/*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} Problem 6 An employee of JHT Holdings, Inc... [FREE SOLUTION] | 91Ó°ÊÓ

91Ó°ÊÓ

An employee of JHT Holdings, Inc., a trucking company, was responsible for resolving roadway accident claims under \(\$ 25,000\). The employee created fake accident claims and wrote settlement checks of between \(\$ 5,000\) and \(\$ 25,000\) to friends or acquaintances acting as phony "victims." One friend recruited subordinates at his place of work to cash some of the checks. Beyond this, the JHT employee also recruited lawyers, who he paid to represent both the trucking company and the fake victims in the bogus accident settlements. When the lawyers cashed the checks, they allegedly split the money with the corrupt JHT employee. This fraud went undetected for two years. Why would it take so long to discover such a fraud?

Short Answer

Expert verified
The fraud was sophisticated with credible fronts and avoided detection by staying under scrutiny thresholds and exploiting weak internal controls.

Step by step solution

01

Understanding the Scheme

The fraudulent scheme involved multiple layers of deceit. The JHT employee was creating fake accident claims and using the guise of legitimate processes involving friends and acquaintances who posed as victims. Additionally, the use of recruited lawyers gave an air of legality and legitimacy to the transactions.
02

Identifying Concealment Techniques

The employee chose settlement amounts that were under the scrutiny threshold of $25,000, which likely meant they could approve and process them without higher-level reviews. Additionally, having multiple people involved in cashing checks would make it difficult to trace the fraudulent checks back to a single source.
03

Complexity and Professional Appearance

Involvement of lawyers possibly gave the entire operation professional credibility, as legal professionals were representing the involved parties, thus lowering suspicions from supervisors or auditors. This would make the transactions appear standard and legitimate, reducing chances of scrutiny.
04

Lack of Oversight and Internal Controls

The scheme took advantage of potential gaps in internal controls, like lack of verification processes for claims under a certain amount or ineffective auditing practices. This lack of detection mechanisms allowed the scheme to operate without being flagged for extended periods.
05

Calculating Time of Exposure

The scheme operated undetected for two years mainly because of its sophistication, low-profile nature, and the lack of robust internal controls to flag small fraudulent transactions that did not arouse suspicion.

Unlock Step-by-Step Solutions & Ace Your Exams!

  • Full Textbook Solutions

    Get detailed explanations and key concepts

  • Unlimited Al creation

    Al flashcards, explanations, exams and more...

  • Ads-free access

    To over 500 millions flashcards

  • Money-back guarantee

    We refund you if you fail your exam.

Over 30 million students worldwide already upgrade their learning with 91Ó°ÊÓ!

Key Concepts

These are the key concepts you need to understand to accurately answer the question.

Internal Controls
In the world of accounting, internal controls are systems and procedures put in place to ensure the integrity and accuracy of financial and operational activities. They are crucial in detecting and preventing fraud. Despite their importance, weaknesses in internal controls can allow fraudulent activities to go unnoticed. As seen in the JHT Holdings case, insufficient oversight on claims under $25,000 provided an opportunity for fraud to persist.

Effective internal controls might include thorough review processes, clear delineation of responsibilities to create accountability, and continual monitoring and auditing. When internal controls are robust, they offer several advantages:
  • Minimizing human errors by having checks and balances
  • Preventing unauthorized transactions through multi-level approval systems
  • Discouraging fraud by increasing the chance of detection
It is important for companies to regularly review and improve their internal controls to adapt to new risks and ensure effective fraud prevention.
Accounting Fraud Schemes
Fraud schemes in accounting refer to various deceptive practices intended to benefit perpetrators financially or materially. In the JHT Holdings example, the fraud scheme was complex, involving false accident claims and collusion with complicit parties. Understanding such schemes is key to preventing them.

Common types of accounting fraud schemes include:
  • Embezzlement: Misappropriation of company funds by employees
  • Asset misappropriation: Theft of cash or physical goods
  • Data manipulation: Altering financial records to create a false financial picture
Fraudsters often use a combination of creativity and knowledge of internal systems to exploit weaknesses. Companies must stay vigilant and conduct training to educate employees on recognizing and reporting suspicious activities.
Fraudulent Claims Detection
Detecting fraudulent claims is a key aspect of preventing fraud in companies, particularly those handling insurance and settlement cases. Fraudulent claims detection involves identifying false or exaggerated claims being made, as seen in the JHT Holdings scenario, to siphon money from the company.

