Financial Transactions and Fraud Schemes Flashcards

1
Q

Occupational Fraud

A

those in which and employee, manager, officer or owner of an organization commits fraud to the organizations detriment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

three major types of occupational fraud

A
  • corruption
  • asset misappropriation
  • financial statement fraud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three red flags that increase the risk of fraudulent financial reporting (eg Fraud Triangle)

A
  • Situational Pressures, related to company performance/targets
  • Opportunities to commit fraud with the perception of a small chance for detection
  • Potential Rationalizations, to justify that the fraud was ok
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Channel Stuffing

A

selling an unusually large quantity of a product to distributors who are encouraged to overbuy via deep discounts or extended payment terms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the five classifications of financial statement schemes?

A
Revenues Fictitious
Timing Differences (smoothing)
Asset Valuations Improper
Expense/ liabilities concealed
Disclosures Improper
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is “backdating stock options”?

A

when a company alters the date of the option grant to a time when the stock was trading at a lower price so the option is instantly valuable to the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The 3 types of comparative financial statement analysis

A

1- Vertical Analysis (IS items as % of revenue/ BS items as % of assets)
2- Horizontal Analysis (period over period comparisons)
3- Ratio analysis (quick ratio/ turnover/ debt to equity/ margins/ etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cash Larceny

A

the theft of money that has already appeared on the victim orgs books

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Skimming

A

the theft of cash/assets that have not yet been recorded in the accounting system

aka “off-book frauds”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is “Lapping” customer payments?

A

-a way to conceal skimming receivables/sales where the thief credits one account by taking money from another account due later and then continues doing that

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Misappropriation

A

Using funds meant for another purpose for personal gain (eg, embezzlement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fraudulent Disbursement

A

Tricking a company into paying for an invalid payment (ex: false invoices, altered timecards, forged company checks, fake voids/refunds)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorized Maker Scheme

A

When an employee with signaure authority on a company account writes fraudulnt checks for thieown benefit and signs their own name as the maker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A shell company

A

a business with a mailing address but no physical presence or employees that generates little, if any, economic value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Collusion

A

when two or more individulas agree to engage in a deceitful act in order to gain an unfair advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A turnaround sale

A
  • A conflict of interest scheme
  • when an employee knows their employer is looking to purchase a certain assets to they but it themselves and sell it to the company at an inflated price
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

open-source information

A

information available in the public domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In the US, what laws govern commercial filings? Where are they?

A
  • the uniform commercial code

- maintained and searchable at the state level by each secretary of state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are “commercial filings”?

A

records that banks, finance companies and other lenders generate when they provide loans or leases to borrowers who use property as collateral for loans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the difference between a sleeper and a mole??

A

A sleeper is deliberately planted to extract info and a mole is usually an existing, compromised employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pretexting

A

impersonating someone else of making false/misleading statements to persuade a target to release information of perform some action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Elicitation

A

the process of extracting information that can be used and exploited to achieve particular goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social Engineering

A

using deceptive techniques to manipulate people into taking certain actions or disclosing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define “Identity Theft”

A

Using fraud or deception to obtain and uses another person’s personal data, typically for economic gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A Suspense Account

A

The section of an organizations books where unclassified debits and credits are temporarily recorded until a final destination is determined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Embezzlement

A

When a person that has been lawfully entrusted with someones property takes it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A Daisy Chain

A

When a bank buys, sells and swaps its bad loans for the bad loans of another.
-creates new documentation and masks bad loans by making them look recent and good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Retainage

A
  • a construction holdback

- the amount withheld from draw requests until construction is complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An Air Loan

A

A loan for nonexistent property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An Advance-fee fraud

A

A scheme where the fraudster persuades the target to advance sums of money by falsely promising the delivery of a product or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is an SAR?

A
  • A Suspicious Activity Report filed in the Financial Crimes Enforcement Network (FinCen)
  • Requires US banks to file a report within 30 days of detection if is there is a known or suspected criminal violation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

An Access Device

A

an object that allows access to account funds (debit card, PIN, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

pecuniary

A

of or relating to money (eg, pecuniary damages)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Fidelity Insurance

A

indemnifies against loss caused by employee dishonesty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Capitation

A

A healthcare reimbursement method in which providers receive one lump sum for each patient that they treat, regardless of how many services the provider renders to each patient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The Stark Law

A

limits ability of physicians to profit from their referrals by not allowing them to refer patients to physicians to which they have a financial relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Medicare Part A covers….

