SlideShare a Scribd company logo
1 of 16
A Presentation
on
Fraud in Bank
Presented By:
Pawan Kumar Jha
What is Fraud
 Fraud is any dishonest act and behavior by which one person gains or intends to gain advantage over
another person. Fraud causes loss to the victim directly or indirectly.
 Fraud has not been described or discussed clearly in The Indian Penal Code but sections dealing with
cheating. concealment, forgery counterfeiting and breach of trust has been discusses which leads to
the act of fraud.
TYPES OF FRAUD
Fraud by Insiders
Rogue traders
A rogue trader is a highly placed insider nominally authorized to invest sizeable funds on behalf of the bank;
this trader secretly makes progressively more aggressive and risky investments using the bank's money, when
one investment goes bad, the rogue trader engages in further market speculation in the hope of a quick profit
which would hide or cover the loss.
Fraudulent loans
A fraudulent loan, however, is one in which the borrower is a business entity controlled by a dishonest bank
officer or an accomplice; the "borrower" then declares bankruptcy or vanishes and the money is gone. The
borrower may even be a non-existent entity and the loan merely an artifice to conceal a theft of a large sum
of money from the bank.
Conti…..
Wire fraud
Wire transfer networks such as the international, interbank fund transfer system are tempting as targets as a
transfer, once made, is difficult or impossible to reverse. As these networks are used by banks to settle accounts
with each other, rapid or overnight wire transfer of large amounts of money are commonplace; while banks
have put checks and balances in place, there is the risk that insiders may attempt to use fraudulent or forged
documents which claim to request a bank depositor's money be wired to another bank, often an offshore
account in some distant foreign country.
Forged or fraudulent documents
Forged documents are often used to conceal other thefts; banks tend to count their money meticulously so
every penny must be accounted for. A document claiming that a sum of money has been borrowed as a loan,
withdrawn by an individual depositor or transferred or invested can therefore be valuable to a thief who
wishes to conceal the minor detail that the bank's money has in fact been stolen and is now gone.
Uninsured deposits
Theft of identity
Dishonest bank personnel have been known to disclose depositors' personal information for use in theft of
identity frauds. The perpetrators then use the information to obtain identity cards and credit cards using the
victim's name and personal information.
Demand draft fraud
DD fraud is usually done by one or more dishonest bank employees that is the Bunko Banker. They remove
few DD leaves or DD books from stock and write them like a regular DD. Since they are insiders, they know
the coding, punching of a demand draft. These Demand drafts will be issued payable at distant town/city
without debiting an account. Then it will be cashed at the payable branch. For the paying branch it is just
another DD. This kind of fraud will be discovered only when the head office does the branch-wise
reconciliation, which normally will take 6 months. By that time the money is unrecoverable.
Fraud By Others
Forgery and altered cheques
Thieves have altered cheques to change the name (in order to deposit cheques intended for payment to
someone else) or the amount on the face of a cheque (a few strokes of a pen can change 100.00 into
100,000.00, although such a large figure may raise some eyebrows).
Stolen cheques
Some fraudsters obtain access to facilities handling large amounts of cheques, such as a mailroom or post office
or the offices of a tax authority or a corporate payroll or a social or veterans' benefit office. A few cheques go
missing; accounts are then opened under assumed names and the cheques deposited so that the money can
then be withdrawn by thieves.
Money laundering
The operations work in various forms. One variant involved buying securities (stocks and bonds) for cash; the
securities were then placed for safe deposit in one bank and a claim on those assets used as collateral for a loan
at another bank. The borrower would then default on the loan. The securities, however, would still be worth
their full amount. The transaction served only to disguise the original source of the funds.
Conti….
Cheque kiting
Cheque Kiting exploits a system in which, when a cheque is deposited to a bank account, the money is made available
immediately even though it is not removed from the account on which the cheque is drawn until the cheque actually
clears.
Credit/Debit card fraud
Credit/debit card fraud is widespread as a means of stealing from banks, merchants and clients.
 Genuine cards are manipulated
 Genuine cards are altered
 Counterfeit cards are created
 Fraudulent telemarketing is done with credit cards.
Booster cheques
A booster cheque is a fraudulent or bad cheque used to make a payment to a credit card account in order to "bust out"
or raise the amount of available credit on otherwise-legitimate credit cards. The amount of the cheque is credited to
the card account by the bank as soon as the payment is made, even though the cheque has not yet cleared. Before the
bad cheque is discovered, the perpetrator goes on a spending spree or obtains cash advances until the newly-"raised"
available limit on the card is reached. The original cheque then bounces, but by then it is already too late.
Conti….
Duplication or skimming of card information
This takes a number of forms, ranging from a dishonest merchant copying clients' credit card numbers for
