Professional Documents
Culture Documents
Let’s look at an example to illustrate how this might work. Assume the
from the company through the use of a fictitious vendor. The CFO made
up this fictitious vendor and has been submitting phony invoices on behalf
service that only the CFO has full knowledge of, so the CFO approves the
The problem is that the CFO has drained the company’s cash over time.
And the payments have all been posted to a handful of expense accounts,
whose balances are now beginning to get substantially larger than what
value accounting scheme. The CFO might inflate the fair value of the company’s
and cash equivalents for purposes of calculating many financial ratios, such
as the current ratio, the deteriorated financial condition caused by the fraudulent
The CFO might even go one step further to conceal the fictitious vendor
certain expense accounts into which the fraudulent payments have been
posted. Through a series of journal entries, the CFO might reclassify some
or all of the fraudulent recognized unrealized gains on the investments into
the expense accounts, or vice versa, so that the final balances in the expense
accounts are more in line with expectations. Part of the logic the CFO uses
in carrying out this reclassification part of the scheme is that many (perhaps
might be looking only at final balances in various line items of the financial
statements. The details of the underlying transactions are often not looked
at very closely.
Whether the CFO would succeed with this scheme depends on many
factors, including the strategy employed by the internal and external auditors