A

facilities (hospice care, home health, SNFs, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Medicare Part B covers…

A

outpatient care and doctors services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Medicare Part C covers…

A

Medicare Advantage Plans (part A and B but provided by a private insurance company)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Medicare Part D covers…

A

Prescription Drugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

EDI

A
  • Electronic Data Interchange

- the exchange of data between computers with no human interaction

42
Q

Fill-and-split games

A

A pyramid scheme that includes elements to make it feel like a game to keep players attention focused on their riches

43
Q

Malware

A

any kind of malicious software

includes viruses, worms, trojan horses, spyware, etc

44
Q

Logistical Access Control

A

The process by which users are identified and granted access to certain systems, info or resources

45
Q

A Vendor Master file

A

a database containing all vendors a company does business with, including contact detail, terms, etc

46
Q

a register disbursement scheme

A

Involves a fraudulent transaction that justifies the removal of cash from a register, such as a false return or a voided sale

47
Q

The crux of a conflict of interest case is….

A

that the victim organization is unaware that its employee has divided loyalties.

If an employer knows of the employee’s interest in a business deal or negotiation, there can be no conflict of interest, no matter how favorable the arrangement is for the employee.

48
Q

A sham loan scheme

A

When loan officers will make loans to accomplices who then share all or part of the proceeds with the lending officer.

49
Q

Extortion

A

Using actual or threatened force/fear to obtain property from another

50
Q

The register records should NOT match up with the cash in the drawer when a ____ scheme has occurred.

A

cash larceny

51
Q

The purpose of developer overhead in a construction loans is….

A

to supply the developer with operating capital while the project is under construction.

This overhead allocation should not include a profit percentage, as the developer realizes profit upon completion

52
Q

physical padding of inventory

A

Making it appear as though there are more assets present in the warehouse or stockroom than there actually are.

E.G. Empty boxes or boxes filled with bricks or other inexpensive materials, for example, might be stacked on shelves to create the illusion of extra inventory.

53
Q

Perpetual Inventory

A

The official record of inventory

A method of accounting for inventory that records the sale or purchase of inventory immediately through the use of computerized point-of-sale systems

54
Q

Property Flopping

A

A rapid transfer of property with an unjustified, significant change in value, but instead of inflating the value on the second transaction, the value on the first transaction (a short sale) is deflated

55
Q

What is a “positive pay system”?

A
  • a way for the company and its bank to detect fraudulent items presented for payment
  • The company provides the bank with a list of checks and amounts that are written each day. The bank verifies items presented for payment against the company’s list and rejects items that are not on the list. Investigations are conducted as to the origin of the unlisted items.
56
Q

Synthetic Identity Theft

A

The use of entirely fabricated personal information or a combination of real and fabricated information to create a new identity

57
Q

Traditional Identity Theft

A

Stealing an individual’s personal information and pretending to be that individual

58
Q

True Name Fraud

A

Using an individual’s personal information to open a new account in the individual’s name. Unlike an account takeover, which involves an existing account, true name fraud involves a new account.

59
Q

A purchasing and receiving scheme

A

When a person responsible with receiving goods on the victim company’s behalf—such as a warehouse supervisor or receiving clerk—falsifies the records of incoming shipments

60
Q

Durable Medical Equipment

A

-reusable medical equipment

61
Q

Data Manipulation

A

using or manipulating a computer to commit a crime

62
Q

Data Destruction

A

the unauthorized modification, suppression, or erasure of computer data or computer functions, to alter or hinder the normal functions of the targeted system.

63
Q

Technical Security (in computer networks)

A

Safeguards incorporated in computer hardware

64
Q

A Land Flip Scheme resulting in an NPL

A

When a loan is made for a property that has an artificially inflated value

The seller is financed out of the property and the bank holds a NPL

65
Q

__________ is the term used for including additional coverages in an insurance policy without the insured’s knowledge

A

Sliding

-extra charges are hidden in the total premium

66
Q

Why is Billing for experiments with new medical devices that have not yet been approved by a jurisdiction’s health care authority a form of medical fraud?

A
  • Allows hospitals to deliberately mislead third-party payers by getting them to pay for the manufacturer’s research
  • Many of the doctors involved are alleged to have stock in the manufacturing companies.
67
Q

Definition of Financial Statement Fraud

A

the deliberate misrepresentation of the financial condition through the intentional misstatement to deceive financial statement users

68
Q

Phishing + Example

A

a scheme that involves electronically impersonating a trusted individual or entity

Generally, phishers manipulate victims into providing sensitive information by falsely claiming to be from an actual business, bank, Internet service provider (ISP), or other entity with which the target does business.

69
Q

Credit Card Skimming

A

Using a device to scan and store a large amount of credit card numbers that the scammer can sell to a a counterfeiter or use to produce fake cards

70
Q

Unbundling (in Health Care Fraud)

A

-When providers attempt to increase profits by billing separately for procedures that are actually part of a single procedure

AKA - coding fragmentation

71
Q

Crimeware

A

A type of malware used to simplify or automate online criminal activities

(Eg, programs to fraudulently obtain financial gain from the affected user or other third parties)

72
Q

Credit card fraud is successful because….