later misuse (or a thief using carbon copies from old mechanical card imprint machines to steal the info) to
the use of tampered credit or debit card readers to copy the magnetic stripe from a payment card while a
hidden camera captures the numbers on the face of the card.
Fraudulent loan applications
These take a number of forms varying from individuals using false information to hide a credit history filled
with financial problems and unpaid loans to corporations using accounting fraud to overstate profits in order
to make a risky loan appear to be a sound investment for the bank.
Phishing and Internet fraud
Phishing operates by sending forged e-mail, impersonating an online bank, auction or payment site; the e-
mail directs the user to a forged web site which is designed to look like the login to the legitimate site but
which claims that the user must update personal info. The information thus stolen is then used in other
frauds, such as theft of identity or online auction fraud.
Difficult to Investigate
Faceless crime:
The major advantage criminal has in instituting a computer crime is that there is no personal exposure, no
written documents, no signatures, no fingerprints or voice recognition. The criminal is truly and in strict
sense faceless.
There are certain spy software's which is utilized to find out passwords and other vital entry information to a
computer system. The entry is gained through a spam or bulk mail.
International crime
A computer crime may be committed in one country and the result can be in another country. there has been
lot of jurisdictional problem an though the Interpol does help but it too has certain limitations. the different
treaties and conventions have created obstructions in relation to tracking of cyber criminals hiding or
operation in other nations“.
Hi-tech crime
The normal investigator does not have the proper background and knowledge. Special investigators have to be
created to carry out the investigations. the FBI of USA have a cell, even in latest scenario there has been cells
operating in the Maharashtra police department to counter cyber crimes. CBI also have been asked to create
special team for fighting cyber crimes.
Security Tips for Banks to Protect Themselves
and Customers through Better Online Banking
System Security
Strong Password or Pass Phrase Support
 A common practice in online banking systems is to require passwords that meet certain criteria:
 Minimum length requirement (usually eight characters)
 Use upper and lower case letters
 Must include a number or special character
 In addition, the systems need to enforce password expiration rules that require scheduled
password changes and prevent re-use of old passwords
Risk-Based Authentication
Many online banking systems today employ risk-based authentication (RBA) to prevent unauthorized access
to customer accounts.
A common RBA method uses a combination of challenge questions and security images
Integrated banking industry security solutions
 Tyco Integrated Security has worked closely with banks and financial institutions as a trusted partner,
delivering end-to-end security systems and value-added solutions that help optimize banking
operations
 Our enterprise banking solutions, systems, software and services help safeguard bank operations against
internal and external threats and fraud, allowing enhanced protection of bank employees, customers,
assets, offices, branches and bank office operations.
 Our ATM security solutions include advanced anti-skimming technology, silent alarm notification, video
surveillance, ATM lighting and remote video monitoring
 Using our remote management tools, you can receive remote alerts and perform live video surveillance
on your iPhone, iPad or Android device, with video displays for banking and finance security
professionals
Mobile Banking Security
 Our innovative authentication (including face recognition), mobile app security and real-time fraud
prevention solutions are designed to increase the trust level across all areas of mobile banking – user,
device and application – so you can eliminate threats to your mobile banking platform
 Authentication and authorization: Financial institutions should use mobile payment applications that rely
exclusively on two-factor or multifactor authentication
 Applications security: Management should ensure that the institution’s Mobile Financial Services contain
log-on credentials in addition to those used to access the device, employing multi-factor authentication or
layered security controls depending on the types and volumes of transactions
 Logging and Monitoring: Management should have logging and monitoring capabilities on all MFS to
track customer activity and security changes and to identify anomalous behavior and transactions
Digi pass
Digipass is a brand name for a security token and other authentication products and services from Vasco Data
Security International. This product family provides strong user authentication and digital signature products
and services for Internet security applications and transactions.
It uses time and/or challenge-based two-factor authentication and can be used to sign electronic transactions.
Digipass products fall into six types:
 Single-button Digipass
 e-signature Digipass with multiple buttons for PIN entry and data input
 Software Digipass on mobile telephones, portable devices or PCs
 Embedded Digipass
 Card reader Digipass, which combines secret values, stored on smart cards, with algorithms pre-
programmed into the card reader
 PKI Digipass for strong authentication and digital signature (using public key infrastructure certificates
and keys)
THANK YOU

