Sei sulla pagina 1di 11

In

Focus

12 OCTOBER 2014 / THE CPA JOURNAL


Why Audits
Cannot Detect
All Fraud Examples
Real

and
Insights
from an
Expert
Witness
By W. Steve Albrecht and Jeffrey L. Hoopes

A
uditors are expected by the public to find financial statement fraud, even
though U.S. GAAS has long held that they might not be able to detect all
frauds. The following discussion draws upon the experience of an expert
witness in numerous major fraud cases in order to illustrate situations in
which auditors can—and cannot—reasonably be expected to detect fraud. Certain fac-
tors can make fraud nearly impossible to discover, even when a competent GAAS
audit is performed, and certain factors are often present when auditors should have detect-
ed fraud.

The Auditor’s Role


Most companies and their managers prepare financial statements that are transparent
and fairly stated; however, in rare cases, individuals succumb to pressures and oppor-
tunities to commit financial statement fraud. Society has long believed that the protec-
tor—that is, the “public watchdog” [U.S. v. Arthur Young & Co., 465 U.S. 805 (1984)]—
against this dishonest minority is the independent financial statement auditor.
Arthur Levitt, former SEC chairman, articulated the auditor’s role: “America’s audi-
tors were given a franchise by the Securities Acts of 1933 and 1934 to provide the
public with accurate audited statements of companies. … And their mission, the rea-
son for all of that, was to protect the public investor from financial fraud”
(http://www.pbs.org/wgbh/pages/fronttine/shows/regulation/interviews/levitt.html).

OCTOBER 2014 / THE CPA JOURNAL 13


Likewise, Douglas R. Carmichael, the first Views of Audit Assurance: Recent unknown—resulted in a material misstate-
PCAOB chief audit director of professional Evidence of the Expectation Gap,” Journal ment. In all of these cases, the auditors
standards, stated: “Auditors should recog- of Accountancy, vol. 178, no. 5, 1994, pp. were sued for not detecting the fraud or for
nize that the detection of fraud is clearly 60–66). Consistent with this belief, audi- not detecting it earlier. A fuller understand-
an important objective of an audit. That tors are usually sued in class action law- ing of when auditors can or cannot be
has been true for over 60 years, but the suits on behalf of the shareholders in cases expected to detect fraud should guide audi-
literature of the profession has not of financial statement fraud. tors, expert witnesses, legal practitioners, pol-
forthrightly acknowledged that objective. Despite the public’s view of the auditor icymakers, and the investing public as they
It is important that auditors take AU 316 as a protector, the accounting and audit lit- observe instances in which fraud is discov-
(SAS 99) seriously and conduct audits in erature state that a company has the prima- ered in a company previously subject to a
a manner that makes it probable fraud ry duty to design, implement, and maintain financial statement audit and where auditor
will be detected” (http://www.pcaobus.org/ a system of internal controls that provide rea- negligence is being considered.
News_and_Events/Events/2003/Speech/ sonable assurance that reliable financial
12-12_Carmichael.aspx). statements can be produced and that audi- Background: Nature of the Audits
But an expectation gap exists between tors have the responsibility to provide rea- There are two types of financial state-
what regulators, the public, and investors sonable assurance that the financial state- ment-related audits that are performed
ments are prepared fairly in accordance with today—regular financial statement audits
U.S. GAAP. It is widely understood in the and fraud audits. [In this article, the authors
academic and professional auditing literature assume that financial statements audits
Unfortunately, performing that it is not the auditor’s duty to guarantee are performed in accordance with GAAS,
that the financial statements are accurately because most of the examples are prior to
