EFFECTIVE FRAUD & CORRUPTION MANAGEMENT
CONFERENCE PAPER
1ST NATIONAL FORENSIC CONFERENCE,
YAOUNDE, CAMEROON
March 20-22, 2013
Dr. Richard
Mayungbe
E-mail: richardmayungbe@gmail.com
+2348033467639
Tel: +16462028832
·
Definition of fraud, How
Fraud Occurs, Various Fraud Schemes and targets.
Introduction:
It is a great pleasure to welcome
all delegates to this brain storming conference aimed at pulling our collective
wisdom together in finding effective solutions to one of Africa’s nagging
problems, “Fraud and Corruption”
For the next 3 days, we shall be
here together on this matter.
Definition of Fraud:
There is no single accepted definition of
fraud. It is impossible to provide a comprehensive definition of fraud. Indeed,
it may be possible to distinguish between two general types of definition: a
general broader one and a criminal narrower one. However, all definitions have
one thing in common - an element of dishonesty or deceit.
There are many dictionary definitions of
the word 'fraud' each is similar but not exactly the same.
Such expressions as:
·
Unfair
advantage by unlawful or unfair means;
·
Knowingly
making a false representation;
·
Intentional
deception resulting in injury to another person;
·
Something
intended to deceive; deliberate trickery intended to gain an advantage;
·
An
intentional perversion of truth; deceitful practice or device resorted to with
intent to deprive another of property or other right;
·
The
intentional and successful employment of cunning, deception, collusion; or
artifice used to cheat or deceive another person whereby that person acts upon
it to the loss of his property and to his legal injury;
·
The
act of leading a person to believe something which you know to be false in a
situation where you know the person will rely on that thing to their detriment;
·
A
deception, intended to wrongfully obtain money or property from the reliance of
another on the deceptive statements or acts, believing them to be true;
·
The
intentional perversion of the truth in order to mislead someone into parting
with something of value
The
specific legal definition varies by legal jurisdiction, but fraud is a crime,
and is also a civil law violation.
From the point of view of the criminal law,
fraud could be defined as criminal deception, being the use of false
representations to obtain unfair advantage or to harm the interests of another.
To deceive is to induce someone to believe
that a thing is true which is false, and which the person practicing the deceit
knows or believes to be false. To defraud is to deprive by deceit: it is by
deceit to induce someone to act to his injury.
Fraud has nine elements:
1. a
representation of an existing fact;
2. its
materiality;
3. its falsity;
4. the speaker's
knowledge of its falsity;
5. the speaker's
intent that it shall be acted upon by the plaintiff;
6. plaintiff's
ignorance of its falsity;
7. plaintiff's
reliance on the truth of the representation;
8. plaintiff's
right to rely upon it; and
9. consequent
damages suffered by plaintiff.
How
Fraud Occurs
Fraud,
like other crimes, can best be explained by three factors:
1)
A supply of motivated offenders;
2)
The availability of suitable targets;
3)
The absence of capable guardians or a control system.
When economic climate
declines, it is likely to raise the risk of fraud. As individuals and companies
suffer financially, more people may be tempted to cross the line of legality
and engage in fraud to maintain the lifestyles they had enjoyed during better
times. Imagine the pressures that may be on individuals stagnant earnings, no
bonuses, stiff competition, irresponsive governments, the possibility of job losses – all of these,
and more, increase the likelihood of an individual and even organisations to commit fraud.
Smaller business are overall more
susceptible because they generally don’t have as many people in place to
separate job functions and put controls in place. The culture is usually open
and trusting. Layoffs have caused even more holes to exist. Potential
fraudsters may find plenty of opportunities to launch their schemes.
Some of
the Ways Occupational Fraud Occurs include:
-Skimming cash receipts
-Falsifying expense reports
-Forging or tampering with company checks
-Falsifying pay roll records
-Falsifying bills and invoices
-Stealing cash –Larceny
-Stealing other physical assets
-Stealing intellectual assets and information
-Corruption
-Financial statement fraud
-Skimming cash receipts
-Falsifying expense reports
-Forging or tampering with company checks
-Falsifying pay roll records
-Falsifying bills and invoices
-Stealing cash –Larceny
-Stealing other physical assets
-Stealing intellectual assets and information
-Corruption
-Financial statement fraud
Various
Fraud Schemes and Targets
Fraud is as numerous as the
languages under the sun! Let us compile the most popular ones taking our source
from the Association of Certified Fraud Examiners 2012 Global Fraud Study:
Occupational Fraud – This type of
fraud falls into 3 categories viz:
• Asset
misappropriation schemes, in which an employee steals or misuses
the organization’s resources (e.g., theft of company cash, false billing
schemes or inflated expense reports) The targets here are the employers,
private or public.
• Corruption
schemes, in which an employee misuses his or her influence in a business
transaction in a way that violates his or her duty to the employer in order to
gain a direct or indirect benefit (e.g., schemes involving bribery or conflicts
of interest) The targets are internal and external clients of the organization
• Financial
statement fraud schemes, in which an employee intentionally
causes a misstatement or omission of material information in the organization’s
financial reports (e.g., recording fictitious revenues, understating reported
expenses or artificially inflating reported assets) The targets are shareholders,
the investing public, banks and financial institutions, suppliers, customers,
inland revenue, and many other stakeholders.
BANK FRAUDS
Cheque Fraud is responsible for the loss of about $815 million
yearly, which is nearly 12 times the amount robbed from banks each year. Many
types of cheque scams exist and include:
·
Forged Signatures –
involves forging a signature on legitimate blank check
·
Forged Endorsement –
includes endorsing and cashing or depositing a stolen check
·
Counterfeit Checks –
is on the rise with the advancement in color copying and desktop publishing
·
Altered Checks –
where a person changes the name of the payee or dollar amount on a legitimate
check
·
Uninsured Deposits: occurs when
illegitimate companies persuade customers with high rates of interest or
offshore secrecy to avoid paying taxes. These companies are not monitored or
authorized by any federal bank or financial institution, meaning depositors do
not receive protection or insurance on their investments from any state or
federal institution.
·
Credit Card Fraud: is a common
type of fraud that affects millions each year. Statistics show that credit card causes $500 million in damages
to card companies and credit card holders. So, it’s wise to learn how to keep
your credit card and bank documents safe to prevent credit fraud from happening to you. And, if you
suspect that you’re a target of credit fraud contact
your bank or credit card company immediately to check for fraud and to disable your card.
·
Falsification of Loan Applications: also known as Loan Fraud. It occurs when a person produces
false information to qualify for a loan, such as a mortgage for their house.
Sometimes, loan officers may be in on the fraud.
