SlideShare a Scribd company logo
1 of 53
Basics, types of frauds, and fraud
schemes
Dr. Suchita Rawat (MSc. MPhil, PhD)
● Fraud: Key Takeaways
● Intentional use of false or misleading
information in an attempt to illegally
deprive another person or entity of
money, property, or legal rights.
● Fraud is a deliberate act (or failure to
act) with the intention of obtaining an
unauthorized benefit, either for
oneself or for the institution, by using
deception or false suggestions or
suppression of truth or other
unethical means, which are believed
and relied upon by others.
Necessary Elements of Fraud
● A misrepresentation of a material
fact
● Knowledge of falsehood
● Intent to deceive
● Reasonable reliance by the victim
● Actual loss or injury suffered
https://www.acfe.com/about-the-acfe
Corruption
Corruption can take many forms, and can
include behaviours like:
•public servants demanding or taking money or favours
in exchange for services,
•politicians misusing public money or granting public
jobs or contracts to their sponsors, friends and families,
•corporations bribing officials to get lucrative deals
Key players
Politician
Government officials
Public servants
Business people
Formation 1993
Type International non-governmental
organization
Legal status Eingetragener Verein (German
registered voluntary association)
Purpose Combat corruption, crime
prevention
Headquarter
s
Berlin, Germany
Location •Alt-Moabit 96
10559 Berlin, Germany
Managing
Director
Daniel Eriksson
Chairman Delia Ferreira Rubio
https://www.transparency.org/
● 21-08-2022 : CBI ARRESTS A SENIOR BARRACKS STORE OFFICER (Lt. Col.) OF MES & THREE
OTHERS INCLUDING PRIVATE PERSONS IN AN ALLEGED BRIBERY OF RS.22.48 LAKH AND
RECOVERS RS.48.50 LAKH (APPROX) DURING SEARCHES
● 13-08-2022 : CBI ARRESTS AN OFFICIAL OF REVENUE DEPARTMENT FOR ACCEPTING BRIBE
OF Rs. 25,000/-
● 10-08-2022: CBI ARRESTS AN ENGINEER OF UTILITY POWERTECH LTD FOR ACCEPTING
BRIBE OF Rs. ONE LAKH
● 05-08-2022: CBI ARRESTS CHIEF MECHANICAL ENGINEER, PARADIP PORT TRUST & THREE
PRIVATE PERSONS ON THE ALLEGATIONS OF BRIBERY AND RECOVERS Rs. 84.5 LAKH
(APPROX.) DURING SEARCHES AT VARIOUS LOCATIONS
● 16-07-2022: CBI ARRESTS PLANT PROTECTION OFFICER OF MINISTRY OF AGRICULTURE &
THREE PRIVATE PERSONS IN A BRIBERY CASE AND RECOVERS Rs. 1.86 CRORE (APPROX.)
DURING SEARCHES
● 26-07-2022: CBI ARRESTS A LICENSING OFFICER & REGIONAL LABOUR COMMISSIONER FOR
ACCEPTING BRIBE OF RS. 25,000/-
● 01-08-2022 :CBI ARRESTS A CHIEF FREIGHT TRANSPORTATION MANAGER (IRTS-1996) OF
EAST CENTRAL RAILWAY & FOUR OTHERS INCLUDING TWO SENIOR DOMs OF ECR IN A
BRIBERY OF Rs. SIX LAKH AND RECOVERS RS. 46.50 LAKH (APPROX.) DURING SEARCHES
https://cbi.gov.in/press-releases
ASSET MISAPPROPRIATION
https://cybercrime.gov.in/pdf/Cyber%20Security%20Awareness%20Booklet%20for%20Citizens.pdf
 act of wrongfully obtaining
someone’s personal information
(name, phone number, address,
bank account number, Aadhaar
number or credit/debit card number
etc ) without their permission.
 bank accounts /file a tax
refund/obtain a driver’s license,
passport or immigration papers/
medical treatment/assume your
identity on social media
This Photo by Unknown Author is licensed under CC BY-ND
IDENTITY THEFT
VISHING
 Fraudsters try to seek personal
information like Customer ID, Net
Banking password, ATM PIN, OTP,
Card expiry date, CVV etc. through
a phone call.
PHISHING
 involves stealing personal
information such as Customer ID,
IPIN, Credit/Debit Card number,
Card expiry date, CVV number, etc.
through emails that appear to be
from a legitimate source.
This Photo by Unknown Author is licensed under CC BY-
NC-ND
PSYCHOLOGICAL TRICKS
SMSHING
 type of fraud that uses mobile
phone text messages to lure
victims into calling back on a
fraudulent phone number, visiting
fraudulent websites or downloading
malicious content via phone or web
ONLINE JOB FRAUD
 An attempt to fraud people who are
in need of employment by giving
them a false hope/ promise of
better employment with higher
wages.
This Photo by Unknown Author is licensed under CC BY-NC-ND
PSYCHOLOGICAL TRICKS
DEBIT/CREDIT CARD FRAUD
 an unauthorized use of another's
credit or debit card information for
the purpose of purchases or
withdrawing funds from it.
LOTTERY FRAUD
 The fraudster congratulates the
victim for winning a handsome
lottery via e-mail/call/SMS and
asks to transfer a token amount
and share vital personal
information to get the lottery
money.
PSYCHOLOGICAL TRICKS
This Photo by Unknown Author is licensed under CC BY-
SA
SPAMMING
 Spamming occurs when someone
receives an unsolicited commercial
try to persuade recepient to buy a
product or service, or visit a website
where he can make purchases; or
they may attempt to trick him/ her
into divulging bank account or credit
card details. This Photo by Unknown
Author is licensed under
CC BY-NC-ND
PSYCHOLOGICAL TRICKS
CYBER BULLYING
 harassment or bullying inflicted through
the use of electronic or communication
devices
CYBER STALKING
 use of electronic communication by a
person to follow a person, or attempts
