This document provides an introduction to fraud, including definitions, types of fraud, who can commit fraud, potential triggers of fraud, reasons for fraud, and impacts of fraud. It defines fraud as any dishonest act or omission intended to gain advantage. Common types of fraud include cheating, forgery, misappropriation, and fraudulent transactions. Employees, customers, and outsiders can all perpetrate fraud. Triggers may include lifestyle changes or high-risk transactions. Fraud is often committed due to financial problems, knowledge of weaknesses, and rationalization. Impacts include financial, regulatory, and reputational risks for institutions, as well as punishments for individuals.
On December 5, 2013, Ron Steinkamp, principal, government advisory services at Brown Smith Wallace, presented at the 2013 MIS Training Institute Governance, Risk & Compliance Conference. Ron focused on the following keys to fraud prevention, detection and reporting:
1. Anti-fraud culture
2. Fraud policy
3. Fraud awareness/training
4. Hotline
5. Assess fraud risks
6. Review/investigation
7. Improved controls
The presentation provides overall insight of operational fraud risk management. It explains the operational fraud risk and mitigation strategies. The role of Internal audit and audit committee is further exemplified
On December 5, 2013, Ron Steinkamp, principal, government advisory services at Brown Smith Wallace, presented at the 2013 MIS Training Institute Governance, Risk & Compliance Conference. Ron focused on the following keys to fraud prevention, detection and reporting:
1. Anti-fraud culture
2. Fraud policy
3. Fraud awareness/training
4. Hotline
5. Assess fraud risks
6. Review/investigation
7. Improved controls
The presentation provides overall insight of operational fraud risk management. It explains the operational fraud risk and mitigation strategies. The role of Internal audit and audit committee is further exemplified
Introduction to Know Your Customer (KYC)LoanXpress
Know your customer (KYC) is the process of a business, identifying and verifying the identity of its clients. The term is also used to refer to the bank regulation which governs these activities.
What is Money Laundering?
The act of concealing or disguising (laundering) of funds obtained through illegal activity
so that they appear to have been generated through legal, legitimate sources.
Types of Money- Laundering:
Structuring
Micro-Structuring
Cuckoo Smurfing
What is Structuring?
Structuring is one of the most common ways money launderers place money in the system
It is also known as smurfing. The individuals used to structure funds by organizations
doing money laundering are called Smurfs
Red Flags of Structuring:
Structuring red flags that banks and other financial institutions should look out for
include:
Cash transaction between $6,000 and $10,000
Frequent deposits for $9,000 or
Consecutive deposits that total $10,000
What is Micro-Structuring
Micro-structuring usually involves:
Checking accounts receiving cash deposits in amounts under $1,000 as infrequently as
several times a month
These deposits may be followed by ATM withdrawals in foreign countries
Red Flags of Micro-Structuring:
It has frequent deposits between $1,000 and $3,000
Makes it difficult to discern from normal account transactions
Easiest way to detect and prevent micro-structuring is to have accurate and up-to-date
Customer Due Diligence information is crucial to discover this type of structuring
Cuckoo-Smurfing
The term ‘cuckoo smurfing’ originated in Europe because of similarities between this
typology and the activities of the cuckoo bird
The perpetrators of this money laundering typology seek to transfer wealth through the bank
accounts of innocent third parties
Identity Theft Red Flags
opportunity to uncover identity theft is at the time of account opening
Examine the identification proof given by the customer carefully
Factors to look at carefully:
Does the picture on the ID match the person in front of you?
Does the year of birth match the person in front of you?
Does the identification match the state?
Is the identification real?
Use tools like Lexis Nexis to verify background information
Want to learn more about anti-money laundering process, its regulations, red flags and best
practices? ComplianceOnline webinars and seminars are a great training resource. Check out
the following links:
Red Flags of Money Laundering
Managing an Effective AML Compliance Program
Are You Doing Your BSA/AML Risk Assessment Properly?
How to Report under AML/BSA?
BSA/AML Compliance Checklist
How to Create Effective AML/BSA Compliance Program?
How to Develop Risk Models for AML Monitoring Program?
Introduction to Know Your Customer (KYC)LoanXpress
Know your customer (KYC) is the process of a business, identifying and verifying the identity of its clients. The term is also used to refer to the bank regulation which governs these activities.
What is Money Laundering?
The act of concealing or disguising (laundering) of funds obtained through illegal activity
so that they appear to have been generated through legal, legitimate sources.
Types of Money- Laundering:
Structuring
Micro-Structuring
Cuckoo Smurfing
What is Structuring?
Structuring is one of the most common ways money launderers place money in the system
It is also known as smurfing. The individuals used to structure funds by organizations
doing money laundering are called Smurfs
Red Flags of Structuring:
Structuring red flags that banks and other financial institutions should look out for
include:
Cash transaction between $6,000 and $10,000
Frequent deposits for $9,000 or
Consecutive deposits that total $10,000
What is Micro-Structuring
Micro-structuring usually involves:
Checking accounts receiving cash deposits in amounts under $1,000 as infrequently as
several times a month
These deposits may be followed by ATM withdrawals in foreign countries
Red Flags of Micro-Structuring:
It has frequent deposits between $1,000 and $3,000
Makes it difficult to discern from normal account transactions
Easiest way to detect and prevent micro-structuring is to have accurate and up-to-date
Customer Due Diligence information is crucial to discover this type of structuring
Cuckoo-Smurfing
The term ‘cuckoo smurfing’ originated in Europe because of similarities between this
typology and the activities of the cuckoo bird
The perpetrators of this money laundering typology seek to transfer wealth through the bank
accounts of innocent third parties
Identity Theft Red Flags
opportunity to uncover identity theft is at the time of account opening
Examine the identification proof given by the customer carefully
Factors to look at carefully:
Does the picture on the ID match the person in front of you?
Does the year of birth match the person in front of you?
Does the identification match the state?
Is the identification real?
Use tools like Lexis Nexis to verify background information
Want to learn more about anti-money laundering process, its regulations, red flags and best
practices? ComplianceOnline webinars and seminars are a great training resource. Check out
the following links:
Red Flags of Money Laundering
Managing an Effective AML Compliance Program
Are You Doing Your BSA/AML Risk Assessment Properly?
How to Report under AML/BSA?
BSA/AML Compliance Checklist
How to Create Effective AML/BSA Compliance Program?
How to Develop Risk Models for AML Monitoring Program?
Financial ethical issues presentation by Ihsanullah mansoor from Afghanistan,currently enrolled student of the University of Haripur ,Haripur KPK,Pakistan
The initial stage of the supply chain process is the planning stage. We need to develop a plan or strategy in order to address how the products and services will satisfy the demands and necessities of the customers. In this stage, the planning should mainly focus on designing a strategy that yields maximum profit.
For managing all the resources required for designing products and providing services, a strategy has to be designed by the companies. Supply chain management mainly focuses on planning and developing a set of metrics.
1.4.2) Develop (Source)
After planning, the next step involves developing or sourcing. In this stage, we mainly concentrate on building a strong relationship with Develop of the raw materials required for
production. This involves not only identifying dependable suppliers but also determining different planning methods for shipping, delivery, and payment of the product.
Companies need to select suppliers to deliver the items and services they require to develop their product. So, in this stage, the supply chain managers need to construct a set of pricing, delivery and payment processes with suppliers and also create the metrics for controlling and improving the relationships.
Finally, the supply chain managers can combine all these processes for handling their goods and services inventory. This handling comprises receiving and examining shipments, transferring them to the manufacturing facilities and authorizing supplier payments.
1.4.3) Make
The third step in the supply chain management process is the manufacturing or making of products that were demanded by the customer. In this stage, the products are designed, produced, tested, packaged, and synchronized for delivery.
Here, the task of the supply chain manager is to schedule all the activities required for manufacturing, testing, packaging and preparation for delivery. This stage is considered as the most metric-intensive unit of the supply chain, where firms can e gauge the quality levels, production output and worker productivity.
We had another great webinar presented by Dave Hammarberg (Director of IT and Consulting Senior Manager) and Jim Shellenberger (Senior Manager) with McKonly & Asbury! Thank you to everyone that attended and received CPE credit.
We discussed what skimming is and went into a discussion of several examples and how to detect and prevent your organization from becoming a victim of skimming.
Check out our Upcoming Events page for news and updates on our future seminars and webinars.
For more information on this topic or to submit a question for Dave or Jim, use our contact page at www.macpas.com/contact.
www.macpas.com/webinar-recap-skimming-what-the-auditors-miss
Compliance is about identifying the risks that the financial institution could encounter as a result of “Failing To Comply”.
Conduct & document comprehensive Risks Assessment; and the planned remedial measures in a manner appropriate to the requirements of the compliance rule!
This is my message.
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
Combating Fraud : Putting in Place an Effective Audit System to Detect and Prevent Fraud
The 9th - Cyber Defense Initiative Conference 2009 - (CDIC 2009)
10th-11th November 2009 Queen Sirikit National Convention Center
By Pairat Srivilairit, CIA, CISA, CBA, CCSA, CFSA, CISSP, CFE
Tuesday, 10 November 2009 15:15-16:00 hrs
Combating Fraud: Putting in Place an Effective Audit System to Detect and Prevent Fraud (45 min)
Key Indicators of Fraud
Types of Fraud in Activities Reviewed
Prevention Aids by Internal Auditors
Detection and Investigation Techniques
Summary
This presentation is an overview of Fraud Risk Management in Indian companies and the role of the Board of Directors in the context of the newly enacted Companies Act, 2013.
how to sell pi coins effectively (from 50 - 100k pi)DOT TECH
Anywhere in the world, including Africa, America, and Europe, you can sell Pi Network Coins online and receive cash through online payment options.
Pi has not yet been launched on any exchange because we are currently using the confined Mainnet. The planned launch date for Pi is June 28, 2026.
Reselling to investors who want to hold until the mainnet launch in 2026 is currently the sole way to sell.
Consequently, right now. All you need to do is select the right pi network provider.
Who is a pi merchant?
An individual who buys coins from miners on the pi network and resells them to investors hoping to hang onto them until the mainnet is launched is known as a pi merchant.
debuts.
I'll provide you the Telegram username
@Pi_vendor_247
What price will pi network be listed on exchangesDOT TECH
The rate at which pi will be listed is practically unknown. But due to speculations surrounding it the predicted rate is tends to be from 30$ — 50$.
So if you are interested in selling your pi network coins at a high rate tho. Or you can't wait till the mainnet launch in 2026. You can easily trade your pi coins with a merchant.
A merchant is someone who buys pi coins from miners and resell them to Investors looking forward to hold massive quantities till mainnet launch.
I will leave the telegram contact of my personal pi vendor to trade with.
@Pi_vendor_247
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...Vighnesh Shashtri
Under the leadership of Abhay Bhutada, Poonawalla Fincorp has achieved record-low Non-Performing Assets (NPA) and witnessed unprecedented growth. Bhutada's strategic vision and effective management have significantly enhanced the company's financial health, showcasing a robust performance in the financial sector. This achievement underscores the company's resilience and ability to thrive in a competitive market, setting a new benchmark for operational excellence in the industry.
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...Quotidiano Piemontese
Turin Startup Ecosystem 2024
Una ricerca de il Club degli Investitori, in collaborazione con ToTeM Torino Tech Map e con il supporto della ESCP Business School e di Growth Capital
Even tho Pi network is not listed on any exchange yet.
Buying/Selling or investing in pi network coins is highly possible through the help of vendors. You can buy from vendors[ buy directly from the pi network miners and resell it]. I will leave the telegram contact of my personal vendor.
@Pi_vendor_247
Lecture slide titled Fraud Risk Mitigation, Webinar Lecture Delivered at the Society for West African Internal Audit Practitioners (SWAIAP) on Wednesday, November 8, 2023.
what is the best method to sell pi coins in 2024DOT TECH
The best way to sell your pi coins safely is trading with an exchange..but since pi is not launched in any exchange, and second option is through a VERIFIED pi merchant.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and pioneers and resell them to Investors looking forward to hold massive amounts before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade pi coins with.
@Pi_vendor_247
BYD SWOT Analysis and In-Depth Insights 2024.pptxmikemetalprod
Indepth analysis of the BYD 2024
BYD (Build Your Dreams) is a Chinese automaker and battery manufacturer that has snowballed over the past two decades to become a significant player in electric vehicles and global clean energy technology.
This SWOT analysis examines BYD's strengths, weaknesses, opportunities, and threats as it competes in the fast-changing automotive and energy storage industries.
Founded in 1995 and headquartered in Shenzhen, BYD started as a battery company before expanding into automobiles in the early 2000s.
Initially manufacturing gasoline-powered vehicles, BYD focused on plug-in hybrid and fully electric vehicles, leveraging its expertise in battery technology.
Today, BYD is the world’s largest electric vehicle manufacturer, delivering over 1.2 million electric cars globally. The company also produces electric buses, trucks, forklifts, and rail transit.
On the energy side, BYD is a major supplier of rechargeable batteries for cell phones, laptops, electric vehicles, and energy storage systems.
