Professional Documents
Culture Documents
SEMESTER V
2016-2017
SUBMITTED BY:
KAHINI MEHTA
ROLL NO. 35
(SEMESTER V), hereby declare that I have completed this research project, ‘Financial
Frauds in India - An Analysis’ in the Academic Year 2016 – 2017. This information
__________________________________
I, Prof. Poonam Jain, hereby certify that Kahini Mehta of H.R. College of Commerce &
- An Analysis’ in the Academic Year 2016-2017. This information submitted is true and
______________________________ ______________________________
CO-ORDINATOR COLLEGE
Firstly, I would like to thank the Mumbai University for introducing research projects as a part of the
Bachelor of Management (BMS) Curriculum thereby giving me the opportunity to work on this
project. I am indebted to the H. R. College of Commerce and Economics for allowing me to choose
The project has truly been an incredible learning experience. I would like to thank Prof.
Poonam Jain, my project guide, for her invaluable advice, guidance and support at every stage of this
research project. Without her constant encouragement and assistance this project would not be
possible.
I would further like to thank all the respondents who undertook my primary research survey. Their
I would also like to thank my parents and friends for all of the help and support throughout.
The purpose of this research project is to study the various types of financial frauds occurring in India,
along with assessing the trends of fraud awareness and occurrence in corporate organizations.
While conducting my research, the survey methodology was employed in order to understand the
current scenario of financial crime occurrence and awareness levels amongst people, to gain an
insight into their perceptions of fraud and to ascertain the current trends of frauds in corporate
organizations.
Financial frauds have emerged as an inevitable unwanted byproduct of economic growth. This
research project describes the various types of financial frauds in detail, and explains how they are
carried out. It further aims to provide an overview on the role of technology in transforming frauds
into a systemic crisis, the changing regulatory landscape, and the ways for fraud prevention and
control. It showcases several case studies that highlight the adverse impact such crimes have had on
Thus, this research project’s motive lies in increasing financial fraud awareness and promoting fraud
prevention measures. It recognizes that frauds are an extremely pressing problem for the economy
1. INTRODUCTION 9
2. RESEARCH OBJECTIVES 12
3. HYPOTHESIS 13
4. RESEARCH METHODOLOGY 14
5. REVIEW OF LITERATURE 17
MEANING
7. FRAUD LANDSCAPE 24
8. EVOLUTION OF FRAUD 25
21. EMBEZZLEMENT 56
HARSHAD MEHTA
SATYAM SCANDAL
SAHARA SCAM
KETAN PAREKH
SARADHA SCAM
PACL
misrepresentation that an individual or entity makes knowing that the misrepresentation could result
in some unauthorized benefit to the individual or to the entity or some other party.”
With India having topped the World Bank’s growth outlook for 2015–16 for the first time and
achieved economic growth of 7.3% in 2014–15, there is an upsurge of optimism in business corridors.
Although the general business sentiment remains positive, the threat of fraud, bribery and corruption
looms large. The Indian financial services sector has witnessed exponential growth in the last decade,
however this growth that has not been without its pitfalls, as incidents of fraud have also been on the
rise. Financial frauds have emerged as an inevitable unwanted byproduct of economic growth. Taking
advantage of the basic human attributes of aspiration and greed, fraudsters have duped millions across
the world. They have also taken advantage of the lack of financial literacy amongst the masses.
Global financial world is replete with such examples and India too has had its share of such scams.
Investors had little idea about a complex financial product such as Credit Default Swap (CDS) which
triggered the global financial crisis in 2008. In India, people were unaware about ponzi schemes; yet
time and again people have lost their hard earned savings in a bid to make quick profits through such
schemes. Thus, financial frauds have emerged in all shapes and sizes throughout history.
In fact, things are becoming more challenging now. The devious ingenuity of the human brain is now
leveraging technology to indulge in more sophisticated methods of crimes which are very much
capable of creating systemic instability. Technology has overcome the barrier of distance
and infiltrated almost every sphere of the networked life that we live today. A security threat today
can be orchestrated by the click of a mouse. Phrases such as phishing, vishing, SMSishing, identity
theft, data theft, online surveillance, digital espionage, ransomware, Dark Web, etc., which were
a facilitator, but it can also be a disruptor if it is used by people with ulterior motives.
According to the PWC Global Crime Survey 2016, more than one in every four organisations in India
are impacted by economic crime—a finding that reflects the pervasiveness of the problem in India. In
the globalised and liberalised business environment of the last few years, we face a drastically
increasing volume of frauds, especially in the financial sectors in India. Fraud results in significant
losses to the public exchequer, thus adversely affecting service delivery. Financial fraud has become a
big business, contributing to an estimated Rs. 14000 crore (20 billion USD) in direct losses annually.
Industry experts suspect that this figure is actually much higher, as firms cannot accurately identify
With India positioning itself as the world’s fastest growing big economy and the country getting
digitally connected both within and with the outside world, instances of financial fraud are bound to
rise. It is therefore imperative to prepare our country for coping with the emerging challenges. Our
institutions should earmark budgets to make their systems fool-proof and train their people
accordingly. Our regulatory bodies should be aware of what is happening on this front around the
world and shape regulations accordingly. Financial literacy for the masses must figure
Thus, this research project aims to provide an overview on the trends on financial frauds, the role
of technology in transforming frauds into systemic crisis, the changing regulatory landscape, and the
ways for fraud prevention and control. It showcases several case studies that highlight the adverse
Thus, this research project’s motive lies in increasing financial fraud awareness and promoting fraud
prevention measures.
To review the risks posed by financial frauds and evaluate various methods to prevent the
occurrence of frauds
To examine case studies that highlight the impact of financial frauds and crimes in India
2. Payment/ Finance processes are the most vulnerable to fraud risk in an organization.
3. Employees are the most likely to commit financial frauds in a corporate organization.
4. It is perceived that Indian law enforcement agencies are not adeqautely resourced and trained
RESEARCH SCOPE:
The scope of the research extends to studying the various types of financial frauds and their respective
RESEARCH METHODS:
Primary research is the first hand research that the researcher collects, by interacting with the sample
population and the conclusions and analysis he/she draws from the data that has been obtained.
Primary research in this project involved interacting with 100 respondents to evaluate their awareness
Secondary research is the background research done by the researcher on already existing information
regarding the topic. This helps the researcher in determining whether previous research papers have
been written on that particular topic and if and how new ground on that particular topic can be
covered. It also helps the researcher in building a base for the questions to be asked to the sample
population and to construct an informative questionnaire and ask all the right questions. Secondary
research in this project involved reading and examining various research papers, journals, newspaper
Quantitative Data:
Surveys: This method captures information through the input of responses to a research instrument
containing questions (such as a Questionnaire). Information can be input either by the respondents
themselves (E.g.: An Online Survey) or, the researcher can input the data (E.g.: a phone survey, a
one-on-one survey, a mall intercept, etc). The main methods for distributing surveys are via a website,
postal mail, phone, or in person. However, newer technologies are creating additional delivery options
including through wireless devices, such as smart phones and technologies wherein the information
gets recorded in real time and can be viewed and intercepted very easily through pie charts and bar
graphs.
The surveys for this project were in the form of a questionnaire, which was filled by 100 respondents
RESEARCH DESIGN:
studied. The research conducted is descriptive in nature as it seeks to assess the current
The research respondents are only from Mumbai, India. Thus, the research scope is
The respondents are limited to 100 in number. Thus, the sample size is restricted.
The limited knowledge of the respondents regarding the topic may hamper the true
With white-collar crime almost doubling from 2009, financial fraud by insiders remains the
single greatest fear of Indian companies, according to the results of a survey by audit and
consulting firm KPMG. Of the 1,000 companies covered in the survey, 87% said they had
incurred losses of at least Rs10 lakh due to fraud in 2009.The previous survey, carried out in
2008, had only 47% complaining on this count. At least 75% of Indian firms said instances of
fraud had increased over the past two years. A lack of objective and independent internal
audits, inadequate overseeing of senior management’s activities by the audit committee, and
weak regulatory environment were pinpointed as culprits for the spike in financial statement
frauds.
The 10th Biennial India Fraud Survey Report 2010 reveals that 81% of the companies
surveyed felt that financial statement fraud was the biggest threat in India, with at least 60% of
them saying inadequate enforcement of regulations had increased such fraud. The findings of
the report suggested that weak internal control systems, eroding ethical values and lack of
legal action against fraudsters created an environment conducive to such crimes. The survey,
conducted by KPMG’s forensic wing in India, covered leading Indian firms from the public
and private sectors. The respondents included chairman and managing directors, chief
operating officers, chief financial officers, internal auditors, heads of investigation divisions
and other senior management officials. Indian companies, according to the study, remained
highly vulnerable to fraud in the absence of “inadequate internal control framework” that can
identify and deal with such crimes. The report suggested that 41% of Indian firms did not have
fraud risk management systems. The KPMG report showed that 45% of the firms had
experienced fraudulent activities in the past two years, with financial services and consumer
FINANCIAL FRAUDS IN INDIA- AN ANALYSIS Page 17
markets showing the highest levels of risk. However, more than the lack of monitoring
systems, what was prevalent and disturbing was the reluctance of companies to report
incidence of frauds. According to the survey, only 35% of the companies initiated legal action
against a perpetrator of fraud. A majority of the frauds had been investigated internally.
internationally known provider of computer security solutions, said on October 10, 2007, “that
India was another country rapidly participating in financial fraud on the Internet and has was
also becoming a victim of it.” Such online financial fraud in India has increased by 81%
during the last few months. According to the Internet Security Threat Report of the company
that was published in September 2007, India occupies the 14th position globally in hosting
phishing sites. The city of Mumbai accounted for 30% of all phishing Websites in the country,
Delhi for 29%, and Chennai and Bangalore hosted 12% each of all phishing Websites. “In the
online food chain fraud, India has a major involvement where 33 Websites have been turned
into phishing sites. These sites leveraged attacks to allow identity theft in 2006”, Vishal
Dhupar, Managing Director of Symantec, India told reporters. The Economic Times published
this in news on October 10, 2007. According to Symantec, cyber criminals are increasingly
that India was sixth in the global ranking of countries for computers having multiple
infections. Incidentally, the top most rank goes to USA. China also placed itself among the top
countries with malicious activity, top countries suffering DoS (Denial of Service) outbreaks,
countries with bot-infected PCs, countries as origin of attacks, and countries with multi-
infectious computers. Cyber criminals who sell stolen data do so using underground servers.
Such data include identification details like Social Security numbers, bank cards, credit cards,
“Financial crimes are crimes against property, involving the unlawful conversion of the ownership
of property (belonging to one person) to one's own personal use and benefit. Financial crimes may
involve fraud (Cheque fraud, credit card fraud, mortgage fraud, medical fraud, corporate
fraud, securities fraud (including insider trading) bank fraud, market manipulation, payment (point of
sale) fraud, health care fraud, theft; scams or confidence tricks, tax evasion, bribery; embezzlement,
identity theft; money laundering, and forgery and counterfeiting, including the production of
Frauds and financial crimes are a form of theft/larceny that occur when a person or entity takes money
or property, or uses them in an illicit manner, with the intent to gain a benefit from it. These crimes
typically involve some form of deceit, subterfuge or the abuse of a position of trust, which
distinguishes them from common theft or robbery. In today's complex economy, fraud and financial
crimes can take many forms.
It is possible to divide financial crime into two essentially different, although closely related,
types of conduct :
First, there are those activities that dishonestly generate wealth for those engaged in the conduct
in question. For example, the exploitation of insider information or the acquisition of another
person’s property by deceit will invariably be done with the intention of securing a material
benefit. Alternatively, a person may engage in deceit to secure material benefit for another.
Secondly, there are also financial crimes that do not involve the dishonest taking of a benefit,
but that protect a benefit that has already been obtained or to facilitate the taking of such
benefit. An example of such conduct is where someone attempts to launder criminal proceeds of
another offence in order to place the proceeds beyond the reach of the law.
1. Pre-planned fraudsters, who start out from the beginning intending to commit fraud. These
can be short-term players, like many who use stolen credit cards or false social security
numbers; or can be longer-term, like bankruptcy fraudsters and those who execute complex
2. Intermediate fraudsters, who start off honest but turn to fraud when times get hard or when
life events, such as irritation at being passed over for promotion or the need to pay for care for
3. Slippery-slope fraudsters, who simply carry on trading even when, objectively, they are not
in a position to pay their debts. This can apply to ordinary traders or to major business people.
There are essentially seven groups of people who commit the various types of financial crime:
Organised criminals, including terrorist groups, are increasingly perpetrating large-scale
Corrupt heads of state may use their position and powers to loot the coffers of their (often
impoverished) countries.
Employees from the most senior to the most junior steal company funds and other assets.
From outside the company, fraud can be perpetrated by a customer, supplier, contractor or by
Increasingly, an external fraudster who colludes with an employee to achieve bigger and better
There is no single reason behind fraud and any explanation of it needs to take account of various
factors. Looking from the fraudster’s perspective, it is necessary to take account of:
Conditions under which people can rationalize their prospective crimes away
Expected and actual risk after the actual fraud has been carried out
A common model that brings together a number of these aspects is the Fraud Triangle. This model is
built on the premise that fraud is likely to result from a combination of three factors: motivation,
In simple terms, motivation is typically based on either greed or need. Stoy Hayward’s (BDO) most
recent FraudTrack survey found that greed continues to be the main cause of fraud, resulting in 63%
of cases in 2007 where a cause was cited. Other causes cited included problems from debts and
gambling. Many people are faced with the opportunity to commit fraud, and only a minority of the
greedy and needy do so. Personality and temperament, including how frightened people
are about the consequences of taking risks, play a role. Some people with good objective principles
can fall into bad company and develop tastes for the fast life, which tempts them to fraud. Others are
Opportunity:
In terms of opportunity, fraud is more likely in companies where there is a weak internal control
system, poor security over company property, little fear of exposure and likelihood of detection, or
unclear policies with regard to acceptable behaviour. Research has shown that some employees are
totally honest, some are totally dishonest, but that many are swayed by opportunity.
Rationalisation:
Many people obey the law because they believe in it and/or they are afraid of being shamed or
rejected by people they care about if they are caught. However, some people may be able to
motive or opportunity, or preferably both. Rationalisation is personal to the individual and more
difficult to combat, although ensuring that the company has a strong ethical culture and clear values
should help.
According to the RBI, while the number of fraud cases has declined from 24,791 cases in
2009–10 to 13,293 cases in 2012–13 — i.e. a 46% drop—the amount involved has increased
substantially from Rs. 2037.81 crore to Rs. 8646.00 crore —i.e. an increase of 324%.14. This
A granular analysis in this study reveals that nearly 80% of all fraud cases involved amounts
less than 1 lakh INR, while on an aggregated basis, the amount involved in such cases was
Major risk areas: Corruption and cash in hand are the most fraud vulnerable areas in the
Latest reported facts and figures: In India, frauds worth 11,022 crore INR were unearthed in
public sector banks between April–December 2014; 2,100 cases of fraud were reported to the
RBI.
BANK
FRAUD
EMBEZZLEMENT INSURANCE
FRAUD
PONZI CHEQUE
SCHEMES FRAUD
FINANCIAL
CORPORATE FRAUDS ACCOUNTING
FRAUD FRAUD
CREDIT
SECURITIES CARD
FRAUD FRAUD
INTERNET TAX
FRAUD EVASION
Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or
held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or
TYPES:
Fraudulent Documentation:
It involves altering, changing or modifying a document to deceive another person. It can also involve
approving incorrect information provided in documents knowingly. Deposit accounts in banks with
lax KYC drills/ inoperative accounts are vulnerable to fraudulent documentation. Some examples:
• An individual illegally obtains personal information/ documents of another person and takes a loan
• He/she provides false information about his/her financial status, such as salary and other assets, and
takes a loan for an amount that exceeds his eligible limits with the motive of non-repayment.
• A person takes a loan using a fictitious name and there is a lack of a strong framework pertaining to
• Fake documentation is used to grant excess overdraft facility and withdraw money.
• A person may forge export documents such as airway bills, bills of lading, Export Credit Guarantee
Siphoning of funds takes place when funds borrowed from financial institutions are utilised for
purposes unrelated to the operations of the borrower, to the detriment of the financial health of the
entity or of the lender. Diversion of funds, on the other hand, can include any one of the following
occurrences:
• Use of short-term working capital funds for long-term commitments not in conformity with the
terms of sanction
• Using borrowed funds for creation of assets other than those for which the loan was sanctioned
• Shortage in the usage of funds as compared to the amounts disbursed/ drawn, with the difference not
Identity Theft:
Fraudsters are devising new ways to exploit loopholes in technology systems and processes. In case of
frauds involving lower amounts, they employ hostile software programs or malware attacks, phishing,
SMSishing and whaling (phishing targeting high net worth individuals) apart from stealing
confidential data. In February 2013, the RBI advised banks to introduce certain minimum checks and
balances such as the introduction of two-factor authentication in case of ‘card not present’
transactions.
