Question

In: Accounting

How do you detect billing scheme fraud

How do you detect billing scheme fraud

Solutions

Expert Solution

A billing scheme is a fraud aimed at the payments system of a business. Its main purpose is to manipulate that system and cause the business to make a fraudulent payment to the employee. Though it is a payment to an employee, the business still records it as a legitimate business expense in its records. The employee will normally have some sort of influence on a false bill being approved for payment. Since the payment is recorded as a legitimate business expense, it is effectively hidden in the business’s records.

Types of Billing Schemes
Shell company schemes – a fake entity is established by a dishonest employee to bill a company for goods or services it does not receive. The employee converts the payment to his or her own benefit.
Pass-through schemes – a shell company is established by an employee to purchase goods or services for the employer. The goods or services purchased by the employee’s shell company are then marked up and sold to the employer and the employee converts the mark-up to his or her own benefit.
Pay-and-return schemes – an employee purposely causes an overpayment to a vendor to occur, and when the vendor returns the overpayment to the company, the employee embezzles the refund.
Personal-purchase schemes – an employee orders personal merchandise and charges it to the company. The employee will then either keep the merchandise, or return it for a cash refund.

These types of billing schemes could be detected with some of the following techniques:

  • Analyze disbursements, looking for many large round amounts, or amounts falling just below a threshold that requires additional approval for payment.
  • Look for unusually large expenses, unexplained variances in expenses between years, or expenses that exceed budgeted amounts. Billing schemes may inflate expenses enough to cause one or all of these comparisons to yield questionable results.
  • Examine the financial statements for variances in expenses that should track predictably with revenue. Cost of goods sold is a popular account in which to conceal theft via billing schemes because of the high level of activity in this account. If the account varies significantly from expected values when compared to revenue, however, this might indicate a billing scheme.
  • Cross-check addresses of employees and vendors, looking for exact matches or close matches.
  • Verify ownership of vendors that are suspected shell companies. While many fraudsters will use fictitious names to disguise the ownership of the shell companies, sometimes real names are used and can offer clues in cases of suspected fraud.
  • Collusion between employees will make such schemes much more difficult to detect. Normal checks and balances that are carried out by multiple employees may be thwarted if those employees decide to team up to commit fraud.
  • Abnormal levels of purchases from a particular supplier. The supplier’s name may be being used by the fraudster to submit false invoices. Checking the details on the invoices may show that some of the invoices are different from the others or suspicious in some manner. Verifying invoices with the real supplier will highlight false invoices.
  • Missing documentation. The employee may destroy the documentation used to generate a payment once the payment has been made. It may later be assumed that the document has just been lost. The lack of documents will frustrate investigations into suspicious payments.

    SOME BASIC CONTROLS

  • Purchases should be done with pre-numbered purchase orders. All suppliers should be given authorized orders and invoices should not be authorized for payment unless they match authorized orders.
  • Random checks on invoices may locate fictitious entities being used for billing schemes.
  • The use of electronic payments to pre-approved bank accounts will stop cheques being diverted to fraudulent entities.
  • Audit purchases with pre-approved suppliers to look for payments to similarly named suppliers. An approved supplier’s name, or a very similar name, may be used by a fraudster without their knowledge.
  • Randomly check the name and addresses of suppliers, particularly when the only address on the invoices is a postal address.

Related Solutions

1. List some controls that reduce fraud risks. 2. Explain how you can detect fraud
  1. List some controls that reduce fraud risks. 2. Explain how you can detect fraud.
Occupational fraud victims are concerned about how to detect fraud effectively and efficiently. Write an essay...
Occupational fraud victims are concerned about how to detect fraud effectively and efficiently. Write an essay on "Occupational Fraud: Detection". In the essay, State and describe the manner in which occupational fraud may be detected, and explain what factors determine the effectiveness and efficiency of the manner of fraud detection.
Differentiate between the auditors' responsibilities to detect errors, fraud, and illegal acts. How would you assess...
Differentiate between the auditors' responsibilities to detect errors, fraud, and illegal acts. How would you assess the ethics of a company that has experienced each event with respect to motivation and the integrity of those who go along with such events?
What is Benford's Law and how can it be applied to detect financial statement fraud?
What is Benford's Law and how can it be applied to detect financial statement fraud?
what is Fraud Scheme/Financial Statement Fraud Due? brief explanation with example.
what is Fraud Scheme/Financial Statement Fraud Due? brief explanation with example.
"Fraud Risk" Create a scenario where the external auditors detect that there is fraud. Discuss the...
"Fraud Risk" Create a scenario where the external auditors detect that there is fraud. Discuss the auditors’ responsibilities for assessing fraud risk. What are the procedures used to detect material misstatements due to fraud? Discuss recommendations to management for reducing fraud.  
You are a fraud examiner tasked with investigating an embezzlement scheme at a local manufacturer company....
You are a fraud examiner tasked with investigating an embezzlement scheme at a local manufacturer company. An employee from the accounting department was able to hack into the company's network from his home computer and access the passwords for other employees. He then used an employee's log in information and accessed the vendor master file where he created multiple fake vendors. Once the vendors were set up he began submitted invoices from his work computer and then subsequently authorized and...
In this assignment you are developing a fraud detection system to detect fraudulent activities based on...
In this assignment you are developing a fraud detection system to detect fraudulent activities based on this Decision Three. Your program receives a comma separated transaction log with the below format as its input: [amount],[# of transactions in last day],[area code],[transaction time] Your program should use string operations to decompose the transaction log and store its elements in variables of appropriate types. Then, based on the values of those attributes and the decision three, it attaches either a ",fraud" or...
In your opinion, how can internal auditors best detect fraud in their organization? Provide explanations to...
In your opinion, how can internal auditors best detect fraud in their organization? Provide explanations to support your answer.
You have been engaged to investigate a fraud scheme involving several accounts receivables clerks in a...
You have been engaged to investigate a fraud scheme involving several accounts receivables clerks in a large international magazine company. How might you use social media methods to help with your investigation?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT