Business

Asset Misappropriation: Theft Schemes

skimming is the withdrawal of cash for a victim company before the transaction is entered into the accounting system. Since theft is a type of off-the-books fraud (it is never recorded), there is no direct audit trail, so fraud is difficult to detect. The employees who have the opportunity to commit skimming schemes are those who deal directly with customers or those who handle their payments. This article will cover the four main categories of skimming schemes and discuss some of the red flags for fraud detection.

Unregistered Sales

The most common form of skimming is not to record the sale of goods but to collect money from the customer. Despite controls such as recording tape, managers, and surveillance equipment, employees can manipulate the system to avoid fraud detection. In some unrecorded sales examples, the fraudster manipulates the record tape so that it does not print on the tape when transactions are entered into the system. One means of detection would be the pre-numbering of the system records, so that if a theft were perpetrated when the fraudster turns the record tape back on, there would be a break in the pre-numbered transactions. Businesses should be especially wary of unrecorded sales schemes with revenue streams that are difficult to monitor and generally of unpredictable value.

Understated sales and accounts receivable

In these skimming schemes, the customer receives a receipt for the full amount of the transaction, but when the employee enters it into the system, it records a discount or lower value sale. To cover their tracks, they may manipulate carbon copies of the receipt by writing their own amounts or generating fake discount documentation. Fraud prevention is possible by requesting approval of sales discounts, checking receipts for tampering, and tracking sales discount history of cashiers.

Theft of checks by mail

In this particular scheme, the sale has been recorded in the company’s system, but the account receivable payment has not been received. The person in charge of receiving the payment in the company physically steals the check and cashes it in the bank. If the clerk is able to overcome check cashing issues such as endorsement and convince the bank that the transaction is legitimate, then he must grapple with how to hide the fraud when the customer’s balance becomes delinquent. If the employee is not careful, the business will send overdue notices to customers likely to result in customer complaints with a copy of the canceled check. Fraudsters have gotten around this by intercepting the ads or manipulating the customer’s address to reroute the mail. A major red flag for the opportunity to commit this scheme is when the employee who receives the mail is also the same person who has the job of recording the receipt. By properly segregating duties and marking all checks for deposit only, a business can easily reduce the potential for this theft scheme.

Short Term Skimming

The last category of short-term theft is less about stealing money than about borrowing it to accumulate time value gains. By delaying receipt of payment, the employee can use the funds for short-term investments that earn interest for the perpetrator. The means of gaining access to the money could be any of the above ways, but there is a clear distinction that in this case the money is ultimately returned to the company and the only loss is the time value of that receipt. Red flags in this area would include a higher days pending sales ratio or unusual payment timing compared to historical customer payment, especially when looking at specific customers.

fraud prevention

Regardless of the skimming method, the most important means of prevention is to establish proper internal controls. Segregation of duties and employee knowledge of the company’s policy on theft can eliminate the opportunity and rationalization of committing these frauds. When early detection fails, skimming can lead to very costly losses and a corporate culture that ignores signs of fraud.

Leave a Reply

Your email address will not be published. Required fields are marked *

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1