• Unauthorised emails asking for account information for updating bank records are sent by
• Bank employees keep original Fixed Deposit (FD) receipts with themselves and hand over phony
• Lost/stolen card: It refers to the use of a card lost by a legitimate account holder for
unauthorised/illegal purposes.
• Account takeover fraud: An individual illegally obtains personal information of valid customers
• Theft of valuables: Fraudsters open bank lockers to take key impressions of other lockers and then
Around 65% of the total fraud cases reported by banks were technology-related frauds (covering
frauds committed through/ at an internet banking channel, ATMs and other payment channels like
credit/debit/prepaid cards), whereas advance-related fraud accounted for a major proportion (64%) of
Some examples:
• Triangulation/site cloning: Customers enter their card details on fraudulent shopping sites. These
banking system. Counterfeit cards are then issued for the purpose of money laundering.
• Online Fraud: Card information is stolen at the time of an online transaction. Fraudsters then use
• Lost/Stolen Card: It refers to the use of a card lost by a legitimate account holder for
unauthorised/illegal purposes.
• Debit Card Skimming: A machine or camera is installed at an ATM in order to pick up card
• ATM fraud: A fraudster acquires a customer’s card and/or PIN and withdraws money from the
machine.
• Social engineering: A thief can convince an employee that he is supposed to be let into the office
building, or he can convince someone over the phone or via e-mail that he’s supposed to receive
certain information.
• Dumpster diving: Employees who aren’t careful when throwing away papers containing sensitive
information may make secret data available to those who check the company’s trash.
• False pretences: Someone with the intent to steal corporate information can get a job with a
cleaning company or other vendor specifically to gain legitimate access to the office building.
• Computer viruses: With every click on the internet, a company’s systems are open to the risk of
being infected with nefarious software that is set up to harvest information from the company servers.
According to PwC’s Global Economic Crime Survey 2014, external fraudsters are still the main
perpetrators of economic crime for the majority of financial service organisations (57% in 2014 and
FINANCIAL FRAUDS IN INDIA- AN ANALYSIS Page 30
60% in 2011). Financial institutions are prime targets for external frauds, given the amount of money
fraudsters can potentially obtain as well as the sensitivity of data held by these organisations (credit
card and personal identity details, for example). The financial services sector also tends to be more
strictly regulated and as a result, many business processes and functions have corporate controls in
place. This makes it more difficult for frauds to be internally perpetrated without discovery. The
absence of a proactive and robust monitoring framework, however, does not allow the entity to
identify conflict of interest issues such as employees or agents having a close relationship with other
entities.
Some examples:
• Falsified Valuations: External consultants advising loan borrowers to fabricate their valuation
• Corporate Espionage: Sharing trade secrets or confidential customer information with the
• Merchant Collusion: Merchant owners and/or their employees conspiring to commit frauds using
• Ponzi Scheme: A type of pyramid scheme, where money from new investors is used to provide
• Off shore investing: External vendors convincing investors to invest in outside companies by
• Bogus offerings: Investing in a bogus company (no operations, earnings or audited financial
statements)
• Inflation of projected sales figures or past income: Large and unusual year end transactions
• Others: Faking net worth of directors, faking CA certificates or financial statements, inflating sundry
debtors or reducing sundry creditors, reference checks not being conducted, irregularities in repayments
for loans availed from other banks, frequent start-ups, maintenance of a large number of small
enterprises, etc.
Counterfeit cheques:
Counterfeit or fake cheques that look too good to be true are being used in a growing number of
fraudulent schemes, including foreign lottery scams, cheque overpayment scams, internet auction
scams and secret shopper scams. Unsuspecting sellers get stuck when scammers pass off bogus
Even though the above-mentioned terms are interchangeably used, in the banking world, asset
stripping primarily implies taking company funds or assets of value, and leaving behind debts. This
can happen when a company’s directors transfer only the assets of one company to another and not
the liabilities. The result is a dormant company which has to be liquidated as it has large liabilities
• Asset stripping: Fraudsters deliberately target a company or companies to take ownership, move
the assets and then put the stripped entity into liquidation.
• Phoenixing: Directors of a company move the assets from one limited company to another to
‘secure’ the benefits of their business and avoid the liabilities. Most or all directors will usually be the
same in both companies. This usually is a way of ‘rescuing’ the assets of a failing business rather than
targeting a company.
• Teeming and lading: In order to maintain the liquidity situation artificially, amounts received from
the subsequent debtor are credited to the earlier debtor’s account so that one debtor’s account does not
show an outstanding balance for a long time. Such a process is continued till the time the original
amount misappropriated is finally replaced or till the time the cashier is caught.
Absence of stringent guidelines on the due diligence of professionals assisting borrowers at the time
of disbursement of loans may result in valuation agencies or advocates facilitating the perpetration of
frauds by colluding with the borrowers to inflate security valuation reports. Some examples:
• Concealing liabilities: Borrowers concealing obligations such as mortgage loans on other properties
or newly acquired credit card debts in order to reduce the amount of monthly debt declared on the
loan application
overstated, more money can be obtained by the borrower in the form of a cash-out refinance, by the
transaction participants, most often the borrowers, who receive a ‘rebate’ that is not disclosed to the
lender
• Shot gunning: Multiple loans for the same home being obtained simultaneously for a total amount
There are two types of mobile financial services that are currently offered in the Indian market—
mobile banking and mobile wallets. Being an easy and convenient mode of transacting, there has been
a 55 times rise in value usage of mobile banking and 5.5 times rise in the volume of transactions
between FY12 and FY15. After the recent changes to RBI policy, customers of semi-closed pre-paid
This move, on one hand, enhances the convenience and adoptability of a mobile wallet and on the
• Mobile banking application being mapped to an incorrect mobile number: For bank customers
who do not use mobile banking, an employee of the bank could attach an associate’s mobile number
to the bank account and install a mobile application on his mobile device. The customer’s account is
compromised by the associate and he or she does not get any notification about the same.
• Creating fake and non-existent users on the mobile financial services platform: Most of the
banks appoint a third party vendor to develop a mobile application to be integrated with their core
banking system. The vendor may create two unauthorised users with rights to initiate and verify
transactions, and transfer funds from the organisation to his associates’ wallets, effectively stealing
• Malware: The increase in the number of mobile banking users is accompanied by a rise in attacks
through malware.
benefits.
• SIM swap: SIM swap means replacing the old SIM with a new one, when the old gets lost or
damaged, or when one needs a differently sized SIM card. If a fraudster manages such a swap, he can
carry out numerous fraudulent transactions using the mobile number of the victim. For instance, the
valid mobile station international subscriber directory number (MSISDN) is moved to another
handset. The user has no access to their account and receives no notification. The user with the other
• Fake or similar interface apps: Fake applications, with exactly the same user interface as the
original application, are being created to steal confidential information shared by the user. Risks
• Increased risk of money laundering: Transfer of money into and out of a mobile wallet from or to
a bank account is now possible. Cash-in from the bank account of an individual and cash-out to a
different bank account of another individual can be used as a platform for laundering unaccounted
money.
customer account): Employees of the mobile wallet service provider may misuse the balance stored
customer with no nomination facility, the balance in the customer’s account is not passed on to his
family members and remains with the service provider, which ultimately becomes a low-hanging fruit
provider is a fraudster, and the payment is made by the customer for fictitious goods or services from
• No auto log off facility: An individual usually opens the application on his mobile device for
availing of the services and closes the application, instead of logging out. If the mobile device is
stolen or lost and a fraudster opens the application, he can misuse the remaining balance in the service
provider’s wallet.
Large accumulations of liquid assets make insurance companies attractive for loot schemes. These
companies are under great pressure to maximise the returns on investing the reserve funds, making
them vulnerable to high-yielding investment schemes. The insurance industry has witnessed an
increase in the number of fraud cases over the last couple of years. A growing number of
organisations are realising that frauds are driving up the overall costs of insurers and premiums for
policyholders, which may threaten their viability and also have a bearing on their profitability. To
keep these risks under check, a detailed framework for insurance fraud monitoring has been laid down
with effect from 2013–14 and is applicable to all insurers and reinsurers.