to contact a person
 monitors the internet, email or any other
form of electronic communication
commits the offence of stalking
This Photo by Unknown Author is licensed under CC BY-
NC-ND
SOCIAL MEDIA FRAUDS
CYBER GROOMING
 a person builds an online
relationship with a young person
and tricks or pressures him/ her
into doing sexual act.
ONLINE SEXTORTION
 When someone threatens to
distribute private and sensitive
material using an electronic
medium if he/ she doesn’t provide
images of a sexual nature, sexual
favours, or money.
SOCIAL MEDIA FRAUDS
This Photo by Unknown Author is licensed
under CC BY-SA-NC
MOBILE APPLICATION FRAUDS
SIM SWAP SCAM
 fraudsters manage to get a new
SIM card issued against a
registered mobile number
fraudulently through the mobile
service provider.
 With the help of this new SIM card,
they get One Time Password
(OTP) and alerts, required for
making financial transactions
through victim's bank account.
This Photo by Unknown
Author is licensed under
CC BY-SA
ONLINE BANKING FRAUDS
 Digital Payments Applications related
attacks
 Hacking of Bank Account due to
Weak Password
 Hacking of Multiple Accounts due to
same password
This Photo by Unknown Author is licensed under CC BY-
NC
 Money laundering has been addressed in the UN
Vienna 1988 Convention Article 3.1 describing
Money Laundering as:
 “the conversion or transfer of property, knowing
that such property is derived from any offense(s),
for the purpose of concealing or disguising the
illicit origin of the property or of assisting any
person who is involved in such offense(s) to evade
the legal consequences of his actions”.
 criminal proceeds to disguise their illegal origin as
it enables the criminal to enjoy these profits without
jeopardizing their source (Illegal arms sales, drug
trafficking, organized prostitution rings,
Embezzlement, insider trading, bribery and
computer fraud schemes)
 The Financial Action Task Force on money
laundering (FATF) was established by the G-7
Summit in Paris in 1989 to develop a coordinated
international response for anti-money laundering
programs.
3 Stages of Money Laundering
•Placement (i.e. moving the funds from
direct association with the crime)
•Layering (i.e. disguising the trail to foil
pursuit)
•Integration (i.e. making the money
available to the criminal from what seem
to be legitimate sources)
How is Money Laundering done?
Smurfing
Electronic money
Offshore Accounts
Money Mules
Cryptocurrencies
This Photo by Unknown Author is licensed under CC BY-NC
Casinos
https://www.fbi.gov/stats-services/publications/securities-
fraud#:~:text=Definition,Pyramid%20Schemes
The term Securities Fraud covers a wide
range of illegal activities, all of which involve
the deception of investors or the
manipulation of financial markets.
Types
•Ponzi Schemes
•Pyramid Schemes
https://iica.nic.in/home.aspx
https://iica.nic.in/images/Book_on-Ponzi-Schemes%20in%20India.pdf
 Sanchaita scam (duped around two-lakh investors, majorly in
West Bengal, by offering, as high as, 48 % return rate on their
investment. It is said to have garnered more than INR 100 crore
from depositors/investors)
 Saradha scam (Saradha started its journey as a chit fund entity
but by 2012, the estimated collection was nearly INR 10,000
crore. Mostly the collection was done in West Bengal, Assam,
Odisha, and Tripura and it affected lakhs of gullible depositors.)
 Peerless scam (Another Kolkata-based company, Peerless
General Finance, and Investment Co Ltd, 12 million people with
total deposits of over INR 300 crore in the late 70’s. )
 Pearl Agro scam (One of the biggest chit-fund scams PACL
(Pearl Agro Corporation Limited) scam illegally collected
approximately INR 49,100 crore from about 5.5 Crore gullible
investors in the name of selling them plots of land over a period of
18 years)
 Sahara OFCD scam (Sahara India Real Estate Corporation
(SIREC) and Sahara Housing Investment Corporation (SHIC)
raised money aggregating to Rs 19,400.87 crore and Rs 6,380.50
crore respectively from around 3.07 crore
IMA scam
 Bike Bot scam
 Noida scam
QNet scam
Social Cause scam
Anubhav Plantation scam
Rose Valley scam
Speak Asia scam
GainBitcoin scam 5
Bitconnect scam
● Common types of bankruptcy fraud
involve a bankruptcy filer:
● Hiding accounts or property, or hiding the
real value of assets (called concealment
of assets)
● Lying about money or property on your
bankruptcy petition (called false
statements or perjury)
● Transferring money to friends or family or
hiding it in cash (called money
laundering)
● Taking on debt and filing bankruptcy over
and over (sometimes called petition
mills)
When someone provides false information to an
insurance company in order to gain something of
value that he or she would not have received if the
truth had been told, they've committed insurance
fraud.
https://www.ndtv.com/topic/insurance-fraud
https://www.ndtv.com/topic/insurance-fraud
https://www.ndtv.com/topic/insurance-fraud
https://www.ndtv.com/topic/insurance-fraud
This Photo by Unknown Author is licensed under CC BY-SA

