Criminals falsify or adjust financial records, including accounting entries, invoices, or transaction timestamps, to disguise illicit fund flows. By under- or over-invoicing and generating fictitious revenue entries, they embed unlawful proceeds within official business activity. Repetitive manipulations, sometimes enabled by pliant accountants to cook the books, complicate reconciliation of actual cash movements with ledger records. The exploitation of corporate structures, such as limited liability companies, further facilitates false liability shifts and the incremental integration of criminal proceeds into legitimate revenue streams.
Manipulation of Financial Records
Accounting Manipulation
Manipulation of Financial Records
Tactics
Criminals falsify or alter financial statements and accounting entries to create misleading records, explicitly obscuring links between illicit funds and their true source. This complexity frustrates investigators' ability to trace the origin of proceeds, fulfilling a clear layering objective.
Through the incremental inclusion of illicit funds as purported corporate revenue—such as reclassifying or timing accruals—criminals embed illicit proceeds into legitimate financial statements over time, achieving integration into the lawful economy.
Risks
This technique relies on the customer (the business entity) providing falsified accounting records and financial statements to conceal illicit fund flows. By masking genuine transaction patterns behind fabricated invoices, accruals, or backdated entries, the criminals undermine financial institutions' normal monitoring procedures—which rely significantly on information supplied by the customer—and obscure the true nature of fund movements.
Indicators
Significant and unexplained adjustments in revenue accrual entries near period-end that lack support from underlying transaction volumes.
Frequent modifications or reversals of accrued revenues or expenses immediately before or after financial reporting deadlines.
Discrepancies between recorded accrual figures and actual cash flows or invoice data.
Material shifts in revenue recognition or expense deferral practices that deviate substantially from industry norms or the entity’s historical policies.
Absence or inconsistency of supporting documentation for significant accrual adjustments, including missing or contradictory invoices and receipts.
Management override or lack of segregation of duties in the accrual accounting process, enabling unauthorized financial record changes.
A recurrent pattern of understating accrued expenses or overstating revenue accruals without corresponding business activity.
Backdated or inconsistent timestamps on invoices or accounting records that conflict with actual transaction dates in operational logs.
Large accrual entries attributed to vendors or customers with no verifiable business operations or external references.
Data Sources
- Official financial statements, tax returns, and related filings reflect reported revenues, expenses, and liabilities.
- Help identify inconsistencies or manipulations in recorded figures by cross-checking against actual business transactions and historical filings.
- Contains detailed information on contracts, invoices, and related payment terms, including invoice amounts, parties involved, and issuance dates.
- Provides a direct means to compare recorded accounting entries against authentic contract and invoice records, identifying over-invoicing, backdating, or fabricated documents.
- Capture comprehensive details of financial transactions, including timestamps, amounts, parties involved, and transaction identifiers.
- Facilitate direct comparison of actual transaction data with reported accounting entries. This helps detect backdated or altered financial records and identify discrepancies in recorded revenues or expenses.
- Aggregate identity and registration information on individuals and entities from public and private registries.
- Validate the actual existence and status of vendors or customers cited in manipulated revenue or expense accruals, uncovering sham entities used to falsify financial records.
- Store and manage supporting documentation (contracts, invoices, receipts) with version control and access logs.
- Enable verification of document authenticity, ensuring that accounting entries match legitimate invoices and receipts rather than forged or altered documents.
- Document employees’ roles, responsibilities, and hierarchical structures.
- Help detect potential collusion or management override in financial recordkeeping by identifying individuals with the authority to alter accrual entries or bypass internal controls.
- Contain operational data (daily revenue, production, sales figures) reflecting actual business activities.
- Enable comparison between genuine operational results and reported financial statements, exposing inflated or fabricated revenues and manipulated accruals.
- Provide independent audit assessments of an organization's financial statements and internal control systems.
- Reveal suspicious accounting practices, control weaknesses, or repeated adjustments indicative of intentional financial record manipulation.
- Contain verified identities, beneficial ownership details, and risk profiles of customers and counterparties.
- Help confirm the legitimacy of entities appearing in manipulated financial records, detecting potential fabricated or high-risk relationships that facilitate fictional revenues or expenses.
- Provide official data on corporate structures, directors, shareholders, and ownership changes.
- Reveal shell companies or obscure ownership arrangements potentially used to shift liabilities or create fictitious revenues and losses through manipulated accounting entries.
Mitigations
For higher-risk corporate clients or unusual transactions, require documentary evidence of key accounting entries, such as audited financial statements, and verify line-item accruals through external accountants or regulatory filings. Track posted revenues and expenses over time to detect anomalous spikes, false liabilities, or contrived timing shifts.
Continuously reconcile actual transaction flows with the company’s reported financial records to identify mismatched invoice amounts, suspicious accrual entries, or unexplained accounting adjustments. Automated alerts highlight anomalies that lack supporting documentation, enabling thorough investigation of potential record manipulation.
Provide specialized instruction on detecting common red flags of account falsification, such as unexplained accrual reversals, artificially adjusted ledger entries near reporting deadlines, or invoices lacking credible backup. Ensure employees know how to swiftly escalate anomalies for investigation.
Screen accounting and finance personnel thoroughly by checking credentials, references, and any history of unethical behavior to mitigate collusion risks. This prevents criminals from placing compliant staff who willingly falsify books or backdate entries on behalf of illicit actors.
Implement robust, timestamped logs of all financial record updates and require secondary approvals for any modifications. Ensure system-generated audit trails cannot be overwritten, so any backdating or alteration of invoices, accruals, or ledger entries is traceable, facilitating swift detection of illicit tampering.
