Chapter 14
Fraud Data Analytics for Revenue and Accounts Receivable Misstatement

SAS no. 99 states that you “should ordinarily” presume there is risk of material misstatement due to fraud relating to revenue recognition. If you do not identify improper revenue recognition as a risk of material misstatement due to fraud, you should document the reasons supporting this conclusion. The assumption in this chapter is that you are searching for material misstatement of revenue in the source journal. I should clarify that the phrase sale of goods will be used throughout the chapter to indicate revenue earned from the sale of tangible goods, services, or rental income.

Chapter 13 described the methodology for building a fraud data analytics plan for financial accounts. Using the plan, this chapter will focus on the fraud data analytics search routines for fraud scenarios in the source journal.

Revenue is the candy jar of choice used by management to misstate the financial statements. The candy jar has many different types of candy to cause revenue to be over‐ or understated. Fraudulent revenue may be recorded through a source journal or through a journal entry. Management may decide to misapply GAAP, thereby causing the recorded transaction to misstate the financial statements.

For the auditor, revenue recognition requires an understanding of the industry and the organization. The auditor needs to have the ability to apply and interpret the principles of revenue recognition to the audit program. It sounds simple; however, there are many widely accepted revenue recognition procedures and many situation‐specific ways to interpret and apply each of these procedures. Just as organizations are different, the kinds of revenues they generate are different. Consequently, these different types of revenues need different recognition and different reporting methods. Therefore, each revenue system also needs an audit program tailored to its uniqueness.

What Is Revenue Recognition Fraud?

The fundamental revenue recognition concept is that revenues should not be recognized by a company until the revenue is earned and realized or realizable. Revenue is earned if your company has fulfilled its obligations under the revenue contract. Revenue is realized when there is a real expectation that the customer will pay for the goods or services provided by your company.

Therefore, revenue recognition fraud occurs when revenue is recognized on the financial statements and the revenue is not earned or there is no expectation that the customer will fulfill its obligation to pay for the services. The second aspect is that management has concealed the fact that the revenue is not earned or the receivable is not realizable.

Inherent Fraud Risk Schemes in Revenue Recognition

It is generally recognized that misstating revenue is the most common fraud technique used by management to misstate the financial statements. The auditing standards created the phrase that improper revenue recognition is a presumed fraud risk. Therefore, it is critical that fraud auditors understand the fraud scenarios used by management to create fraudulent revenue:

  1. False revenue and false customer scheme is the process of creating a false customer and recording through the source journal a false revenue transaction for the false customer.
  2. False revenue and real customer scheme is the process of recording through the source journal a false revenue transaction that a real customer did not order. In this scheme, the real customer may retain the goods or may return the goods.
  3. Real customer and improper recognition of revenue schemes through historical schemes:
    1. Holding the books is simple; the revenue is shipped in the subsequent period but recorded in the current period.
    2. Channel stuffing is more abstract than holding the books open. In channel stuffing, the customer is real, the goods have been delivered, and the terms of sale are achieved. Channel stuffing is referred to as accelerating sales by causing a real customer to order more goods than a customer would normally purchase through the offering of inducements that are intended to shift revenue versus a normal marketing technique. The traditional inducements are deep discounts, rebates, and extended payment terms.
    3. Sham sales transactions occur with the recording of a revenue transaction with a real customer; however, there is no economic benefit for either party. Typically, tendencies in sham transactions are that there are no cash transfers between the two parties; the two parties have a relationship; and both parties tend to be in the same industry. The sole purpose of sham transactions is to increase revenue versus create an economic benefit.
    4. Soft sale is recording a revenue transaction through the source journal before a fully executed contract exists between the two parties.
    5. Undisclosed return policy scheme is recording a revenue transaction through the source journal when the customer has a right to return the product.
    6. Incomplete terms schemes is recording a revenue transaction through the source journal before all terms and conditions of the sales contract are fulfilled.
    7. Upfront fees are for services provided over a period of time. The fraud scheme is recognizing the upfront fee as current revenue versus amortizing the revenue over the life of the contract.
    8. Non‐operating revenue recognized as operating revenue occurs when a cash receipt from a non‐operating revenue source is recorded as operating revenue.
  4. Revenue is misstated because of the misapplication of GAAP in relation to the customer contract. These schemes need to be identified as part of the brainstorming based on how your company achieves the five criteria of revenue recognition.
  5. Revenue created through changing GAAP without disclosure.
  6. Revenue recognized through improper application of GAAP related to specific accounting statements:
    1. Percentage of completion schemes
    2. Bill‐and‐hold schemes
    3. Income recognized on consignment sales
  7. Falsifying accounts receivable aging or the failure to write off uncollectable receivables.
  8. Revenue created through accrued revenue: journal entries schemes.

