Go to the FBI websiteLinks to an external site. and use the search box in the top right corner to conduct a search on financial fraud. The FBI site provides numerous descriptions of financial fraud cases that they have prosecuted, which would be Julie Kronhaus who was a well-regarded estate planner with impressive training and credentials. She was a licensed attorney, a certified public accountant, and had earned a master’s degree in
Step by stepSolved in 2 steps
- Consider each of the following situations. Is there a potential problem? Which part of the fraud triangle is involved, if any? A. Susan is an accounts payable clerk. She sets up creditors in a financial database and pays invoices as they come in. Last year, she won employee of the year and is a valued employee. Through the grapevine, Susan's boss just learned that Susan's brother has a gambling problem. B. Now suppose that Susan from situation A is now secretary for the head of the marketing department. She keeps track of the vice president of marketing's schedule and handles the correspondence. C. Keith has been employed for 6 months as a teller at a community bank. All is going well, and his cash drawer has had shortages only twice (of less than P500). The shortages were traced and the problems corrected. D. At the company Memorial Day picnic and golf outing last week, Nancy noticed that June moved her ball to a better lie when she thought no one was looking. There…arrow_forwardJim Block, CFE, is investigating Randy Smith for his role in a potential kickback scheme. Gathering evidence about Randy's financial activity has been difficult. While on a stakeout at Randy's home, Jim sees Randy's wife take out the garbage and place it on the curb. Jim takes the trash bag, sorts through its contents, and discovers multiple bank statements that provide details about some of Randy's illicit financial transactions. Is jim's acquirement of the bank statements legal even though there was no search warrant? Fully explain!arrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying a premium to the check’s value. He then scanned the check and used a variety of software packages to prepare fictitious paychecks from the employer. The group arrived on the next payday, cashed the checks at the local establishment, and moved to another town before the check was presented for payment at the local bank. This is an example of what type of fraud? a. Input fraud b. Processor fraud c. Computer instruction Fraud d. Data fraud e. Output fraudarrow_forward
- You are a newly hired fraud examiner. You have been asked to write a preliminary report on thescenario below. The Dude Fraud CaseIn his own words, Daniel Jones was “The Dude.” With his waist-long dreadlocks, part-time rockband, and well-paid job managing a company’s online search directory—he seemed to have itall. Originally from Germany, Jones, now age 32, earned his doctorate and taught at theUniversity of Munich before coming to the United States, where he started his career incomputers. In 1996, Jones started working with the company as a director of operations for U.S.-Speech Engineering Service and Retrieval Technology—working on a new, closely guardedsearch engine tied to the company’s .net concept.The company allows employees to order an unlimited amount of software and hardware, at nocost, for business purposes. Between December 2001 and November 2002, Jones ordered or usedhis assistant and other employees (including a high school intern) to order nearly 1,700 pieces…arrow_forwardAllison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.arrow_forwardGladys is in charge of receiving all customer payments, recording the payments, and depositing them at the bank. What element of the fraud triangle is best described here? Group of answer choices Opportunity Rationalization Incentive/Pressure Attribution Gladys has large amounts of student loan debt and a crippling gambling habit. She works part-time job in another city. What element of the fraud triangle is best described here? Group of answer choices Opportunity Fraudy fraud Pressure/incentive Rationalizationarrow_forward
- A multimediacourse graduate used design software to create paychecks that lookedidentical to those of a company in his town.The paychecks were deposited electronically into ofhis friends’ accounts. What type of fraud did hecommit? Select one: a. output fraud. b. input fraud. c. computer instruction fraud. d. processor fraud.arrow_forwardYou are a forensic accountant for a public accounting firm whose client hired your team to perform a fraud investigation of the accounts payable processes. As part of your fraud testing, you have acquired vendor data including bank accounts to which payments are sent and employee data including bank accounts for direct deposit of paychecks. You need to compare the main vendor table to the main employee table to search for potential fictitious vendors. Analyze the fields in the two tables on the next page, looking for identical or similar fields. Based on what you find, identify three red flags for accounts payable fraud. Provide the record numbers from the tables in your answer. Vendor record # Employee Record# ________ ___________ ________ ____________ _________ ____________arrow_forwardYou are a forensic accountant for a public accounting firm whose client hired your team to perform a fraud investigation of the accounts payable processes. As part of your fraud testing, you have acquired vendor data including bank accounts to which payments are sent and employee data including bank accounts for direct deposit of paychecks. You need to compare the main vendor table to the main employee table to search for potential fictitious vendors. Analyze the fields in the two tables on the next page, looking for identical or similar fields. Based on what you find, identify three red flags for accounts payable fraud. Provide the record numbers from the tables in your answer. Vendor record # Employee Record# ________ ___________ ________ ____________ _________ ____________arrow_forward
- You are a highly experienced CA financial accountant for a law firm, responsible for all aspects of the financial reporting, from preparing budget reports, reconciling accounts, through preparing annual financial reports. The CEO has suspected that the procurement manager is appropriating funds from the firm's bank accounts. He has asked you to assist him to reviewing the financial records for the firm and identify any fraudulent transactions. The procurement manager is a close friend of yours. What sort of forensic accounting service are you providing? Should you accept the engagement to assist the CEO? What sort of evidence would you collect and review? If required to prepare a report for court proceedings, do you think your evidence will be accepted? Why?arrow_forwardScenario: You are an assistant manager of a high-end retail store and, through routine end-of-day accounting procedures, you have discovered your long-time coworker, who is also an assistant manager and good friend, has been embezzling from the company. Use your knowledge related to the ways employees conduct fraud to build a case for how your coworker might have embezzled money. How would you utilize the store’s accounting software to access data and find the proper evidence to determine if it truly is fraud? To whom would you report your findings? Would you confront your coworker/friend?arrow_forwardGo to the internet and search on a recent incident of alleged embezzlement. Explain the facts and circumstances around the case and then put yourself in the shoes of the person who discovered the embezzlement. What actions would you have taken?arrow_forward
- Individual Income TaxesAccountingISBN:9780357109731Author:HoffmanPublisher:CENGAGE LEARNING - CONSIGNMENTBusiness Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:Cengage
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningCollege Accounting (Book Only): A Career ApproachAccountingISBN:9781305084087Author:Cathy J. ScottPublisher:Cengage Learning