represented. This is demonstrated by the lan- the Sarbanes-Oxley Act of 2002, when
fraud audits is the guage used in the audit report that accom- GAAS was required for audits of both pub-
panies every 10-K filing and many auditing lic and private companies; however, the
only way to satisfy the standards. AU section 316, “Consideration analysis also applies to a PCAOB audit
of Fraud in a Financial Statement Audit” of a public company or a generally accept-
expectation that financial [originally issued as Statement on Auditing
Standards (SAS) 99, Consideration of Fraud
ed government auditing standards
(GAGAS) audit of a government entity.
in a Financial Statement Audit], states that The term “financial statement audit” refers
statement auditors always “even a properly planned and performed to an audit that looks at the financial
audit may not detect a material misstatement statements in their entirety, on a sample
detect material financial resulting from fraud.” basis, with the goal of forming an opinion
Although it is understood that auditors as to whether the financial statements, as
statement fraud. might not be able to detect all fraud, an a whole, are fairly presented.]
understanding of the factors that make fraud One of the unstated assumptions usual-
detection difficult is lacking; thus, this dis- ly made by plaintiffs is that the auditor has
cussion aims to provide real-world examples performed a fraud audit when, in fact, the
believe that a financial statement audit is of some of the circumstances under which auditor has performed a GAAS audit.
intended to do and what the auditing stan- a competent GAAS audit might not detect Many such plaintiffs seem unaware that
dards state that financial statement audits fraud. These examples are based on 35 there are major differences between these
are required to do. Indeed, William R. separate fraud cases in which one of the two types of audits. Financial statement
Kinney Jr. and Mark W. Nelson indicated authors acted as an expert witness. At any audits involve the examination, usually
that “bank loan officers, bank regulators, stage in reviewing the facts, the author on a sample basis, of the entirety of the
members of Congress and their staff, the resigned from the case if he believed the financial statements and are performed
SEC, GAO, financial writers, financial ana- auditors did not perform a GAAS audit or according to promulgated standards set
lysts, judges, jurors, and ordinary investors should have discovered the fraud (which by the PCAOB for public companies and
appear to hold auditors responsible for occurred several times in these examples). by the Auditing Standards Board (ASB)
higher levels of disclosure and greater audit If he thought the auditor had performed a for nonpublic, nongovernmental organiza-
effectiveness than auditors believe is appro- competent GAAS audit but was nonetheless tions. Fraud audits are much more detailed
priate” (“Outcome Information and the unable to detect the fraud or did not detect and look in greater depth at specific ele-
‘Expectation Gap’: The Case of Loss the fraud as early as expected by the plain- ments that might be misstated. These audits
Contingencies,” Journal of Accounting tiffs, he testified for the defense. are designed to detect financial statement
Research, vol. 34, no. 2, Autumn 1996, pp. Of these cases, 19 involved major inten- fraud, and they most often only occur after
281–299). In addition, Marc J. Epstein and tional manipulation of the financial state- there is suspicion (predication) of actual
Marshall A. Geiger found that more than ments. Nearly all of the other 16 cases fraud. They are also typically much more
70% of the investing public expected abso- involved a top executive committing a fraud time-consuming and are prohibitively
lute assurance from auditors against mate- against the organization so large that not expensive. Unfortunately, performing fraud
rial fraud in financial statements (“Investor reporting it—because the fraud was audits is the only way to satisfy the

