Journal Entries and Adjustments: A Fraud Danger Viewed Through the Lens of Forensic Accounting and Investigations
Opening
Journal entries and financial adjustments play a vital role in an organization’s financial reporting. From a forensic accounting and investigative perspective, journal entries offer critical insight into how fraud is carried out, concealed, and perpetuated.
Manipulating journal entries allows perpetrators to alter financial statements, misrepresent a company’s financial health, and cover up fraudulent transactions.
This Fraud Tip Friday release explores the various risks associated with journal entries, the forensic techniques used to investigate them, and how they are exploited to conceal fraud.
The Role of Journal Entries in Financial Fraud Investigations
Journal entries form the backbone of an organization’s financial records. They capture everything from routine daily operations to complex financial adjustments. Forensic accountants rely on journal entries to trace how fraudsters manipulate financial data. In many cases, journal entries provide a clear record of manipulation and offer direct evidence of how a company’s financial results have been misrepresented.
Types of Journal Entries: Key Areas of Focus in Investigations
Forensic investigations often reveal that journal entries, particularly nonstandard and top-side adjustments, were used to conceal fraudulent activities. Investigators must scrutinize every entry to uncover patterns of manipulation, understand the context behind each adjustment, and determine whether these entries align with legitimate business practices.
Investigating Top-Side Journal Entries: A Key Focus for Forensic Accountants
Top-side journal entries are a common tool used by senior management to manipulate financial results. Unlike standard entries, which pass through routine transaction cycles, top-side adjustments are made directly at the financial statement level. These adjustments allow management to bypass normal controls, making it easier to manipulate financial figures without detection.
Key Risks and Red Flags in Top-Side Entries
Forensic accountants pay close attention to top-side entries for several reasons:
Forensic accountants investigate top-side journal entries by reconstructing the financial logic behind each entry. They review whether the adjustments were made for legitimate reasons or if they were intended to misstate the financial position of the company.
Key Risks and Red Flags in Journal Entries from an Investigative Perspective
Fraudulent journal entries have several characteristics that forensic accountants look for during an investigation. These red flags often point to manipulation or the concealment of improper activities:
Investigative Techniques for Detecting Fraud Through Journal Entries
Forensic accountants employ a variety of techniques to detect and investigate fraudulent journal entries. These methods help investigators uncover hidden patterns, trace the flow of funds, and identify suspicious transactions.
Cross-Referencing Entries with Supporting Documentation
A critical part of any journal entry investigation is ensuring that each entry is backed by appropriate documentation. This includes verifying whether the entry has legitimate support, such as invoices, contracts, or third-party confirmations. A lack of proper documentation is a major red flag, as it suggests that the entry was made to conceal fraud or manipulate results.
Transaction Cross-Referencing
Forensic accountants also cross-check journal entries against other financial records, such as bank statements, accounts payable, and accounts receivable. This ensures that journal entries correspond with real-world transactions. If there is no underlying transaction to support an entry, it may indicate that the entry is fraudulent.
Pattern Recognition and Anomaly Detection
One of the most powerful techniques in forensic accounting is the ability to recognize patterns in journal entries. Investigators use data analytics to detect anomalies, including:
Using Benford’s Law in Forensic Investigations
Benford’s Law is a mathematical principle that predicts the distribution of leading digits in naturally occurring datasets. According to Benford’s Law, the digit 1 appears as the leading digit around 30.1% of the time, while the digit 9 appears only about 4.6% of the time. This law can be applied to financial datasets, including journal entries, to detect manipulation.
When financial data deviates from Benford’s Law, it may signal that the entries have been fabricated or altered. Forensic accountants use Benford’s Law to analyze journal entries and identify entries that fall outside the expected digit distribution.
