…What’s the big deal?

Issued by AICPA FLS Fraud Task Force
Lead Author: Elizabeth Woodward, CPA/CFF

Corruption is defined as “dishonest or illegal behavior, especially by powerful people such as government officials or police officers).”¹ This publication is not intended to address political or international corruption; rather, we intend to address the insidious nature of employee corruption that keeps forensic accountants up at night — that is, our experience, education and training combine to absolutely convince us that the “depravity, decay and decomposition” (also part of Merriam-Webster’s definition stated previously) embodied by corrupt individuals will likely always be the strongest opponent we face in our fight to prevent fraud. Forensic accountants believe that for fraud to occur, three factors generally need to be present:

  1. Opportunity (under control of company)
  2. Rationalization (internal to individual)
  3. Pressure (possibly more internal to individual)

Corporate fraud is apparent at all levels, including supervisors, management and even executives. The problem for forensic accountants is that if a person is “corrupt,” they will always have the ability to rationalize theft. Some of the most troubling projects that an investigator pursues can involve employee theft via violations like expense report abuse, improper vendor relationships and low-dollar bribes. Perhaps what makes these offenses so unpleasant is that they show a diseased corporate culture where employees feel entitled to “extra” benefits. Imagine the manufacturing engineer who awards million-dollar contracts for factory maintenance, and that same engineer has a barn built at his personal residence for free, or at a very low cost using his employer’s resources or discounts from vendors (which, his employer would pay for indirectly via higher prices). “It doesn’t hurt anybody” is never a true defense. When personal gain is factored in to business decisions, the employee is not acting in the best interest of his or her employer and the business is harmed.

It should be noted that corrupt activities may be either committed acts such as defalcation of records or misrepresentation of work performed, or omitted acts such as “looking the other way” or failing to enforce policies or regulations in exchange for something of value.

Examples of Employee Corruption

Payroll and ghost employees

“Ghost” employees are individuals who receive paychecks but do not exist, or exist but are not legitimate employees. In the first instance, they are fictitious employees who are entered into the payroll file. In the latter, they may be associates of an existing employee or former employees who continue to receive checks after their employment is terminated. For this fraud to occur, employment files are created or altered. Work activity records (like time cards) are maintained. Payroll checks, or more conveniently, direct deposits, are diverted to an account controlled by the perpetrator.

Billing and fictitious vendors

This fraud scheme is perpetrated by issuing disbursements to either a fictitious vendor or to a legitimate vendor for fictitious goods/services. The fictitious vendor is entered into the vendor master file and receives payment for goods and services not actually provided. Legitimate vendor accounts may also be used to commit fraud. Payments to legitimate vendors for fictitious goods/services may be intercepted and converted, or employees can collude with existing vendors to create inflated invoices or false invoices and provide kick-backs or bribes to the employee. Please see “Vendor Fraud” in the Spring 2017, Issue 3, edition of FVS Eye on Fraud for more information.

Expense reimbursement

As mentioned previously, expense reimbursement is one of the most prevalent forms of corruption because it is so easy to commit compared to other frauds. Some common examples include:

  • Submitting personal expenses as business expenses (for example, dinner with a spouse is submitted as dinner with a client)
  • Writing in overstated amounts for blanks on a receipt (for example, a $20 taxi ride from the airport is submitted as a $40 ride)
  • Duplicating reimbursement (for example, a board member is reimbursed mileage from the organization and from their employer)
  • Masking true nature of expense to one that is allowed by company policy (for example, submitting “discrete receipt” from a “gentlemen’s club,” to make an outing appear to be dining, rather than non-allowed adult entertainment)

Some Slightly More Sophisticated Examples of Employee Corruption

Bid rigging

Bid rigging occurs when participants work together, also referred to as colluding, to make it appear as though several competitive bids have been received, when in fact the process is “rigged” to favor a higher-than-necessary price. This is often accomplished through employees inside an organization’s procurement department working with accomplices to set up sham “business” entities. These employee-controlled “businesses” work in coordination to fabricate the bids. Of course, an enterprising procurement employee may work with individuals outside the company as well.

The element of collusion can make fraud much more difficult for a forensic accountant to detect. However, the involvement of more than one participant can sometimes cause the scheme to unravel — when one participant feels shortchanged, they may turn on the others.


The barn built for the manufacturing engineer mentioned previously is an example of a nonmonetary kickback. Although the engineer’s employer does not directly lose cash, the company is likely paying more than they need to for the maintenance service in this case. In other cases, the cost of whatever good or service the vendor is providing may be inflated due to the “extras” that have been provided to the employee awarding the contract(s).

Kickbacks can also be in the form of cash. For example, a hiring manager negotiates with a potential recruit and offers them a high-paying position, as long as 5% of the new salary is secretly given back to the hiring manager.


This scheme involves the corrupt payment of money, gifts or other rewards to influence the action of another person. Generally, in order to investigate bribery, a forensic accountant must understand a company’s compliance program and the applicable laws and regulations.

The U.S. Foreign Corrupt Practices Act (FCPA) prohibits corrupt payments to foreign officials and requires that books and records be maintained in a manner to assure that such corrupt payments are not made. Companies with international agents or operations are subject to extensive controls and monitoring responsibilities. The provisions of FCPA are beyond the scope of this publication. For guidance, see sec.gov/spotlight/fcpa/.

How Does This Happen?

Hiring practices

All too often employers just do not do enough to properly vet new employees. See the “Practice Tips — Pre-Employment screening” insert for some suggestions.

Failure of fraud victims to report theft

As forensic accountants, we often hear after the fact that a fraudster had actually stolen before, but the theft had not been reported. Unfortunately, this hesitancy is widespread and occurs for different reasons. Some organizations do not want the reputational harm of being known as a victim. Some fear the reaction of investors, donors, employees, or the community at large.

Lack of training/corporate culture

There should be no question regarding what a company believes is the appropriate use of funds. Leaders establish the tone at the top by embodying the values of the entity. If a CEO buys expensive wine with employees present at the company’s expense, those employees will likely mimic the behavior if given the opportunity.

Lack of internal controls surrounding accounting and procurement processes

Internal controls around key accounting (cash disbursements and cash receipts) and procurement (purchase orders and receiving) processes help mitigate the risk of employee corruption. Segregation of duties and secondary reviews within these processes are examples of controls that will prevent and detect various fraud schemes.

FVS Eye on Fraud