All of these schemes have been committed by management in some company. The study of prior schemes by the fraud auditor will enhance their practical application of the suggested fraud data analytics routines.

Inherent Fraud Schemes and Creating the Revenue Fraud Scenarios

For ease of reading, the following will repeat the guidance in earlier chapters.

  1. Person committing: The starting point is to understand how revenue is reported and how internal persons are held accountable for meeting sales numbers in the company. The person committing would start with financial management. In a regional sales environment, the misstatement may occur through one division or one sales region.
  2. Direction of misstatement: Most reported fraud schemes result in the overstatement of revenue. Therefore, overstatement is the most predictable direction of misstatement. However, GAAS fraud risk factors need to be considered in determining the direction of misstatement. If the fraud auditor is focusing on a specific region versus the company as a whole, then the direction of testing is dependent on the historical success of the region. A highly successful region is more likely to understate revenue as a form of cookie jar, whereas a region having difficulty in meeting internal goals is more likely to overstate its revenue.
  3. General ledger account: What is critical about revenue recognition is which accounts are used for the sales journal and which accounts are used for revenue accrual journal entries.
  4. Type of entity: The same structure identified in the shell company chapter is relevant for financial reporting.
  5. Fraud action statement: Describes how the fraud scenario occurs in the financial account. The fraud action statement describes whether the transaction is false or real, whether the entity is false or real, and whether the transaction is recorded through a source journal or journal entry.
  6. A GAAP implication focuses on either whether the recorded revenue transaction achieved the five criteria of revenue recognition or how management concealed the failure to achieve the five criteria.
  7. Impact statement for revenue recognition should provide specifics to the impact on the financial statements.

Identifying Key Data on Key Documents

The revenue system has more diversity than any other core business system. The industry will impact the documents that will comprise the system. Think about the difference between retail, health care, telecommunications, wholesale, and construction. Within each industry and within each company the revenue system is more unique than payroll, which is somewhat standardized throughout all industries. In this chapter, we will present the methodology for detecting revenue fraud in the financial accounts.

The revenue cycle comprises sales order, which is a customer purchase order or internal sales order; shipping records; internal sales invoice; customer payment; and customer return or customer sales adjustment. The understanding of the information on these documents becomes the basis of the fraud data analytics plan. Consistent with Chapter 3 the documents all have a control number, control date, sales invoice amount, and a description of what was ordered that is posted to a general ledger account. Furthermore, in the revenue cycle, in contrast to the expenditure cycle, the documents may originate from an internal source or an external source.

Sales order is the document that starts the sales process. The sales order may originate from an internal salesperson or from a customer's purchase order system. If the document originates from the customer's purchase order system, then the consistency of information is by customer versus internal systems. This will impact the usability question in the planning phase.

Shipping process occurs through an internal fleet of trucks or through an external fleet of vehicles. If the shipping occurs through an external source, the critical issue is how to match the internal records to the external shipping records. If the shipping records are internal, then fraud data analytics for improper recognition is possible.

Internal sales invoices are created either through one centralized billing system or through billing systems that are decentralized by location. The sales invoice becomes the central point of the fraud data analytics.

Customer payments depending on the industry may originate from currency, credit card, paper check, electronic transfer, or via a loan transaction. Is the payment applied to a specific invoice or to an account balance?

Customer return or sales adjustment is the contra entry to a customer payment transaction. These transactions are associated with reversing false transactions.

Now that the fraud auditor understands the documents that comprise the system and the information on the documents, the fraud auditor can start the process of building the fraud data profile.

Do I Understand the Revenue Data?

The planning reports are a form of analytic review. In the accounting profession we use ratio analysis to determine if relationships and changes are consistent with our understanding of the company. We also use the data as part of our planning process to determine how to tailor our audit program to detect a material error. This stage is no different from historical analytic review. The major difference is that the fraud auditor is creating the revenue report from raw data versus from the prepared financial statements.

The planning reports should be designed around the most logical grouping of data that is associated with a specific fraud scenario. Many fraud schemes have occurred by management recording false revenue to a false customer. Therefore, a report summarizing sales by new customers would indicate what percentage of revenue was derived from new customers. If the amount is material, then the predictability of false revenue being recorded in new customers goes up. If the revenue amount is not material, then look somewhere else.

Creating the reports is a two‐step process. First, summarize the revenue data in some common grouping. Second, link the report to a fraud scenario. I need to stress the importance of the second step. Without defining the purpose of the report, the auditor will not know how to interpret the report or offer any logical conclusions regarding the information.