Example of Benford’s Law Applied to Journal Entries
Consider the following set of 10 journal entries:
Using Benford’s Law, we analyze the leading digits of each journal entry amount. The expected distribution from Benford’s Law versus the actual leading digit distribution for this dataset is as follows:
? JE001: Leading digit 1 (102,500)
? JE002: Leading digit 5 (58,930)
? JE003: Leading digit 2 (235,700)
? JE004: Leading digit 9 (915,600)
? JE005: Leading digit 4 (476,200)
? JE006: Leading digit 1 (150,300)
? JE007: Leading digit 3 (310,250)
? JE008: Leading digit 8 (89,500)
? JE009: Leading digit 6 (62,400)
? JE010: Leading digit 1 (15,930)
Benford’s Law Expected Distribution vs. Actual Distribution:
? Digit 1: Expected 30.1% | Actual: 30% (3 occurrences)
? Digit 2: Expected 17.6% | Actual: 10% (1 occurrence)
领英推荐
? Digit 3: Expected 12.5% | Actual: 10% (1 occurrence)
? Digit 4: Expected 9.7% | Actual: 10% (1 occurrence)
? Digit 5: Expected 7.9% | Actual: 10% (1 occurrence)
? Digit 6: Expected 6.7% | Actual: 10% (1 occurrence)
? Digit 8: Expected 5.1% | Actual: 10% (1 occurrence)
? Digit 9: Expected 4.6% | Actual: 10% (1 occurrence)
Analysis:
This discrepancy, combined with the fact that both JE004 and JE008 were entered outside regular business hours (at 9:00 PM and 11:00 PM, respectively), raises red flags that warrant further investigation.
Timestamp and User Analysis: A Critical Forensic Technique
Journal entry investigations require reviewing audit logs to understand who made the entries when they were made, and whether they were subsequently modified. This provides critical insights into potential manipulation.
Audit logs are a powerful tool for forensic accountants because they record the precise details of every journal entry, including the user, the timestamp, and any subsequent modifications. Fraudulent entries are often made after business hours or by individuals who typically do not have accounting responsibilities, making audit logs a vital source of evidence in identifying irregularities.
In the provided example:
Investigators should carefully analyze the roles and responsibilities of each user making these entries, ensuring they have the proper authorization. Additionally, the timing of the entries should be compared to business operations. Late-night entries, especially those made right before financial reporting deadlines, are highly suspicious and should be flagged for further investigation.
By combining timestamp analysis, user profiling, and audit logs, forensic accountants can build a more comprehensive picture of how fraudulent entries are made and who might be involved.
Additional Red Flags in Journal Entries
In addition to analyzing user activity and timestamps, forensic accountants look for specific characteristics in journal entries that suggest fraud. These red flags, when detected in combination with other suspicious behaviors, can provide a clear indication of fraudulent activity.
Backdated or Post-Close Entries:
Entries made after a financial period has closed, or entries that are backdated to previous periods, can signal an attempt to alter financial results retrospectively. Forensic accountants will examine whether entries were made after the books should have been closed and determine if they were backdated to manipulate performance metrics. Any such entries require detailed scrutiny.
Entries to Dormant or Unrelated Accounts:
Fraudsters often use dormant or unrelated accounts to obscure fraudulent journal entries. Investigators should focus on entries made to accounts that are seldom used or do not align with the nature of the transaction. Entries routed through dormant or obscure accounts can be a sign that the fraudster is attempting to hide the true nature of the transaction.
Round Numbers and Consistent Endings:
Fraudulent journal entries frequently involve round numbers or amounts with consistent endings (e.g., $100,000, $500,000, etc.). This is because perpetrators often fabricate entries using easy-to-calculate numbers, hoping to avoid detection. Forensic accountants should pay close attention to entries with large, round numbers, as these are often indicative of fabricated or manipulated transactions.
Case Studies: Journal Entries in Fraud Investigations
Several high-profile fraud cases have illustrated how journal entries were used to perpetuate and conceal fraud. These case studies highlight the critical role that forensic accountants play in uncovering fraudulent journal entries.
WorldCom
WorldCom executives used fraudulent journal entries to reclassify more than $11 billion in operating expenses as capital expenditures. By manipulating journal entries, the company inflated its assets and net income, hiding its deteriorating financial position from investors and regulators. Forensic accountants uncovered the fraud by analyzing these journal entries, which lacked proper documentation and were authorized by senior management without adequate oversight. The entries were often made near reporting deadlines, raising further suspicion.
Xerox
Xerox executives engaged in fraudulent activities by making top-side adjustments to inflate the company’s earnings. These journal entries bypassed normal accounting processes and were recorded without supporting documentation. By focusing on these entries, forensic accountants were able to unravel the fraudulent scheme, which misrepresented the company’s financial performance over several years. The use of audit logs and user tracking played a key role in identifying how and when these entries were made.
Cendant
Cendant Corporation used fraudulent journal entries to backdate revenue and inflate earnings. These entries were made without proper authorization and were routed through unrelated accounts to obscure the true nature of the transactions. Forensic accountants detected the fraud by analyzing the audit logs and cross-referencing the entries with supporting documentation. The investigation revealed that these entries were made with the intent of misleading investors and regulators.
Using Benford’s Law to Identify Anomalies in Journal Entries
As previously discussed, Benford’s Law is an effective tool for detecting anomalies in financial data, particularly when examining journal entries. By analyzing the leading digits in a dataset of journal entries, forensic accountants can identify entries that deviate from the expected distribution, suggesting manipulation.
How Benford’s Law Works in Practice
Benford’s Law predicts that in a naturally occurring dataset, the digit 1 should appear as the leading digit about 30.1% of the time, while the digit 9 should appear only 4.6% of the time. When journal entries deviate significantly from this expected distribution, it can signal that some entries were fabricated or manipulated.
In our earlier example dataset, JE004 and JE008 raised red flags due to their deviation from the expected distribution. The leading digit 9 (JE004) was overrepresented in the dataset, and both entries occurred after regular business hours, further increasing the likelihood of fraud.
By applying Benford’s Law, forensic accountants can quickly identify which journal entries require further investigation. This allows investigators to focus on the most suspicious entries and cross-reference them with supporting documentation and audit logs.
Summary
Journal entries, while a necessary component of financial reporting, are often exploited by fraudsters to conceal fraudulent activities and manipulate financial results. Forensic accountants play a critical role in detecting these manipulations by carefully analyzing the content, timing, and documentation of journal entries. Whether through top-side adjustments, backdating, or improper classifications, journal entries are frequently used to distort a company’s true financial condition.
It is important to emphasize that journal entry fraud is not a category of fraud in itself but a tool used to perpetrate fraud in general. Through the use of forensic techniques such as Benford’s Law, timestamp analysis, and user profiling, forensic accountants can uncover hidden patterns of manipulation and hold those responsible accountable.
The case studies of WorldCom, Xerox, and Cendant illustrate how senior management can abuse journal entries to cover up financial wrongdoing. By focusing on suspicious patterns, irregularities in timing, and deviations from normal accounting practices, forensic accountants can expose the individuals behind the fraud and help restore trust in the company’s financial statements.
Thoughts and comments are welcome!
References
1. The concepts and case studies discussed in this paper were inspired by Journal Entries and Adjustments—Your Biggest Fraud Danger by Delwyn D. DeVries and Jack E. Kiger.
2. Additional case studies and methodologies are based on real-world investigations from publicly available SEC and DOJ enforcement actions.
2023 and 2024 Internal Audit Beacon award recipient | Internal Audit & Compliance Advisor | Board Member | Independent Director | Speaker & Author
6 个月Super useful, comprehensive reminder about the risks and possible audit approaches, thanks a lot Jonathan T. M.-CPA,CFF,CGMA,CITP,CFE,PI,NACD Board Fellow for the article!