Concept explainers
The Dude Fraud Case Scenario
In his own words, Daniel Jones was “The Dude.” With his waist-long dreadlocks, part-time rock
band, and a well-paid job managing a company’s online search directory—he seemed to have it
all. Originally from Germany, Jones, now age 32, earned his doctorate and taught at the University of Munich before coming to the United States, where he started his career in computers. In 1996, Jones started working with the company as a director of operations for the U.S.- Speech Engineering Service and Retrieval Technology—working on a new, closely guarded search engine tied to the company’s .net concept. The company allows employees to order an unlimited amount of software and hardware, at no cost, for business purposes. Between December 2001 and November 2002, Jones ordered or used his assistant and other employees (including a high school intern) to order nearly 1,700 pieces of software which had very low cost but were worth a lot on the street. He then resold them for reduced prices—reaping millions. When items with a cost of goods sold of more than $1,000 are ordered, an e-mail is sent to the employee’s direct supervisor, who must click on an “Approve” button before the order is filled. In no individual order was the cost of goods more than 1,000—he made sure none of the orders required a supervisor’s approval. The loosely controlled internal ordering system reflects the trust the company puts in its employees.
In June, FBI agents said they saw Jones exchanging a large box of software for cash in a
Department-store parking lot. The FBI contacted the company’s security and began monitoring
Jones’ bank accounts. Previously, one account with his bank had an average balance of $2,159. In a short time, however, the average balance ballooned to $129,775. Another account at
another bank showed irregular deposits totalling $500,000—none of which appeared to be from any legitimate income or other source.
Investigators also noted that Jones purchased a Ferrari F355 Berlinetta, a Jaguar XJ6, and traded
in lesser vehicles for a Hummer, a Mercedes 500SEL, and a Harley-Davidson motorcycle. He
also bought an $8,000 platinum diamond ring, a $2,230 wristwatch, and a $4,000 bracelet. “You
figured that I like big boy’s toys by looking at some of my pictures,” Jones wrote on his personal
Web page. “I just can’t resist.” The Dude’s Web page includes a camera for monitoring his cat
and photos of his yacht, cars, and other treasures. For a relatively low-level manager, it was an
impressive collection. But at his company, where teenage software engineers can earn more than
company directors, no one batted an eyelid.
A neighbor across the street from Jones said that he was clearly wealthy, but not flamboyant
with his money. He described Jones as an intelligent man who didn’t flaunt his education, would
loan neighbors tools, and was always friendly. The neighbor was surprised to hear the
accusations against someone he called his friend. All he knew about Jones was that he was a
good neighbor who loved cars. “He was very, very helpful. The few times I had problems with
my PC, he’d come and help straighten them out,” the neighbour said. “They are just ideal
neighbours. I feel terrible for him and his wife." Jones and his wife lived in a modest 1960s split-level home.
In 2001, he joined the city's Rotary Club, "where he seemed more outgoing and personable than
the stereotype techie," said a local jeweller and immediate past president of the club. He seemed
like what I would expect a genius software developer to be."
Questions
a) Determine if fraud was committed and if so, describe the symptoms of fraud that might be evident to a fellow employee.
b) All frauds involve key elements. Identify and describe using examples of the elements of the Jones fraud.
c) In the scenario, Jones' employer has been putting more emphasis on controlling costs. With the slowing of overall technology spending, executives have ordered managers to closely monitor expenses and have given vice presidents greater responsibility for
d) Describe the company’s fraud prevention program and identify any improvements that might be necessary to prevent this type of fraud or at least discover it sooner.
Trending nowThis is a popular solution!
Step by stepSolved in 4 steps
- Mid-Pacific Tennis Courts (MPTC), a small family-held corporation, hired Leroy Jacob as a salesperson. Jacob devised a scheme to defraud MPTC. Using MPTC customer leads, Jacob entered into contracts with potential customers to build tennis courts without informing MPTC. Jacob accepted checks from potential customers made payable to MPTC. Jacob then deposited those checks in his personal bank account with Peoples Bank & Trust Co. (Peoples Bank) without indorsement or permission by MPTC. Jacob took the money and disappeared. When MPTC learned of the fraud and discovered that the checks were accepted for deposit by Peoples Bank in Jacob’s personal account, MPTC sued Peoples Bank to recover the amount of the checks in question. Did Peoples Bank properly accept the checks for deposit? Pick the phrase the completes the sentence The Uniform commercial Code (UCC) has the following requirements for instrument to be negotiable: the instrument must be in writing, the instrument must…arrow_forwardThe following is an excerpt from a conversation between two sales clerks, Jean Moen and Sara Cheney. Jean and Sara are employed by Turpin Meadows Electronics, a locally owned and operated electronics retail store Jean: Did you hear the news? Sara: What news? Jean: Neal and Linda were both arrested this morning. Sara: What? Arrested? You're putting me on! Jean: No, really! The police arrested them first thing this morning. Put them in handcuffs, read them their rights-the whole works. It was unreal! Sara: What did they do? Jean: Well, apparently they were filling out merchandise refund forms for fictitious customers and then taking the cash. Sara: I guess I never thought of that. How did they catch them? Jean: The store manager noticed that returns were twice that of last year and seemed to be increasing. When he confronted Neal, he became flustered and admitted to taking the cash, apparently more than $9,000 in just three months. They're going over the last six months' transactions to…arrow_forwardIn the Why It Matters feature “Examples of Theft and FinancialReporting Frauds” at the beginning of the chapter, we introduced youto the Koss Corporation fraud. In this problem, we provide you withfurther details about that fraud. During the fall of 2009, Koss Corporation,a Wisconsin-based manufacturer of stereo headphone equipment,revealed that its vice president of finance (Sujata “Sue” Sachdeva) haddefrauded the company of approximately $31 million over a periodof at least five years. Grant Thornton LLP was the company’s auditor,and the firm issued unqualified audit opinions for the entire period in which they worked for Koss. According to reports, Sachdeva’s theftaccelerated over a period of years as follows:FY 2005 $2,195,477FY 2006 $2,227,669FY 2007 $3,160,310FY 2008 $5,040,968FY 2009 $8,485,937Q1 FY 2010 $5,326,305Q2 FY 2010 $4,917,005To give you a sense of the magnitude of the fraud, annual revenuesfor Koss Corporation are in the range of $40 to $45 million…arrow_forward