Conduct periodic, unannounced audits to compare ledger entries, accrual accounting records, and supporting documentation with actual cash flow data. Engage external audit specialists or separate internal teams to identify fabricated revenue, improper timing shifts, and backdated entries used to launder funds through fraudulent financial narratives.
Verify counterparties, invoices, and claimed business activities against reputable external data sources (e.g., registries, third-party databases, media). Confirm that recorded transactions match bona fide trade volumes and timelines to expose fictitious revenues or fraudulent expense entries used to launder money.
Scrutinize the authenticity of trade transactions and invoice documents by verifying commodity quantities, shipping details, and pricing data. Specifically, identify over- or under-invoicing or fictitious shipments by cross-referencing trade data with official ledgers, thereby exposing manipulations designed to conceal illicit fund movements.
Instruments
- Criminals falsify or backdate entries to show phantom deposits and withdrawals in company bank accounts, aligning these fabricated movements with manipulated invoices or accrual adjustments.
- By reflecting non-existent transactions in official ledgers, they create a misleading financial narrative that conceals the true origin and destination of illicit funds.
- These bogus records frustrate AML efforts by presenting seemingly legitimate account activity that is difficult to distinguish from real customer transactions.
- Criminals manipulate trade documents (e.g., invoices, bills of lading) linked to trade finance instruments by inflating or deflating transaction values.
- These manipulations provide cover for false accrual entries, allowing the laundering of illicit funds under the guise of cross-border or domestic trade.
- Financial institutions often rely on these documents for AML checks, and fraudulent adjustments severely hinder the ability to detect inconsistencies between actual shipments and recorded values.
- Through over- or under-invoicing, criminals record inflated or entirely fictitious sales as receivables in the company’s books.
- They manipulate accruals to time revenue recognition in a way that masks or justifies illicit fund inflows, blending them with legitimate sales data.
- Such fabricated invoice records make it difficult for auditors or regulators to trace actual cash flows, thereby hiding suspicious activities behind ostensibly legitimate business transactions.
- Criminals record fictitious cash sales or alter petty cash ledgers to mask the true sources and volumes of physical currency, effectively commingling dirty money with apparently legitimate revenues.
- By adjusting accrual accounting entries linked to these counterfeit cash transactions, they reconcile false data in official records, making it appear as normal business income.
- This creates a misleading paper trail that complicates efforts by financial institutions and regulators to identify irregular inflows or outflows of actual cash.
Service & Products
- Criminals generate or alter invoices that do not correspond to genuine transactions, inflating or deflating amounts to disguise illicit fund movements.
- Fictitious invoicing masks suspicious flows behind ostensibly legitimate documentation, thwarting standard AML review.
- Criminals employ complicit accountants or auditors to falsify ledger entries, accruals, and other financial figures, masking the true source of illicit income.
- Fabricated or backdated entries create a misleading financial narrative, obscuring suspicious cash flows from regulators and investigators.
- Formation and management of corporate entities enable criminals to shift liabilities or record fictitious revenues, complicating detection of actual money flows.
- Maintaining business records on behalf of these entities can include falsifying or omitting transactions, reinforcing the manipulated financial narrative.
Actors
Complicit accountants knowingly:
- Fabricate or adjust invoices and accruals to mask illicit income.
- Prepare financial statements that obscure the true nature of fund inflows and outflows.
Their role directly affects financial institutions by providing false records that undermine transaction monitoring and beneficial ownership analysis.
Business entities, including public or private limited liability companies, are used to:
- Shift liabilities, reclassify expenses, or fabricate revenues, thereby confusing attempts to reconcile actual cash flows.
- Present seemingly legitimate financial records while hiding illicit transactions behind official corporate ledgers.
This structural exploitation complicates financial institutions' due diligence and obscures the origin of funds.
These individuals or groups initiate and control the falsification of accounting entries, invoices, or transaction timestamps. They knowingly:
- Employ compliant accountants to manipulate the books and hide suspicious fund flows.
- Overstate or understate revenues and expenses to create a misleading financial narrative.
By engineering these manipulations, they frustrate financial institutions' ability to identify and scrutinize illicit transactions.
Complicit or negligent auditors:
- Sign off on falsified financial statements, providing an appearance of legitimacy.
- Overlook suspicious accrual adjustments or backdated entries, inhibiting timely detection of illicit activities.
Their involvement grants criminals a veneer of credibility that hinders financial institutions' AML controls.
References
The Asia/Pacific Group on Money Laundering (APG). (2008, July 11). APG Typologies Report 2008. http://www.apgml.org
FATF (Financial Action Task Force). (2015, October). Guidance on AML/CFT-related data and statistics. FATF. http://www.fatf-gafi.org/publications/fatfrecommendations/documents/aml-cft-related-data-statistics.html
OECD. (2019). Money Laundering and Terrorist Financing Awareness Handbook for Tax Examiners and Tax Auditors. OECD. www.oecd.org/tax/crime/money-laundering-and-terrorist-financing-awareness-handbook-for-tax-examiners-and-tax-auditors.pdf
Ravenda, D., Valencia-Silva, M.M., Argiles-Bosch, J.M., Garcia-Blandon, J. (2018). Accrual management as an indication of money laundering through legally registered Mafia firms in Italy. Accounting, Auditing & Accountability Journal, Vol. 31 No. 1, pp. 286-317. https://doi.org/10.1108/AAAJ-12-2015-2329
Putza A., Keating T., Benson K., Rudolph J., Rusin M., Wild F. Financial crime insights: The role of enablers in facilitating illicit finance. Financial Crime Insights Podcasts. Center for Financial Crime and Security Studies at RUSI.