A

the chances of being caught are low and, even if law contacted law enforcement is contacted, there’s often little or no response regarding the crime

73
Q

A Bid Tailoring Scheme

A

When an employee with procurement responsibilities, often in collusion with a contractor, drafts bid specifications in a way that gives an unfair advantage to a certain contractor

74
Q

A Rolling Lab Scheme

A

When a mobile laboratory that solicits individuals to participate in health screening tests at no cost to the patient. After conducting the tests, however, the lab bills the individual’s insurance provider or health care program

75
Q

An easy way to recognize a real estate scam is if it has an element of _________

A

of time pressure, with the victims being convinced they are participating in a “once-in-a-lifetime, now-or-never” deal.

76
Q

DRG Creep

A
  • Diagnostic-related groupings (DRG) is a reimbursement methodology for the payment of institutional services that categorizes patients by diagnosis/age/gender/etc.
  • occurs when medical staff members manipulate diagnostic and procedural codes to increase reimbursement amounts or other forms of funding (eg, coding minor cuts as major lacerations)
77
Q

Pharming

A

an attack in which users are fooled into entering sensitive data into a malicious website that imitates a legitimate website

-user does not have to click on a link in an email or message to direct them to the website

78
Q

A baiting scheme

A

tricking victims into inserting malware-infected data storage devices into their computers

79
Q

non-repudiation

A

Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the information.

80
Q

The five information security goals that should be achieved to ensure the security of information systems for users and account holders

A
  • Confidentiality of data
  • Integrity of data
  • Availability of data
  • Authentication
  • Non-repudiation
81
Q

What is the primary purpose of an automated clearing house (ACH) filter?

A

Lets account holders to provide their banks with a list of defined criteria to ensure only designated individuals get paid

82
Q

Past posting

A

When a person is involved in an automobile accident but does not have insurance. After the accident, the person gets insurance, waits a short time, and then reports the vehicle as having been damaged in some manner, thus collecting for the earlier loss

83
Q

A direct action virus

A

A virus that loads onto the target system’s memory, infect other files, and then unload itself

84
Q

Buffer overflows

A

A way to attack a computer by overloading the storage capacity of the memory buffer

85
Q

Privilege escalation

A

Using an info system flaw to gain privileges other than what was originally intended for the user

86
Q

The three main types of payroll schemes

A
  • ghost employees
  • falsified hours and salary
  • commission schemes
87
Q

Pharming differs from phishing in that in a pharming scheme…

A

the attacker doesn’t have to rely on having users click on a link in an email or other message to direct them to the malicious website that is imitating a legitimate website

88
Q

A person ____ should be responsible for preparing the bank statement.

A

Independent of the cash receipts and AR functions

89
Q

Rock Phishing

A

Using botnets to send massive amounts of phishing emails to huge volumes of Internet users.

The emails contain a message from a financial institution, enticing users to click on a fraudulent URL.

90
Q

When an employee skims money by making off-book sales of merchandise, it is impossible to detect theft by….

A

comparing the register to the cash drawer because the sale was not recorded on the register.

91
Q

SMiShing

A

A hybrid of phising and text messaging where the attacker uses text messages to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, Internet service provider (ISP), or other entity with which the target does business.

92
Q

____ occurs when contractors intentionally use inaccurate cost or pricing data to inflate costs in negotiated contracts

A

Defective pricing

93
Q

a pass-through scheme

A

When Instead of buying merchandise directly from a vendor, the employee sets up a shell company and purchases the merchandise through that fictitious entity. They then resell the merchandise to their employer from the shell company at an inflated price, thereby making an unauthorized profit on the transaction.

94
Q

If the cost of goods sold increases by a disproportionate amount relative to sales, and no changes occur in the purchase prices, quantities purchased, or quality of products purchased, the cause of the disproportionate increase in cost of goods sold might be one of three things:

A

(1) ending inventory has been depleted by theft
(2) someone has been embezzling money through a false billing scheme
(3) someone has been skimming sales revenue

95
Q

A scavenger scheme

A

when a company that initially conned a consumer contacts that consumer and offers to help retrieve the lost money. However, the investigation requires an upfront fee and the consumer is swindled again

96
Q

The most common giveaway scheme, in which a postcard arrives in the mail telling the recipient they have already won a prize such as a luxurious vacation or cash, is known as _____.

A

the “1-in-5”

97
Q

The purpose of a draw request in construction lending is to provide….

A

documentation that costs have been incurred and reimbursement is sought

98
Q

The four major categories of check tampering schemes

A

1- forged maker
2- forged endorser
3- altered payee
4- authorized maker

99
Q

An exception or manual override reports lists…

A

all exceptions to normal electronic payment processing

Would point out when a computer is being used outside the normal processing time

100
Q

Unbundling

A

When a health care provider charges a comprehensive code, as well as one or more component codes for the same procedure

AKA coding fragmentation

101
Q

Some companies present a _____ rather than a statement of changes in owners’ equity

A

statement of retained earnings

102
Q

The five security goals of an e-commerce system

A

Availability of data

Confidentiality of data
Authentication
Integrity of data
Non-repudiation