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...beulahfernandes8
Role in Financial System
NBFCs are critical in bridging the financial inclusion gap.
They provide specialized financial services that cater to segments often neglected by traditional banks.
Economic Impact
NBFCs contribute significantly to India's GDP.
They support sectors like micro, small, and medium enterprises (MSMEs), housing finance, and personal loans.
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
The European Unemployment Puzzle: implications from population aging
Fraud risk management in banks
1. Introduction to Frauds
What is Fraud? Any behavior by which one person intends to gain a dishonest advantage over another may be called as
‘Fraud’
• It may either be an ‘Act’ or ‘Omission’
Section 17 of the Indian Contract Act, 1872 defines Fraud as any of the following acts committed by a party to
a contract, or with his connivance, or by his agents, with intent to deceive another party thereto, or his agent,
or to induce him to enter into the contract.
• the suggestion as a fact, of which is not true, by one which does not believe it to be true
• the active concealment of a fact by one having knowledge or belief of the fact
• a promise made without any intention of performing it
• any other act fitted to deceive
• any such act or omission as the law specially declares to be fraudulent
The Working Group on IS Security, Electronic Banking, Technology Risk Management and Cyber Frauds has
suggested the below definition:
‘A deliberate act of Omission or Commission by any person, carried out in the course of a Banking Transaction or in the
books of accounts maintained manually or under computer system in Banks, resulting in wrongful gain to any person for a
temporary period or otherwise, with or without any monetary loss to the Bank’
2. Who can Perpetrate Frauds
• Ss
Frauds maybe perpetrated by any of the below entities (either singly or jointly in connivance with
other entities),
• Employee/s of the institution
• Customer/s of the institution
• Outsiders
We will discuss on this topic further in the subsequent slides..!
Frauds encompasses all industries and are not just restricted to Banking Sector.
Few Sectors where Frauds with high Financial impact are commonly observed,
• Insurance
• Foreign Exchange
• Stock Market
3. Potential Triggers which may lead to/be indicative of Frauds
Internal Frauds or Frauds perpetrated by Employee (being the perpetrator himself or for having nexus with the actual
perpetrator):
• Sudden change in lifestyle / Disproportionate increase in personal assets
• Significant increase in borrowings beyond his declared financial capacity
• Frequent non-salary credits received in salary account
• High / frequent usage of branch petty cash / expenses GL
Customer Frauds:
• Frequent Cheque Bounces or bouncing of a high value cheque
• Delay in payments of outstanding dues
• Early defaults in servicing EMIs
• High value transactions in newly opened accounts / transactions not in line with the profile of the customer
• Immediate HV Cash Withdrawal subsequent to credited into account through (NEFT/RTGS/FT)
External Frauds or Frauds perpetrated by outsiders:
• Posing as an employee of the institution to gain trust of unsuspecting individuals to access their account/s
• Individual/s loitering outside the ATM offering to help the customer to withdraw money
• Any protruding device fixed on the ATM machine externally (fixed to Skim/Clone the card)
• Account operated by a third party using the mandate of the account holder.
4. Why are Frauds committed
By a Freudian construct, there are primarily three drivers of fraudulent behavior:
• A non-shareable financial problem (Motive)
• Knowledge of weakness in the structure and workings of a corporation which would allow the perpetrator to
commit the fraud and escape detection (Opportunity)
• Ability to justify to oneself that the fraudulent action are not necessarily wrong. It also includes the aspect of ability
to carry out such acts with confidence (Rationale)
These aspects can be better understood with the below diagram which is widely acknowledged in the industry as
‘Fraud Triangle’.
5. Nature & Type of Frauds
In order to have uniformity, Frauds have been majorly classified as under the provisions of IPC
Cheating & Forgery
Misappropriation & Criminal Breach of Trust
Fraudulent transactions involving Forex
Un-authorized credit facility extended for a reward/illegal gratification
Fraudulent encashment through forged instruments
On a case to case basis the frauds of the above nature are further classified into different types, (a few common
types are listed below)
Clandestine selling of hypothecated asset/mortgaged property
Defective title deeds / fabricated title deeds or SOA/ Multiple hypothecation
Diversion of funds
Fake FD receipts, Fake LC
Identify theft
Phishing / Vishing / Skimming
6. Areas of Operations vulnerable to Frauds
Advances (Personal Loans, HL, LAP, Micro Finance under the JLG model)
Cards / Digital products (Debit Cards, Credit Cards, Prepaid/Gift Cards, Internet banking,
Mobile Banking)
Deposits (Fixed Deposits, Recurring Deposits, Investment instruments – Insurance/wealth
management products)
Cash (Cash deposits, payments, collection, CRL)
Cheque / DD (fake / altered instruments)
Forex (fake LC/BG)
7. Case Study 1
Case Details / Modus Operandi:
Mr. SNN was posted as Assistant Branch Manager (ABM) of TNR branch. His primary role is to source business, conduct Personal
Discussion (PD) with prospective borrowers and furnish a PD report as a part of the pre-sanction loan process.
Borrower Ms. KRI visited the branch to pre-close her retail loan. Mr. SNN collected the cash and provided a pre-closure statement along
with his sign and branch stamp as acknowledgement (fake receipt). Instead of accounting the cash into the borrowers account, ABM
handed over this cash to Mr. PTM posted as Receivables Officer (RO). ABM and RO colluded and mis-utilized the pre-closure amount
received from the borrower.
Branch Manager (BM) Mr. VGN having known the facts of the case, did not escalate the incidence to their supervisors/Head Office.
Ms. KRI raised a complaint through our customer support about non-receipt of SMS towards the pre-closure of loan account.
What went wrong / Lapses, which enabled the perpetration of fraud?
Action taken ?
8. Case Study - 2
Mr xyz, is the Business Development Officer (BDO) of ABC branch. He has been working in this role since
01/01/2018 with the primary responsibility to source new business to the branch. During his tenure, he had
sourced many accounts viz., Current Account & Savings Account.
All these account were opened through the “Cash” mode for Initial Payment (IP).
What is the trigger here??
What could be the Modus Operandi of the Fraud ?
Opportunity?
Motive?
Rationale?
9. Who watches over these Frauds and establish
accountability ??
• Internal Vigilance Function
• Risk Containment Units
• Internal Audit Function
Apart from the above, there are various Regulatory and Statutory agencies that continuously monitors the
industry and brings about accountability and enforces punitive actions namely,
• The Reserve Bank of India
• Law Enforcement Agencies
• Other statutory bodies like NPCI, SEBI, etc.
There are also global watchdog agencies like FATF and UNSC which monitors the flow of fraudulent funds
which may be routed for terrorist financing.
( *The above list is only indicative and not exhaustive )
10. Mechanism for prevention, early identification and
detection of Frauds
Whistle Blower
Who can be a Whistle Blower ?
Any employee of the bank branch, stakeholders (including customers) or an outsider
Is it safe to report a Complaint through the WB mechanism ?
As stated in the CVC guidelines and practiced in the Industry, Whistle Blowers identity will be protected and no
adverse action viz. demotion, transfers, termination etc. will effected as a result of the WB complaint.
Each employee of the institution is a Vigilance Official for the institution. It is the obligation of every
employee who witnesses a wrong doing, to report it to the Management immediately either through the
WB machinery or through his reporting manager. Officials who fail to escalate such
irregularities/anomalies are termed as “by-standers” and may be referred for a Disciplinary action based
on the veracity of the incident & its impact on the institution.
11. Mechanism for prevention, early identification and
detection of Frauds
Internal Vigilance Function, Risk Containment Unit, Transaction Monitoring Unit and Internal
Audit Department
These functions within the institution work in tandem continuously round the year with the common goal of
safeguarding the interest of the institution and its stakeholders.
A Few indicative activities performed by these units are listed below,
• Preventive Vigilance
• Detective Vigilance
• Punitive Vigilance
• Sampling Checks
• Field Inspection (FI)/ Contact point verification (CPV)/ Back ground verification (BGV)
• Rule based transaction monitoring
• Concurrent Audits
• Risk Based Audits
• Thematic Studies
• Snap Audits
• Compliance Audit
12. Impacts of Frauds
On the Institution:
Financial Risk, Regulatory Risk, Reputational Risk
On the Employee:
Punitive actions by the employer, Punishments through LEA, Career / Personal Life
On the Society:
Erosion of Trust on the System (banking in this case), Increase in Taxes (against
investment for mitigations, both corrective & preventive)
13. Thank You..!!
• Ss
Sathyananda Prabhu, MBA, LLB, CEH, DTIRM, CISA, CISM, CGEIT, ISO 27001
certified lead IS Auditor,
Chief Audit Executive & Chief of Internal Vigilance – Equitas Small Finance Bank
Governing Member of the IIA, Madras Chapter