More Related Content

What's hot

Internet related frauds
Internet related fraudsInternet related frauds
Internet related fraudsTejalAdani
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Money Laundering by Vivek Singh,Aryan College
Money Laundering  by Vivek Singh,Aryan CollegeMoney Laundering  by Vivek Singh,Aryan College
Money Laundering by Vivek Singh,Aryan CollegeAryan Ajmer
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
Sanctions List Screening with World-Check and CaseWare
Sanctions List Screening with World-Check and CaseWare Sanctions List Screening with World-Check and CaseWare
Sanctions List Screening with World-Check and CaseWare Alessa
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...SHAUN HASSETT
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk AssessmentTahir Abbas
 
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK Melissa Cammarata
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud InvestigationSalih Islam
 
Money laundering
Money launderingMoney laundering
Money launderingRam Kumar
 

What's hot (20)

Internet related frauds
Internet related fraudsInternet related frauds
Internet related frauds
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Money Laundering by Vivek Singh,Aryan College
Money Laundering  by Vivek Singh,Aryan CollegeMoney Laundering  by Vivek Singh,Aryan College
Money Laundering by Vivek Singh,Aryan College
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Sanctions List Screening with World-Check and CaseWare
Sanctions List Screening with World-Check and CaseWare Sanctions List Screening with World-Check and CaseWare
Sanctions List Screening with World-Check and CaseWare
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
AML Training uba capital
AML Training uba capitalAML Training uba capital
AML Training uba capital
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Money laundering
Money launderingMoney laundering
Money laundering
 

Similar to Basics of fraud, types of fraud schemes, and anti-fraud organizations

MONEY LAUNDERING: A THREE-STEP SECRET GAME
MONEY LAUNDERING: A THREE-STEP SECRET GAMEMONEY LAUNDERING: A THREE-STEP SECRET GAME
MONEY LAUNDERING: A THREE-STEP SECRET GAMEMd Arman
 
Money Laundering: A Three Step Secret Game
Money Laundering: A Three Step Secret GameMoney Laundering: A Three Step Secret Game
Money Laundering: A Three Step Secret GameMd Arman
 
LIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxLIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxAbhishek356846
 
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMoney Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMd. Moulude Hossain
 
Presentation AML
Presentation AMLPresentation AML
Presentation AMLMirsazzad
 
Money Laundering: A Three-Step Secret Game
Money Laundering: A Three-Step Secret GameMoney Laundering: A Three-Step Secret Game
Money Laundering: A Three-Step Secret GameMd Arman
 
Demonetisatiion and money laundering final palash
Demonetisatiion and money laundering final   palashDemonetisatiion and money laundering final   palash
Demonetisatiion and money laundering final palashPalash16
 
Anti-money laundering course, Bishkek Academy, 2018
Anti-money laundering course, Bishkek Academy, 2018Anti-money laundering course, Bishkek Academy, 2018
Anti-money laundering course, Bishkek Academy, 2018Murod Khusanov
 
A brief study on the situation of Money Laundering in Nepal (1).pdf
A brief study on the situation of Money Laundering in Nepal    (1).pdfA brief study on the situation of Money Laundering in Nepal    (1).pdf
A brief study on the situation of Money Laundering in Nepal (1).pdfSabuMahatChaulagain
 
Money laundering-ppt
Money laundering-pptMoney laundering-ppt
Money laundering-pptSamehSalah26
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentationElias Mose
 
Anti-money laundering modules.pdf
Anti-money laundering modules.pdfAnti-money laundering modules.pdf
Anti-money laundering modules.pdfMurod Khusanov
 
Lalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptLalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptGarimaVohra4
 
Presentation on Money laundering
Presentation on Money launderingPresentation on Money laundering
Presentation on Money launderingPrasanna Hegde
 

Similar to Basics of fraud, types of fraud schemes, and anti-fraud organizations (20)

MONEY LAUNDERING: A THREE-STEP SECRET GAME
MONEY LAUNDERING: A THREE-STEP SECRET GAMEMONEY LAUNDERING: A THREE-STEP SECRET GAME
MONEY LAUNDERING: A THREE-STEP SECRET GAME
 
Money Laundering and Corruption
Money Laundering and CorruptionMoney Laundering and Corruption
Money Laundering and Corruption
 
Money Laundering: A Three Step Secret Game
Money Laundering: A Three Step Secret GameMoney Laundering: A Three Step Secret Game
Money Laundering: A Three Step Secret Game
 
LIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxLIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptx
 
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMoney Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
Money Laundering: A Three-Step Secret Game
Money Laundering: A Three-Step Secret GameMoney Laundering: A Three-Step Secret Game
Money Laundering: A Three-Step Secret Game
 
Corruption
CorruptionCorruption
Corruption
 
Demonetisatiion and money laundering final palash
Demonetisatiion and money laundering final   palashDemonetisatiion and money laundering final   palash
Demonetisatiion and money laundering final palash
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Anti-money laundering course, Bishkek Academy, 2018
Anti-money laundering course, Bishkek Academy, 2018Anti-money laundering course, Bishkek Academy, 2018
Anti-money laundering course, Bishkek Academy, 2018
 
Money Laundering Paper
Money Laundering Paper Money Laundering Paper
Money Laundering Paper
 
A brief study on the situation of Money Laundering in Nepal (1).pdf
A brief study on the situation of Money Laundering in Nepal    (1).pdfA brief study on the situation of Money Laundering in Nepal    (1).pdf
A brief study on the situation of Money Laundering in Nepal (1).pdf
 
Money laundering-ppt
Money laundering-pptMoney laundering-ppt
Money laundering-ppt
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
 
Terrorist Use of Cryptocurrencies
Terrorist Use of CryptocurrenciesTerrorist Use of Cryptocurrencies
Terrorist Use of Cryptocurrencies
 
Anti-money laundering modules.pdf
Anti-money laundering modules.pdfAnti-money laundering modules.pdf
Anti-money laundering modules.pdf
 
Lalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptLalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.ppt
 
Presentation on Money laundering
Presentation on Money launderingPresentation on Money laundering
Presentation on Money laundering
 
F0312010140044
F0312010140044F0312010140044
F0312010140044
 

More from Suchita Rawat

Forensic examination of Blood semen saliva.pptx
Forensic examination of Blood semen saliva.pptxForensic examination of Blood semen saliva.pptx
Forensic examination of Blood semen saliva.pptxSuchita Rawat
 
Forensic identification of uncommon body fluids.pptx
Forensic identification of uncommon body fluids.pptxForensic identification of uncommon body fluids.pptx
Forensic identification of uncommon body fluids.pptxSuchita Rawat
 
Fetal and adult blood.pptx
Fetal and adult blood.pptxFetal and adult blood.pptx
Fetal and adult blood.pptxSuchita Rawat
 
Menstrural blood and circulatory blood.pptx
Menstrural blood and circulatory blood.pptxMenstrural blood and circulatory blood.pptx
Menstrural blood and circulatory blood.pptxSuchita Rawat
 
Blood grouping from bloodstains.pptx
Blood grouping from bloodstains.pptxBlood grouping from bloodstains.pptx
Blood grouping from bloodstains.pptxSuchita Rawat
 
Serogenetic markers and HLA.pptx
Serogenetic markers and HLA.pptxSerogenetic markers and HLA.pptx
Serogenetic markers and HLA.pptxSuchita Rawat
 
TsD using spectroscopic methods.pptx
TsD using spectroscopic methods.pptxTsD using spectroscopic methods.pptx
TsD using spectroscopic methods.pptxSuchita Rawat
 
TsD using microbial diversity.pptx
TsD using microbial diversity.pptxTsD using microbial diversity.pptx
TsD using microbial diversity.pptxSuchita Rawat
 
Analysis of Body Fluids using Mass spectroscopy.pptx
Analysis of Body Fluids using Mass spectroscopy.pptxAnalysis of Body Fluids using Mass spectroscopy.pptx
Analysis of Body Fluids using Mass spectroscopy.pptxSuchita Rawat
 
Body fluid identification using X ray fluorescenece and NMR.pptx
Body fluid identification using X ray fluorescenece and NMR.pptxBody fluid identification using X ray fluorescenece and NMR.pptx
Body fluid identification using X ray fluorescenece and NMR.pptxSuchita Rawat
 
Body Fluid identifcation using spectroscopic methods.pptx
Body Fluid identifcation using spectroscopic methods.pptxBody Fluid identifcation using spectroscopic methods.pptx
Body Fluid identifcation using spectroscopic methods.pptxSuchita Rawat
 
MSC III_Research Methodology and Statistics_Inferrential ststistics.pdf
MSC III_Research Methodology and Statistics_Inferrential ststistics.pdfMSC III_Research Methodology and Statistics_Inferrential ststistics.pdf
MSC III_Research Methodology and Statistics_Inferrential ststistics.pdfSuchita Rawat
 
MSC III_Research Methodology and Statistics_Descriptive statistics.pdf
MSC III_Research Methodology and Statistics_Descriptive statistics.pdfMSC III_Research Methodology and Statistics_Descriptive statistics.pdf
MSC III_Research Methodology and Statistics_Descriptive statistics.pdfSuchita Rawat
 
MSC III_Research Methodology and Statistics - Data Collection.pdf
MSC III_Research Methodology and Statistics - Data Collection.pdfMSC III_Research Methodology and Statistics - Data Collection.pdf
MSC III_Research Methodology and Statistics - Data Collection.pdfSuchita Rawat
 
Research Methodology and Statistics_sampling and hypothesis testing.pdf
Research Methodology and Statistics_sampling and hypothesis testing.pdfResearch Methodology and Statistics_sampling and hypothesis testing.pdf
Research Methodology and Statistics_sampling and hypothesis testing.pdfSuchita Rawat
 
MSCIII_Forensic anthropology_Forensic imaging in anthropology.pptx
MSCIII_Forensic anthropology_Forensic imaging in anthropology.pptxMSCIII_Forensic anthropology_Forensic imaging in anthropology.pptx
MSCIII_Forensic anthropology_Forensic imaging in anthropology.pptxSuchita Rawat
 
MSCIII_Forensic anthropology_age estimation using dentition.pptx
MSCIII_Forensic anthropology_age estimation using dentition.pptxMSCIII_Forensic anthropology_age estimation using dentition.pptx
MSCIII_Forensic anthropology_age estimation using dentition.pptxSuchita Rawat
 
MSCIII_Forensic anthropology_Trauma analysis.pptx
MSCIII_Forensic anthropology_Trauma analysis.pptxMSCIII_Forensic anthropology_Trauma analysis.pptx
MSCIII_Forensic anthropology_Trauma analysis.pptxSuchita Rawat
 
MSCIII_Forensic anthropology_Personal Identification.pptx
MSCIII_Forensic anthropology_Personal Identification.pptxMSCIII_Forensic anthropology_Personal Identification.pptx
MSCIII_Forensic anthropology_Personal Identification.pptxSuchita Rawat
 

More from Suchita Rawat (20)

Forensic examination of Blood semen saliva.pptx
Forensic examination of Blood semen saliva.pptxForensic examination of Blood semen saliva.pptx
Forensic examination of Blood semen saliva.pptx
 
Forensic identification of uncommon body fluids.pptx
Forensic identification of uncommon body fluids.pptxForensic identification of uncommon body fluids.pptx
Forensic identification of uncommon body fluids.pptx
 
Species origin.pptx
Species origin.pptxSpecies origin.pptx
Species origin.pptx
 
Fetal and adult blood.pptx
Fetal and adult blood.pptxFetal and adult blood.pptx
Fetal and adult blood.pptx
 
Menstrural blood and circulatory blood.pptx
Menstrural blood and circulatory blood.pptxMenstrural blood and circulatory blood.pptx
Menstrural blood and circulatory blood.pptx
 
Blood grouping from bloodstains.pptx
Blood grouping from bloodstains.pptxBlood grouping from bloodstains.pptx
Blood grouping from bloodstains.pptx
 
Serogenetic markers and HLA.pptx
Serogenetic markers and HLA.pptxSerogenetic markers and HLA.pptx
Serogenetic markers and HLA.pptx
 
TsD using spectroscopic methods.pptx
TsD using spectroscopic methods.pptxTsD using spectroscopic methods.pptx
TsD using spectroscopic methods.pptx
 
TsD using microbial diversity.pptx
TsD using microbial diversity.pptxTsD using microbial diversity.pptx
TsD using microbial diversity.pptx
 
Analysis of Body Fluids using Mass spectroscopy.pptx
Analysis of Body Fluids using Mass spectroscopy.pptxAnalysis of Body Fluids using Mass spectroscopy.pptx
Analysis of Body Fluids using Mass spectroscopy.pptx
 
Body fluid identification using X ray fluorescenece and NMR.pptx
Body fluid identification using X ray fluorescenece and NMR.pptxBody fluid identification using X ray fluorescenece and NMR.pptx
Body fluid identification using X ray fluorescenece and NMR.pptx
 
Body Fluid identifcation using spectroscopic methods.pptx
Body Fluid identifcation using spectroscopic methods.pptxBody Fluid identifcation using spectroscopic methods.pptx
Body Fluid identifcation using spectroscopic methods.pptx
 
MSC III_Research Methodology and Statistics_Inferrential ststistics.pdf
MSC III_Research Methodology and Statistics_Inferrential ststistics.pdfMSC III_Research Methodology and Statistics_Inferrential ststistics.pdf
MSC III_Research Methodology and Statistics_Inferrential ststistics.pdf
 
MSC III_Research Methodology and Statistics_Descriptive statistics.pdf
MSC III_Research Methodology and Statistics_Descriptive statistics.pdfMSC III_Research Methodology and Statistics_Descriptive statistics.pdf
MSC III_Research Methodology and Statistics_Descriptive statistics.pdf
 