14 OCTOBER 2014 / THE CPA JOURNAL


expectation that financial statement audi- of cases in which an auditor was sued for every entry summarized in them had appro-
tors always detect material financial state- failing to detect fraud or failing to detect priate support.
ment fraud. it in a timely manner. These cases ranged In another case, a large industrial corpo-
To illustrate this difference, consider one from a fraud of $25 million to misstate- ration was audited using proper techniques;
of the cases included in this article, where ments of more than $3 billion. All of the however, the company concealed fraud with-
it was discovered that management had companies were public, and most of the in vast amounts of data, and the valid ran-
been intentionally overstating revenues and auditors were large national firms. The dom samples taken by the auditor simply did
assets, resulting in materially misstated companies represented different industries, not include fraudulent transactions. This is
financial statements. The auditors were and most of the cases were documented a good example of how, even if appropri-
sued by the shareholders for failure to in the financial press. Because a nondis- ate sampling techniques yield a high level
detect the fraud during the three-year closure agreement was signed in most of assurance against the presence of materi-
period over which it occurred. The foren- cases, specifics about the firms and their al misstatements, sampling errors may still
sic unit of a different Big Four auditing auditors cannot be disclosed. The remain- exist. With tens of thousands of audits per-
firm and special counsel were engaged to der of this article will focus on the 19 cases formed annually, this means that even
conduct a fraud audit, and that audit uncov- where there was intentional misstatement some properly performed financial statement
ered the extent of the fraud, how it was of financial statement elements by audit audits will fail to detect material frauds. In
committed, and how it was concealed. clients. one case, the fraudsters hid the fraudulent
These fraud determinations were made In 10 of those 19 cases, it was the transactions in very minor and remote sub-
after the forensic team had spent more than expert’s opinion that the financial statement sidiaries that were beyond the scope nor-
50 times as much time as the financial audits were conducted in accordance with mally examined by the auditors. None of
statement audit and charged a fee that applicable standards. In 4 cases, settlements these fraudulent transactions were material
was 70 times higher. were reached early, and the level of dis- individually, but cumulatively, they had a
The fraud auditors physically confiscat- covery was insufficient to determine material impact on the financial statements.
ed all the computers of suspected perpe- whether a sufficient financial statement Further complicating the nature of audits
trators, interviewed hundreds of individu- audit was performed. In 5 cases, the expert is the fact that most large companies are
als, and audited 100% of the transactions believed the audit was not performed in spread out in various locations. For exam-
in the suspected accounts. These steps are accordance with applicable standards. ple, Wal-Mart has approximately 4,100
neither contemplated by GAAS or PCAOB Exhibit 2 describes situations in which, retail stores in the United States and more
auditing standards for a regular financial in the opinion of the retained expert and than 4,000 units in other countries. While
statement audit, nor are they feasible for author, the failure to detect fraud does a single store probably could not commit
such audits. (The nonfraudulent accounts and does not necessarily constitute an ade- a fraud that would be material to Wal-
that had been examined by the financial quately performed financial statement audit. Mart’s financial statements, the company’s
statement auditors were not examined by Based on a detailed examination of evi- various divisions could. The audit scope
the fraud auditors.) This serves as a good dence discovered in the cases, Exhibit 2 assumes that errors that fall beyond the
example of what was stated in the first cod- identifies four factors that made it extreme- scope of the audit are uncorrelated or ran-
ified auditing standard, Statement on ly difficult—if not impossible—for even dom; however, collusion among managers
Auditing Procedure (SAP) 1, Extensions of a properly designed and performed finan- that turns errors into fraud can make this
Auditing Procedure (now superseded), cial statement audit to detect a material assumption untrue.
which stated: “To exhaust the possibility fraud: In one of the cases, it was later discov-
of all cases of dishonesty or fraud, the inde- n The nature of accounting records neces- ered through a fraud audit that more than
pendent auditor would have to examine sitates sampling 27 different people—many of them divi-
in detail all transactions. This would entail n The use of outsiders to help conceal the sion controllers and accountants—partici-
a prohibitive cost to the great majority of frauds pated in committing and concealing fraud
business enterprises—a cost which would n Reluctance of people to disclose what from the auditors. To detect this, the audi-
pass all bounds of reasonable expectation they know tors would have had to examine detailed,
of benefit or safeguard there from, and n Forgery and lying. division-level records that were well below
place an undue burden on industry.” Nature of accounting records. The first their audit scope. General and specific
Much of why a financial statement audit reason why a well-conducted GAAS ledgers and other accounting records for
is not able to detect fraud—whereas a fraud audit did not detect material financial state- large companies are voluminous, not lend-
audit is able to do so—centers around the ment fraud was the voluminous nature of ing themselves to easy detection. This is
different nature of these types of audits. accounting records and the economics of especially true when perpetrators conceal
Some of these differences are outlined in financial statement audits. In one of the 19 their frauds in ways that are hardest to
Exhibit 1. cases, the trial balances maintained at head- detect.
quarters alone filled an entire room, and Use of outsiders to help conceal the
Could the Auditor Have Detected most subsidiary locations contained numer- frauds. The second reason that even a
Fraud? ous other trial balances as well. There properly performed audit will sometimes fail
As mentioned previously, the examples was no way the auditors could examine all to detect material financial statement fraud
in this discussion are derived from a set of them in detail and make sure that is that those committing frauds use outsiders

OCTOBER 2014 / THE CPA JOURNAL 15


EXHIBIT 1
Key Differences between a Financial Statement Audit and a Fraud Audit

Financial Statement Audit Fraud Audit

Purpose Provides reasonable assurance that financial statements, Detects and investigates suspicions or allegations of fraud.
as a whole, are prepared in accordance with applicable
auditing standards.

Scope Not looking for specific problems, but rather, to issue an Investigating suspected fraud, often targeting only one or
opinion on the overall financial statements. two accounts; there is always predication and sometimes
tips (or confessions) about where to look.

Method Financial statement auditors must rely on sampling, Fraud auditors analyze all transactions that are within
which introduces sampling error. the scope of the audit, eliminating sampling error.

Procedures Reperformance, analytical analysis, documentation, GAAS audit procedures, plus surveillance, extensive
confirmation, observation, physical examination, and interviews, seizure of computers and confiscation of
inquiry, all performed with as little disruption as possible. records, all performed without forewarning, without
regard to disruption of business, and with the ability to
subpoena records.

Timing Occurs in a predictable and consistent manner, with the Occurs when there is predication (allegation or suspicion
majority of the audit happening near year-end. of fraud) at any time during the year, without notice or
warning.

Reason for To see if they are functioning as designed and to To see where there is a potential for fraud and whether
Testing establish the scope of their audit. In public company control weaknesses have been abused to help commit
Controls audits, to examine controls as required by section 404 fraud. A lack of controls provides fraud opportunities.
of the Sarbanes-Oxley Act of 2002.

