Common sense the best defence against fraudsters: forensic auditor

Basic common sense is one of the best tools to detect fraudulent schemes, a forensic auditor has said.

.

Sharlene Anderson, a consultant for Veritas Auditing, says on the latest ASF Audits podcast that SMSF trustees and finance professionals should follow the “age-old adage” that, if it looks too good to be true, it probably is.
 
As another collapse of an investment scheme, Australian Fiducaries, hits the headlines, and the ATO upping its warnings over similar scams, spotting a fraudulent scheme doesn’t require fancy tech or complicated investigation, Anderson said.
 
Australian Fiduciaries was put into liquidation in July owing 660 investors up to $170 million. Similar to the 12,000 people who sunk more than $1 billion into First Guardian and the Shield Master Fund, investors in Australian Fiduciaries ended up with their superannuation locked in complex and risky illiquid investments, many of which were controlled by related parties.
 

ASIC has been investigating all three schemes, a collective failure that is bigger than the $1 billion collapse of Storm Financial in 2009, or the $450 million collapse of Dixon Advisory in 2019.

“You're not going to see consistent returns all the time. We all know about Bernie Madoff and his Ponzi scheme that was producing 12 per cent returns year-on-year and it was an FBI algorithm that pointed it out, through a lot of testing,” Anderson said.

“No matter where you put your money, you couldn't get that return. I'm not suggesting that any SMSF professional is going to have those sorts of algorithms, but we've got common sense.”

Anderson continued that SMSF professionals can do some basic analytical procedures to determine if fraud is occurring, and one of those is just looking for something that is consistently the same.

“[Ask the question] should it be? And how does that compare to the other funds you may be working with.”

“That's the first part. The next part really comes back to using common sense and looking at the documents in front of you and ticking them off.”

Anderson gave an example of a recent CommSec bank statement she had been asked to review from the Melissa Caddick case, which was dated 24 December as the period end for the statements.

“Now, I'm yet to see any sort of statements that end, unless they're weekly statements which CommSec don't issue on Christmas Eve, so that straight away should have been a red flag to anybody looking at that document.”

“You have got to do your general checks and balances. Check for signatures, check for last year's documents compared to this year's documents, maybe even something for you to use as a bit of a benchmark.

“Or have you got another fund with a similar investment? Do the documents look the same? Just follow your nose and be sceptical because that professional scepticism really needs to come in at this point, and when you're doing your audits, and make sure that you focus on not what looks right, but what perhaps looks wrong.”

Shelley Banton, head of technical for ASF Audits, said the Caddick case is a good example of things being too good to be true.

“I think the clever or tragic aspect of that case, apart from everybody losing their money, is that she really just targeted her friends and family and that brought that up to an extra level of trust as well,” Banton said.

Anderson said schemes like Trio Capital are far more sophisticated scams and harder to detect.

“Hindsight is a great thing. When you look back and go, I can't believe they were able to do that, but it was a failure by the regulators in so far as the scammers were able to buy a small country financial planning business and take control of that, and with that came the AFSL license,” she said.

“So it was legitimate, unlike Melissa Caddick, who didn't have an AFSL license and just had a bogus number on her paperwork. Trio Capital's AFSL license was valid, so if you had a check site, you wouldn't have picked it up.”

In that case, Anderson said the scammers targeted accountants and “wined and dined” them so they would then start referring their clients.

“And people trust their accountants, which they should. So when your accountant says, ‘this is safe and it's a good investment,’ they jump in.”

“From a fraudster’s perspective, they just sat back. They'd found a hole in the system that allowed them to get a legitimate business, then they targeted accountants as the weakest link between SMSF and superannuation funds.”

Anderson said in the Trio Capital case, the scam netted in excess of $180 million, none of which was ever recovered.

“That's a level of sophistication that we haven't seen before, and hopefully we won't see again.”

 

 

 

 

Keeli Cambourne
August 27 2025
smsfadviser.com

 

Want to know more?

Do you have a question about something you've read in this article? Need more information? Want to book an appointment? Simply let us know below and we'll get back to you ASAP.

