Joseph R. Dervaes, CFE, CIA
All Wired Up: Electronic Funds Transfers are Prime Fraud Targets
Theodore Swaggen was above reproach. This eight-year employee of a major Midwest bank, had won the trust of his coworkers and supervisors. But as the supervisor of the bank's wire transfer room, Swaggen handled ridiculous sums of money. He decided it was time to get his hands on some of it; $68.7 million to be exact.
Written By: Joseph R. Dervaes, CFE, CIA
Examining fraud and abuse in trade-skill education programs
This column discusses some of the special situations of examining trade-skill education programs.
Written By: Joseph R. Dervaes, CFE, CIA
Raising frauds, not funds
This column is the first in a three-part series presenting many scenarios of fraud and abuse in student fundraising activities.
Written By: Joseph R. Dervaes, CFE, CIA
Raising funds, not frauds
Article giving recommendations to avoid fraud and abuse in all types of student fundraising activities,along with several cases
Written By: Joseph R. Dervaes, CFE, CIA
Missing Disbursement Documents (Part 2)
Part two of a two part series on missing disbursement documents is concluded by discussing alternative procedures you can use to determine if the transactions were made to valid vendors for authorized business purposes.
Written By: Joseph R. Dervaes, CFE, CIA
Checking Account Fraud: When Employees Steal (Part 6)
Employee fraud often involves checking accounts and businesses need to take steps to prevent disbursement fraud.
Written By: Joseph R. Dervaes, CFE, CIA
False or Altered Disbursement Documents (Part 1)
This column, the first in a series of three, begins a discussion about some of the most common issues fraud examiners face when they detect false or altered documents in the organization’s disbursement records.
Written By: Joseph R. Dervaes, CFE, CIA
Bank Reconciliation Process
Proper reviews of bank reconciliations can prevent or detect check fraud by employees.
Written By: Joseph R. Dervaes, CFE, CIA
Checking Account Fraud: When Employees Steal (Part 7)
This column underscores the importance of reviewing the volume of activity in small checking accounts, and it also offers lessons from the past – what fraud examiners can learn from actual case histories.
Written By: Joseph R. Dervaes, CFE, CIA
Using an Organization's Credit to Commit Fraud, Part 1
We begin this three-part series with employee abuses of general organization credit cards.
Written By: Joseph R. Dervaes, CFE, CIA
Phoning it in: Employee phone fraud and abuse
Overview and case histories outlining phone fraud and abuse
Written By: Joseph R. Dervaes, CFE, CIA
St. Valentine's Day massacre (revisited)
Part 2 of an article about a false billing scheme case study
Written By: Joseph R. Dervaes, CFE, CIA
St. Valentine's Day Massacre (revisited)
Case study of a false billing scheme.
Written By: Joseph R. Dervaes, CFE, CIA
Bank Reconciliation Process
One of the oldest home-improvement companies in Washington had bad news for its 210 employees: they wouldn't be receiving holiday bonuses. The owner discovered that an accountant had embezzled $1.2 million in five years.
Written By: Joseph R. Dervaes, CFE, CIA
Small Organizations Need Internal Controls for Cash Disbursements: Part 3
This column, part 3 of 4, proposes steps that an independent volunteer should take to monitor the cash disbursement function of small organizations. Fraud examiners can also use the columns in this series as a checklist for all types of organizations, regardless of size.
Written By: Joseph R. Dervaes, CFE, CIA
Bank Reconciliation Process
Part three in a three part series. A case study involving dealing with outsider threats in the bank reconciliation process
Written By: Joseph R. Dervaes, CFE, CIA
Bank Reconciliation Process: Dealing With Outsiders' Threats (Part 2)
Check fraud will occur in your organization - it's not a matter of if but when. So make sure your organization not only has excellent internal controls but a companion program to monitor those controls to deter and detect fraud.
Written By: Joseph R. Dervaes, CFE, CIA
Cash larceny, part six: Alteration of accounting documents in imprest fund accounts
This column continues our discussion about cash larceny frauds. Here we'll discuss fraud in advance travel funds.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny, Part Five: Alteration of accounting documents
Unscrupulous cashiers often prepare false accounting records or alter these documents in cash receipting operations to conceal a misappropriation of funds from their employers. The next three columns present fraud cases that illustrate some of the common alterations of accounting records I've encountered in my practice.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny, Part Eight: Cashier manipulations of manual and computer cash register systems
As we continue our discussion of cash larceny frauds, we begin to look at manual and computer cash register manipulations that cashiers use to misappropriate funds from the organization.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny, Part Seven: Alteration of accounting documents in imprest fund accounts (continued)
Almost all organizations use a petty cash fund to disburse funds to employees who make miscellaneous purchases on their behalf. This column demonstrates some of the ways that employees commit petty cash fund fraud.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny, Part Four: Alteration of manual cash receipt forms
Unscrupulous cashiers often alter manual cash receipt forms for customer payments to misappropriate funds from the entity. These manual cash receipt forms usually come in a book with three or more receipts to a page.