Reliance on There is neither the time nor the resources to corroborate Fraud auditors rarely, if ever, rely on management
Management all information provided by management. Financial representations because they already suspect that
statement auditors must often rely on management management cannot be trusted—that is the reason why
representations because it is infeasible not to do so. they were engaged.
They neither assume that management is honest nor
dishonest.

Training Performed by CPAs trained in auditing and accounting. Conducted by Certified Fraud Examiners (CFE) or other
Becoming a CPA requires little specific fraud training similarly trained professionals. CFEs understand auditing
beyond a basic audit course. CPAs are trained to provide and accounting, and are also required to be skilled in
a vast array of financial services. forgery identification, detection and investigation
methods, interviewing, criminal profiling, and how
perpetrators use fraud schemes. CFEs are trained to
detect and investigate fraud.

Exposure to Financial statement auditors are rarely exposed to fraud. Fraud auditors live on a constant diet of fraud. Detecting
Fraud With 17,000 public companies, and only a few being and investigating fraud is what they do, and most
investigated for fraud, a GAAS auditor might work an companies where they are engaged have a high
entire career without ever seeing a financial statement suspicion of fraud. Investigation is the expectation in
fraud. a fraud audit.

16 OCTOBER 2014 / THE CPA JOURNAL


to help conceal them. For example, consid- In this case, the auditors exercised sig- loaned money to Company X. Company X
er one case that involved collusion by an nificant professional skepticism and sought then purchased land from the financial
unrelated party. The two general partners outside verification of the liens that cor- institution. The transaction is shown in
of a partnership with more than 5,000 lim- roborated management’s explanations. The Exhibit 3. Not knowing about these bor-
ited partners had significant personal real auditors had nowhere else to seek infor- rowings, the auditors believed that the trans-
estate concerns that desperately needed cash. mation, and there was no one to confirm action between Company X and the finan-
They went to an out-of-state bank and, with- whether the information the bank president cial institution had met the requirements of
out authorization from the limited partners, had provided was accurate. GAAS and a 20% down payment under GAAP
borrowed millions of dollars, thus incurring other auditing standards allow auditors to [Accounting Standards Codification (ASC)
significant debt against the limited partner- accept confirmations as audit evidence. 360-20; SFAS 66, Accounting for Sales of
ship’s assets.
Because of the triple-net leases
involved, the financial statement auditors Company employees and others who have
performed lien searches for unpaid prop-
erty taxes. They discovered liens against
Arizona, Texas, and Alaska properties
held by a bank in a completely separate
knowledge of the fraud often do not help
state, in which the partnership had no
business activity. The auditors approached
management, which claimed that the com-
external auditors—indeed, they often lie to
pany was thinking about taking out a
line of credit, but the facility never protect their supervisors or colleagues.
materialized. To corroborate this expla-
nation, the auditors sent an independent
confirmation to the bank, requesting that There comes a time in an audit when exter- Real Estate, at the time] for the financial
it disclose all loans or other liabilities out- nal auditors must accept representations institution to account for the sale on an accru-
standing as of December 31 of that year. that something is as it is stated to be. al basis. This unknown transaction between
In response, the auditors received both a Furthermore, even if auditors question con- Companies X and Y would have been very
fax and an original letter dated April 12 firmations, management will usually find difficult for the auditor of the financial
of the following year from the president another way to deceive them. institution to detect. The ability of perpetra-
of the bank: In this particular case, the auditors, exer- tors to rely on unrelated outsiders to collude,
In response to (name of signer) letter of cising professional skepticism, noticed that forge, and use off-book entities makes some
January 24 regarding your audit of (named the letter did not refer to the end of the frauds very difficult—if not impossible—to
partnership), please be advised as follows: year (December 31) as the date on which detect, even when an audit is performed in
(1) (named partnership) has no debt or there were no liens. As a result, they accordance with professional standards.
obligation outstanding to the bank, and (2) phoned the bank’s vice president, who per- Reluctance of people to disclose what
the bank’s attorneys are in the process of sonally confirmed that, although the letter they know. A third problem that makes
releasing the collateral liens since it is was dated April 12, there had been no liens financial statement fraud very difficult to
the bank’s understanding the borrower or liabilities on December 31. Once those detect is that company employees and oth-
does not intend to utilize its existing line colluding with management decided to lie ers who have knowledge of the fraud often
of credit arrangements. and deceive, they continued to do so until do not help external auditors—indeed, they
The auditors relied upon this confirma- the auditors were satisfied. As a result, often lie to protect their supervisors or col-
tion and concluded that there was no out- the auditor, who had no reason to believe leagues, or they assume that these super-
standing debt. Unfortunately, the confir- that the bank president was colluding and visors or colleagues know what they’re
mation was false. In reality, there were sig- lying, accepted the “independent” repre- talking about. They want to be “team play-
nificant liabilities at year-end that contin- sentations. Even when auditors go the extra ers” and often don’t understand the serious
ued until April 11, at which time they were mile, as they did in this case, there is consequences of the small part they’re
removed. On April 12, the date the con- always one more deception, one more col- playing in a much larger fraud.
firmation was signed, there were no lusion, one more forgery, or one more act Another reason for not disclosing suspi-
unrecorded liabilities, but on April 13, new of concealment that can be used to mislead cious activity is the difficulty in knowing for
liabilities and liens were recorded. The financial statement auditors. In most cases, sure that a fraud has been committed. The
bank’s president and executive vice pres- the concealment efforts are directed more first reaction of those victimized by fraud is
ident—individuals completely unrelated to toward the auditors—both internal and usually denial. They then generally attempt
the general partners—had been bribed by external—than toward anyone else. to try to convince themselves that fraud could
the partners to respond to the auditors and Another example of using an unrelated not be happening at their company, nor could
remove the liens for one day; thus, they outsider occurred at a financial institution. In their trusted coworkers commit fraud; as a
colluded with the general partners to this case, the institution loaned money to one result, they don’t report suspicious activity.
deceive the auditors. entity, Company Y, which subsequently [Research has shown that individuals