• Policy Holder and Claims Fraud: Policy holder committing fraud against the insurer at the time of
• Intermediary Fraud: Intermediaries committing frauds against the insurer and/or policyholders
• Internal Fraud: Employees commit fraud ‘suo moto’ or in collusion with external parties or
TYPES:
Misrepresentation:
occupation, etc)
Example: The proposal form mentioned that the client had a shop in the market, whereas
investigations revealed that the client was a small-time vendor sitting on a footpath.
Forging the customer’s signature in any document, proposal or any supporting document Example:
The client (staying in one city) and working as a surgeon was required to countersign the application
form for some corrections. The form came back and it was found that the signatures were forged by
Bogus business:
Cash defalcation:
Agent collecting the premium but not remitting the cheque to the insurance company, owing to which
Example: The advisor had collected the premiums from the customer and had not deposited the same
for almost a month; it came to the insurer’s notice when the customer was sent the lapsed letter.
Mis-selling:
A selling practice wherein the complete, detailed and factual information of a product is not given to
the customer (also called product misinformation); can include incomplete or incorrect representation
of the terms and conditions such as guaranteed returns, rider features, charges, linked product vs
endowment, facility of top-up vs regular premium, premium holiday, etc Example: The customer was
given a cover of Rs.1 lakh and the premium was Rs. 5 lakh.
This was a clear case of mis-selling as even the facility of a top-up was not explained to the client.
Obtaining pre-signed blank forms and filling the address change request (ACR)/contact number
change (CCR) without actually physically seeing the client or satisfying oneself about the client
Example: While the proposal form mentioned that the customers were working in an electronic
Doctor’s nexus:
Doctor being involved with the perpetrators in committing life insurance fraud
Example: A doctor gave clean medical reports, while the fraudster influenced the doctor to conceal
the information.
Cheque fraud refers to a category of criminal acts that involve making the unlawful use of cheques in
order to illegally acquire or borrow funds that do not exist within the account balance or account-
holder's legal ownership. Most methods involve taking advantage of the float (the time between the
negotiation of the cheque and its clearance at the cheque-writer's bank) to draw out these funds.
TYPES:
Cheque Kiting
Cheque kiting refers to use of the float to take advantage and delay the notice of non-existent funds.
Embezzlement
While some cheque kiters fully intend to bring their accounts into good standing, others, often known
as paper hangers, have pure fraud in mind, attempting to "take the money and run."
A cheque is written to a merchant or other recipient, hoping the recipient will not suspect that the
cheque will not clear. The buyer will then take possession of the cash, goods, or services purchased
with the cheque, and will hope the recipient will not take action or will do so in vain.
Abandonment
The paper hanger deposits a cheque one time that he/she knows is bad or fictitious into his/her
account. When the bank considers the funds available (usually on the next business day), before being
informed that the cheque is bad, the paper hanger withdraws the funds in cash. The offender knows
the cheque will bounce, and the resulting account will be in debt, but the offender will abandon the
account and take the cash.
Such crimes are often used by petty criminals to obtain funds through a quick embezzlement, and are
frequently conducted using a fictitious or stolen identity in order to hide that of the real offender.
Forgery
Sometimes, forgery is the method of choice in defrauding a bank. One form of forgery involves the
use of a victim's legitimate cheques, that have either been altogether stolen and then cashed, or
Counterfeiting
This involves creating a cheque on non-bank paper to look genuine. It relates to a genuine account, but
has actually been created and written by a fraudster for the purposes of committing fraud.
Cheque fraud is among the oldest and most common forms of financial crime. Even with the advent
of electronic payment products, cheques still account for billions of payments each year, making them
ACCOUNTING FRAUD:
In order to hide serious financial problems, some businesses have been known to use fraudulent
bookkeeping to overstate sales and income, inflate the worth of the company's assets, or state a profit
when the company is operating at a loss. These tampered records are then used to seek investment in
the company's bond or security issues or to make fraudulent loan applications in a final attempt to
obtain more money to delay the inevitable collapse of an unprofitable or mismanaged firm.
Examples: Enron and WorldCom and Ocala Funding: These companies "cooked the books" in order
to appear as though they had profits each quarter, when in fact they were deeply in debt.
It is a wide-ranging term for theft and fraud committed using or involving a payment card, such as
a credit card or debit card, as a fraudulent source of funds in a transaction. The purpose may be to
obtain goods without paying, or to obtain unauthorized funds from an account. Credit card fraud is
Credit card fraud happens when consumers give their credit card number to unfamiliar individuals,
when cards are lost or stolen, when mail is diverted from the intended recipient and taken by
criminals, or when employees of a business copy the cards or card numbers of a cardholder.
TYPES:
Credit card frauds can happen in several ways. But the biggest point of concern is that, criminals are
Stolen Cards:
Stolen cards are one of the very well-known modes of credit card frauds. Stolen credit cards remain
usable until and unless credit card holders call up the card users and block their cards. Criminals can
use the stolen cards to purchase any products or services if the card is not blocked.
Phishing Mails:
Internet is a huge medium of credit card frauds. In case of CNP (Card Not Present) transactions,
merchants have to rely on the person who is providing the information on the credit cards. Hence, if
one can provide all the information relating to the credit card (such as credit card number, name of
card holder, expiry date of the credit card and the CVV or verification number) during an online
purchase, one can easily use the card while buying products/services. As correct information about the
card is provided, the merchant recognizes him/her as the original owner of the credit card. Phishing
FINANCIAL FRAUDS IN INDIA- AN ANALYSIS Page 43
mails are one of the most well-known methods of stealing credit card information, where mails are
sent to the credit card holders asking to provide information on the cards. Phones are also used to
Skimming:
Skimming is stealing credit card information through various means in an otherwise genuine
transaction. In these cases, some ‘insiders’ or dishonest employees of the merchant, help criminals to
steal information on the credit cards. Here, small electronic devices are used to read the information
stored in the magnetic tape of the credit cards. Photocopies of the receipts are also used to steal the
information.
Carding:
Carding is the process to verify the authenticity of the stolen data of the credit cards. Criminals
provide the information of the card in the website that deal with real-time transaction processing. If
Application Fraud
Application fraud is the scam during the application process. Here fake or stolen data is used to open
an account in the name of others. Utility bills, bank statements are used to open fake accounts.
Account Takeover:
Account takeover is taking possession of other's account. Criminals gather all the necessary
information about the credit card and the cardholders. Then they contact the card issuer and
masquerade as genuine cardholder and request them to change their billing address. At a later stage,
they report a card loss and request for a new card (replacement) at the new address.
Rooting for taxes is never an easy thing because most people question that concept of giving away
part of their earning to a government but the fact is that taxes are an important source of income for
the government. This is the money that is invested in various development projects that are meant to
improve the company's situation. But the country has been facing a massive problem with tax
evasion. People who should be paying taxes have found ways not to pay them and, as a result, it may
There are two aspects of not paying taxes when they are due. The first is tax avoidance and the other
tax evasion. The difference between the two is that tax avoidance is basically finding a loophole that
exempts you from paying taxes and is not strictly illegal, while evasion is not paying the taxes when
they are actually due, which is absolutely illegal. These are some of the ways in which people may
avoid/evade taxes.
This is the simplest way in which someone may evade taxes. They simply won't pay it to the
government, not even when the dues are called for. A person engaged in this sort of tax evasion won't,
willingly or unwillingly, pay the tax before or after the due date.
Smuggling:
When certain goods move from one location to another, across international or state borders, a tax or
charge may be payable in order to move the goods. However, some individuals may move these
goods in surreptitious ways in order to avoid paying those taxes that evading the tax altogether.
In some cases, when an individual files taxes, they may submit false or incorrect information in order
to either lessen the tax that they are supposed to pay or not pay it at all. This is also tax evasion since
the complete information is not provided and they may actually be paying less than what they should.
The taxes that are payable by an individual or an organisation may be decided on the financial dealing
that have taken place during the assessment year. If false financial documents or accounts books are
submitted, ones that show incomes less than what was actually earned, the tax may come down.
