Criminals submit falsified expense claims or inflate legitimate ones to misclassify illicit funds as ordinary corporate reimbursements. This commonly involves bogus or duplicate receipts, forged signatures on expense forms, and manipulated travel-and-entertainment costs or personal expenditures disguised as business outlays. Offenders may also fabricate entire claims for items like professional subscriptions, electronic purchases, or other expenditures that never actually occurred, capitalizing on minimal scrutiny from supervisors or accounting personnel. Because these claims are paid through normal finance flows, the illicit proceeds appear legitimate. Perpetrators sometimes create false vendor invoices with inflated reimbursement amounts, and repeated resubmission or backdating of expense reports can further mask the fraud. In organizations where expense accounts are only subjected to a cursory review, substantial sums can be siphoned off over long periods before detection.
Expense Report Fraud
Expense Reimbursement Fraud
Tactics
Expense report fraud serves as a predicate offense to obtain illicit proceeds from an organization by submitting falsified or inflated expense claims, thereby siphoning company funds under the guise of legitimate reimbursements.
Risks
Expense report fraud exploits inadequate internal governance and oversight in an organization’s accounting and supervisory processes. Offenders forge or inflate expense claims, relying on minimal scrutiny or insider collusion, thereby converting illicit funds into seemingly legitimate reimbursements.
Indicators
Expense claims consistently exceeding typical amounts for similar roles, with limited or no justification provided.
Frequent reimbursement requests supported by receipts from vendors that cannot be verified through open-source or official registries.
Multiple employees submitting nearly identical receipts or invoice references for travel or entertainment expenses within overlapping date ranges.
Employee repeatedly reclassifies personal expenses (e.g., electronics, clothing) as work-related costs in the accounting system.
Noticeable pattern of partial expense claims just below internal review thresholds, filed multiple times over short intervals.
Employee repeatedly alters or backdates officially submitted expense reports, resulting in increased reimbursement amounts.
Detection of unauthorized or forged signatures on expense forms, suggesting fabrication or misuse of approval authority.
Data Sources
Captures updates to expense categories and financial records in accounting systems, including timestamps, user information, and details of modifications. This helps identify repeated reclassifications of personal expenses as business expenses, a hallmark of expense fraud schemes.
Collects publicly available information (e.g., company websites, social media, business directories) to verify vendor legitimacy. Discrepancies between claimed vendors on expense reports and publicly documented entities can reveal shell or non-existent vendors used for fraudulent expense reimbursements.
Contains official records of vendor invoices, including invoice identifiers, itemized charges, payment terms, and amounts. These details enable thorough verification of expense claims, helping detect inconsistencies such as mismatched or inflated invoice amounts, duplicated invoice references, and nonexistent vendor relationships, which are commonly indicative of expense report fraud.
Provides detailed records of reimbursement transactions, including amounts, timestamps, and counterparties. This data allows for the detection of suspiciously high claims, duplicate submissions, or repeated partial claims strategically kept below internal review thresholds, all indicative of potential expense report fraud.
Stores and indexes receipts, invoices, and expense forms with version control and document histories. Investigators can detect duplicate receipts, identify unauthorized revisions, and pinpoint forged or altered documentation indicative of expense reimbursement fraud.
Tracks user access events, including logins, timestamps, and IP addresses. By correlating expense report modifications with these logs, investigators can detect suspicious after-hours edits, backdating attempts, or repeated modification patterns that indicate intentional fraud.
Authenticates and examines submitted paperwork, such as signatures or official documents, for potential tampering or forgery. This helps uncover falsified signatures on expense forms commonly used in expense report fraud.
Contains employee roles, salaries, and job responsibilities, enabling cross-referencing of claimed expenses with typical job-related outlays. This helps identify employees filing excessive or anomalous reimbursements and potential collusion, such as multiple employees submitting identical receipts.
Supplies official registration details and ownership structures of entities. Cross-checking expense claim vendors against these registries helps identify shell companies or completely fictitious vendors involved in fraudulent reimbursements.
