The ex-CFO of Enron, oh humbly, asks:
"If the internal and external auditors and lawyers sign off on it, does that make it okay?"
History has shown us that, "that all depends." However, maybe things have changed?
[via HBR]
The ex-CFO of Enron, oh humbly, asks:
"If the internal and external auditors and lawyers sign off on it, does that make it okay?"
History has shown us that, "that all depends." However, maybe things have changed?
[via HBR]
Yesterday I sat in a session at the ACFE Fraud Conference and Exhibit entitled “Effectively Using Social Networks and Social Media in Fraud Examinations” with a few hundred [?] fraudbusters and I got the impression that few people in the room were social media savvy (in the stalk-y sense, anyway). I came to this conclusion after watching most of the hands in the room go up when asked “who thinks social media is a waste of time?” and saw nearly same amount of hands raised when asked “do you have some sort of social network presence?”
Cynthia Hetherington, President of Hetherington Group, described herself as “[A] librarian, a technologist and licensed private investigator. So, I’m a nerd, I’m a geek and I’m a dick,” was the speaker for this particular session and a lot of her talk introduced the crowd to the idea of stalking people on the Internet. She knew her crowd well, as a joke about Laverne & Shirley’s apartment got plenty of laughs, while a quip about Snooki got crickets. This reinforced my suspicion that the idea that of curating information about financial crooks using Facebook and Twitter was new to many in the room.
Now, the majority of people listening may have known it was possible to find partially-nude pics on someone’s Facebook profile or Twitter account (which she demonstrated in one non-Anthony Weiner example) but maybe they hadn’t considered that they could learn a lot of other useful information about someone they were investigating.
In short, Ms. Herrington explained to the biz casual crowd that you can find out a lot of information about a person just by poking around their social media accounts. Whether it’s Facebook, Twitter, or LinkedIn, you can learn someone’s likes, dislikes, their political leanings, where they’ve lived, who their friends are, etc. and use that information to build a profile, analyze behavior or in some cases, find out where someone maybe hiding.
What does all this mean? Opportunity my friends. If you fancy yourself social media and Internet savvy, you probably have a leg up on many of the vets in the fraud and forensics business when it comes to poking around the Web and finding information on people of interest to you. Sure you may not have their years of investigative expertise, extensive contacts or an aging wardrobe but you may have successfully Web-stalked ex-significant others, crushes and completely random people to learn things that they’ve volunteered into cyberspace. And here you thought your creepy behavior was completely worthless.
This Sunday, July 30, 2017, marks the 15th anniversary of the enactment of the Sarbanes-Oxley […]
As you may recall, restated financial statements for headphonesmith company Koss were due yesterday and they used all the time they were allowed.
According to our friends at y filed its restated 10-K for June 30, 2009, and 10-Qs for September 30, 2009, December 31, 2009 and March 31, 2010 5 pm, 5:06, 5:11, 5:16 and 5:17 respectively.
Oh and they topped everything off with an 8-K at 5:27 that explains the barrage (not that we need it but, you know, securities law and stuff):
On June 30, 2010, Koss Corporation (“Koss”) released restated consolidated financial statements for the fiscal years ended June 30, 2009 and 2008, and the quarter ended September 30, 2009. Koss filed amendments to its Annual Report on Form 10-K for the fiscal year ended June 30, 2009 and its Quarterly Report for the three months ended September 30, 2009 containing the restated consolidated financial statements for the applicable periods. The restatements were required as a result of previously disclosed unauthorized transactions by Sujata Sachdeva, Koss’s former Vice President of Finance and Principal Accounting Officer.
Koss also amended its Quarterly Reports on Form 10-Q for the three months ended December 31, 2009 and March 31, 2010 to include financial statements, which were omitted from the Company’s reports when previously filed. The release of these financial statements was delayed due to the restatement of Koss’s financials statements required by the unauthorized transactions. With the filings of these amended Quarterly Reports on Form 10-Q, Koss understands that it will regain compliance with Nasdaq Listing Rule 5250(c)(1), which requires the timely filing of periodic financial statements.
That about covers it, doesn’t it? Oh right, the actual numbers. We checked in with forensic sleuth and GC friend Tracy Coenen on these and she gave us some perspective on the restated numbers:
So I’ve taken a run through the restated numbers for 6/30/09 and 6/30/08. Very interesting.
2009 – Revenue was understated by $3.5 million to conceal the fraud, while COGS was overstated by $1.7 million. Overall there is now a loss for 2009, thanks to $8.5 million of theft, but without that, the company would have had profits of $8.2 million, or 19.6% on net sales. Wow!
2008 – Revenue was understated by $2.1 million to conceal the fraud, while COGS was overstated by $1 million. Overall there is now a loss of 2008 of $1.3 million thanks to $5.1 million of theft, but without that, the company would have had profits of $10.7 million or 21.9% of sales.
Pretty impressive stuff. Maybe the company was right when they said everything would be hunky-dory once they got this little mishap out of the way. Chief headphone inheritor Michael Koss explains in the company’s press release, “Given that certain unauthorized transactions were concealed in the Company’s sales and cost of sales accounts, our sales were higher and our cost of sales was lower than previously reported in both 2009 and 2008. This correction has revealed an increase in gross margins for our Company. From this perspective, the Company’s performance was actually stronger than originally reported.”
Tracy continues:
What you see is that 65%-75% of the theft on an annual basis was concealed on the P&L, and the remainder was dumped into the balance sheet, via inflated A/R, Inventory, and fixed assets, and understated liabilities. The adjustments on the balance sheet are large by 2009 because those irregularities were cumulative.
So the bottom line is that the company is very profitable, if shareholders could actually count on them to watch over the money and see to it that the profits aren’t all being stolen. My original theory was that Sachdeva was expensing her theft, and that’s true to some extent, but failure to record sales was presented to me later as part of her her scheme, and she also involved the balance sheet which created a cumulative (and messy) problem.
Oh right! Watching the money. Should probably write that one down. Hopefully we’ve all learned a valuable lesson.