The common grouping analysis for false revenue starts with creating a homogeneous data file based on type of customer commonly associated with fraud scenarios. The second grouping for false revenue starts with the data attributes associated with the sales transaction. For improper revenue recognition, the common grouping needs to be linked to the specific technique. For improper recognition, change analysis becomes a large part of designing the report.

For simplicity, we will assume a December year‐end for our discussions on planning reports and our discussions will focus on an annual reporting process versus a quarterly process. The purpose of the planning reports is to identify where material revenue is recorded and the material amount associated with a predictable fraud scenario.

The first report is an analysis of all revenue accounts to determine what percent of revenue was posted from a source journal and what percentage of revenue was posted from a manual journal entry. The purpose is to describe the source of all revenue postings. My preference is to create the report by general ledger account with the appropriate totals and record counts.

The second report is an analysis of revenue posted in the source journal by customer. The report should provide sales by the first three quarters and the final quarter. The purpose of the report is to identify customers whose sales reflect a large increase in the fourth quarter.

The report design can be modified in various ways:

  • New customers created in the current year have a focus on false revenue transactions.
  • Sales recorded in a dormant customer that now has sales activity have a focus on false revenue transactions.
  • Sales recorded in what is labeled as house accounts have a focus on false revenue transactions.
  • Sales recorded in customer account not assigned to a sales representative have a focus on false revenue transactions.
  • December sales for all customers as compared to the fourth quarter sales for all customers have a focus on both false revenue and improper recognition of revenue.
  • Sales by a meaningful business unit, by region, by division, by geographic area, or by subsidiary, may indicate that a particular unit is committing an improper revenue recognition scheme.
  • Sales by product line with special emphasis on new sales items.
  • Sales by product line with a comparison to the previous year's sales by product line may indicate a concealment technique associated with obsolete inventory.
  • Sales by product line with the associated cost of goods sold may indicate sham transactions.

Creating the right planning reports to highlight a potential fraud scenario is as important as performing the right ratio analysis. Your ability to interpret the report as to fraud predictability is as important as your ability to interpret what are the implications of the change in working capital. The planning reports are part of the process of the identified fraud risk process defined in the auditing standards.

What Is the Fraud Data Analytics Plan for Revenue?

In Chapter 13, we discussed the steps of building a fraud data analytics plan for financial statements; the same concepts apply when the auditor is drilling down to a specific account in the financial statements. In applying the methodology to revenue, the auditor must have a solid understanding of the revenue recognition principles.

Fraud Brainstorming for Revenue

The proper recognition of revenue is defined in IFRS 15, Revenue from Contracts with Customers. As a disclaimer, the intent of this section of the chapter is not to be an authoritative discussion of the new accounting standard, but rather, the importance of understanding how to use the standard in the search for a fraud scenario or the associated concealment strategy. Fraud data analytics brainstorming starts with understanding the basic framework for proper revenue recognition:

  1. Persuasive evidence of an arrangement exists—this is intended to ensure that an understanding exists between the two parties and that a final understanding of the terms and conditions is achieved.
  2. Delivery has occurred or services have been rendered—this assumes that the customer takes title and assumes the benefits and risks of ownership.
  3. The seller's price to the buyer is fixed or determinable as to payment terms, right of return, discounts, and rebates.
  4. Collectability is reasonably assured because all the terms and conditions are achieved and the customer has the ability to fulfill its obligations.

To illustrate the concept of fraud brainstorming for fraud data analytics, let's focus on the collectability concept. So, how could management conceal the collectability concept or how can we find data that indicate the collectability concept was falsified? From a data perspective we will focus on the concept of the probability of whether the customer will pay for a recorded revenue transaction at the recorded amount.

For discussion purposes, we will focus on three different situations. There are two types of revenue transaction from the collectability perspective: false revenue or real revenue.

  • False revenue to a false customer. Clearly your company will not collect from a fictitious customer. However, there are cases that management has used their personal funds to create the illusion of collection. Among management's fraud strategies:
    • Record the revenue at year‐end so the false revenue does not appear on the aging report.
    • Reverse the revenue transaction after opinion date.
    • Clear the false revenue transaction with a sales adjustment or return transaction.
    • Use a rebilling scheme to create a current date on the false revenue.
    • Use a variation of a lapping scheme to cause the aging report at year‐end to reflect the balance as paid.
    • Apply a dormant credit to the false revenue transaction.
  • False revenue to a real customer. The assumption is that the customer did not order the item and the customer will not accept the item:
    • Since the transaction is a false revenue transaction, the previous concepts apply.
    • Conceal the return of the item from the customer that indicates the return is posted to the customer account after the opinion date. In one publically traded company, management concealed the returns by making false statements to the customer regarding the shipment. Then management had the items returned to a secret warehouse to conceal the return from the auditors.
    • Crediting the customer account with a false sales adjustment versus a sales return transaction.
  • Real revenue to a real customer. The assumption is that the contract is valid and the sales transaction is complete. The focus is on the probability the customer will remit the required funds under the terms of the contract. In one sense all customers are the same; however, from a collectability perspective customers are very different.
    • New customers with credit limits that exceed normal credit limits for new customers.
    • Existing customers:
      • Active customers with no history of delinquent payments should be excluded from this analysis; the exception is for channel stuffing.
      • Nonactive customers with a history of delinquent payments and a change to credit amount or creditworthiness should be the focus of the analysis.
    • Improper application of GAAP.

From a GAAP perspective, let's use price concessions on tangible goods to brainstorm how revenue can be overstated and concealed from the auditors. For purposes of discussion, price concessions are: rebate, allowance or a price reduction, or other terms of agreement. Since our discussion is on revenue our discussions will not focus on other accounts such as a potential liability. The price concession discussion assumes collectability; the question focuses on the total amount of consideration to be received and the proper reporting of the event.

The starting point is to understand how the transaction should be recorded from a GAAP perspective. The second aspect is a review of standard customer contracts to ensure the contract is consistent with GAAP. Assuming management's accounting policies are GAAP compliant, now the fraud auditor can start building the fraud data analytics plan.

The next important step is to discuss how management could conceal the over‐ or understatement of revenue. Using the rebate concept, the rebate could be recorded as a marketing expense versus a contra revenue account. Management could hire a marketing company to pay the rebates and record the disbursement as a marketing expense.

Remember, the purpose of the brainstorming session is to assist the auditor in developing the fraud action statement. Consistent with Chapter 13, the following fraud action statements are the generic list, which needs to be converted for the GAAP implications of the revenue transaction.

The primary techniques used to overstate revenue are:

  1. Record false revenue through either a false customer or a real customer.
  2. Record real revenue in the wrong period or account.
  3. Record accrued revenue that is false or improper recognition of revenue through a journal entry.
  4. Record contra revenue as an operating expense.
  5. Record non‐operating revenue in operating revenue.
  6. Consideration should also be for uncollectable revenue hidden in the accounts receivable.

The primary techniques to understate revenue:

  1. Record real revenue in the wrong period.
  2. Record through a journal entry improper recognition of revenue.

What Are the Accounting Policies for Revenue?

The accounting policies identify how a transaction should be recorded to comply with GAAP. The auditor needs to ensure that the accounting practices comply with GAAP. However, from a fraud data analytics perspective the company's accounting policies will identify how a transaction should be recorded. Therefore, an anomaly can be described as a transaction recorded contrary to the company's accounting guidelines.

Within the Revenue Accounts, Which Fraud Scenarios Are We Trying to Uncover?

As stated in Chapter 13, the process starts with the fraud risk assessment, which is an integral part of determining which fraud scenarios are relevant to the fraud data analytics plan. The understanding data step is intended to help the auditor by identifying revenue data at a high level, which is consistent with the fraud theory associated with the fraud scenario. Therefore, the decision should be based on the likelihood analysis from the control assessment and likelihood analysis from the planning reports.

What Are the Overall Strategies for Revenue Fraud Data Analytics?

The fraud data analytics plan has two choices. Search for the fraud scenario in the source journal by building the fraud data profile or search for the concealment strategy in the source journal or general ledger used to conceal the improper recognition of revenue.

The Data Analytics Is Based on the Mechanics of the Fraud Scenario

The following provides a brief synopsis of the fraud data analytics approach based on the inherent scheme structure.

In false customer schemes, the data analytics plan should use the same approach as the outlines in the chapter on shell companies, tailored for customers versus vendors.

In false revenue schemes for false customers, the data analytics should search for the data profile of false revenue or through the subsequent reversal of the false revenue in the next operating period.

A false revenue scheme for a real customer depends on whether the real customer accepts the false revenue or rejects the false revenue. If the real customer rejects the revenue, the search should focus on the subsequent operating period and focus on the reversal of the transaction. If the real customer accepts the revenue, the data analytics should search for the data profile of false revenue.

Improper recognition schemes involve real customers that may or may not be complicit in the scheme and real revenue transactions. Typically the recorded transaction complies with company policies at least on the face of the transaction. The key to building the fraud data analytics plan is to understand the fraud action statement as it relates to the improper recognition inherent fraud scheme.

