Presentation is loading. Please wait.

Presentation is loading. Please wait.

CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.

Similar presentations


Presentation on theme: "CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES."— Presentation transcript:

1 CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES

2 BILLING SCHEMES WHAT IS A BILLING SCHEME? WHAT ARE THE THREE CATEGORIES?

3 Billing Schemes The perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose Fraudulent disbursement is issued in same manner as a legitimate disbursement Schemes 1. Shell company schemes 2. Non-accomplice vendor schemes 3. Personal purchases schemes

4 EXAMPLES OF THE THREE CATEGORIES OF BILLING SCHEMES SHELL COMPANY SCHEMES NON-ACCOMPLICE VENDOR SCHEMES PERSONAL PURCHASES SCHEMES

5 Shell Company Schemes Fictitious entities created for the sole purpose of committing fraud Bank account is usually set up in the company’s name Forming a shell company Certificate of incorporation or assumed-name certificate set up Shell company may be formed in someone else’s name Best way is set up company under a fictitious name Set up entity’s address – home address, post office box, or friend/relative’s address

6 Shell Company Submitting false invoices Invoice is manufactured using a professional printer, personal computer, or a typewriter Self-approval of fraudulent invoices Most fraudsters are in a position to approve payment Approvals may be forged “Rubber stamp” supervisors Don’t check the documentation Approve whatever is submitted Reliance on false documents Without approval authority, fraudster submits false documents – purchase order, invoice, and receiving reports

7 Shell Company Collusion Two or more employees conspire to steal More difficult to detect Circumvents controls implemented to prevent fraud Purchases of services rather than goods Purchases of service are preferable over purchases of goods Services are intangible and fraud is more difficult to detect Pass-through schemes Goods or services are purchased by the employee and resold to the victim company at an inflated price

8 Billing Schemes – Non-Accomplice Vendors Vendor is not a part of the scheme Pay-and-return schemes Payments owed to legitimate vendors intentionally mishandled Double pay an invoice Pay the wrong the vendor Overpay the invoice amount Purchase excess merchandise Overbilling with a non-accomplice vendor’s invoices Fake invoice is created for a vendor that regularly does business with victim organization Rerun an invoice already paid

9 PUT IT TO THE TEST WHAT TYPE OF BILLING SCHEMES WERE COMMITTED IN THE CASE “MEDICAL SCHOOL TREATS FRAUD AND ABUSE”?

10 CHECK TAMPERING SCHEMES HOW DO WE DEFINE A CHECK TAMPERING SCHEME? WHAT ARE THE FIVE MAJOR CATEGORIES?

11 THE FIVE MAJOR CATEGORIES 1. FORGED MAKER SCHEMES 2. FORGED ENDORSEMENT SCHEMES 3. ALTERED PAYEE SCHEMES 4. CONCEALED CHECK SCHEMES 5. AUTHORIZED MAKER SCHEMES

12 Forged Maker Schemes An employee misappropriates a check and fraudulently affixes the signature of an authorized maker Forged Endorsement Schemes Employee intercepts a company check intended for a third party Signs the third party’s name on the endorsement line of the check

13 Authorized Maker Schemes Employee with signature authority writes a fraudulent check Overriding controls through intimidation High-level managers can make employees afraid to question suspicious transactions Can happen when ownership is absent or inattentive Poor controls Failure to closely monitor accounts Lack of separation of duties

14 Concealed Check Schemes Employee prepares a fraudulent check and submits it along with legitimate checks Check is payable to the employee, accomplice, a fictitious person, or fictitious business Occurs when checks are signed without proper review or reviewer is busy In many cases, only the signature line is exposed and the payee is concealed

15 Authorized Maker Schemes Employee with signature authority writes a fraudulent check Overriding controls through intimidation High-level managers can make employees afraid to question suspicious transactions Can happen when ownership is absent or inattentive Poor controls Failure to closely monitor accounts Lack of separation of duties

16 PUT IT TO THE TEST HOW WAS MELISSA ROBINSON ABLE TO COMMIT CHECK TAMPERING FRAUD AND WHAT MEASURES DID SHE TAKE TO CONCEAL HER FRAUD IN THE CASE “A WOLF IN SHEEP’S CLOTHING”?

17 Happy Holidays!


Download ppt "CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES."

Similar presentations


Ads by Google