Mitigations
Implement rigorous expense reimbursement controls requiring itemized receipts, mandatory managerial approvals above specific cost thresholds, and standardized expense forms. Schedule random spot checks and enforce dual sign-off for high-value claims. By ensuring each reimbursement is validated with complete documentation and oversight, institutions reduce opportunities for forged receipts and inflated expenses, directly targeting expense report fraud vulnerabilities.
Verify prospective hires for prior financial misconduct or expense-fraud-related offenses by checking criminal records, employment references, and regulatory databases. This measure prevents individuals with a history of fraudulent behavior from obtaining roles with access to sensitive expense or reimbursement processes.
Conduct periodic targeted audits of expense reporting systems and processes to identify patterns of fraudulent claims, repeated vendor anomalies, or inflated reimbursements. Focus on comparing expense records to actual business activities, verifying the authenticity of receipts, and reviewing any backdated or reclassified claims for potential abuse.
Regularly cross-check suspicious or seldom-used vendors and receipts against publicly available data, online reviews, and official registries to confirm the legitimacy of claimed expenses. For instance, verify that service providers or merchants actually exist at the listed addresses and offer the goods or services shown on submitted expense documentation.
Establish confidential whistleblower channels that enable employees or supervisors to discreetly report suspicious or repetitive expense reimbursements, forged signatures, or fabricated receipts. These channels should include anonymous hotlines and secure digital portals, ensuring all staff feel safe reporting potential fraud without fear of retaliation or reputational risk.
Instruments
- Companies often issue checks for employee expense reimbursements.
- By submitting bogus receipts, perpetrators secure checks for non-existent or over-reported outlays, then deposit or cash them, integrating illicit proceeds into their personal finances under the guise of valid reimbursements.
- Criminals submit falsified or inflated expense claims, prompting the organization to transfer reimbursement funds into personal bank accounts.
- Since these outflows are recorded as legitimate business expenses in corporate ledgers, the diversion of funds appears ordinary, effectively laundering the proceeds.
- Employees with access to corporate cards may charge personal or fabricated expenses, presenting them as legitimate business costs.
- Since card statements are often only briefly reviewed, offenders can blend criminal charges with authentic transactions, making illicit spending appear as valid expense items.
- Perpetrators fabricate or alter vendor invoices for goods or services that were never provided or are inflated in cost.
- By presenting these invoices as reimbursable employee expenses, the company unwittingly pays out funds under false pretenses, classifying them as legitimate vendor-related disbursements and masking the fraud.
- Some organizations reimburse small expenses from petty cash. Offenders forge receipts or inflate costs to receive higher cash payouts.
- Since petty cash transactions frequently face minimal documentation, the misappropriated funds appear as normal operating expenses in corporate records.
Service & Products
- Offenders may submit fake or inflated invoices to third-party processors, relying on weak validation checks to secure inflated reimbursements.
- Repeatedly generating bogus documentation through outsourced or automated systems enables criminals to conceal fraudulent expense entries, especially when oversight is minimal.
- Criminals can exploit inattentive or complicit accountants to process false or inflated expense entries, making illicit reimbursements appear legitimate in corporate ledgers.
- Fabricated or duplicated invoices and questionable expense reports may go undetected if auditing procedures are lax or deliberately circumvented, allowing sustained misclassification of funds over time.
Actors
Accountants, including finance staff and supervisors, may be either complicit or inattentive, approving and processing falsified or inflated claims. By recording these reimbursements as ordinary business expenses, they inadvertently help conceal the true source of funds, making it challenging for financial institutions to distinguish legitimate disbursements from fraudulent ones.
The organization's financial processes are exploited to channel falsified or inflated expenses. When the entity pays out these claims as ordinary operating costs, the resulting disbursements appear legitimate, shielding the illicit origin of the funds from financial institution oversight.
References
Silverstone, H., Sheetz, M., Pedneault, S., & Rudewicz, F. (2012). Forensic Accounting and Fraud Investigation for Non-Experts (3rd ed.). John Wiley & Sons, Inc
Spann, D. D. (2014). Fraud Analytics: Strategies and Methods for Detection and Prevention. John Wiley & Sons, Inc