OCTOBER 2014 / THE CPA JOURNAL 17


exposed to fraud often go through five dis- “Understanding Reactions to Fraud,” Internal otherwise normal-seeming company are
tinct stages: denial, anger, rationalization, Auditor, vol. 47, no. 4, August 1990, pp. often hesitant to divulge information that
depression, and acceptance (W. Steve 45–51).] Even once they feel confident that may indicate fraud because they fear the con-
Albrecht and Timothy L. Williams, something is not right, employees of an sequences. Even if they are not implicated,

EXHIBIT 2
Issues in Determining Whether Financial Statement Auditors Were Negligent

Reason for Failure Examples of Situations from the 19 Cases


to Detect Fraud

Voluminous accounting records did not allow finding well-hidden fraudulent


transactions
Nature of accounting records Inability to examine all transactions (sampling)
and assets, and economics Nature, volume, and location of assets made it impossible to verify their
of a financial statement audit existence and value
Dispersed geographic locations with fraudulent transactions hidden at
subsidiaries that were below the scope of the audit
Recruited outsiders to help them conceal the fraud; auditors didn’t know these
Financial statement Use of outsiders to help outsiders were involved or who they were
auditors failed to conceal the frauds Outsiders lied to help conceal the fraud
detect fraud, but
were not negligent Additional lying by management to cover up outside relationships
Power exerted by perpetrators to keep people quiet
Denial (normal crisis) reactions of observers
Reluctance of people to Confidence in perpetrators by coworkers
disclose what they know Fear of consequences, both personally and to the firm
Uncertainty that fraud was really occurring
First-time perpetrators
Forged documents looked real
Forgery and lying Management lied
Necessary to accept management representations
How audits are staffed—least experienced auditors most likely to see red flags
Inadequate training and Inadequate GAAP, GAAS, company, or industry knowledge
experience
Insufficient fraud knowledge
Inadequate planning
Financial statement Insufficient evidence
auditors were Poor audit execution
Inadequate time spent on audit
negligent in
performing a Failure to corroborate management representations
financial statement Not recognizing red flags
audit
Not following up on red flags
Failure to exercise due care
Placing too much confidence in management
Not auditing related entities
Accepting bribes
Lack of independence
Lack of objectivity