General Disclaimer

The information contained on this website is general in nature and does not take into account your personal circumstances, financial needs or objectives. Before acting on any information, you should consider the appropriateness of it and the relevant product having regard to your objectives, financial situation and needs. In particular, you should seek the appropriate financial advice and read the relevant Product Disclosure Statement or other offer document prior to acquiring any financial product.

Dr John Tickell is a registered Medical Doctor, who graduated at the University of Melbourne, Australia. Dr John has spent several decades travelling and researching the eating and living habits of the longest living, healthiest people on our planet.

The author may give opinions and make general or particular statements in this literature regarding potential changes of lifestyle habits based on experience and research. You are strongly advised not to make any changes or take any action as a result of reading or listening to this material without specific advice from your doctor, physician or registered Health Professional.

The author, the Publisher, the Editor and their respective employees or agents do not accept any responsibility for the actions of any person, or injury, loss or damage occasioned - actions which are in any way related to information contained herein.

Opinions and statements in this literature are based on verified research and experiences by the authors and are to be regarded as health and wellness advice.

Privacy Policy

What Personal Information Do We Collect?

The personal information that we collect will depend on your relationship with us and the service(s) you or your organisation have engaged us to provide or are interested in. It may include:

Name and contact information (including telephone and mobile number, email address and residential and postal address);

Individual information (including racial or ethnic origin(s), language(s) spoken, religious belief(s) and affiliation(s), date of birth, age, place of birth, gender(s), occupation(s), employment and qualification details, financial records, income details, asset listings, taxation records, bank account details, insurance policies, medical history, disability status, criminal record and Court records);

Payment and transactional information (including banking and credit card details);

Other personal or sensitive information (including information contained in communications or documents, any information required due to the nature of your matter, or information we are required to or permitted to collect by law).

Collecting Personal Information

HOW WE COLLECT PERSONAL INFORMATION

We may collect your personal information directly from you or in the course of our dealings with you. For example, we collect personal information from you or about you from:

Correspondence between you and us;

Meetings and interviews with us, telephone calls with us, the instructions you provide to us;

Visits to and submissions you make on our website;

Your interactions with our electronic direct mail and/or emails from our marketing campaigns (such as clicks on links included in these emails); and

Registration and forms you may fill in for our marketing-related activities and events.

WHY WE COLLECT, HOLD AND USE PERSONAL INFORMATION

We collect and hold your personal information for a variety of purposes, and you permit us to use it:

To provide you with our services and carry out our business functions;

For purposes related to the provision of our services such as , educational briefings, seminars and coaching and other service offering updates, conducting client satisfaction surveys and feedback requests, statistical collation and website traffic analysis;

Where you have consented to its use or disclosure;

Where we reasonably believe that use or disclosure is necessary to lessen or prevent a serious, immediate threat to someone's health or safety or the public's health or safety;

Where we reasonably suspect that unlawful activity has been, is being or may be engaged in and the use or disclosure is a necessary part of our investigation or in reporting the matter to the relevant authorities;

Where such use or disclosure is required under or authorised by law (for example, to comply with a subpoena, a warrant or other order of a court or legal process);

Where we reasonably believe that use or disclosure is necessary for the prevention, investigation, prosecution and punishment of crimes or wrongdoings or the preparation for, or conduct of, proceedings before any court or tribunal (or the implementation of orders of a court or tribunal or on behalf of an enforcement body);

To develop and improve our business, products and services; and

For any lawful purpose.

Where we wish to use or disclose your personal information for other purposes, we will obtain your consent.

HOW WE HOLD AND STORE PERSONAL INFORMATION

Your personal information is held and stored on paper, by electronic means or both. We have physical, electronic and procedural safeguards in place for personal information and take reasonable steps to ensure that your personal information is protected from misuse, interference, loss and unauthorised access, modification and disclosure:

Data held and stored on paper is stored in a secure premises.

Data held and stored electronically is protected by internal and external firewalls, high encryption and all access to electronic data including databases requires password access

Access to personal information is restricted to staff and contractors whose job description requires access. Our employees and contractors are contractually obliged to maintain the confidentiality of any personal information held by us.

We undertake regular data backups, with the data copied and backed up to multiple locations for redundancy purposes.

Our staff receive regular training on privacy procedures.