To illustrate the improper recognition inherent fraud scheme for channel stuffing, the concept suggests an accelerated sales pattern at year‐end. Therefore, the planning report would compare December sales history to last year's December sales history or fourth‐quarter sales to the previous three quarters. Often, the sales transaction has extended payment terms. The fraud data analytics would compute the average number of days the customer remits payment for the first nine months and the last quarter average number of days for remittance. The inclusion and exclusion theory would focus on those customers having an elevated sales pattern in the fourth quarter.

Is the Data Analytics Is Based on the Concealment Strategy?

When either false revenue or real revenue is materially misstated in the financial statement management needs to conceal the fact from the auditors. Later in the chapter, the common concealment techniques used by management are discussed. The advantage of using the concealment technique is that when the concealment technique is identified the probability of fraud occurring increases dramatically. The second aspect is the key difference between revenue error and revenue fraud is the intent to conceal factor.

What Are the Steps to Designing a Fraud Data Analytics Search Routine for Improper Recognition Fraud Risk?

Chapter 13 provided the methodology for creating a fraud data analytics plan for financial statements. For easy reference, the questions are repeated and the discussion will focus on the nuances related to revenue.

  1. Which financial account is the focus of the fraud data analytics?
  2. Are we searching for understatement or overstatement in the financial account?
  3. How does the opinion date correlate to our ability to analyze the general ledger?
  4. How is the fraud scenario recorded, through a source journal or a journal entry?
  5. Is the fraud data analytics searching for fraud scenario?
  6. Based on the fraud scenario should our data interrogation occur through the recording of the transaction or through disaggregated analysis of the general ledger account?
  7. Is the fraud data analytics searching for the concealment strategy to hide the fraud scenario?
  8. Are we searching for a large error or many small errors, which in the aggregate is material?
  9. Which data‐mining strategy is appropriate for the scope of the fraud audit?

Using the previous questions, the fraud data analytics plan is as follows:

FDA for False Revenue Scenarios

False revenue schemes either occur through a false customer or through a real customer. In false customer schemes, the search starts with fraud data analysis for shell customers and then proceeds to the transactional analysis. In real customer schemes, the fraud data analytics searches for clues in the sales journal or returns and adjustments in the subsequent period.

FDA for False Customers

The analysis for false customers is very similar to shell companies; however, the fraud data analysis needs to be tailored for customers. The additional fields that should be examined are:

  • Credit limit. To record a material amount of false sales that customer will need a higher credit limit. The fraud data analytics should search for a change in credit limit or a higher credit than normal for a new customer.
  • Sales representative assigned to the customer. The fraud data analytics is looking for customers that have no sales representative assigned to the account.
  • New customers are more prone to be used in the scheme; therefore, search for new customers' material sales in the final quarter.
  • Dormant customers are real customers; however, management has assumed the identity of the customer. The fraud data analysis should search for customers with address changes and material sales in the final quarter.
  • Ship‐to address. Since false customers have no physical location the ship‐to address has to be an address controlled by the company. The fraud data analytics should search for duplicate shipping addresses and different customer names and physical locations that link to company operations. There are schemes where management used a freight forwarding company to provide the illusion of delivery of the goods.

FDA for False Revenue for False Customers

The first assumption in the analysis is that the customer is either new or a dormant customer that has become active. The second assumption is that the sales transaction will not be attributable to a sales representative. So, the fraud data analytics should focus on:

  • Sales transactions that have no commission code. The analysis will need to be tailored to the sales force's compensation and how their performance is measured.
  • Sales order number anomalies. The list should include: no sales order number; low sales order numbers, even‐number sales order (e.g., 1,000), and a sequential pattern of sales order numbers.
  • Round or even sales invoice amounts.
  • Recurring sales invoices; the focus is on materiality in the aggregate versus a single sales invoice.
  • Products that were not selling in the first half of the year suddenly reflect an accelerated sales movement.

FDA for Real Customers

For real customers, the fraud data analytics should search for increases in customer credit limits in the final quarter or use the beginning of the year credit amount and the end of the year credit amount. If management is recording a material amount of false revenue through a real customer, then the credit limit will need to be increased to allow for both the real and false revenue. Also search for the addition of a new shipping address for the real customer when the false revenue is not shipped to the real customer.