18 OCTOBER 2014 / THE CPA JOURNAL


whistleblowers often lose their jobs or see supervisors, they went along without ask- see W. S. Albrecht and M. B. Romney,
their companies experience serious financial ing questions. Consider this request made “Red-Flagging Management Fraud: A
and legal problems if material financial state- to one of the company controllers by the Validation,” Advances in Accounting,
ment fraud is found. CFO: On a Friday afternoon, the CFO vol. 3, pp. 323–333.) But regardless of how
Before a fraud audit is conducted, a instructed the division controller to increase hard auditors search for fraud symptoms,
fraud is generally already suspected. The earnings by $105 million by Monday they often cannot be expected to find fraud
future of current management—and some- morning. He didn’t give him any specific that involves forgery and lying.
times the company as a whole—is instructions about how to do it. The divi- Consider a fraud case involving a com-
already in question. The resulting uncer- sion controller was skeptical about the pur- pany that tested new drugs for large drug
tainty and shift in social attitudes toward pose of these instructions, but he did not manufacturers. It would sign contracts to
disclosure make people more willing to tell challenge them. He created a spreadsheet administer newly developed drugs to par-
what they know and help the fraud audi- with 210 improper journal entries that he ticipants a certain number of times in a lab-
tors. The unwillingness of knowledgeable determined were necessary to fulfill the oratory setting. If the drug was to be
individuals to assist is much more com- CFO’s instructions. This was the first administered 10 times, for example, the
mon in annual financial statement audits time the division controller had participat- arrangement might be that the company
than in fraud audits. ed in making fraudulent entries. He trust- could bill the drug manufacturer after 5 vis-
In the authors’ experience, people are its and again at the end of the 10th visit.
aware of a fraud at different levels, which If the patient dropped out before comple-
can be represented by concentric circles. tion of the 10th visit, however, no rev-
The inner circle, which contains the key enue would be earned because the testing
perpetrators, usually involves only two or Regardless of how hard was never completed. The company orig-
three individuals, often including the inally recognized revenue after the 10th
CEO and CFO. The next circle, which visit, even though there were billing mile-
includes those individuals who were first
auditors search for fraud stones after the 5th and 10th patient visits.
recruited to help with the fraud, rarely see Unfortunately, the executives wanted to
the fraud in its entirety; rather, they are usu- symptoms, they often increase the company’s earnings and stock
ally exposed to only a few fraudulent ele- price; thus, they decided to commit finan-
ments, none of which seems too large or cial statement fraud. They first started using
too egregious. Further removed from the cannot be expected to more and more aggressive accounting
key perpetrators are those individuals asked methods, switching from recognizing rev-
to assist in making suspicious transactions enue after all 10 visits to every 5 visits, and
or other accounting entries in order to help
with the fraud or concealment. These indi-
find fraud that involves then after each visit. When even these
aggressive accounting methods no longer
viduals often do not suspect fraud but, provided the revenue desired, they started
instead, assume that, even though man- forgery and lying. forging contracts from drug manufacturers.
agement is asking them to do something For example, if a contract stated that the
unusual, it knows what it is doing; there- company would be paid $100 per patient
fore, they comply with the illicit requests. visit, the executives physically altered the
Even further away are those who are not ed the CFO. More than 20 other people contract to state that they would be paid
directly involved in the fraud but who were involved in overseeing or making $400 per patient visit. The large number
observe events and accounting entries that similar entries. Not only did none of these of contracts and the quality of forgeries
appear questionable. Because these indi- people tell the external auditors about any made it difficult, if not impossible, to tell
viduals do not see the entire fraud and are of these fraudulent entries, but they went that they had been altered. Furthermore, the
not actually involved in perpetrating it, they to great lengths to hide their actions and to four members of management who perpe-
usually dismiss the questionable actions as fabricate documentation to support the trated the fraud—the CEO, CFO, COO, and
something other than fraud. In addition, entries if they were questioned. controller—all worked in concert to hide
because fraud perpetrators are usually first- Forgery and lying. A fourth reason why the fraud from the auditor. With this type
time offenders who cannot be distinguished auditors may not detect a financial state- of lying and forgery, very few, if any,
from nonperpetrators unless conspicuous ment fraud is forgery and lying. Although GAAS auditors would have detected this
red flags of egregious behavior are it isn’t their main purpose, GAAS auditors financial statement fraud. Indeed, AU sec-
observed, such observers often believe are always on the lookout for fraud tion 316 states that auditors are not trained
there is no reason to suspect fraud. symptoms, including analytical symptoms, to be forgery experts. In paragraph 9, it con-
In one of the 19 cases, more than 20 internal control symptoms, documentation tinues: “Employees or members of man-
people were recruited to participate in the or records symptoms, lifestyle symptoms, agement who misappropriate cash might try
fraud; all had college degrees in account- behavioral symptoms, and tips or to conceal their thefts by forging signatures.
ing or finance and none had ever partici- complaints—anything that could be a red … An audit conducted in accordance with
pated in a fraud before. Yet, when asked flag. (For an explanation of the practical- GAAS rarely involves the authentication of
to do something very unusual by their ity and effectiveness of red flag detection, such documentation, nor are auditors