The government may have provided certain exemptions and privileges to certain strata or members of
society in order to ensure they have a bit more financial freedom to progress. In some cases, members
who actually don't qualify for such privileges will get documents created to support their claim of
being a part of that group thus claiming exemptions where they are not suited
It could be said that this is one of the most common methods of tax evasion. In this case, individual
just won't report any income that they receive during a financial year. Not having reported any
income, they don't pay any tax thus successfully evading tax all together. The simplest example of
this would be a landlord who has kept tenants but has not informed the authorities that he has rented
There may be a situation where there a certain amount due in taxes which the individual may not be
willing to pay. In such a case he or she may actually offer a bribe to officials to not make them pay
Offshore accounts are accounts maintained outside the country and information about the dealing in
these accounts is not disclosed to the income tax department thereby evading any and all taxes due on
INTERNET FRAUD:
An Internet fraud (online scam) is the use of Internet services or software with Internet access to
defraud victims or to otherwise take advantage of them; for example, by stealing personal
information, which can even lead to identity theft. A very common form of Internet fraud is the
distribution of rogue security software. Internet services can be used to present fraudulent solicitations
financial institutions or to others connected with the scheme. Research suggests that online scams can
happen through social engineering and social influence. It can occur in chat rooms, social media,
Securities fraud, also known as stock fraud and investment fraud, is a deceptive practice in the
stock or commodities markets that induces investors to make purchase or sale decisions on the basis
These purchases often result in monetary loss for the buyer. Securities fraud can be committed a
variety of ways, including printing untrue information on a company's financial statement or SEC
filings, insider trading, falsifying information in dealings with corporate auditors, stock manipulation
This includes offences such as buying, selling and dealing in securities fraudulently, or manipulation
SEBI Act.
Regulation 3 and 4 of The Securities and Exchange Board of India (Prohibition of Fraudulent and
Unfair Trade Practices Relating to Securities Market) Regulations 2003 lay down the list of
using or employing, in connection with the issue, purchase or sale of any security listed or
employing any device, scheme or artifice to defraud in connection with dealing in or issue of
deceit upon any person in connection with any dealing in or issue of securities that are listed
Manipulative, fraudulent and unfair trade practices are prohibited. Dealing in securities
is a fraudulent or an unfair trade practice if it involves fraud. This may include all or
indulging in an act that creates a false or misleading appearance of trading in the securities
market;
dealing in a security not intended to effect transfer of beneficial ownership but intended to
operate only as a device to inflate, depress or cause fluctuations in the price of such security
advancing or agreeing to advance any money to any person thereby inducing any other person
to offer to buy any security in any issue only with the intention of securing the minimum
paying, offering or agreeing to pay or offer, directly or indirectly, to any person any money or
money's worth for inducing such person for dealing in any security with the object of inflating,
securities any information that is not true or that he does not believe to be true prior to or in
an intermediary not disclosing to his client transactions entered into on his behalf including
encouraging the clients by an intermediary to deal in securities solely with the object of
a futures or option position is taken about an impending transaction in the same or related
planting false or misleading news that may induce sale or purchase of securities.
TYPES:
Corporate Fraud:
Corporate fraud consists of activities undertaken by an individual or company that are done in a
dishonest or illegal manner, and are designed to give an advantage to the perpetrating individual or
company. Corporate fraud schemes go beyond the scope of an employee's stated position, and are
marked by their complexity and economic impact on the business, other employees and outside
parties.
This involves criminals spreading false information through various channels on the internet (i.e.
forums, spam emailing, chat rooms, and internet boards) to increase the price on either seldom traded
stock or the stocks of shell companies. Then the instigators of the swell in purchasing sell all of their
own stock once the price has met their standards. They walk away having made a huge profit, while
the victims are now left with stock that has settled at its usual low price, substantially lower than the
Insider Trading :
This involves individuals that hold more than ten percent of a particular company's stock or other
individuals that have access to non-public information regarding a certain company. There are various
legal ways for a person with this knowledge to trade stock legally, as long as the non-public
information does not influence the trade in any way. If a person with non-public information uses that
knowledge to trade to their advantage, or convinces anyone else to trade stock based on that
Accountant Fraud:
This type of fraud is committed by an accountant who neglects to point out and halt the release of
inaccurate financial reports, written by a corporate client, which misrepresents the financial stability
the books thereby misleading the investors. The most popular accounting schemes are
capitalising expenses, side deals, swap transactions, channel stuffing, accelerated revenues and
by senior executives such as loans granted to senior management that are never intended to be
repaid, failure to disclose forgive loans, reimbursed personnel expenses and extra ordinary
personnel expenses charged to the company. Other such frauds are insider trading, misuse of
corporate property for personal gain, kickbacks and individual tax violations related to self-
dealing.
TYPES:
statement data for the purpose of misleading the reader and creating a false impression of an
manipulation of expenses, improper disclosures on financial statements and overstating assets, misuse
The finance and accounting function of any organisation can misuse their position within the
organisation and manipulate the processes and bypass controls to derive personal gains or any other
malafide motif.
There are many types of related party transactions that might potentially be used to mis-state financial
reports. The most frequent type of transactions that require regulatory action are concessionary loans
that were either unapproved or non-existent, transfer of funds through overvalued purchases of assets/
investments, and sales of goods or services to related entities in which the existence of the
Generally, related party transactions are not necessary a mechanism for fraud. Their presence need not
indicate fraudulent financial reporting. At first sight a related party transaction is represented to be of
for the auditor to understand the benign nature of most related party transactions, the differentiating
features between benign and fraudulent transactions, and the importance of evaluating a company’s
Procurement fraud can be of multiple types and is one of the most widely used modus operandi for
siphoning off funds and window dressing the financial statements. Often defined as any illegal
conduct through which the offender gains advantage, avoids an obligation or causes damage to an
organisation. Procurement fraud can also be defined as the unlawful manipulation of the procurement
process to acquire goods /services, obtain an unfair advantage, avoid an obligation or cause a loss to
public property during the procurement process by public servants, contractors, or any other entity
o false invoices for products and services for suppliers who do not exist
Payroll fraud:
Payroll fraud is the theft of cash from a business via the payroll processing system. There are several
o Buddy punching
o Ghost employee
o Unauthorised hours
Money laundering is a criminal offence aimed at presenting wealth of illicit origin or the portion of
wealth that has been illegally acquired or concealed from the purview of tax and other authorities, as
legitimate, through the use of methods that hide the identity of the ultimate beneficiary and the source
Falsified credentials are a growing concern for organisations, as job applicants fill their resumes with
bogus academic degrees and job titles. The real risk comes when these applicants get the job and
perhaps land in high-profile positions, as in the case of former Yahoo CEO Scott Thompson, whose
four-month tenure ended after controversy over whether he had embellished his official bio.
This is the easiest means of stealing some money from an organisation. Employees inflate their
Misappropriation of Assets:
Asset misappropriation schemes include both theft of company assets, such as cash or inventory, and
the misuse of company assets, such as using a company car for a personal trip.
Market timing and late trading are used to dupe unaware and unsuspecting investors into investing in
Short selling, when abused, can cause a decrease in stock prices. Unscrupulous naked short selling
involves a buyer who sells the stock before borrowing and, in truth, without even planning to borrow.
Distributing inaccurate information on stocks with the purpose of driving down prices is named "short
and distort."
PONZI SCHEMES:
This is an investment fund from which withdrawals are taken from the most recent investors, rather
than money made through the investment itself. A Ponzi scheme is “an investment fraud that involves
payment of purported returns to existing investors from funds contributed by new investors”.
EMBEZZLEMENT:
position of trust or responsibility over those assets. Embezzlement typically occurs in the employment
Accounting embezzlement, a common form of the crime, is the manipulation of accounting records to
hide theft of funds. Offenders are given lawful possession of the property, and then are accused of
A person is often given access to someone else’s property or money for the purposes of managing,
monitoring, and/or using the assets for the owner’s best interests, but then covertly misappropriates
the assets for his/her own personal gain and use. This is clear embezzlement.
This type of crime is most common in the employment and corporate fields. Some embezzlers simply
take a large amount of money at once, while others misappropriate small amounts over a long period
of time. The methods used to embezzle can vary greatly and are often surprisingly creative. They can
• There must be a fiduciary relationship between the two parties; that is, there must be a reliance by
• The defendant must have acquired the property through the relationship (rather than in some other
manner)
• The defendant must have taken ownership of the property or transferred the property to someone
else
Harshad Mehta was an Indian stockbroker, well known for his wealth and for having been charged
with numerous financial crimes that took place in 1992. Of the 27 criminal charges brought against
him, he was only convicted of four, before his death at age 47 in 2001. It was alleged that Mehta
engaged in a massive stock manipulation scheme financed by worthless bank receipts, which his firm
brokered in "ready forward" transactions between banks. Mehta was convicted by the Bombay High
Court and Supreme Court of India for his part in a financial scandal valued at 49.99 billion
(US$740 million or Rs. 5000 Crores) which took place on the Bombay Stock Exchange (BSE). The
scandal exposed the loopholes in the Bombay Stock Exchange (BSE) transaction system and SEBI
further introduced new rules to cover those loopholes. He was tried for 9 years, until he died in late
2001.