Written By: Joseph R. Dervaes, CFE, CIA
Living the Good Life: Case Study of Another Authorized Maker Scheme, Part 1
This article discusses the finer points of fraud deterrence and detection for authorized maker schemes.
Written By: Joseph R. Dervaes, CFE, CIA
Traveling in High Style on the Organization's Dime, Part 2
Every employee has the opportunity to commit travel fraud.
Written By: Joseph R. Dervaes, CFE, CIA
Traveling in High Style on the Organization's Dime, Part 3
Part 3 of a series outlining travel fraud
Written By: Joseph R. Dervaes, CFE, CIA
Traveling in High Style on the Organization’s Dime, Part 1
There are many travel fraud schemes, and we’ll try to cover a variety of them in this and the next two columns.
Written By: Joseph R. Dervaes, CFE, CIA
Living the Good Life! Case Study of Another Authorized Maker Scheme, Part 2
This column discussing an actual authorized maker scheme investigation, including elements of the fraud, the red flags, some additional detection techniques and information about the interview.
Written By: Joseph R. Dervaes, CFE, CIA
Fraud and abuse in school cafeterias
The policies and procedures for managing food service operations vary from state to state. Thus, fraud examiners in other U.S. states and in other countries should research the rules and regulations that apply to these activities for the guidance needed to investigate them.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny (Part 11): Fictitious Void Transactions on Type 2 Cash Registers
Processing fictitious void transactions is a common type of cash register manipulation that cashiers use to misappropriate funds from their organizations. This article describes frauds committed on type 2 cash registers - registers that do permit voids to be recorded during normal transaction processing.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny (Part 9)
One of the most basic cash register frauds involves losses of revenue associated with missing Z tape numbers. This article instructs fraud examiners on how to calculate the amount of loss from missing cash register Z tapes and provides lessons from cash register manipulation schemes that cashiers use to misappropriate funds.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny, Part 12
This column summarizes key points about cash larceny frauds and provides fraud examiners with a checklist to use during cash receipt testing.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny, Part Ten: Fictitious Void Transactions on Type 1 Cash Registers
Processing fictitious voided transactions is a type of cash register manipulation that cashiers use to misappropriate funds from their organizations. This column provides tips for preventing and detecting fictitious void transactions on type 1 cash registers.
Written By: Joseph R. Dervaes, CFE, CIA
Small Organizations Need Internal Controls, Part One
This column stresses the importance of monitoring the internal control structure in small organizations and recommends the use of volunteers to do the monitoring.
Written By: Joseph R. Dervaes, CFE, CIA
Weights That Don’t Measure Up (Part 1)
This column outlines a false billing scheme case study involving the Washington state Liquor Control Board.
Written By: Joseph R. Dervaes, CFE, CIA
Weights That Don’t Measure Up: False Billing Scheme Case Study (Part 2)
This column discusses the investigation, lessons learned, and recommendations to prevent future occurrences of false billing schemes.
Written By: Joseph R. Dervaes, CFE, CIA
Stop, Look, and Listen
Skilled fraud examiners should make it a habit to stop, look, and listen for red flags when communicating with staff.
Written By: Joseph R. Dervaes, CFE, CIA
Laundering stolen checks: Skimming revenue, part two
In the January/February 2005 issue, we began a discussion about the primary method I've seen where the highest-risk employee skims revenue from the organization using a check-for-cash substitution scheme. This column continues the discussion on employees stealing checks from the organization.
Written By: Joseph R. Dervaes, CFE, CIA
Skimming revenue, part four: Stealing cash payments from customers
In the past three columns, we've discussed many ways fraud perpetrators steal currency and checks from organizations before accountability for the transactions has been recorded in the accounting system. This column concludes this brief coverage of skimming cash payments from customers.
Written By: Joseph R. Dervaes, CFE, CIA
The highest-risk employee: Skimming revenue, part one
With this column, we begin a journey through the many facets of cash receipting and types of fraud that occur in every organization. Our first step involves skimming: removing funds prior to recording accountable transactions in the accounting system.
Written By: Joseph R. Dervaes, CFE, CIA
Cash Larceny, Part One: No fixed responsibility losses
With this column, we begin a new series about cash larceny - on-book frauds in which employees steal the organization's revenue after accountability for the funds has been recorded in the accounting records.
Written By: Joseph R. Dervaes, CFE, CIA
Stealing cash payments from customers: Skimming revenue, part three
Here we'll discuss some of the methods employees use to skim funds by stealing customer payments made in cash.
Written By: Joseph R. Dervaes, CFE, CIA
Begin Your Free 30-Day Trial
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