More Related Content

What's hot

Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Dinidu Weeraratne
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in EcommerceMartyn Sukys
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101Martyn Sukys
 
Frauds & Scams in Banks
Frauds & Scams in BanksFrauds & Scams in Banks
Frauds & Scams in BanksAkshay Virkar
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97alessio d
 
Bank frauds vk (2)
Bank frauds vk (2)Bank frauds vk (2)
Bank frauds vk (2)Prashant raj
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer AccountsAbbie Olson
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 

What's hot (20)

Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Credit card fraud(1)
Credit card fraud(1)Credit card fraud(1)
Credit card fraud(1)
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101
 
Frauds & Scams in Banks
Frauds & Scams in BanksFrauds & Scams in Banks
Frauds & Scams in Banks
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
Bank frauds vk (2)
Bank frauds vk (2)Bank frauds vk (2)
Bank frauds vk (2)
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
 
FRB Check Fraud
FRB Check FraudFRB Check Fraud
FRB Check Fraud
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 

Similar to Fraud in bank

Identity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesIdentity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesFTx Identity
 
Banking electronic
Banking electronicBanking electronic
Banking electronicvinart
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
financial ethical issues Ihsanullah mansoor
financial ethical issues Ihsanullah  mansoorfinancial ethical issues Ihsanullah  mansoor
financial ethical issues Ihsanullah mansoorihsan467
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTesth9gfhypx97
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
Lalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptLalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptGarimaVohra4
 

Similar to Fraud in bank (20)

Identity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesIdentity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the Differences
 
Banking electronic
Banking electronicBanking electronic
Banking electronic
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
financial ethical issues Ihsanullah mansoor
financial ethical issues Ihsanullah  mansoorfinancial ethical issues Ihsanullah  mansoor
financial ethical issues Ihsanullah mansoor
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Lalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.pptLalit Srivastava-AML-IBA BANGALORE.ppt
Lalit Srivastava-AML-IBA BANGALORE.ppt
 

Recently uploaded

Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.Christina Parmionova
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…nishakur201
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
 