False Revenue for False Customers through Accounts Receivable Analysis

Since false customers seldom pay for false revenue transactions, the fraud data analytics should search for customers with material sales and no posting from cash receipts. The design of the report would in essence recreate the accounts receivable account. The report would have eight columns of data providing both dollar amount and frequency of postings:

  • All debits originating from a sales journal
  • All other debits
  • All credits originating from a cash receipts journal
  • All other credits

While the analysis will detect the false revenue, the issue becomes the timing of the procedure. If the opinion date is after the first quarter of the next year, perform the procedure at year‐end, otherwise the procedure must be performed midyear. In the midyear approach, the search for the false revenue scenario should be performed on final quarter sales.

The report will have a few phases before the report reveals the false revenue. Start with summarizing the data as recommended. Exclude those customers with no sales or minimal sales. Then exclude those customers reflecting a significant amount of postings from the cash receipts journal. The first search is for customers that have no cash receipts posting and recorded sales. If the false sales were recorded through the year, then the report will reflect significant other credits. If the false sales are recorded at the end of the year, then the account will only reflect sales journal postings.

Remember, one of the concealment strategies is a form of lapping. If the lapping scheme is being used, then the customer will have cash receipts posting. However, since the posting must be transferred to the true customer, the customer account should also have a material amount in the other debits and credits column.

FDA for False Revenue through Real Customers

False revenue posted to real customers has two approaches. The first is the fraud data profile of the sales transactions or the subsequent return of the product. The sales transaction fraud data profile should focus on:

  • The customer order number may be blank or there is an anomaly with the number. Common anomalies are round numbers, number contains alpha or a special symbol, or the order number is less than earlier numbers.
  • Quantity order amounts are different than previous order amounts. Common anomalies are round numbers, quantity is larger than average quantity amounts.
  • No sales representative number assigned to the sale.
  • Customer number links to an internal house account versus a real customer.
  • Shipping address is different from the shipping address for all other customer invoices.
  • Speed of processing by comparing the sales order date to the invoice date.

The sales returns and adjustments approach will focus on returns and adjustments posted in the subsequent period. The fraud data analytics should create a file of all sales returns and adjustments in the subsequent period and link the transactions to the related sales invoice. The sample selection is based on sales transactions in the year of audit that were returned in the subsequent period. If there is an accrual for returns and adjustments, then the analysis would compare the actual return rate to the accrued amount.

Fraud Concealment Strategies for False Revenue Fraud Scenarios

The second approach to search for a fraud scenario is through the concealment strategy used by management. The following concealment strategies all can be found through the study of historical fraud stories:

  • The weakness in the false revenue schemes is the realization principle. False customers typically do not pay for goods and services. There are published cases where financial management used personal funds to create the illusion of customer payment. In some way and at some time, the false receivable will need to be cleared.
  • Lapping is typically associated with an asset misappropriation scheme. However, the technique can be used to hide the false revenue from the aging schedules. The concept is simple: Apply a real customer's payment to a false customer's account payment at the end of the year. After the aging report is created, the customer payment is transferred back to the real customer. The fraud data analytics should search for transfer of customer payments between customer accounts after the creation of the aging schedule.
  • The astute auditor should see how the concealment techniques can be used in different industries. In the banking industry, management or a loan officer might be trying to hide an uncollectable loan. The lapping technique would conceal the bad loan from the delinquency report. Similar but different, the delinquent loan could be concealed by rolling over the loan using internal bank funds. Also, see the discussion on rebilling in what follows.
  • In accounts receivable, there are dormant credits associated with both dormant customers and active customers. The dormant credit is transferred to clear the false revenue. The fraud data analytics searches for the transfer of an aged credit to a customer's account.
  • Rebilling is a technique to hide a delinquent invoice from the aging report. The concealment technique is concealing a true delinquency for a real customer with real revenue. The financial management is trying to hide the bad‐debt expense. The technique is also used to hide false revenue.
  • In the rebilling scheme the delinquent invoice is credited with an adjustment or return, thereby removing the customer invoice from the aging report. A second invoice is created for the same customer with a current date. The adjustment or sales return is recorded through a source journal and is posted to the correct general ledger account. The fraud data analytics is first matching sales adjustments to aged sales invoices. The second step is to search for a current duplicate invoice for aged invoice. The use of a customer order number or line item descriptions on the invoice is a useful technique for the matching.
  • A more sophisticated approach to hide the sales adjustment is to post the sales adjustment as a contra transaction in the sales journal, thereby concealing the adjustment in the sales journal. The search for a contra entry in the sales journal is an easy technique using the number anomaly strategy.
  • Returns and adjustments is the most common technique to clear false revenue. The return or adjustment is typically posted after the opinion date. There are many variations of the returns and adjustments scheme. Instead of clearing the false revenue with the sales return, which the auditor is looking for, the false revenue is cleared with a sales adjustment transaction and the inventory is added back as an inventory adjustment. The fraud auditor needs to understand the different systems or transactions that exist in the revenue system to clear a customer invoice.
  • Shipping concealment strategies vary by the organizational structure of the company. The first step is to ship the inventory somewhere. The shipment location for the false revenue schemes maybe another company warehouse, public warehouse, freight forwarder location, etc. The fraud data analytics should summarize sales by customer by shipping address, providing aggregate dollar value and the frequency of the invoice. Depending on the number of customers, the fraud auditor will need to determine how to shrink the report.
  • There are many other concealment strategies associated with fraudulent revenue schemes. However, not all schemes are useful in fraud data analytics. The undisclosed terms and conditions scheme is often associated with fraudulent revenue; however, the concept does not lend itself to fraud data analytics. As a reminder, it is important to understand what you can find and what you cannot find with fraud data analytics.