Some techniques for detecting fraudulent claims include:
  • Trend and pattern analysis to spot anomalies in claims
  • Cross-referencing claims with external data sources for verification
  • Using technology like artificial intelligence to flag suspicious activity
The ability to detect fraudulent claims can save a company a significant amount of money and protect its reputation. Regular auditing and employee training can enhance the effectiveness of fraud detection initiatives.
Auditing Processes
Auditing is an essential process in any organization aimed at evaluating the accuracy and completeness of financial statements and operations. It acts as a powerful tool in detecting and preventing fraud. Unfortunately, gaps in auditing can allow schemes like the one at JHT Holdings to persist undetected.

Key elements of effective auditing processes include:
  • Regular and unannounced audits to maintain vigilance
  • Independent auditors to provide objective assessments
  • Comprehensive review of both financial and operational data
For audits to be effective in preventing fraud, they must be thorough and conducted by well-trained professionals. Companies should integrate these practices into their auditing strategies to ensure robust fraud detection and prevention.

One App. One Place for Learning.

All the tools & learning materials you need for study success - in one app.

Get started for free

Most popular questions from this chapter

Clear Voice Company, a communications equipment manufacturer, recently fell victim to a fraud scheme developed by one of its employees. To understand the scheme, it is necessary to review Clear Voice’s procedures for the purchase of services. The purchasing agent is responsible for ordering services (such as repairs to a photocopy machine or office cleaning) after receiving a service requisition from an authorized manager. However, since no tangible goods are delivered, a receiving report is not prepared. When the Accounting Department receives an invoice billing Clear Voice for a service call, the accounts payable clerk calls the manager who requested the service in order to verify that it was performed. The fraud scheme involves Dana Foley, the manager of plant and facilities. Dana arranged for her uncle’s company, Foley Industrial Supply and Service, to be placed on Clear Voice’s approved vendor list. Dana did not disclose the family relationship. On several occasions, Dana would submit a requisition for services to be provided by Foley Industrial Supply and Service. However, the service requested was really not needed, and it was never performed. Foley would bill Clear Voice for the service and then split the cash payment with Dana. Explain what changes should be made to Clear Voice’s procedures for ordering and paying for services in order to prevent such occurrences in the future.

Using the http://www.google.com Advanced Search feature, enter "Sarbanes- Oxley" and click on Google Search. Click on "Summary of Sarbanes-Oxley Act of \(2002^{\prime \prime}\) that appears as part of the aipca.org Web site. Scan the summary of the act and read Section 404 . What does Section 404 require of management's internal control report?

The mailroom employees send all remittances and remittance advices to the cashier. The cashier deposits the cash in the bank and forwards the remittance advices and duplicate deposit slips to the Accounting Department. a. Indicate the weak link in internal control in the handling of cash receipts. b. How can the weakness be corrected?

First Capone Bank provides loans to businesses in the community through its Commercial Lending Department. Small loans (less than \(\$ 125,000\) ) may be approved by an individual loan officer, while larger loans (greater than \(\$ 125,000\) ) must be approved by a board of loan officers. Once a loan is approved, the funds are made available to the loan applicant under agreed-upon terms. The president of First Capone Bank has instituted a policy whereby she has the individual authority to approve loans up to \(\$ 4,000,000\). The president believes that this policy will allow flexibility to approve loans to valued clients much quicker than under the previous policy. As an internal auditor of First Capone Bank, how would you respond to this change in policy?

Quality Sound Co. discovered a fraud whereby one of its front office administrative employees used company funds to purchase goods, such as computers, digital cameras, compact disk players, and other electronic items for her own use. The fraud was discovered when employees noticed an increase in delivery frequency from vendors and the use of unusual vendors. After some investigation, it was discovered that the employee would alter the description or change the quantity on an invoice in order to explain the cost on the bill. 1. What general internal control weaknesses contributed to this fraud?

See all solutions

Recommended explanations on Math Textbooks

View all explanations

What do you think about this solution?

We value your feedback to improve our textbook solutions.

Study anywhere. Anytime. Across all devices.