OCTOBER 2014 / THE CPA JOURNAL 19


trained as or expected to be experts in panies had signed them. These forgeries Sufficient Financial Statement Audits
such authentication.” would have been very difficult for any Not Performed
In another case, a company headquar- GAAS auditor to detect. Despite follow- Exhibit 2 identifies four factors—which
tered in the Midwest supposedly had ing proper confirmation procedures, the are not completely independent of each
large real estate deposits for future devel- independent auditors still missed the fraud- other—that existed in the financial state-
opment. Title companies located at spe- ulent deposits. ment fraud cases where fraud was not
cific addresses in other states maintained A third example of lying and forgery detected, but where, in the author’s opin-
these “deposits.” In reality, the title com- took place in a large public oil company ion, a competent financial statement audit
panies’ street addresses given to the audi- that claimed to have large underground was not performed:
tors were the locations of mailboxes at Mail reserves of oil in Puerto Rico, Australia, n Inadequate training and experience of
Boxes Etc. When the auditors sent confir- and New Zealand. “Independent experts” the auditors
mations to the supposed title companies, attested to all of these reserves, but none n Poor audit execution—planning, gath-
company officers flew to the respective of the oil actually existed. Professional, ering evidence, and examining controls
cities, retrieved the confirmations from the well-documented, and consistent forged n Failure to exercise due professional care
mailboxes, signed them, and returned them documents supported the “existence and n Lack of independence.
to the auditors. The auditors who received quality” of this oil. In this case, both In 5 of the 19 cases, the author con-
the signed confirmations for the deposits organization insiders and outsiders lied and cluded, after considerable discovery, that
believed that an officer of the title com- forged. sufficient financial statement audits were
not performed. In 2 of these cases, he
was retained by the defense and resigned
from being an expert witness, and in 3 of
EXHIBIT 3 the cases, the plaintiffs retained him after
Example of a Fraudulent Transaction Made by a Large Financial Institution That Is he had studied the facts of the cases.
Undetectable to a GAAS Audit Inadequate training and experience.
AU section 210, “Training and Proficiency
of the Independent Auditor,” requires that
auditors have appropriate training and expe-
rience. It is common for the youngest and
March 31: Land Sale
most inexperienced auditors to spend the
most time in the field during an audit. As a
Financial result, these auditors are most likely to have
Institution Company X first-hand exposure to fraud symptoms if they
exist. On the other hand, the most experi-
March 31: $3.5 Million Down,
enced auditors typically spend less time in
$10.5 Million Note the field; thus, they are less likely to see any
fraud symptoms. It is critical, then, that all
March 30: $3.5 Million Note

March 31: $3.5 Million Note

auditors, including staff, be well trained.


In one case, staff auditors were unaware
of the fraud because they were insuffi-
ciently familiar with the industry. In gath-
ering substantive evidence, they exam-
ined numerous contracts whose figures
March 30:
were 20 times higher than the industry
$30 Million Loan standard, all of which had been altered.
When asked about the contract amounts
and when shown numerous industry stan-
dards during the deposition, it was obvi-
May 2: Company Y ous that the staff auditors had little under-
$30 Million Loan standing of the industry.
In another case, auditors examined sev-
eral of their client’s large construction pro-
jects. Revenue was being recognized on a
June 30: percentage-of-completion basis. But revenue
$34 Million Overpayment was being recognized when inventory and
supplies were purchased, not when the mate-
rials were actually used in construction. It
was shown in this case that the auditors’
knowledge of both percentage-of-completion

20 OCTOBER 2014 / THE CPA JOURNAL


accounting and standard practices in the exactly the same amount three years in a public accounting career. The audit part-
industry was severely lacking. row. Clearly, the auditors should have ner chose not to reveal the fraud, accept-
Poor audit execution. Fieldwork audit- asked, “Why would one asset and one lia- ed a bribe, and proceeded to staff the audit
ing standards require that audits be prop- bility account for more than 95% of all engagement with what he referred to as
erly planned, that internal controls be assets and liabilities?” And, even more “incompetent” members of the firm. This
examined, and that sufficient evidence be importantly, “Why would the total amount clearly violated independence rules. The
obtained. Unfortunately, these fieldwork of the two accounts (essentially the receiv- several-hundred-million-dollar fraud was
standards were violated in at least 4 of ables and payables on the balance sheet) discovered when the CEO died unexpect-
these 5 cases. In one case, only three trans- be the same three years in a row?” edly of a heart attack. In this case, the audi-
actions were examined out of thousands. Unfortunately, the auditors did not tor was negligent for several reasons,
In another case, the auditors accepted the understand repurchase agreements and including a lack of independence, essen-
engagement after the end of the year and reverse repurchase agreements, and they tially becoming a fraudster himself.
promised to have it completed within two did not understand that they were the com-
weeks—a time far too short to compile suf- pany’s payable and receivable accounts. As Closing the Expectation Gap
ficient evidence. Probably the most egre- it turns out, the amounts were only the The investing public, as well as lawmak-
gious audit failure involving poor execu- same because of a large receivable from ers, juries, regulatory agencies, and others,
tion in our sample was a large fraud where an unaudited, related entity. The receivable often expect auditors to detect all material
the auditors actually saw several red flags was described in detail in a note to the financial statement fraud; however, the audit-
that fraud was occurring, asked manage- financial statements that turned out to be ing standards do not, and have never, indi-
ment about them, and then accepted man- fictitious. Auditors cannot detect all mate- cated that detecting all material financial
agement’s explanations without getting the rial financial statement frauds, but there is statement fraud is possible. This expecta-
corroborating evidence that, in an expert’s no excuse for not catching fraud because tion gap often results in costly auditor liti-
opinion, would have been easily obtainable. of a failure to exercise due care. gation, even when a financial statement audit
For example, in one case, the company’s Lack of independence. AU section 220, has been conducted in accordance with
records showed several shiploads of inven- “Independence,” requires that auditors be professional standards.
tory in transport at sea; however, the com- independent and fair. Lack of independence This article aimed to provide a general dis-
pany had a policy of shipping all invento- ranges from cases where auditors are cussion, based on real-life examples, of when
ry with the identifying term “FOB shipping willfully complicit in the fraud to those auditors can and cannot realistically be
point” (indicating that the buyer pays for where auditors might not be completely expected to uncover financial statement fraud.
the delivery of the goods), which caused independent. Serious cases are relatively The authors recognize the inherent weakness
the auditors to question why the inventory easy to prove. The more difficult cases that the conclusions about the quality of audits
was being recognized as owned. In fol- are those where auditors are not completely were those of the retained expert/author.
lowing up with management, they received independent and their mental state has been Other experts might have disagreed with the
oral representations that these shipments changed, perhaps even at an unconscious author in these cases. To the extent the author/
were unusual and were going to commu- level, allowing frauds to go undetected. expert’s opinions are correct, this article
nist countries where governments would This expert witness experienced an should help expert witnesses, legal practi-
not pay shipping costs. The auditors did not example of the most egregious form of tioners, policymakers, and the investing pub-
examine production reports, shipping independence violation, where an auditor lic as they observe instances in which fraud
records, purchase/sales invoices, vessel became explicitly complicit in the fraud. It is discovered in a company previously sub-
records, or any other documents. Doing so was a case in which neither the audit ject to a financial statement audit and in cases
would have quickly revealed a lack of such partner nor his team caught a fraud that where the auditors’ negligence is being
records, indicating that the ships did not had been going on for three years; how- considered. q
exist and the inventory was fictitious. ever, in the fourth year, the CEO asked the
Failure to exercise due professional audit partner to help the company retain a
care. AU section 230, “Due Professional certain client that also happened to be a W. Steve Albrecht, PhD, CPA, CFE, CIA,
Care in the Performance of Work,” requires client of the auditor. The auditor respond- is the Andersen Alumni Professor in the
that auditors exercise just that: due pro- ed that doing so would represent a conflict Marriott School of Management and a
fessional care. Even though the authors of interest and violate his firm’s indepen- Wheatley Fellow at Brigham Young
focused on other areas of negligence, the dence policies. At that point, the CEO con- University, Provo, Utah. Jeffrey L.
cases above also illustrate situations where fided in the audit partner that the firm had Hoopes, PhD, CPA, is an assistant pro-
due professional care was not exercised. In been committing fraud for three years and fessor in the Fisher College of Business,
another, more extreme case, one asset and that failure to retain the client would expose Ohio State University, Columbus, Ohio.
one liability on the financial statements the fraud. The CEO told the young audit The authors appreciate the financial
accounted for more than 95% of total assets partner that he would either help the com- sup port of the Marriott School of
and total liabilities. The accounts, repur- pany get through the “short-term” problem Management, the Wheatley Institution, and
chase agreements, and reverse repurchase or that the auditor could tell his fellow part- the Fisher College of Business. This arti-
agreements were not only the largest ners that he had failed to catch a fraud for cle has also greatly benefited from the
accounts, but they were also recorded at three consecutive years, thus ending his comments of Doug Prawitt.

OCTOBER 2014 / THE CPA JOURNAL 21


Copyright of CPA Journal is the property of New York State Society of CPAs and its content
may not be copied or emailed to multiple sites or posted to a listserv without the copyright
holder's express written permission. However, users may print, download, or email articles for
individual use.

Potrebbero piacerti anche