MODUS OPERANDI
The banks at that time were not allowed to invest in the equity markets. Harshad Mehta had very
cleverly squeezed some capital out of the banking system. Another instrument used in a big way was
the bank receipt (BR). In a ready forward deal, securities were not moved back and forth in actuality.
Instead, the borrower, i.e. the seller of securities, gave the buyer of the securities a BR. The BR
confirms the sale of securities. It acts as a receipt for the money received by the selling bank. Hence,
the name, ‘Bank Receipt’. It promises to deliver the securities to the buyer. It also states that in the
mean time, the seller holds the securities in trust of the buyer.
government securities. Two small and little known banks - the Bank of Karad (BOK) and the
Once these fake BRs were issued, they were passed on to other banks and the banks in turn gave
money to Mehta, plainly assuming that they were lending against government securities when this
was not really the case. He took the price of ACC from Rs. 200 to Rs. 9,000. That was an increase of
4,400%. The stock markets were overheated and the bulls were on a mad run. Since he had to book
profits in the end, the day he sold was the day when the markets crashed.
The Satyam Computer Services scandal was a corporate scandal affecting India-based IT services and
back-office accounting company, Satyam Computer Services, in 2009, in which Chairman Ramalinga
How he did it: Falsified revenues, margins and cash balances to the tune of 50 billion rupees.
How he got caught: Admitted the fraud in a letter to the company's board of directors.
Penalties: Raju and his brother charged with breach of trust, conspiracy, cheating and falsification of
records. He was released after the Central Bureau of Investigation failed to file charges on time.
A special court under India’s Central Bureau of Investigation (CBI) on April 10, held the founders
and former officials of the outsourcing firm, guilty in the accounting scam worth Rs. 7,000 crores
($1.1 billion). B Ramalinga Raju, the company’s former chairman, has been sentenced to seven years
in jail.
The case, which is also called the Enron of India, dates back to 2009. Six years ago, Raju wrote a
letter to the Securities and Exchange Board of India (SEBI) and his company’s shareholders,
admitting that he had manipulated the company’s earnings, and fooled investors. Nearly $1 billion—
In an immediate reaction to the confession, investors lost as much as Rs. 14,000 crores ($2.2 billion)
percentage of equity, the concern was that poor performance would result in a takeover, thereby
“What started as a marginal gap between actual operating profit and the one reflected in the books of
accounts continued to grow over the years,” Raju said in the letter. “It has attained unmanageable
Raju was once the poster boy of India’s IT revolution—rubbing shoulders with top CEOs and
1987: Thirty three-year-old Raju establishes Satyam Computer with his brother and a brother-in-law
in Hyderabad.
1991: The company is listed on the Bombay Stock Exchange, where its initial public offering is
1993: Satyam Computer signs a deal with US-based Dun & Bradstreet to set up Dun & Bradstreet
Satyam Software. Satyam holds 24% stake in the venture, while Dun & Bradstreet holds the
remaining. In 1996, Satyam sells its stake to Dun & Bradstreet, ahead of a restructuring, and the new
1999: Satyam Infoway, a subsidiary of Satyam Computer, becomes the first Indian information and
countries.
2006: Satyam’s revenues cross 1200 crores ($1 billion). Raju becomes the chairman of industry body,
official IT services provider of the FIFA World Cups in 2010 and 2014.
2008: Satyam’s revenues cross 2400 crores ($2 billion). In December, the company decides to buy
out Maytas Infra—owned by Raju’s sons—for 1920 crores ($1.6 billion). The deal falls through after
investors and board members object, and in a span of four days, four directors of the company quit.
January 2009: Satyam is barred from doing business with the World Bank for eight years. The
World Bank alleges that Satyam was involved in data thefts and staff bribery. Shares fall to record
low in four years. Satyam employees receive a letter from Raju admitting to the fraud, following
Raju and his younger brother B. Rama Raju are arrested by police, while the Indian government steps
June 2009: Tech Mahindra, owned by the Mahindra Group, and Satyam merge to form India’s fifth
November 2011: Raju gets bail from India’s supreme court after the CBI fails to file charge-sheet.
October 2013: India’s enforcement directorate files a charge-sheet against Raju and 212 others under
money-laundering charges.
July 2014: India’s market regulator SEBI bars Raju from the capital markets for 14 years, and also
April 2015: The special CBI court holds Raju and nine other officials guilty of cheating. Among
those held guilty are two former partners at PwC. “We are disappointed with this verdict given by the
statement.
Raju, who also has to pay a fine of about $800,000 (Rs. 5 crore), has served 32 months in prison so
far.
Subrata Roy, founder of Sahara India, has been in jail since 2014.
Once a powerful and influential businessman who owned an airline, sponsored India’s cricket team,
and even had a stake in a cricket team in the Indian Premier League, Roy is now accused of duping
The case relates to an investment option that Sahara ran in 2008 where investors had deposited money
in schemes launched by Sahara India Real Estate Corp Ltd and Sahara Housing Investment Corp Ltd.
SEQUENCE OF EVENTS:
A Pin Drops
• In 2010, Roshan Lal, a chartered accountant based out of Indore, sent a letter requesting the National
Housing Bank (NHB) to investigate housing bonds issued by Sahara India Real Estate Corporation
• The letter was forwarded to the market regulator Securities and Exchange Board of India (Sebi).
Regulator in Action
• Investigations hit a hurdle as SIREC and SHIC were not listed on stock exchanges.
• Luckily for the SEBI, Sahara Prime City, a real estate arm of the Sahara Group, had filed a draft red
• The SEBI concluded that SIREC and SHIC violated the Companies Act by collecting money
through optionally fully convertible unsecured debentures (OFCDs) and ordered the company not to
• The Allahabad high court stayed the SEBI order and the SC also turned down SEBI's plea to stop the
• The SEBI issued a public notice cautioning investors against buying bonds issued by SIREC and
SHIC
• Lucknow bench of Allahabad high court vacated earlier stay on the SEBI order
• The SEBI then alerted investors about a ban on fund raising schemes by the two Sahara companies
• Sahara challenged the Allahabad high court order in Supreme Court; the SC told Sahara to share
details of investors and asked the company to approach the Securities Appellate Tribunal (SAT).
• The SAT ruled in SEBI’s favour, upholding the order and asking the company to refund the money.
• The Sahara Group accused the SEBI of refusing to accept documents of the investors, which the
company was required to submit to the market regulator to meet the deadline set by the SC
• Sahara alleged that the trucks carrying documents were waiting since the evening of September 10
Ad Fest
• In newspaper advertisements, Sahara said it would return the money to investors. "You need not
worry about anything and be at absolute peace as Sahara is the most dutiful and absolute honest
• In December, 2012, the company was allowed to pay the money in three installments, including an
immediate payment of Rs. 5,120 crore, followed by an installment of Rs. 10,000 crore in the first
• The SEBI said neither of the latter two installments were paid
• The SC allowed the SEBI to freeze accounts and seize properties of Sahara Group's two companies
• The properties being attached by the SEBI included the land owned by Sahara Group firm Aamby
• The SEBI also ordered freezing of all bank and demat accounts as well as attachment of properties
• The Lucknow Police took Sahara Group chief Subrata Roy into custody from his home in Uttar
Ketan Parekh, popularly known as KP, is a former stock broker from Mumbai, India, who was
convicted in 2008, for involvement in the Indian stock market manipulation scam in late 1999-2001.
Currently he has been debarred from trading in the Indian stock exchanges till 2017.
Parekh is alleged to have been involved in circular trading throughout the time period and with a
variety of companies, including Global Trust Bank and Madhavpura Mercantile Cooperative Bank.
Parekh's sole conviction, which carried a one-year sentence, came as a result of a transaction he
MODUS OPERANDI:
He bought shares when they were trading at low prices and saw the prices go up in the bull
When the price was high enough, he pledged the shares with banks as collateral for funds.
This could not have been possible out without the involvement of banks.
KP and his associates started tapping the MMCB for funds in early 2000
In December 2000, when KP faced liquidity problems in settlements he used MMCB in two
different ways:
Pay Order Route, wherein KP issued cheques drawn on BoI to MMCB, against which MMCB
It was alleged that MMCB issued funds to KP without proper collateral security and even
As per a RBI inspection report, MMCB's loans to stock markets were around Rs.10 billion
METHOD 2:
KP used around 16 such accounts, either directly or through other broker firms, to obtain
funds
Few Brokers were also believed to have taken loans on his behalf
Madhur Capital, a company run by Vinit Parikh, the son of MMCB Chairman Ramesh Parikh,
KP reportedly used his BoI accounts to discount 248 pay orders worth about Rs 24 billion
The MMCB pay order issue hit several public sector banks very hard
The Saradha Group financial scandal was a major financial scam and alleged political scandal caused
by the collapse of a Ponzi scheme run by Saradha Group, a consortium of over 200 private companies
that was believed to be running collective investment schemes popularly but incorrectly referred to as
chit funds, in Eastern India. The Saradha scam, where more than 1.74 million people lost their savings
and investments worth $3.7 billion, was exposed when Kolkata-based Saradha group went bankrupt
in January 2014. The crisis did not end just there. It led to some 35 people committing suicide.
Politicians from the ruling Trinamool Congress Party in West Bengal were alleged to have been the
On 18 April, an arrest warrant for Sudipto Sen, the chairman and managing director of the Saradha
Group, was issued. By 20 April, the news of potentially the largest Ponzi scheme in India had become
headline news in West Bengal, and then front-page news nationally. After evading the authorities for
a week, Sudipto Sen, Debjani Mukherjee and Arvind Singh Chauhan were arrested in Sonmarg,
Some three decades ago, Nirmal Singh Bhangoo was a milk seller near the India-Pakistan border in
Soon, PACL diversified into real estate and hospitality. Today it owns more than 183,000 acres of
On Jan. 08, 2016, India’s federal investigative agency, the Central Bureau of Investigation
(CBI), arrested Bhangoo and three others in connection with an alleged Rs. 45,000 crore ($6.7 billion)
Ponzi scam. The scheme promised depositors returns on investments in agricultural land, the
regulator said. PACL has argued it was selling land to customers and not investment schemes, and so
Some 55 million investors who joined the massive scheme are said to have been duped–making
process
transaction reports
Securities and Exchange Board of India Act, Protects the interests of investors from
1992
fraudulent activities of corporates
conduct investigations
of fraud
Procedure, 1973
management
pension
act
matters
The Black Money (Undisclosed Foreign Deals with the problem of black
Income and Assets) and Imposition of Tax
Act, 2015 money (undisclosed foreign income
and assets)
a criminal liability
person
Aims to:
transactions
benami transactions
fraud investigation
taken thereon
incidences in future).
taking a bribe.
The Prevention of Bribery of Foreign Public Officials and Officials of Public International
organization.
Criminal Proceedings:
Fraudulent and unfair trade practices relating to securities: The higher of either:
Cheating. Simple cases of cheating are punishable with one year's imprisonment and a fine.
Civil Suits:
An aggrieved party can file a claim for damages. Class actions are permitted under the Code
Several financial frauds in the past and since the beginning of the century have repeatedly breached
the trust of investors. Despite incidents of frauds, organisations still lack a formal system of fraud
detection, prevention, and a response mechanism. A robust control environment is vital to reduce the
risk on account of fraud and misconduct within companies and their dynamic business environment.
The following are some key aspects of the anti-fraud framework that an organisation should
Board of directors are responsible for setting the “tone at the top”, which flows across the entire
company and its various locations. Management views on mitigating fraud, corruption and
misconduct should be revealed to the employees. It is recommended that management should actively
assess frauds, corruption and misconduct risks and controls. Without ensuring that all suspected
allegations of misconduct are independently investigated, management might not be able to develop
the requisite neutral and balanced environment within the organisation. Disciplinary action and zero
tolerance for violations should also be part of the message that the Board sends out to employees.
Organisations willing to counter fraud should develop sound fraud prevention policies that must have
Segregation of duties;
Position rotations;
Ethics Code:
The ethics code of the company should be developed keeping in mind the size of the organisation, the
mix of employees, the number of employees, and the key risk areas. Once developed, this code must
be formally documented and communicated to the employees, third parties, and other stakeholders
(official website of the organisation, if any). It should describe the disciplinary actions that can be
A whistleblower is a person(s) who has and reports insider knowledge of illegal activities occurring in
who becomes aware of illegal or fraudulent activities taking place in a business either through
Actions that can be initiated based on the nature and seriousness of the issue reported?
Concern about compliance of policies or procedures with laws and regulatory guidance and
As previously stated, whistleblowers are the most common source of detection for frauds. However, it
is helpful and crucial to understand who is most likely to report fraud to the organisations.
After policies and procedures are developed they must be effectively communicated and employees
Special training for others in high-risk positions (i.e. business developers, sales and marketing)
The purpose of fraud risk assessments can be established with the below:
Assessing the types of frauds that can impact business and identifying relevant types of fraud,
such as fraudulent financial reporting, possible loss of assets, and corruption methods through
Understanding frauds through business partners and assess the manner in which work is
performed by vendors, outsourced agencies and other third parties doing business for and on
Identifying and evaluate frauds and risks that bring change in the operating environment
Identifying where the company should focus its anti- fraud resources and periodically review
the results of the fraud risk assessment with the audit committee. Such periodic assessment
should be helpful in challenging certain key aspects such as management override of controls
Business data is increasingly being managed and stored by IT systems. The pressure to improve
efficiencies and integrate supply chains has meant that many organisations are now heavily reliant on
IT systems to support business processes. Such systems have also reduced the level of human
intervention required, which has traditionally acted as a fraud control. As a result, organisations are
placing more reliance on automated controls to both prevent and detect fraud.
The key aspects steps that organisations can consider to start are the following:
Proactively monitoring key processes and run data analytics modules on internal/external
Develop a robust log maintenance policy and retention period of logs in line with fraud risk
management requirements
Adequate control on devices containing confidential data, encrypt devices and use reliable
software tools with remote data wiping capabilities to safeguard against device theft or
intrusions
Organisations mostly use services of third parties to manage their business operations and other
activities. Sometimes working with third parties can significantly increase the
risk of frauds. Organisations are able to extend limited control over their third party ecosystems and
unlike some of the other countries, incorporating right to audit clauses in vendor contracts may be
perceived as a breach of trust, damaging the business relationship. In these circumstances due
diligence can be a useful tool to understand one’s vendors and business partners.
These areas mentioned here can be covered by due diligence on third parties in order to address
and affiliates, experience and competence/track record, any information on these fronts/shell
Any adverse news in media about unethical business practices, involvement in tax evasion,
Any political affiliations, Inappropriate political support and links to politically exposed
persons/entities
Financial institutions are enhancing their processes, controls and fraud risk management frameworks
to minimise the opportunities for fraud as well as reduce the time taken in their detection. Funding
continues to compete with other business initiatives and is mostly challenged on a cost-benefit basis.
Many financial institutions are thus implementing their fraud control and reporting frameworks to
generate information in a way that the level of fraud identified, prevented and actual losses incurred
are identified. This approach has enabled the benefits of skilled resources and automated tools to be
ROLE OF REGULATORS
Regulators and investigative agencies are trying to gear up for the changed environment. In 2012, the
Central Bureau of Investigation (CBI) announced that it is developing a Bank Case Information the
correlation between fraud, This database contains the names of accused persons, borrowers and
The RBI has relased a new framework to check loan frauds by way of early warning signals for banks
and red flagging of accounts where defaulters have no access to further banking finance. It also plans
to set up a Central Fraud Registry that can be accessed by all Indian banks. In addition, the CBI and
Central Economic Intelligence Bureau (CEIB) will share their databases with banks.
Similarly, the IRDA is also in the process of setting up an insurance fraud repository in order to
reduce monitoring costs, using advanced detection and prevention systems deployed at the industry
level. The initiative is expected to identify fraudulent claims right at the processing stage, before the
payment occurs, and is aimed to ensure better screening of proposals at the underwriting stage. This
project aims at establishing an industry wide single fraud database that will eliminate the need for
insurers.
SEBI is currently in the process of getting its existing business intelligence software which is used
Whilst the legal environment and regulators have pushed the financial sector in the right direction,
individual institutions are also taking the lead in protecting their earnings and reputation.
It has been found that suspicious transaction reporting, effective fraud risk management measures,
whistleblowing processes and tip-offs helped financial services organisations to detect most frauds.
TOP TRENDS
Automated analysis tools: Today, the industry is increasingly aware of the need for
automated analysis tools that identify and report fraud attempts in a timely manner. Solution
compliance solutions.
vulnerability of financial institutions are now available. They help in formulating a targeted
Data visualisation tools: These are being used to provide a visual representation of complex
data patterns and outliers to translate multidimensional data into meaningful pictures or
graphics.
post mortem.
transfer methods are using deep learning, a new approach to machine learning and artificial
intelligence that is good at identifying complex patterns and characteristics of cybercrime and
online fraud.