- The operation manager of Marcoba Bhd is seeking your advice on his company's request for a computer software to be used in managing the sales of the company. He is unsure of how to obtain the computer software but realizes that different types of acquisition will impact the company's financial statement differently. He is considering the following possibilities: a) Making a purchase of the computer software externally. The quotation that he has received includes packages for payroll and general ledger. b) Making a purchase of a computer software that can be incorporated into a sales system that the company will develop. c) Signing a contract with independent programmers to develop a computer software that will specifically cater for Marcoba Bhd's own use d) Employing own programmers to write a computer software that the company will use. Required: Advice the operation manager on the impact of each possibility above on the company's financial statementarrow_forwardThe operation manager of Marcoba Bhd is seeking your advice on his company's request for a computer software to be used in managing the sales of the company. He is unsure of how to obtain the computer software but realizes that different types of acquisition will impact the company's financial statement differently. He is considering the following possibilities: a) Making a purchase of the computer software externally. The quotation that he has received includes packages for payroll and general ledger. b) Making a purchase of a computer software that can be incorporated into a sales system that the company will develop. c) Signing a contract with independent programmers to develop a computer software that will specifically cater for Marcoba Bhd's own use d) Employing own programmers to write a computer software that the company will use. Required: Advice the operation manager on the impact of each possibility above on the company's financial statementarrow_forwardHow could Pascal and Super Tech have identified and addressed this risk? What should Pascal do now? Case - Pascal is the manager of software development for Super Tech. He discovered that Bill, the lead software designer, has announced that he is leaving the company next week. Pascal finds that Bill has accepted a job with Super Tech main competitor. Pascal fear that in his new job, Bill will use technology developed while at the company and disclose the identities of key customers.arrow_forward
- David H. Brooks, a university graduate with an accounting degree and the former CEO of DHBIndustries, Inc., was charged in October 2007 with accounting and securities fraud for failing toreport the company’s inventory at the lower of cost or market. From 2001 to 2005, DHB purchasedlarge quantities of a material called Zylon and used it in making bulletproof vests that were sold tothe U.S. military and local law enforcement agencies. During this same period, DHB learned thatZylon deteriorated rapidly when exposed to light, heat, and body perspiration. DHB knew that oneof its competitors, Second Chance Body Armor, had stopped using Zylon in its vests and, eventually, discontinued its business because customer demand for its Zylon-based vests had evaporated.DHB did not write down its own inventory of Zylon and Zylon-based vests because it had a largecontract to supply the U.S. military with bulletproof vests. In its financial statements for the yearended December 31, 2004, DHB reported…arrow_forward5. What does Tina mean in her statement to the Clare County Review "the effects of an embezzlement are far reaching and detrimental for everyone"? Who were all the stakeholders that were all affected in this case? How was each of them harmed? 6. Jenifer was caught embezzling via the payroll system, how else might she have been stealing from the company that was never proven? 7. Why do you think Jenifer embezzled the money? 8. Do you think her sentencing is too lenient, too harsh, or is appropriate? Why? 9. What would you do if your friend and employee was stealing from a company that you owned?arrow_forwardBlack is a Certified Fraud Examiner for the ABC Company. Green, an employee in the accounting department, steals $40,000 worth of merchandise from the store’s warehoused. If Green’s cas is eventually referred to the police by Black, they will probably charge Green with: A. Breach of contract. B. Breach of fiduciary duty. C. Embezzlement. D. Larceny.arrow_forward
- Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. The number of incidents and the total dollar losses from computer fraud are increasing rapidly for several reasons: a. Many instances of computer fraud go undetected and many frauds are not reported. b. Many companies are moving to cloud services where there are few data security controls. c. Internet sites offer step-by-step instructions on how to perpetrate computer fraud and abuse. d. Law enforcement is not interested in preventing or prosecuting computer fraud. e. There are no laws against computer fraud so prosecution is difficultarrow_forwardAssume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Cyber sleuths need the following skills: a. Ability to do complex programming so they can develop their own software to examine corporate data and records. b. Ability to follow a trail, think analytically, and be thorough. c. Ability to use their computer engineering experience to evaluate the hardware used by the company d. Ability to think like a fraud perpetrator and use hacking tools and techniques. e. Ability to use their legal training to properly prepare the evidence needed to prosecute perpetratorsarrow_forward
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education