· Stolen Checks
Some fraudsters obtain access to
facilities handling large amounts of checks, such as a mailroom or post office
or the offices of a tax authority (receiving many checks) or a corporate
payroll or a social or veterans' benefit office (issuing many checks). A few
checks go missing; accounts are then opened under assumed names and the checks
(often tampered or altered in some way) deposited so that the money can then be
withdrawn by thieves. Stolen blank checkbooks are also of value to forgers who
then sign as if they were the depositor.
· Demand draft fraud
Demand draft fraud
is usually done by one or more dishonest bank employees. They remove few DD
leaves or DD books from stock and write them like a regular DD. Since they are
insiders, they know the coding, punching of a demand draft. These Demand drafts
will be issued payable at distant town/city without debiting an account. Then
it will be cashed at the payable branch. For the paying branch it is just
another DD. This kind of fraud will be discovered only when the head office
does the branch-wise reconciliation, which normally will take 6 months. By that
time the money is unrecoverable.
· Rogue traders
A rogue trader is a highly placed
insider nominally authorized to invest sizeable funds on behalf of the bank;
this trader secretly makes progressively more aggressive and risky investments
using the bank's money, when one investment goes bad, the rogue trader engages
in further market speculation in the hope of a quick profit which would hide or
cover the loss.
Unfortunately, when one investment loss
is piled onto another, the costs to the bank can reach into hundreds of
millions of dollars; there have even been cases in which a bank goes out of
business due to market investment losses.
Some of the largest bank frauds ever detected
were perpetrated by currency traders John
Rusnak, and Nick
Leeson. Jérôme Kerviel,
allegedly defrauded Société Générale of 4.9 billion euros ($7.1 billion)
while trading stock derivatives.
· Fraudulent loans
One way to remove money from a bank is
to take out a loan, a practice bankers would be more than willing to encourage
if they know that the money will be repaid in full with interest. A fraudulent
loan, however, is one in which the borrower is a business entity controlled by
a dishonest bank officer or an accomplice; the "borrower" then
declares bankruptcy or vanishes and the money is gone. The borrower may even be
a non-existent entity and the loan merely an artifice to conceal a theft of a
large sum of money from the bank.
· Forged or fraudulent documents
Forged documents are often used to
conceal other thefts; banks tend to count their money meticulously so every
penny must be accounted for. A document claiming that a sum of money has been
borrowed as a loan, withdrawn by an individual depositor or transferred or
invested can therefore be valuable to a thief who wishes to conceal the minor
detail that the bank's money has in fact been stolen and is now gone.
· Bill discounting fraud
Essentially a confidence trick, a
fraudster uses a company at their disposal to gain confidence with a bank, by
appearing as a genuine, profitable customer. To give the illusion of being a
desired customer, the company regularly and repeatedly uses the bank to get
payment from one or more of its customers. These payments are always made, as
the customers in question are part of the fraud, actively paying any and all
bills raised by the bank. After time, after the bank is happy with the company,
the company requests that the bank settles its balance with the company before
billing the customer. Again, business continues as normal for the fraudulent
company, its fraudulent customers, and the unwitting bank. Only when the
outstanding balance between the bank and the company is sufficiently large, the
company takes the payment from the bank, and the company and its customers
disappear, leaving no-one to pay the bills issued by the bank.
· Booster cheques
A booster cheque is a fraudulent or bad
cheque used to make a payment to a credit card account in order to "bust
out" or raise the amount of available credit on otherwise-legitimate
credit cards. The amount of the cheque is credited to the card account by the
bank as soon as the payment is made, even though the cheque has not yet
cleared. Before the bad cheque is discovered, the perpetrator goes on a
spending spree or obtains cash advances until the newly-"raised"
available limit on the card is reached. The original cheque then bounces, but
by then it is already too late.
· Prime bank fraud
The "prime bank" operation
which claims to offer an urgent, exclusive opportunity to cash in on the
best-kept secret in the banking industry, guaranteed deposits in "prime
banks", "constitutional banks", "bank notes and bank-issued
debentures from top 500 world banks", "bank guarantees and standby
letters of credit" which generate spectacular returns at no risk and are
"endorsed by the World Bank" or various national governments and
central bankers. However, these official-sounding phrases and more are the
hallmark of the so-called "prime bank" fraud; they may sound great on
paper, but the guaranteed offshore investment with the vague claims of an easy
100% monthly return are all fictitious financial instruments intended to
defraud individuals.
IDENTITY FRAUD
Identity theft is a serious crime affecting as many as 10 million
Americans a year (as estimated by the Federal Trade Commission) and accounting
for the loss of $221 billion a year worldwide (as estimated by the Aberdeen
Group) Identity theft occurs when someone uses
your personally identifying information (like your name, social security
number, or credit card information) to pretend to be you. The identity thief
does this for his own personal gain at the expense of his victim.
This is fraud and it could result in
serious consequences for the victim such as bad credit reports or even warrants
for the victim's arrest, depending on what the thief chooses to do with the
victim's personal information.
An identity thief may use your information to:
·
Open a new credit
card, phone, or utilities account in your name and then run up the bills
without paying them. The delinquent account then appears on your credit report.
·
Open a bank account
and write bad cheques in your name, apply for a loan in your name, or use your
bank information to drain your account.
·
File a fraudulent tax
return, or apply for government benefits in your name.
·
Get a driver's
license with your information but his own picture on it.
·
Give your personal
information to police during an arrest. Then when he does not show up for the
court date, a warrant of arrest is issued in your name.
There are a number of methods a skilled identity thief may use to
steal your information. These include:
·
Shoulder Surfing: watching you from a nearby location as you punch in
your pin codes or listening as you give someone else your personal information
over the phone
·
Dumpster Diving: rummaging through your trash to find bills or other
documents with your name and personal information on them
·
Stealing: stealing mail (including bills, credit card statements,
credit card offers, and tax information), or even stealing wallets and purses
to gain access to documents with your personal information on them
·
Bribing: bribing employees (such as government, bank, or credit card
company employees) who have access to your personal information
·
Pretexting: using false pretenses to obtain your personal information
from banks, phone, credit companies, and other companies
·
Skimming: using a special storage device to scan and remember your
credit and debit card numbers when you use your cards
·
Phishing: pretending to be a financial institution or other company
(like a lotto company) and sending you spam or pop-up advertisements to persuade you to reveal your personal
information
·
Changing your
address: completing a change
of address form to divert your billing statements and other mail to another
location where this information is easily accessible
The following is a list of
warning signals indicating that you may be a victim of identity theft:
·
Your
credit card statement includes purchases you didn't make or your bank statement
includes withdrawals you didn’t make
·
You
receive a credit card that you did not apply for
·
You
are denied credit or offered less favorable credit than your past spending
deserves
·
You
get a denial of credit that you didn't apply for
·
You
receive credit card or bank statements in your name but you do not hold the
account they're billing you for
·
You
no longer receive credit card, bank, or utilities statements.