FDA for Improper Recognition Schemes

Holding the books open scheme occurs when delivery and acceptance occurs in the subsequent period but the revenue is recorded in the current year. The good news is, the homogeneous file is small because the fraud data analytics is only focusing on sales transactions that are recorded at the end of the operating period. The bad news is that the scenario includes real customers and real sales. The fraud data analytics must use either shipping records or inventory records for comparison analysis.

Shipping records are either internal or external. The ease of the analysis will depend on whether the shipping date is available in the electronic format. If so, compare the invoice date to the shipping date. The sample selection is either sales invoices with a subsequent shipping date or sales invoices at year‐end. If using sales at the end of the period, then the audit procedure is finding the scenario versus the fraud data analytics.

FDA for Channel Stuffing

Channel stuffing is referred to as accelerating sales by causing a real customer to order more goods than a customer would normally purchase through the offering of inducements, which are intended to shift revenue versus a normal marketing technique. The traditional inducements are deep discounts, rebates, and extended payment terms.

The first clue for channel stuffing is the planning report that looks for anomalies in the fourth‐quarter sales. The fraud data analytics for channel stuffing should focus on the inducements to cause the customer to agree to accept large sales:

  • Compare unit price on the sales invoice to the unit price on the product master file. The search is looking for deep discounts, which are the inducement to order the large amount.
  • Rebates may occur through sales adjustments or through accounts payable. The first step is to compare the customer list to the vendor list. This step is useful for round‐tripping and possibly for related‐party activity. If the customer is on the vendor master file, then identify the transactions looking for a rebate, commission, and adjustment. Remember, the rebate may occur in the fiscal year or in the subsequent year.
  • Sales adjustments that are in essence a rebate would be posted to accounts receivable. The fraud data analysis should search for sales adjustments that correlate to a customer invoice in the fourth quarter.
  • Compute the average order quantity for the customer for the first 11 months and compute the average order amount for the last month. The sample selection is based on order amounts reflecting a large increase.
  • Compute the average number of days for customer payment on the first 11 months and the last month. Compare the two calculations searching for a significant increase.

FDA for Sham Sales

Sham sale is the recording of a revenue transaction with a real customer; however, there is no economic benefit for either party. There are a few different approaches to searching for sham sales:

  • The analysis of accounts receivable described in the false revenue section would identify customers with material sales and no cash receipts postings.
  • Compare the vendor master to the customer master file to identify customers that are also vendors or possibly related parties.
  • Search for a loan or other receivable associated with the customer.
  • Compare the sales invoice amount to the cost of sales amount for the transaction. The search is for sales transactions that have no gross profit or a gross profit significantly below the gross profit on the financial statements.

FDA for Soft Sale

Soft sale is recording a revenue transaction through the source journal before a fully executed contract exists between the two parties. The fraud data analytics for soft sales would depend on whether the customer eventually executes the contract or the customer does not accept the contract. If the customer rejects the contract, then there would be a reversal or a return in the subsequent period. If the customer executes the contract in the subsequent period, then the fraud data analytics should search for the following:

  • Customer order number. Since the customer has not issued a purchase order before year‐end, the order number for the recorded soft sale should be greater than the last customer order for the fiscal year.
  • Date on the customer order. If there is no attempt to conceal the soft sale, then the sales order date will be for the subsequent year versus the current year.
  • Shipping data. If the soft sale has been recorded but not shipped, then the shipping date would be in the subsequent year.