MSC III_Research Methodology and Statistics - Data Collection.pdf
MSC III_Research Methodology and Statistics - Data Collection.pdfMSC III_Research Methodology and Statistics - Data Collection.pdf
MSC III_Research Methodology and Statistics - Data Collection.pdf
 
Research Methodology and Statistics_sampling and hypothesis testing.pdf
Research Methodology and Statistics_sampling and hypothesis testing.pdfResearch Methodology and Statistics_sampling and hypothesis testing.pdf
Research Methodology and Statistics_sampling and hypothesis testing.pdf
 
MSCIII_Forensic anthropology_Forensic imaging in anthropology.pptx
MSCIII_Forensic anthropology_Forensic imaging in anthropology.pptxMSCIII_Forensic anthropology_Forensic imaging in anthropology.pptx
MSCIII_Forensic anthropology_Forensic imaging in anthropology.pptx
 
MSCIII_Forensic anthropology_age estimation using dentition.pptx
MSCIII_Forensic anthropology_age estimation using dentition.pptxMSCIII_Forensic anthropology_age estimation using dentition.pptx
MSCIII_Forensic anthropology_age estimation using dentition.pptx
 
MSCIII_Forensic anthropology_Trauma analysis.pptx
MSCIII_Forensic anthropology_Trauma analysis.pptxMSCIII_Forensic anthropology_Trauma analysis.pptx
MSCIII_Forensic anthropology_Trauma analysis.pptx
 
MSCIII_Forensic anthropology_Personal Identification.pptx
MSCIII_Forensic anthropology_Personal Identification.pptxMSCIII_Forensic anthropology_Personal Identification.pptx
MSCIII_Forensic anthropology_Personal Identification.pptx
 

Recently uploaded

Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsHajira Mahmood
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxEran Akiva Sinbar
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRlizamodels9
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)riyaescorts54
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 

Recently uploaded (20)

Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 

Basics of fraud, types of fraud schemes, and anti-fraud organizations

  • 1. Basics, types of frauds, and fraud schemes Dr. Suchita Rawat (MSc. MPhil, PhD)
  • 2. ● Fraud: Key Takeaways ● Intentional use of false or misleading information in an attempt to illegally deprive another person or entity of money, property, or legal rights. ● Fraud is a deliberate act (or failure to act) with the intention of obtaining an unauthorized benefit, either for oneself or for the institution, by using deception or false suggestions or suppression of truth or other unethical means, which are believed and relied upon by others.
  • 3. Necessary Elements of Fraud ● A misrepresentation of a material fact ● Knowledge of falsehood ● Intent to deceive ● Reasonable reliance by the victim ● Actual loss or injury suffered
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Corruption Corruption can take many forms, and can include behaviours like: •public servants demanding or taking money or favours in exchange for services, •politicians misusing public money or granting public jobs or contracts to their sponsors, friends and families, •corporations bribing officials to get lucrative deals
  • 15.
  • 17.
  • 18. Formation 1993 Type International non-governmental organization Legal status Eingetragener Verein (German registered voluntary association) Purpose Combat corruption, crime prevention Headquarter s Berlin, Germany Location •Alt-Moabit 96 10559 Berlin, Germany Managing Director Daniel Eriksson Chairman Delia Ferreira Rubio https://www.transparency.org/
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. ● 21-08-2022 : CBI ARRESTS A SENIOR BARRACKS STORE OFFICER (Lt. Col.) OF MES & THREE OTHERS INCLUDING PRIVATE PERSONS IN AN ALLEGED BRIBERY OF RS.22.48 LAKH AND RECOVERS RS.48.50 LAKH (APPROX) DURING SEARCHES ● 13-08-2022 : CBI ARRESTS AN OFFICIAL OF REVENUE DEPARTMENT FOR ACCEPTING BRIBE OF Rs. 25,000/- ● 10-08-2022: CBI ARRESTS AN ENGINEER OF UTILITY POWERTECH LTD FOR ACCEPTING BRIBE OF Rs. ONE LAKH ● 05-08-2022: CBI ARRESTS CHIEF MECHANICAL ENGINEER, PARADIP PORT TRUST & THREE PRIVATE PERSONS ON THE ALLEGATIONS OF BRIBERY AND RECOVERS Rs. 84.5 LAKH (APPROX.) DURING SEARCHES AT VARIOUS LOCATIONS ● 16-07-2022: CBI ARRESTS PLANT PROTECTION OFFICER OF MINISTRY OF AGRICULTURE & THREE PRIVATE PERSONS IN A BRIBERY CASE AND RECOVERS Rs. 1.86 CRORE (APPROX.) DURING SEARCHES ● 26-07-2022: CBI ARRESTS A LICENSING OFFICER & REGIONAL LABOUR COMMISSIONER FOR ACCEPTING BRIBE OF RS. 25,000/- ● 01-08-2022 :CBI ARRESTS A CHIEF FREIGHT TRANSPORTATION MANAGER (IRTS-1996) OF EAST CENTRAL RAILWAY & FOUR OTHERS INCLUDING TWO SENIOR DOMs OF ECR IN A BRIBERY OF Rs. SIX LAKH AND RECOVERS RS. 46.50 LAKH (APPROX.) DURING SEARCHES https://cbi.gov.in/press-releases
  • 25.
  • 26.
  • 28.  act of wrongfully obtaining someone’s personal information (name, phone number, address, bank account number, Aadhaar number or credit/debit card number etc ) without their permission.  bank accounts /file a tax refund/obtain a driver’s license, passport or immigration papers/ medical treatment/assume your identity on social media This Photo by Unknown Author is licensed under CC BY-ND IDENTITY THEFT
  • 29. VISHING  Fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call. PHISHING  involves stealing personal information such as Customer ID, IPIN, Credit/Debit Card number, Card expiry date, CVV number, etc. through emails that appear to be from a legitimate source. This Photo by Unknown Author is licensed under CC BY- NC-ND PSYCHOLOGICAL TRICKS
  • 30. SMSHING  type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web ONLINE JOB FRAUD  An attempt to fraud people who are in need of employment by giving them a false hope/ promise of better employment with higher wages. This Photo by Unknown Author is licensed under CC BY-NC-ND PSYCHOLOGICAL TRICKS
  • 31. DEBIT/CREDIT CARD FRAUD  an unauthorized use of another's credit or debit card information for the purpose of purchases or withdrawing funds from it. LOTTERY FRAUD  The fraudster congratulates the victim for winning a handsome lottery via e-mail/call/SMS and asks to transfer a token amount and share vital personal information to get the lottery money. PSYCHOLOGICAL TRICKS This Photo by Unknown Author is licensed under CC BY- SA
  • 32. SPAMMING  Spamming occurs when someone receives an unsolicited commercial try to persuade recepient to buy a product or service, or visit a website where he can make purchases; or they may attempt to trick him/ her into divulging bank account or credit card details. This Photo by Unknown Author is licensed under CC BY-NC-ND PSYCHOLOGICAL TRICKS
  • 33. CYBER BULLYING  harassment or bullying inflicted through the use of electronic or communication devices CYBER STALKING  use of electronic communication by a person to follow a person, or attempts to contact a person  monitors the internet, email or any other form of electronic communication commits the offence of stalking This Photo by Unknown Author is licensed under CC BY- NC-ND SOCIAL MEDIA FRAUDS
  • 34. CYBER GROOMING  a person builds an online relationship with a young person and tricks or pressures him/ her into doing sexual act. ONLINE SEXTORTION  When someone threatens to distribute private and sensitive material using an electronic medium if he/ she doesn’t provide images of a sexual nature, sexual favours, or money. SOCIAL MEDIA FRAUDS This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 35. MOBILE APPLICATION FRAUDS SIM SWAP SCAM  fraudsters manage to get a new SIM card issued against a registered mobile number fraudulently through the mobile service provider.  With the help of this new SIM card, they get One Time Password (OTP) and alerts, required for making financial transactions through victim's bank account. This Photo by Unknown Author is licensed under CC BY-SA
  • 36. ONLINE BANKING FRAUDS  Digital Payments Applications related attacks  Hacking of Bank Account due to Weak Password  Hacking of Multiple Accounts due to same password This Photo by Unknown Author is licensed under CC BY- NC
  • 37.  Money laundering has been addressed in the UN Vienna 1988 Convention Article 3.1 describing Money Laundering as:  “the conversion or transfer of property, knowing that such property is derived from any offense(s), for the purpose of concealing or disguising the illicit origin of the property or of assisting any person who is involved in such offense(s) to evade the legal consequences of his actions”.  criminal proceeds to disguise their illegal origin as it enables the criminal to enjoy these profits without jeopardizing their source (Illegal arms sales, drug trafficking, organized prostitution rings, Embezzlement, insider trading, bribery and computer fraud schemes)  The Financial Action Task Force on money laundering (FATF) was established by the G-7 Summit in Paris in 1989 to develop a coordinated international response for anti-money laundering programs.
  • 38. 3 Stages of Money Laundering •Placement (i.e. moving the funds from direct association with the crime) •Layering (i.e. disguising the trail to foil pursuit) •Integration (i.e. making the money available to the criminal from what seem to be legitimate sources)
  • 39. How is Money Laundering done? Smurfing Electronic money Offshore Accounts Money Mules Cryptocurrencies This Photo by Unknown Author is licensed under CC BY-NC Casinos
  • 40. https://www.fbi.gov/stats-services/publications/securities- fraud#:~:text=Definition,Pyramid%20Schemes The term Securities Fraud covers a wide range of illegal activities, all of which involve the deception of investors or the manipulation of financial markets. Types •Ponzi Schemes •Pyramid Schemes
  • 41.
  • 42.
  • 45.  Sanchaita scam (duped around two-lakh investors, majorly in West Bengal, by offering, as high as, 48 % return rate on their investment. It is said to have garnered more than INR 100 crore from depositors/investors)  Saradha scam (Saradha started its journey as a chit fund entity but by 2012, the estimated collection was nearly INR 10,000 crore. Mostly the collection was done in West Bengal, Assam, Odisha, and Tripura and it affected lakhs of gullible depositors.)  Peerless scam (Another Kolkata-based company, Peerless General Finance, and Investment Co Ltd, 12 million people with total deposits of over INR 300 crore in the late 70’s. )  Pearl Agro scam (One of the biggest chit-fund scams PACL (Pearl Agro Corporation Limited) scam illegally collected approximately INR 49,100 crore from about 5.5 Crore gullible investors in the name of selling them plots of land over a period of 18 years)  Sahara OFCD scam (Sahara India Real Estate Corporation (SIREC) and Sahara Housing Investment Corporation (SHIC) raised money aggregating to Rs 19,400.87 crore and Rs 6,380.50 crore respectively from around 3.07 crore
  • 46. IMA scam  Bike Bot scam  Noida scam QNet scam Social Cause scam Anubhav Plantation scam Rose Valley scam Speak Asia scam GainBitcoin scam 5 Bitconnect scam
  • 47. ● Common types of bankruptcy fraud involve a bankruptcy filer: ● Hiding accounts or property, or hiding the real value of assets (called concealment of assets) ● Lying about money or property on your bankruptcy petition (called false statements or perjury) ● Transferring money to friends or family or hiding it in cash (called money laundering) ● Taking on debt and filing bankruptcy over and over (sometimes called petition mills)
  • 48. When someone provides false information to an insurance company in order to gain something of value that he or she would not have received if the truth had been told, they've committed insurance fraud.
  • 53. This Photo by Unknown Author is licensed under CC BY-SA

Editor's Notes

  1. 1 billion is 100 crores
  2. Occupational fraud: The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication Asset misappropriation: A scheme in which an employee steals or misuses the employing organization’s resources (e.g., theft of company cash, false billing schemes, or inflated expense reports) Corruption: A scheme in which an employee misuses their influence in a business transaction in a way that violates their duty to the employer in order to gain a direct or indirect benefit (e.g., schemes involving bribery or conflicts of interest) Financial statement fraud: A scheme in which an employee intentionally causes a misstatement or omission of material information in the organization’s financial reports (e.g., employee files fraudulent expense report claiming personal travel or nonexistent meals)
  3. Occupational fraud: The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication Asset misappropriation: A scheme in which an employee steals or misuses the employing organization’s resources (e.g., theft of company cash, false billing schemes, or inflated expense reports) Corruption: A scheme in which an employee misuses their influence in a business transaction in a way that violates their duty to the employer in order to gain a direct or indirect benefit (e.g., schemes involving bribery or conflicts of interest) Financial statement fraud: A scheme in which an employee intentionally causes a misstatement or omission of material information in the organization’s financial reports (e.g., employee files fraudulent expense report claiming personal travel or nonexistent meals)
  4. Financial statement fraud: A scheme in which an employee intentionally causes a misstatement or omission of material information in the organization’s financial reports (e.g., employee files fraudulent expense report claiming personal travel or nonexistent meals)
  5. Cash-on-hand misappropriations: A scheme in which the perpetrator misappropriates cash kept on hand at the victim organization’s premises (e.g., employee steals cash from a company vault) Skimming: A scheme in which an incoming payment is stolen from an organization before it is recorded on the organization’s books and records (e.g., employee accepts payment from a customer but does not record the sale and instead pockets the money) Cash larceny: A scheme in which an incoming payment is stolen from an organization after it has been recorded on the organization’s books and records (e.g., employee steals cash and checks from daily receipts before they can be deposited in the bank)
  6. Smurfing- Smurfing, also referred to as structuring, is when criminals break a large number of funds into small chunks of cash, making multiple transactions and spreading the amount to different accounts, thereby making it hard to detect the origin. Electronic money- There are many ways where criminals can acquire money, whether by infusing malware, phishing, account hackers, or other vectors. Stored value cards are often used to launder such illegal money by purchasing items from that money. Offshore Accounts- Individuals with unexplained excess credits place such money into bank accounts of countries with less or no jurisdiction related to anti-money laundering. The no disclosure policy in those tax haven countries makes the criminals feel safe, defeating the law. Money Mules- Cash smugglers who help carry the illegal cash across different countries and deposit that cash in countries with less stringent tax laws are equally liable as the money launderer is. Cryptocurrencies- The newly inserted online transacting currency in the form of cryptos such as Bitcoin and several others has increased the chances of money laundering. Increasing amounts of OTC trade might result in the heavy transfer of funds between countries. The lack of strict KYC norms in some cryptocurrencies has also acted as an invitation to money laundering. Casinos- Money launderers buy chips from the casinos with their cash and later get those chips exchanged with checks provided by the casinos, sometimes without betting or gambling.
  7. Saradha Group of companies, had more than 100 firms registered with Registrar of Companies and dealt in various businesses like, education, automobile, entertainment and real estate, along with chit-fund business.
  8. Saradha Group of companies, had more than 100 firms registered with Registrar of Companies and dealt in various businesses like, education, automobile, entertainment and real estate, along with chit-fund business.