·
You
applied for a credit card or bank account but you are not getting a card or
statements
·
You
notice some of your mail is missing
·
You
receive notice of a mail redirection request you didn't make
·
You
receive bills from companies you don't recognize
·
There
are credit cards or loans that you didn't open listed on your credit history
·
Your
credit report reveals inquiries from companies you never dealt with
·
Debt
collection companies try to collect debts that aren't yours
·
You
are arrested for a crime you didn't commit
COMPUTER
FRAUDS
Computer fraud is the use of information
technology to commit fraud. In the United
States, computer fraud is specifically proscribed by the Computer
Fraud and Abuse Act, which provides for jail time and fines.Types of computer fraud vary and can be complex or simple. Simple types of fraud might include:
- Sending hoax emails intended to scare people.
- Illegally using someone else’s computer or “posing” as someone else on the Internet.
- Using spyware to gather information about people.
These actions are computer
fraud because they are deliberate misrepresentations of the truth. They
progress into more harmful actions as they grow more complex and include:
- Emails requesting money in return for “small deposits.”
- Pyramid schemes or investment schemes via computer with the intent to take and use someone else’s money.
- Emails attempting to gather personal information to be used to access and use credit cards or social security numbers.
- Using someone else’s computer to access personal information with the intent to use such fraudulently.
- Using the computer to solicit minors into sexual alliances.
- Violating copyright laws by copying information with the intent to sell information, like DVDs, CDs.
- Hacking into computer systems to gather large amounts of information for illegal purposes.
- Hacking into or illegally using a computer to change information, such as grades, work reports, etc.
- Sending computer viruses or worms with the intent to destroy or ruin someone else’s computer.
·
Even though there are stiff penalties
for committing computer fraud, laws governing against it may be difficult to
enforce. Some of the email scams for investment opportunities
and get rich quick schemes originate outside of the US, and it may be difficult
to instigate investigations on foreign soil. It’s therefore wise to be wary and
commit to the following computer philosophy when you’re on the net:
1) Do not give personal information to anyone or to any
company you’ve never heard of before. This includes your full name, your address,
your phone number, credit card number, social security
numbers, or information about the people in your household.
2) Do not pay attention to get rich quick schemes. If
they seem too good to be true, they absolutely are.
3) Do not open emails from strangers. Install anti-viral
software and spam blocking programs on your computer and
your email program.
4) Don’t download
attachments from people you don’t know.
5) Teach your children about safe communication on the
Internet to protect them from Internet predators.
6) Don’t keep passwords on your computer, and do not use
common passwords like the names of your kids, birthdays, or other guessable
words. Never give your password to someone else.
CORRUPTION
IN PUBLIC PROCUREMENT Corruption is defined by the World Bank and Transparency International (TI) as “the misuse of public office for private gain.” As such, it involves the improper and unlawful behavior of public-service officials, both politicians and civil servants, whose positions create opportunities for the diversion of money and assets from government to themselves and their accomplices
There are two widely-acknowledged dimensions of corruption—supply and demand-side. Supply- side is the private sector that gifts or bribes the government officials who, in turn, constitutes the demand-side or the receivers. Over the past two decades, anti-corruption measures have targeted only the demand-side either by limiting the government officials’ vulnerability to bribes or in-kind gifts through enactment of laws or by empowering the people through advocacy against the demand-side corruption. Although legal measures against the demand-side corruption are important in their own right, we have often ignored the role of the private sector as a supplier of corrupt payments and a vulnerable sector for corruption itself
Previously,
the private sector believed that corruption exists because the government
officials are corrupt and did not consider itself as encouraging corruption.
Over the years, the private sector has been established as an equal participant
in corruption transaction, and efforts to limit its ability and vulnerability
to engage in corruption are therefore, equally and urgently needed. In our
mainstream corruption debate, demand-side often draws the attention while
supply-side is hardly a matter of public concern. Though the activism against
corruption in post-1990 period scaled up new heights in terms of awareness,
capacity building and empowerment, yet there has not been much advocacy to
address the supply side of corruption.
Over the
years, the private sector has been established as an equal participant in
corruption transaction. However, in our mainstream corruption debate,
demand-side often draws the attention while supply-side is hardly a matter of
public concern.
Corruption is a central and a growing challenge for businesses and society— from informal vendors in the least developed countries (LDCs) to multinational companies in the industrialized ones—for citizens, communities and countries, all over the world. Corruption in private sector directly impedes development and makes a few people rich at the cost of many. Lack of a coherent policy and an in-built system to prevent corruption within the corporate sector can distort the national economy and limit the growth of the private sector eventually.
As corruption takes place at the interface of the public and private sector, bringing one into the legal net and leaving out the other has made our anti-corruption fight one-sided. We have seen many corporate corruption scandals over the years. But, a few of them have come under the judicial hammer. The Petroleum Subsidy scandals and most recently Lawan/Otedola scam are some of the most notorious corruption swindles in or by the corporate sector. And in most of these cases, supply-side is hardly or inadequately penalized for the offence due to lack of a concrete policy. Taking into account the rapidly changing forms of corruption, we need to address the corruption in and by the private sector as seriously as in the public sector by widening the legal nets to tackle the menace.
Corruption has become so rampant that we now need to review the existing laws to prosecute even the bribers and the corporate corruption. Africa is no exception to this phenomenon as majority of the anti-corruption interventions worldwide have focused on the demand-side only. Though the supply-side doesn’t adequately figure in anti-corruption discourse, it has now become imperative to address this almost ignored dimension by mainstreaming it in governance policies and laws. Dealing with corruption through a two-pronged approach—supply-side and demand-side is now more urgent than ever given its magnitude and its adverse effects on economy, development and democratic system at large.
Corruption is a central and a growing challenge for businesses and society— from informal vendors in the least developed countries (LDCs) to multinational companies in the industrialized ones—for citizens, communities and countries, all over the world. Corruption in private sector directly impedes development and makes a few people rich at the cost of many. Lack of a coherent policy and an in-built system to prevent corruption within the corporate sector can distort the national economy and limit the growth of the private sector eventually.
As corruption takes place at the interface of the public and private sector, bringing one into the legal net and leaving out the other has made our anti-corruption fight one-sided. We have seen many corporate corruption scandals over the years. But, a few of them have come under the judicial hammer. The Petroleum Subsidy scandals and most recently Lawan/Otedola scam are some of the most notorious corruption swindles in or by the corporate sector. And in most of these cases, supply-side is hardly or inadequately penalized for the offence due to lack of a concrete policy. Taking into account the rapidly changing forms of corruption, we need to address the corruption in and by the private sector as seriously as in the public sector by widening the legal nets to tackle the menace.
Corruption has become so rampant that we now need to review the existing laws to prosecute even the bribers and the corporate corruption. Africa is no exception to this phenomenon as majority of the anti-corruption interventions worldwide have focused on the demand-side only. Though the supply-side doesn’t adequately figure in anti-corruption discourse, it has now become imperative to address this almost ignored dimension by mainstreaming it in governance policies and laws. Dealing with corruption through a two-pronged approach—supply-side and demand-side is now more urgent than ever given its magnitude and its adverse effects on economy, development and democratic system at large.
What causes and
fuels corruption
Corruption distorts resource
allocation and government performance. The causes are many and vary from one
country to the next. Among the contributing factors are:
·
Policies,
programs and activities that are poorly conceived and managed,
·
Failing institutions,
·
Poverty and Deprivation
·
Income disparities,
·
Inadequate civil
servants’ remuneration,
·
Lack of
accountability and transparency.
Political
and or Economic Brigandage
EXAMPLES OF CORRUPTION AT VARIOUS STAGES OF
PROCUREMENT
Pre-qualification
and tender
1. Loser’s
fee
2. Price
fixing
3.
Manipulation of pre-qualification
4. Bribery
to obtain main contract award
5. Bribery
during sub-contract procurement
6.
Corruptly negotiated contract
7.
Manipulation of design
8.
Specification of overly sophisticated design
9.
Inflation of resources and time requirements
10. Obtaining
a quotation only for price comparison
11.
Concealment of financial status
12.
Intention to withhold payment
13.
Submission of false quotation
14.
Falsely obtaining export credit insurance
Project
execution
15. False
invoicing: supply of inferior materials
16. False
invoicing: supply of less equipment
17. False
work certificates
18.
Excessive repair work
19.
Overstating man-day requirements
20.
Inflated claim for variation (1)
21.
Inflated claim for variation (2)
22. False
variation claim
23. Issue
of false delay certificate
24. False
extension of time application
25. False
assurance that payment will be made
26.
Delayed issue of payment certificates
27.
Concealing defects (1)
28.
Concealing defects (2)
29.
Set-off of false rectification costs
30. Refusal
to issue final certificate
31.
Requirement to accept lower payment than is due
32.
Extortion by client’s representative
33.
Facilitation payment
34.
Overstating of profits
35. False
job application
Dispute
resolution
36.
Submission of incorrect contract claims
37.
Concealment of documents
38.
Submission of false supporting documents
39. Supply
of false witness evidence
40. Supply
of false expert evidence
41.
Bribery of witness
42.
Blackmail of witness
43. False
information as to financial status
44. False
statement as to settlement sum
45.
Over-manning by law firm
46.
Excessive billing by lawyer
47.
Complicity by lawyer
To enable
us do a thorough job on corruption in procurement, a whole week course might be
required.
·
Psychology of fraud: what motivates the
fraudster
*
Pressure or Incentive - Perceived need is often created by expensive addictions
such as substance abuse, sex addiction, gambling addiction, and spending
addiction. Typically, a person committing fraud has an incentive or is under
some sort of financial pressure. There may be an unexpected financial crisis in
the family or the individual may be living beyond her/his means. Companies are limited in how much they can
prevent this. However, companies should be aware of changes in behavior and
spending that may raise red flags. Not to trivialize it, but please remember
the four 'Bs' of perceived need: Beer, Boobs, Betting,
and Borrowing.
Once begun,
the fraud typically continues, and even grows. The fraudster gains confidence
and becomes accustomed to the enhanced financial situation. Many fraudsters
initially tell themselves that the scheme is only temporary. Once the current
crisis (or after whatever drove the perpetrator to hatch the scheme in the
first place) has passed, the illegal activity will stop. In fact, this rarely
occurs. The fraudster grows confident and typically enlarges the scam.
Perpetrators may believe that they will repay the
funds after the current crisis passes. They might even develop a plan to save
up the amount to repay the funds. Again, repayment of the stolen money rarely
occurs, unless the court orders it.
Rationalization - Never underestimate
the ability of the human mind to rationalize anything. The criminal mind can
actually rationalize a crime as being a benefit to society. Great fraudster
Frank Abignale bragged in his book, Catch Me If You Can,
that he only bilked large corporations and not
individuals. He was doing them a favor by exposing their weaknesses. Fraudsters
must be able to rationalize their schemes to themselves or embrace an attitude
that the fraud is somehow justified; thus, rationalization or attitude is a
factor typically found in a fraud situation. People who commit fraud may be
able to convince themselves that the wrongdoing is only temporary and will stop
when the financial crisis does. They may believe that they will repay the
money. Further, people who commit fraud might feel that they need the money
more than the entity. Somehow, they are justified in taking the money or goods
or services. They might believe that they deserve the extra money, perhaps to
right a perceived injustice.
Opportunity - This is one area that
companies have the ability to control. Opportunity is the means to steal
whether it is leaving the supply closet unlocked or an inadequate system of
internal control and segregation of duties. There may be a lack of
adequate controls in place. The fraudster is able to take advantage of that
shortcoming in the system of internal control and where suitable controls are
in place, the individual may be able to override the system. The perpetrator
may be at a high level in the organization and have the authority to bypass the
system. The presence of all three factors or points of the triangle heightens
the likelihood of fraud occurring in an organization. The higher the level of a
specific factor that is present, the more likely it is that a fraud has
occurred.
OCCUPATIONAL
FRAUD
The term
"occupational fraud and abuse" is broadly defined as "the use of
one's occupation for personal enrichment through the deliberate misuse or
misapplication of the employing organization's resources or assets”
This happens mostly
through the under listed fraudulent schemes:
LARCENY
Larceny, according to
Black's Law Dictionary, is "felonious stealing, taking and carrying,
leading, riding, or driving away with another person's property, with the
intent to convert it or to deprive the owner thereof.
The key element in a larceny scheme is the fact that there
is no effort to cover up the theft. Unlike the skimming schemes defined below,
the cash has already been recorded on the books. In general, cash larceny
schemes are not a high risk area for businesses. Presumably because adequate
physical controls exist over the custody of cash in most organizations, these
schemes accounted for only one percent of the total losses identified in the
study
SKIMMING
"Skimming" is the embezzlement of cash from an
entity prior to its being recorded on the books
GROUP CASE STUDY 1
Take
a look at the result of the Association of Certified Fraud Examiners Survey on
various cases of fraud in 2012
Summary
of Findings of the ACFE in 2012 Report to the Nation
• Survey participants estimated that
the typical organization loses 5% of its revenues to fraud each year. Applied
to the 2011 Gross World Product, this figure translates to a potential
projected annual fraud loss of more than $3.5
trillion.
• The median loss caused by the
occupational fraud cases in our study was $140,000. More than
one-fifth of these cases caused losses of at least $1 million.
• The frauds reported to us lasted a
median of 18 months before being detected.
• As in our previous studies, asset
misappropriation schemes were by far the most common type of occupational
fraud, comprising 87% of the cases reported to us; they were also the least
costly form of fraud, with a median loss of $120,000. Financial
statement fraud schemes made up just 8% of the cases in our study, but
caused the greatest median loss at $1 million.
Corruption schemes fell in the middle,
occurring in just over one-third of reported cases and causing a median loss of
$250,000
Occupational fraud is
more likely to be detected by a tip than by any other method.
The majority of tips reporting fraud come
from employees of the victim organization.
• Corruption and billing schemes pose
the greatest risks to organizations throughout the world. For all
geographic regions, these two scheme types comprised more than 50% of
the frauds reported to us.
• Occupational fraud is a significant
threat to small businesses. The smallest organizations in our study
suffered the largest median losses.
These organizations typically employ fewer
anti-fraud controls than their larger counterparts, which increases their
vulnerability to fraud.
• As in our prior
research, the industries most commonly victimized in our current study were
the banking and financial services, government and public
administration, and manufacturing sectors.
• The presence of anti-fraud controls
is notably correlated with significant decreases in the cost and duration of
occupational fraud schemes. Victim organizations that had implemented
any of 16 common anti-fraud controls experienced considerably lower
losses and time-to-detection than organizations lacking these controls.
Perpetrators with higher
levels of authority tend to cause much larger losses. The median loss
among frauds committed by owner/ executives was $573,000, the median
loss caused by managers was $180,000 and the median loss caused
by employees was $60,000.
• The longer a perpetrator has worked for
an organization, the higher fraud losses tend to be. Perpetrators with more
than ten years of experience at the victim organization caused a median
loss of $229,000. By comparison, the median loss caused by perpetrators
who committed fraud in their first year on the job was only
$25,000.
• The vast majority (77%) of all frauds
in our study were committed by individuals working in one of six departments:
accounting, operations, sales, executive/upper management, customer service and
purchasing. This distribution was very similar to what we found in
our 2010 study.
• Most occupational fraudsters are
first-time offenders with clean employment histories.
Approximately 87% of occupational
fraudsters had never been charged or convicted of a fraud related offense, and
84% had never been punished or terminated by an employer for fraud-related
conduct.
Required:
1. Against the backdrop of
the above revelations, write a professional letter of recommendation to the
appropriate minister, detailing how to deal with the problems of fraud in your
country.
rEFERENCES/fURTHER READING:
·
Strategic Fraud
Detection: A Technology-Based Model, Conan C. Albrecht and W. Steve Albrecht (Rollins Centre for e-Business)
·
Report to the
Nation, 2012 by the ACFE
DAY 2
INTERVIEWING FOR FRAUD IN THE AUDIT
PROCESS
WHAT THE STANDARDS SAY
Statement of Auditing Standards (SAS) no. 1, Responsibilities and Functions of the Independent Auditor, says, “The auditor has responsibility to plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement, whether caused by error or fraud.” SAS no. 99, Consideration of Fraud in a Financial Statement Audit, reiterates that concept and places a heavy emphasis on making inquiries. Paragraphs 20 through 26 enumerate those questions that Auditors should ask management in checking for fraud risk.
Paragraph
27 is clear: “The auditor should be aware when evaluating management’s
responses to inquiries…that management is often in the best position to
perpetrate fraud.” Indeed, therein lies the challenge: Some people in positions
of trust commit wrongdoing, and those committing wrongful acts and fraud
can—and do—lie to auditors and/or managers/investigators. Statement of Auditing Standards (SAS) no. 1, Responsibilities and Functions of the Independent Auditor, says, “The auditor has responsibility to plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement, whether caused by error or fraud.” SAS no. 99, Consideration of Fraud in a Financial Statement Audit, reiterates that concept and places a heavy emphasis on making inquiries. Paragraphs 20 through 26 enumerate those questions that Auditors should ask management in checking for fraud risk.
Interviews are a useful audit tool to gather
information about internal controls and fraud risks for several reasons. First,
employees involved in the day-to-day operations of a functional area possess
the best knowledge of that area. They are in an excellent position to identify
weak internal controls and fraud risks. Second, although most employees are not
directly involved in fraud, they may have knowledge of suspected, or actual,
frauds that interviews can bring to light. Third, employees may be reluctant to
tell management about needed internal controls and suspected or actual fraud,
even when a company has an ethics hotline, a compliance officer, or other
reporting mechanisms. When interviewed, however, employees are often willing,
even relieved, to talk about these issues.
The Information Needed In Audit
Process
A primary difference between SAS 82 and SAS 99,
which superseded it, is that the latter includes expanded requirements for
inquiries of management. Making inquiries of management is important because
senior management is often in the best position to perpetrate and conceal
fraud. In obtaining information necessary to identify the risk of fraud in a
financial statement audit, SAS 99 requires auditors to ask the following
questions:
- Does management communicate its views on ethical business behavior to its employees?
- Does management have programs and internal controls designed to prevent, deter, and detect fraud?
- Does management discuss with the audit committee of the board of directors how its internal control system serves to prevent, detect, and deter fraud?
- Does management understand the fraud risks specific to its business?
- Does management monitor fraud risks relevant to specific components or divisions within the entity?
- Does management have any knowledge or suspicion of fraud?
- Is management aware of any allegations of fraud?
In addition to management inquiries, SAS 99 also
requires an auditor to inquire of the audit committee and of internal audit
personnel about their views on the company’s fraud risks. Significantly, SAS 99
mandates that other individuals within the company also be questioned
about the risk of fraud. Paragraph 24 of SAS 99 states:
The auditor should use professional judgment to
determine those others within the entity to whom inquiries should be directed
and the extent of such inquiries. In making this determination, the auditor
should consider whether others within the entity may be able to provide
information that will be helpful to the auditor in identifying risk of material
misstatement due to fraud.
SAS 99 suggests that auditors
inquire of operating personnel with varying levels of authority, of in-house
legal counsel, and of others knowledgeable of fraud risk. Because employees are
often aware of where specific fraud risks lie, auditors should understand
employees’ views on the risk of fraud. Additionally, auditors should look for
discrepancies in information received from various interviewees. Unusual
situations or conditions identified through interviews with management and
others can be revealing
The purpose of the interview is to learn new
facts or to confirm previously obtained information. An interrogation, or
“truth-seeking interview,” is in many ways the opposite. The primary difference
is the state of mind of the interviewee. In an interview, the interviewee is
generally a willing participant assisting the interviewer in the process of
determining the facts. An interrogation occurs only when a suspected fraudster
has been identified. The interviewer’s task is to persuade the individual to
admit to an act or omission that he has no intention of divulging.
Interviewing requires the ability to organize
thoughts and discussion along a logical path. Interrogation requires those
skills coupled with the ability to persuade an individual to say something that
runs contrary to his survival instincts.
Venue of the interview: The interview should have a tone that is formal, friendly, and
nonthreatening; should follow a predetermined structure; and should result in
meaningful fact-finding. An interviewer should prepare a set of questions and
an introductory statement that explains the purpose of the interview. This
preparation will set the tone for a serious, purposeful, and effective
interview.
The interview should always be conducted in
private. If the interviewee’s workstation is not sufficient, then the
interviewer should use a meeting room. An interview is most successful when the
subject is comfortable and at ease. Most people are more comfortable in their
own work environment and when they can answer questions without concern that a
coworker might be eavesdropping.
It is essential in the early part of the
interview for the auditor to build a rapport with the interviewee in order to
encourage an open discussion. Structuring questions to progress from the
general to the specific allows the interviewer to first build a rapport, and
then observe changes in an interviewee’s behavior that may signal a suspicious
or sensitive topic as the questions become more focused. Skilled interviewers
are always cognizant of indicators of deception that may be displayed by any
individual attempting to mislead the interviewer. False statements, however,
are not always indicators of fraud; they may be covering up an individual’s
perceived personal or professional deficiencies.
Making a false statement during an audit
interview is stressful for most people. When a false statement is made, the
interviewee releases the stress verbally, nonverbally, or in both ways.
Indicators of deception vary from individual to individual. They can be as
subtle as a change in voice tone or as obvious as a sudden change in
complexion. A skilled interviewer must be trained to identify these indicators
and have a thorough understanding of their potential significance.
Because the main purpose of the fact-finding
interview is to seek information, open-ended questions should be emphasized.
Questions should be structured to encourage the interviewee to volunteer
information. For example, “What internal control problems do you have in your
department with respect to cash receipts?” will likely provide more information
than the closed-ended question, “Are all daily cash receipts deposited intact?”
Interviewers should be good listeners and never interrupt an open-ended
response. One of the last questions asked in each interview should be very
open-ended; for example, “Is there anything else you would like to tell me
regarding the operations of your department?” or “Have I failed to discuss an
important topic with you?” Joseph Wells, chairman and founder of the
Association of Certified Fraud Examiners, advises that the last question should
be whether the interviewee has participated in any fraudulent activities
against the company. Asking this question provides documentation that may prove
invaluable if a lawsuit involving financial statement fraud or asset
misappropriation occurs later.
To minimize legal risk, auditors should gear the
discussion solely toward fact-finding questions or statements and away from
accusatory questions or statements. For example, asking, “Have you stolen any inventory
from the company?” is acceptable, but asking, “You have stolen inventory in the
past from the company, haven’t you?” is not, due to the embedded accusation.
Interview Subjects
SAS 99, paragraph 6, identifies the two types of
fraud that auditors should be aware of as “misstatements arising from
fraudulent financial reporting and misstatements arising from misappropriation
of assets.” As a result, inquiries should be directed toward individuals
concerned with financial reporting as well as those with direct or indirect
access to the company’s assets.
The CEO and the CFO should be carefully
interviewed by a partner or experienced audit manager about their knowledge or
suspicion of fraud. These executives have the power to override internal
controls, and therefore are in a position to perpetrate and conceal fraud.
Their administrative assistants may be privy to sensitive information and may
suspect or be aware of fraudulent activity, and should also be interviewed.
Individuals may be aware of fraudulent activities but not disclose them unless
specifically asked.
DAY 3: FRAUD INVESTIGATION
INVESTIGATION AND EXPERT
WITNESS TESTIMONY
PRE-READING NOTE
A fraud investigation can cover
a wide variety of issues and actions. Fraud investigations and forensic enquires
may not involve actual fraud or corrupt behavior but may instead be concerned
with a breach of company policy, a problem with health and safety, harassment,
or an investigation into security. Fraud itself is defined as a
misrepresentation that is intended to deceive a person or business. Companies
can be accused of fraud if they make claims about a product they sell that are
untrue or made up only in order to make a profit. Fraud investigations are
carried out to determine whether fraud has taken place or whether there is
evidence of the fraud. Fraud can cause serious problems not only concerning
loss of money but physical harm to people and harm to reputations. Fraudulent
behavior or unethical actions can impact strongly on a business. Unethical behavior
can bring emotional as well as financial trauma from which a business may take
years to recover.
Fraud investigations occur when
fraud is suspected, and the fraud investigator meets with the client to find
out what is alleged to have happened. When fraudulent behavior is known to have
taken place, the investigator focuses on why and how it occurred and what can
be done to prevent it
happening again in the future.
Fraud investigations cover a
number of procedures, including the thorough analysis of electronic data.
Computer forensics is vitally important when dealing with fraudulent or
unethical actions in businesses today.
It
can reveal evidence that would otherwise never have come to light — evidence
can be hidden within mountains of electronic data, and only professional
computer forensic investigators will be able to uncover it. Computer forensics
is one of the first procedures to be carried out in a fraud investigation —
making sure that dates and time stamps on files are not changed, and that
critical information is not overwritten.
A fraud investigation should always be
carried out from an objective position and supported by documented evidence.
The investigation should be carried out by a neutral professional, so that the
company can ensure it is seen to be complying with a commitment to objectivity.
The practices used within a fraud investigation should be consistent and
thorough.
INVESTIGATION AND EXPERT WITNESS TESTIMONY
Forensic Accountants are often
called upon to initiate a fraud investigation for the primary purpose of
determining whether a fraud has occurred. Other reasons for initiating a fraud
investigation include the following: a tip or concern received (from an
employee, a vendor, a customer, or other source), an accidental discovery,
fraud uncovered as a result of an audit, or a concern from the business as to
the adequacy of their internal controls system.
Fraud Investigation
A fraud investigation is the
systematic examination to obtain the truth as to:
1.
Whether a fraud has occurred
2. Who
is involved
3. How
it was perpetrated
4. How
much is involved
Fraud Investigation versus
Accounting Audit
While a fraud investigation requires the use of both accounting and
investigatory skills, it is vastly different from an accounting audit. Joseph
T. Wells, the founder of the Association of Certified Fraud Examiner (ACFE),
has said, “A good fraud examiner is part accountant, part psychologist, and
part lawyer,” There are four key areas in which a fraud investigation differs
from a financial statement audit. Target, Purpose, Techniques employed, and
Required Standards.
Example - Key Areas of Fraud Investigation
Differing From Financial Statement Audit.
|
Target
|
Purpose
|
Techniques Employed
|
Required Standards
|
Financial Statement Audit
|
Examination of financial ,data, i.e financial statements
|
Express an opinion on the financial data i.e, financial statements
|
Audit sampling examination of financial data confirmation
|
SAS No.99 requires auditors to approach audits using professional
skepticism
|
Fraud Investigation
|
Resolve one or more very specific allegations of fraud
|
Determine if fraud has occurred, who is involved, and what do they
know
|
|
Sufficiency of proof in order to either prove or disprove the fraud
allegation
|
The differences between forensic accounting/fraud investigation and
auditing can be explained by how they vary by scope, nature, purpose,
frequency, methods used, and presumption.
Steps in
Conducting a Fraud Investigation
Overview
The process known as a fraud
investigation, or fraud examination, is best described as a thorough inquiry.
The forensic accountant is searching for information in order to determine the
truth. There are five key steps in conducting the investigation:
-gathering record,
-looking for patterns,
-determining possible fraud
theories,
- interviewing witnesses,
- and the report.
Gather the Records
Forensic
accountants are well-acquainted with the activities of this step, mainly to
gather documents used within the organization. Records would include vendor
invoices, customer invoices, cancelled checks and bank statements, purchase
orders and receiving reports.
Look for Patterns and
Irregularities
After
gathering the necessary organizational document, the forensic accountant will
review and analyze the documents to look for patterns and irregularities. The
accountant may use analytical procedures, sampling techniques, and ratio
analysis in order to determine if patterns or irregularities exist within the
data.
Determine Possible Fraud
Theories
After
inspecting and analyzing the documents, the forensic accountant will be able to
develop a possible fraud theory (or multiple theories). The theory will
identify potential schemes and methods used. As theories are developed, the
accountant will need to “test” the theory to determine likely scenarios for the
fraud.
Interview the witnesses
This
step is undertaken usually to support an allegation of fraud. Before beginning
this step, the forensic accountant should recommend that the clients advise
their legal counsel. There may be additional considerations to include, for
which the attorney can be a resource.
Write the report
Great
care needs to be given to writing the report, and a separate chapter of this
text addresses the critical elements of a written report.
Fraud
Interview Questions
A fraud
interview is nothing more than a structured meeting in which questions are
designed to elicit information from witnesses. The interviewer may be scheduled
to ask only one question, but more often, the interview is comprised of a
series of questions. There is an art to asking questions, and the means to
acquiring the artful skill is through practice.
·
Fraud examiners should conduct the interview in a
manner so as to ensure the individuals privacy, and the interview should be
conducted under reasonable circumstances. They must ensure that they are not
accusing the individual of the fraud in the course of the interview.
·
The fraud examiner should be direct in asking the
subject specifically if she/he has committed the fraud. If the case should go
to litigation and the examiner is attacked professionally, she/he would be able
to respond that all individuals in question, during the course of the
investigation, were asked if they were involved with the fraud. This
establishes that the fraud examiner did not avoid her/his professional responsibility.
INTERVIEWING FRAUD SUSPECTS
Good Fraud Interview
A good interview should be
succinct, but last long enough to disclose the significant facts. The interview
should also occur as soon after the event as possible, in order to avoid losing
key details. The interview should be conducted privately, so that others can
neither hear nor observe the interview.
Forensic Accountants
Forensic accountants can
increase their success as interviewers by advocating these seven key
attributes:
1. Organized
The interviewer should know, in
advance, the primary questions to ask. She/he should write them down and spend
time reviewing them prior to the interview. The interviewer should be sure to
organize and review the records, documentation and be familiar with the specific
areas needing to be examined. Most fraud investigations include interviews with
those who have general knowledge and interviews with others who will have
specific knowledge, so be sure to give consideration to the source of
information each witness can provide.
The interviewer should be organized and focused. The interviewer
should stay on task and not use diversionary tactics to trick the witness.
2. Engaged
Outward demeanor is vital in
establishing rapport. The interviewer should wear appropriate attire, and when
the interviewer first meets the interviewee, she/he should introduce
her/himself in a friendly manner. The interviewer should try to put the other
person at ease with a warm smile, friendly handshake, and pleasant eye contact.
The interviewer should keep in mind that most witnesses will want to share what
they know with her/him, so allow the interviewees to “tell their story”.
3. Thoughtful
The interviewer should ask the
interviewee if she/he is comfortable, or whether she/he needs something to eat
or drink. Showing consideration for the other person, especially if she/he is a
suspect, will allow the building of cooperation. It is good for the interviewer
to establish a rapport before beginning the question. It is good idea to spend
a few minutes engaging the interviewee in some “small talk” before explaining
the purpose of the interview.
Example - Poor Example for Interviewer’s Introduction
Hi, miss Brennan, I’m Dr. Richard, and I’m with Richard & Linus
Forensic Accountants, I’m here to find out what you know about the recent
employee embezzlement case. I believe you know a lot about what happened, and
I’m here to find it out.
Example – Good Example for Interviewer’s Introduction
Hi, miss Brennan. I’m Dr. Richard. I’m not sure we’ve met before, but
I appreciate you taking some help and wondered if you might have a few minutes
to spend with me?
4. Listening
The interviewer should be
careful not to talk too much. The interviewer is there to glean details of what
the witness knows, so she/he should provide information and then allow the
witness to answer. A good balance of time for the interviewer is 20 percent
talking and 80 percent listening.
5. Flexible
While some interviewers like to
have their questions written down, it is good to remain flexible during
interview process. As the witness
provides information, new details may be disclosed. If the interviewer strictly
follows a script of questions, she/he will, most likely, miss asking questions
about the uncovered information, which could be crucial to the investigation.
It may be good instead, to have key thoughts noted in a short version. This
would also help guard against the witness reading your questions in advance.
6. Observant
Another reason to omit having a
script of questions is that it allows the interviewer to be observant to the
nonverbal behavior of the witness. Individuals have a relaxed body language
that charges when they are under stress. The interviewer will want to watch for
the changes and note their body language when the witnesses are responding to
the easy questions, and how behavior changes when they are replying to the more
difficult questions. Understanding the changes will help assess whether the
witness is responding truthfully.
7. Non-Threatening
If the witness perceives she/he
is a target of the inquiry, she/he will be less likely to cooperate. The
interviewer should appear fair in the line of questioning and phrase the
questions in a non-accusatory manner. The interviewer should not interrupt the
witness as she/he is answering the questions. The witness will be more
compliant if the interviewer expresses interest in hearing her/his story,
appears non-judgmental, and displays respect.
Understanding Body Language
Communication with others is
expressed not only through our words and tone, but is also represented through
our body language, As fraud examiners, we want to focus on charges within the
behavior, as change may be an indicator of deception. When an individual
attempts to deceive, her/his body experiences stress. As she/he increases
her/his deception, so does the level of stress increases. The more stress
created in the body, the easier it is to observe the stress.
The presence of physical
indicators (see list below) may not indicate a witness acting in a deceptive manner.
The subject may just be extremely nervous; however, it is necessary to watch
the changes (or clusters of changes) within the indicators.
The following is a list of some physical indicators:
1.
Placing hand in front of mouth when speaking
2.
Excessive blinking or blinking too quickly
3.
Frequent touching of the nose (the nose is especially sensitive to stress)
4.
Raising of eyebrows
5.
Crossing of arms or legs
6. Lack
of eye contact (or an excess of eye contact)
7.
Tapping of fingers feet
8.
Frequent swallowing
9.
Constant touching of hands to face or head
10.
Holding tightly to arms of chair
11.
Sweating
12.
Shifting posture
It is not uncommon for someone who is innocent to display some of the
above indicator behaviors, especially as the interview first begins. The role
of a fraud examiner is to reduce the amount of anxiety the witness is
experiencing. Then, as the interview continues, note any changes, which signal
changes to the subject’s level of stress.
GROUP CASE STUDY
In late December, Emeka Yaqoob, a former loan officer with
Suwegbe Bank (N254 billion in assets) of Shrine Estate, Okija., reached a plea
agreement in Ajirebi District court after being indicted on 18 counts of bank
fraud stemming from his employment at Suwegbe. According to the Department of
Justice, Yaqoob falsified loan documents between 2004 and 2005. He is
reportedly facing up to 41 years in a federal prison now.
Internal fraud such as that
committed by Yaqoob occurs every day in banks across the world. Typical U.S.
organization loses 5 percent of its annual revenue to internal fraud, and the
banking industry is the hardest hit, according to the 2012 Report to the Nation on Occupational Fraud and Abuse
published by the Association of Certified Fraud Examiners. The ACFE reports
that 14.3 percent of all internal fraud cases occur at banks, with a median
loss of N41.2million per case.
Still, “Banks continue to focus
most of their investment and attention on external fraud applications, despite
the fact that internal fraud is the larger problem," contends Christine
Barry, an analyst who says 60 percent of bank fraud cases are committed by
employees. "Internal fraud is a serious problem and one which they are not
paying enough attention to”.
Required:
1.
Recommend
a company-wide approach aimed at eliminating this menace or at least minimizing
such incidents.
----------------------------------------------------------------------------------------------------------------------------
EXAMPLE OF AN EXPERT WITNESS TESTIMONY IN NIGERIA
IN THE HIGH COURT OF LAGOS STATE
IN THE LAGOS JUDICIAL DIVISION
HOLDEN AT LAGOS
SUIT
NO: LD/?/201?
BETWEEN:
OJORO BANK
PLC ……………………………………. CLAIMANT
AND
JAGUDA
INTERNATIONAL LIMITED …………………........... DEFENDANT
WRITTEN STATEMENT ON OATH OF THE
WITNESS BROUGHT PURSUANT TO ORDER 3 RULE 2 (1) OF THE HIGH COURT OF LAGOS STATE
(CIVIL PROCEDURE) RULES 2004
I, DR.
RICHARD MAYUNGBE, Male, Christian, Certified Forensic Accountant, Financial Expert
and Fraud Examiner of 135, Igbosere Road, Lagos, Lagos State, Nigeria do hereby
make oath and state as follows:
1. That I am a Financial Expert, having
qualified as a holder of the Doctorate Degree (PhD) with specialization in
Finance.
2. That I am further qualified as a
Financial Expert by holding the Master of Business Administration (MBA) with
specialization in Finance.
3. That I am a Certified Forensic Accountant and a Fraud
Examiner and hold the Professional Certification(CPFA) of the Institute of
Certified Forensic Accountants of Canada, and the Associate of the Institute of
Certified Fraud Examiners, (ACFE) of Texas, U.S.A.
4. That I am a Fellow of the Institute
of Company & Commercial Accountants, Fellow of the Institute of Credit
Administration, and an Associate of the Institute of Credit Management , (UK).
5. That I am duly licensed by the
Securities and Exchange Commission (SEC) to offer professional advisory
services in Nigeria and my firm F.A.R Mayungbe & Co is registered with the
Corporate Affairs Commission (CAC) to carry out these services.
6. That I am an Adviser to Messrs.
JAGUDA International Limited, the
Defendant, on matters of accounting, finance, credit, investment, and
management.
7. That I have the consent and authority
of the Defendant to depose to this affidavit and by virtue of my position, I am
conversant with the facts of this case.
8. That the Defendant called for my
services through its Chief Accountant Mrs. Elizabeth Shoocushoocu sometimes in
April 2010 in respect of its Account with Ojoro Bank of Nigeria Plc. Account
Number 00000/001/001/000, which was becoming worrisome.
9. That I demanded for the Letter of
Offer of the Bank Facility together with the Statements of Account of the
Defendants, which was produced by the Claimant and handed over to me to enable
me establish the true position of the account and advise the Defendant
appropriately.
10.
That I carried out my work as engaged and
produced a Report for the Defendant’s easy reference. This document shall be relied upon at the
trial of this suit.
11.
That While I was going through the statement
of account of the Defendant, together with the letter of offer, I discovered
that N150 million was approved by the Claimant for the Defendant.
12.
That the agreed and approved interest rate was
17% per annum and the interest on PRINCIPAL should be MONTHLY SERVED.
13.
That the draw-down took place on 30/07/07.
14.
That surprisingly, the Claimant debited the
first interest charges on 31/07/07 (the second day of the draw-down) against
item 12 above.
15.
That rather than calculating interests as
offered, interests were charged arbitrarily as per the attachments to the
Forensic Accounting Reports. The attachment shall be relied upon at the trial
of this suit.
16.
That the average monthly interest as agreed
was 1.42%, but the average monthly interest charged was 1.75% in contravention
of the offer and acceptance of the facility.
17.
That by their letter of February 23, 2009,
ref: U/C/OO/T/00/0/09, the Claimant approved a concessionary sum of
N169,849,119.63 as full and final payment to the Claimant.
18.
That this is about 4.2% rebate, although on an
incorrectly calculated balance by the Claimant.
19.
That subjecting this rebate to a clean balance
of N169,251,000 as at January 2009, the new concessionary balance as full and
final payment for the Defendant now stands at N162,142,458.00
20.
That the above balance is after taking into
consideration all the re-payments to the Claimant, totaling N17,030,000
That I swear to this
affidavit in good faith.
…………………………………………………………
DEPONENT
SWORN TO AT
THE HIGH
COURT OF LAGOS REGISTRY
LAGOS
THIS………….DAY OF DECEMBER 2010
BEFORE
ME
COMMISSIONER FOR OATHS
End of Example
References/Further Reading:
- www.journalofaccountancy.com
- www.smallbusiness.chron.com
- www.cfe-in-practice.com/lossprevent/fraudprevent.htm
No comments:
Post a Comment