FDA for Undisclosed Return Policy

Undisclosed return policy scheme is recording a revenue transaction through the source journal when the customer has a right to return the product. The difficulty in this fraud scheme occurs because there are no data in the customer file or the sales transaction file that would highlight this fraud scheme. If the customer accepts the goods and pays for the goods, then fraud data analytics would not be successful in identifying the scheme. If the customer does return the item, then the sales return test would disclose the fraud scheme.

FDA for Incomplete Terms

Incomplete terms scheme is recording a revenue transaction through the source journal before all terms and conditions of the sales contract are not fulfilled. The fraud data analytics plan should identify the specific terms and search for the event in the subsequent period. To illustrate, let's assume the tangible goods require an installation of the item. Search the installation expenditures in the subsequent period and match the expense to the sales contract.

FDA for Upfront Fees

Upfront fees are for services provided over a period of time.

The fraud data analytics will depend on how the upfront fees are recorded. Approach one would be to create a sales invoice through the sales journal and post the upfront fees. Approach two would be to post to a general ledger account directly from the cash receipts journal.

Fraud data analytics for approach one is that the sales invoice would most likely be a manual invoice versus an automated invoice. Under that theory, the fraud data analytics would search for manual sales invoices. In the second approach, the product description on the sales invoice would most likely not have a product number for upfront fees. Therefore, the description field on the sales invoice would have no product number or no product alpha description. A second approach is to use an alpha search on the description field on the sales invoice or the cash receipts journal for the term used by the company to describe upfront fees.

The third approach is to summarize the cash receipts journal for credits to accounts other than the accounts receivable control account. The first report would summarize the debits from the cash receipts journal by general ledger account, providing the aggregate dollar amount, frequency, maximum posting, minimum posting, and average dollar value of the postings.

Fraud Data Analytics for Percentage of Completion Revenue Recognition

In revenue recognition, there are specific accounting pronouncements for specific revenue transactions. It would be impossible for this book to describe the fraud data analytics for all the statements. Therefore, to illustrate the use of the methodologies, we have selected percentage of completion.

While there are different variables that are considered in percentage of completion revenue recognition, this discussion will focus on the incurred cost account. The account is typically composed of a subledger of projects, and the expenditures are posted from either a source journal or a journal entry. The first report is a summary of the subledger by total expenditures. The sole purpose is to identify the material account balances or changes in material balances. The report can be enhanced by creating a comparison report (i.e., total expenditures at third quarter by account to fourth quarter by account) and calculating a dollar change and percentage change.

The use of disaggregated analysis would summarize which journals created the account balance for all accounts in the subledger: accounts payable, payroll, other, and general journal entry. The purpose of the report is to identify which journal created the account balance. The first sample selection is based on accounts that have a material general journal entry posting. The journal entry should be selected and summarized by account posting. The second analysis is material postings from the accounts payable journal. Summarize the accounts payable by vendor, providing aggregate dollar value, aggregate frequency, maximum invoice, minimum invoice, and average invoice for the final month (or final quarter) of the report period. The sample selection starts with a fraud data profile of a false vendor invoice.

FDA for Non‐operating Revenue

Non‐operating revenue recognized as operating revenue occurs when a cash receipt from a non‐operating revenue source is recorded in operating revenue. The fraud data analytics starts with identifying all revenue accounts. The second analysis is searching for material cash receipts postings to the revenue accounts. The journal entry testing would search for transfers from a non‐operating revenue account to operating revenue accounts.

The FDA for False Aging of Accounts Receivable

The fraud data analytics is searching for real revenue that was earned but the customer has failed to pay the invoice for whatever reason. The fraud data analytics would use the fraud concealment approach to search for the concealment techniques. The techniques are described in the chapter in the fraud concealment strategies for false revenue.

  • Lapping. Search for cash receipts transfers between customer accounts in the subsequent period.
  • Rebilling. First search for a duplicate transaction with different dates. If management was sophisticated, the second invoice was slightly changed. Then search by customer all invoices that were cleared by a noncash receipts transaction. Using this created file, match the cleared invoice to a subsequent invoice, using the description field or customer order number.
  • Dormant credits. The analysis is similar to the lapping analysis.
  • Changing data. The easiest way to make the invoice current is to change the invoice date. Using the invoice number and the invoice date search for invoice number that the invoice date is out of order with the sequence of numbers.

Summary

The purpose of this chapter was to describe a methodology for searching for fraud scenarios in the sales journal. Consistent with Chapter 13, the fraud auditor will need to adapt the methodology to their industry and company. A second aspect is the unique issues associated with fraud in GAAP interpretation. The fraud data analytics plan will need to be further adapted to search for fraud in GAAP.

As a reminder, the fraud audit procedure must be linked to the fraud scenario and the fraud data analytics.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset