.
Require signed confidentiality agreements.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
77/84
2 Increase the difficulty of committing fraud. Develop a strong system of internal controls.
Segregate duties.
Require vacations and rotate duties.
Restrict access to computer equipment and datafiles.
Encrypt data and programs.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
78/84
3 Improve detection methods.
Protect telephone lines and the system fromviruses.
Control sensitive data.
Control laptop computers.
Monitor hacker information.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
79/84
4 Reduce fraud losses.
Maintain adequate insurance.
Store backup copies of programs and data files ina secure, off-site location.
Develop a contingency plan for fraud occurrences.
Use software to monitor system activity and
recover from fraud.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
80/84
5 Prosecute and incarcerate fraud perpetrators.
Most fraud cases go unreported andunprosecuted.Why?
Many cases of computer fraud are as yet undetected.
Companies are reluctant to report computer crimes.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
81/84
Law enforcement officials and the courts are so busywith violent crimes that they have little time for fraudcases.
It is difficult, costly, and time consuming toinvestigate.
Many law enforcement officials, lawyers, and judgeslack the computer skills needed to investigate,prosecute, and evaluate computer crimes.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
82/84
What did Jason present to the president?
A copy of his own withholding report filed withthe IRS and a printout of withholdings from thepayroll records.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
83/84
How did Jason believe the fraud was
perpetrated? The payroll system had undergone some minor
modifications.
The payroll project had been completed without theusual review by other systems personnel.
An unusual code subtracted $5 from most employees
withholdings and added it to Dons.
2/10/2012
8/3/2019 Accounting Information Systems - Computer Fraud
84/84
What guidelines should Jason suggest toprevent this from happening again?
Strictly enforce existing controls.
New controls should be put into place todetect fraud.
Employees should be trained in fraudawareness, security measures, and ethical
issues. Jason also urged the president to prosecute
the case.