Fraud in bank

  • 1. A Presentation on Fraud in Bank Presented By: Pawan Kumar Jha
  • 2. What is Fraud  Fraud is any dishonest act and behavior by which one person gains or intends to gain advantage over another person. Fraud causes loss to the victim directly or indirectly.  Fraud has not been described or discussed clearly in The Indian Penal Code but sections dealing with cheating. concealment, forgery counterfeiting and breach of trust has been discusses which leads to the act of fraud.
  • 4. Fraud by Insiders Rogue traders A rogue trader is a highly placed insider nominally authorized to invest sizeable funds on behalf of the bank; this trader secretly makes progressively more aggressive and risky investments using the bank's money, when one investment goes bad, the rogue trader engages in further market speculation in the hope of a quick profit which would hide or cover the loss. Fraudulent loans A fraudulent loan, however, is one in which the borrower is a business entity controlled by a dishonest bank officer or an accomplice; the "borrower" then declares bankruptcy or vanishes and the money is gone. The borrower may even be a non-existent entity and the loan merely an artifice to conceal a theft of a large sum of money from the bank.
  • 5. Conti….. Wire fraud Wire transfer networks such as the international, interbank fund transfer system are tempting as targets as a transfer, once made, is difficult or impossible to reverse. As these networks are used by banks to settle accounts with each other, rapid or overnight wire transfer of large amounts of money are commonplace; while banks have put checks and balances in place, there is the risk that insiders may attempt to use fraudulent or forged documents which claim to request a bank depositor's money be wired to another bank, often an offshore account in some distant foreign country. Forged or fraudulent documents Forged documents are often used to conceal other thefts; banks tend to count their money meticulously so every penny must be accounted for. A document claiming that a sum of money has been borrowed as a loan, withdrawn by an individual depositor or transferred or invested can therefore be valuable to a thief who wishes to conceal the minor detail that the bank's money has in fact been stolen and is now gone.
  • 6. Uninsured deposits Theft of identity Dishonest bank personnel have been known to disclose depositors' personal information for use in theft of identity frauds. The perpetrators then use the information to obtain identity cards and credit cards using the victim's name and personal information. Demand draft fraud DD fraud is usually done by one or more dishonest bank employees that is the Bunko Banker. They remove few DD leaves or DD books from stock and write them like a regular DD. Since they are insiders, they know the coding, punching of a demand draft. These Demand drafts will be issued payable at distant town/city without debiting an account. Then it will be cashed at the payable branch. For the paying branch it is just another DD. This kind of fraud will be discovered only when the head office does the branch-wise reconciliation, which normally will take 6 months. By that time the money is unrecoverable.
  • 7. Fraud By Others Forgery and altered cheques Thieves have altered cheques to change the name (in order to deposit cheques intended for payment to someone else) or the amount on the face of a cheque (a few strokes of a pen can change 100.00 into 100,000.00, although such a large figure may raise some eyebrows). Stolen cheques Some fraudsters obtain access to facilities handling large amounts of cheques, such as a mailroom or post office or the offices of a tax authority or a corporate payroll or a social or veterans' benefit office. A few cheques go missing; accounts are then opened under assumed names and the cheques deposited so that the money can then be withdrawn by thieves. Money laundering The operations work in various forms. One variant involved buying securities (stocks and bonds) for cash; the securities were then placed for safe deposit in one bank and a claim on those assets used as collateral for a loan at another bank. The borrower would then default on the loan. The securities, however, would still be worth their full amount. The transaction served only to disguise the original source of the funds.
  • 8. Conti…. Cheque kiting Cheque Kiting exploits a system in which, when a cheque is deposited to a bank account, the money is made available immediately even though it is not removed from the account on which the cheque is drawn until the cheque actually clears. Credit/Debit card fraud Credit/debit card fraud is widespread as a means of stealing from banks, merchants and clients.  Genuine cards are manipulated  Genuine cards are altered  Counterfeit cards are created  Fraudulent telemarketing is done with credit cards. Booster cheques A booster cheque is a fraudulent or bad cheque used to make a payment to a credit card account in order to "bust out" or raise the amount of available credit on otherwise-legitimate credit cards. The amount of the cheque is credited to the card account by the bank as soon as the payment is made, even though the cheque has not yet cleared. Before the bad cheque is discovered, the perpetrator goes on a spending spree or obtains cash advances until the newly-"raised" available limit on the card is reached. The original cheque then bounces, but by then it is already too late.
  • 9. Conti…. Duplication or skimming of card information This takes a number of forms, ranging from a dishonest merchant copying clients' credit card numbers for later misuse (or a thief using carbon copies from old mechanical card imprint machines to steal the info) to the use of tampered credit or debit card readers to copy the magnetic stripe from a payment card while a hidden camera captures the numbers on the face of the card. Fraudulent loan applications These take a number of forms varying from individuals using false information to hide a credit history filled with financial problems and unpaid loans to corporations using accounting fraud to overstate profits in order to make a risky loan appear to be a sound investment for the bank. Phishing and Internet fraud Phishing operates by sending forged e-mail, impersonating an online bank, auction or payment site; the e- mail directs the user to a forged web site which is designed to look like the login to the legitimate site but which claims that the user must update personal info. The information thus stolen is then used in other frauds, such as theft of identity or online auction fraud.
  • 10. Difficult to Investigate Faceless crime: The major advantage criminal has in instituting a computer crime is that there is no personal exposure, no written documents, no signatures, no fingerprints or voice recognition. The criminal is truly and in strict sense faceless. There are certain spy software's which is utilized to find out passwords and other vital entry information to a computer system. The entry is gained through a spam or bulk mail. International crime A computer crime may be committed in one country and the result can be in another country. there has been lot of jurisdictional problem an though the Interpol does help but it too has certain limitations. the different treaties and conventions have created obstructions in relation to tracking of cyber criminals hiding or operation in other nations“. Hi-tech crime The normal investigator does not have the proper background and knowledge. Special investigators have to be created to carry out the investigations. the FBI of USA have a cell, even in latest scenario there has been cells operating in the Maharashtra police department to counter cyber crimes. CBI also have been asked to create special team for fighting cyber crimes.
  • 11. Security Tips for Banks to Protect Themselves and Customers through Better Online Banking System Security
  • 12. Strong Password or Pass Phrase Support  A common practice in online banking systems is to require passwords that meet certain criteria:  Minimum length requirement (usually eight characters)  Use upper and lower case letters  Must include a number or special character  In addition, the systems need to enforce password expiration rules that require scheduled password changes and prevent re-use of old passwords Risk-Based Authentication Many online banking systems today employ risk-based authentication (RBA) to prevent unauthorized access to customer accounts. A common RBA method uses a combination of challenge questions and security images
  • 13. Integrated banking industry security solutions  Tyco Integrated Security has worked closely with banks and financial institutions as a trusted partner, delivering end-to-end security systems and value-added solutions that help optimize banking operations  Our enterprise banking solutions, systems, software and services help safeguard bank operations against internal and external threats and fraud, allowing enhanced protection of bank employees, customers, assets, offices, branches and bank office operations.  Our ATM security solutions include advanced anti-skimming technology, silent alarm notification, video surveillance, ATM lighting and remote video monitoring  Using our remote management tools, you can receive remote alerts and perform live video surveillance on your iPhone, iPad or Android device, with video displays for banking and finance security professionals
  • 14. Mobile Banking Security  Our innovative authentication (including face recognition), mobile app security and real-time fraud prevention solutions are designed to increase the trust level across all areas of mobile banking – user, device and application – so you can eliminate threats to your mobile banking platform  Authentication and authorization: Financial institutions should use mobile payment applications that rely exclusively on two-factor or multifactor authentication  Applications security: Management should ensure that the institution’s Mobile Financial Services contain log-on credentials in addition to those used to access the device, employing multi-factor authentication or layered security controls depending on the types and volumes of transactions  Logging and Monitoring: Management should have logging and monitoring capabilities on all MFS to track customer activity and security changes and to identify anomalous behavior and transactions
  • 15. Digi pass Digipass is a brand name for a security token and other authentication products and services from Vasco Data Security International. This product family provides strong user authentication and digital signature products and services for Internet security applications and transactions. It uses time and/or challenge-based two-factor authentication and can be used to sign electronic transactions. Digipass products fall into six types:  Single-button Digipass  e-signature Digipass with multiple buttons for PIN entry and data input  Software Digipass on mobile telephones, portable devices or PCs  Embedded Digipass  Card reader Digipass, which combines secret values, stored on smart cards, with algorithms pre- programmed into the card reader  PKI Digipass for strong authentication and digital signature (using public key infrastructure certificates and keys)