The internal audit function: This function is being altered to include fraud risk management
in its scope. The changed technological landscape requires the old ways of internal auditing to
give way to new, technologically equipped audit functions. Annual audit planning
may no longer be fully effective and flexible audit plans are the need of the hour, as fraud risk
The key components of an effective Anti-Fraud Programme for an organization are as follows:
The survey was sent across to respondents who are working in various corporate organizations across
the world. Thus, the sample includes respondents from all levels of an organization right from interns
to Chief Information Officers (CIOs) and Chief Executive Officers (CEOs). This was intentionally
Sample Size:
Age:
The sample size included respondents from the following age groups:
20 - 30 years: 8.1%
30 - 40 years: 12.6%
40 - 50 years: 39.4%
50 - 60 years: 36.4%
QUESTION 1:
o Yes
o No
On analysis of the survey, it was found that 67.8% of the respondents had not experienced any
financial fraud in the past 12 months as opposed to 32.2% that had faced such a situation.
This finding highlights that although every single individual does not experience financial frauds
regularly, its existence in society cannot be ignored. If financial frauds were monitored and controlled
properly, statistics would show a very low number of respondents facing such crimes. However, this
is not the case. Thus, this is a warning bell that the problem is real and action needs to be taken before
This question was included in the questionnaire in order to gain an insight into the current level
o Others: 2.7%
This showcased that Credit Card Frauds were the most heard of / most occurring type frauds at
63.9%. This was followed by Bribery / Corruption at 56.3% and E-Commerce / Internet Fraud
at 53%.
o Yes
o No
Cyber crime comprises any form of crime where either the tool or the target of the crime is a
Cyber crime is fast becoming a popular way of defrauding both individuals and entities. No
Perpetrators typically either attempt to steal money, or more seriously sensitive data from target
critical functions in target organisations, leading to not just financial loss, but also loss of
Low levels of enforcement and inadequate preventative controls have resulted in an escalation
Between 2011 and 2015, more than 32000 cyber crimes were reported across the country. More
than 24000 of these cases were registered under the IT Act and the remaining under the various
sections of IPC and other State Level Legislations (SLL). The cases registered under the IT act
grew by more than 350% from 2011 to 2015. The cases registered under the IPC increased by
more than 7 times during the period between 2011 and 2015.
The survey results indicated that 88% of the respondents felt that technology is abused to
commit crimes. This alarming statistic is a clear reflection of the above facts. Financial frauds
have seen an increase due to technological advancements as perpetrators have easier access to
confidential data. E-commerce and Banking industries are known to use technology at every
step of its functioning. Thus, this also arises the problem of technolgical breaches in the system
making these industries easy targets. Furthermore, technology can be abused to devise new
This calls for organizations to delve deeper into formulating prevention policies and procedures
for cyber crime. A cyber corporate crisis is one of the most complex and challenging issues an
organisation can face. Cyber breaches require sophisticated communication and investigative
strategies, including significant forensic and analytical capabilities that are executed with
as an organisational stress test—one that can and should lead to improvements in the
a cyber crisis can serve as a marker of competitive advantage and, ultimately, its survival. Thus,
the time has come for corporate organizations to include cyber risk as a part of the due
diligence considerations.
Thus, from the above observations, the null hypothesis “ Technology is abused to commit
o Procurement
o Inventory
o Finance / Payment
o Admin
o HR
Corporate organizations face fraud risks in every process. Hence, it is important to understand
the operational characteristics of each sector to identify vulnerable processes at each level.
the most vulnerable to fraud risks. This was followed by Procurement Processes at 17%.
Finance/ Payment Processes form the basis for all other business processes. This not only
makes it the one of the most vital process within the organization but also the biggest target for
frauds.
Both Finance and Procurement processes are characterized by multiple touch points along with
interactions with external stakeholders like vendors, agents, customers. Thus, these are areas
where collusion can override internal controls. Failure to implement basic controls like
segregation of duties, control over access rights, due diligence of vendors/agents before
selection can lead to the easy occurrence of frauds. Organizations must ensure that they take
Thus, the respondents’ perception depicted through the survey results can be attributed to the
above reasons.
Hence, the null hypothesis that “ Payment / Finance processes are the most vulnerable to
o Employees
o Business Associate
o Customers
o Vendors / Agents
Over the years, it has been observed that the greatest fraud threats lie within the corporate
organizations itself. Employees are often central to frauds as they either perpetrate the fraud or
discovery of small value frauds (such as faking personal bills or fudging of expense reports).
Therefore, when employees collude with external parties to commit fraud (such as processing
fake invoices submitted by vendors), organisations often tend to blame external parties first and
not employees.
However, this is not the correct approach. It is imperative for organisations to provide a safe,
robust channel for employees to report suspicions of malpractice. It is also important that an
organisation’s Board comprise of individuals with utmost integrity who would engage
themselves with the management.The Board needs to take a lead by setting the tone at the top
and facilitate a zero tolerance approach towards fraud. Employees must be dealt with in the
The survey results revealed that 52.6% of the respondents felt that Employees are the most
Hence, the null hypothesis, “ Employees are most likely to commit financial frauds in a
o Whistle-blower
o Ethics hotline
o IT Controls
o By Accident
o Other
effective fraud detection method with 45.7%. This was followed by IT Controls at 27.1% and
Whistle-blowers at 11.6%.
Considering most companies today deal with vast and complex data, real time analytics and
dashboard tools can be adopted to highlight any red-flags and capture any deviation from the
routine, which could be an indication of a fraud. These tools are very effective in detecting
their identity would remain anonymous and that the information disclosed would be handled in
a safe and confidential manner. This has resulted in a number of fraud related issues being
reported on such channels. It has been observed that such hotlines also become preventive tools
Global surveys by organisations like the ACFE have highlighted that presence of formal
management reviews, employee support programmes and hotlines is inversely related to the
extent of financial losses suffered due to fraud. Organisations lacking these controls
When one looks at the relationship between the presence of a preventive control and the
duration of the fraud, the perpetrator’s ‘perception of detection’ plays a vital role. The duration
of frauds is considerably reduced when the perpetrators perceive that robust detection
mechanisms are in place. Specifically, organisations that utilise job rotation and mandatory
vacation policies, rewards for whistle-blowers and surprise audits are known to detect their
frauds more than twice as qucikly as organizations lacking such controls. The incidence of
high.
Do you think Indian law enforcement agencies are adequately resourced and trained to
o Yes
o No
The survey results showed that alarmingly 85.9% of the respondents felt that Indian law
enforcement agencies are not adequately resourced and trained to investigate and prosecute
financial frauds.
inefficient training practices, lack of adequate funds alloted for training etc.
Hence, the null hypothesis, “It is perceived that Indian law enforcement agencies are not
adeqautely resourced and trained to investigate and prosecute financial frauds.” proved to
be true.
Although several legal parameters have been set down and laws have been formulated,
implementation has always been a weak point for the Indian government. Time lags in judicial
procedures coupled with heavy corruption practices have clearly influenced the general public
perception.
Thus, it is essential that the government takes steps to strenthen its law enforcement agencies to
combat financial fruads. It must ensure the effective implementation of laws set.
o Yes
o No
The survey results showed that 52.6% respondents had a fraud risk compliance policy in their
One of the most effective ways to deal with the problem of fraud is to adopt methods that will
decrease motive, restrict opportunity and limit the ability for potential fraudsters to rationalise
their actions. In the case of deliberate acts of fraud, the aim of preventative controls is to reduce
opportunity and remove temptation from potential offenders. Prevention techniques include the
introduction of policies, procedures and controls, and activities such as training and fraud
activities can help to ensure the stability and continued existence of a business.
As fraud prevention techniques may not stop all potential perpetrators, organisations should
ensure that systems are in place that will highlight occurrences of fraud in a timely manner.
This is achieved through fraud detection. A fraud detection strategy should involve use of
analytical and other procedures to highlight anomalies, and the introduction of reporting
mechanisms that provide for communication of suspected fraudulent acts. Key elements of a
comprehensive fraud detection system would include exception reporting, data mining, trend
Fraud detection may highlight ongoing frauds that are taking place or offences that have
already happened. Such schemes may not be affected by the introduction of prevention
techniques and, even if the fraudsters are hindered in the future, recovery of historical losses
will only be possible through fraud detection. Potential recovery of losses is not the only
objective of a detection programme though, and fraudulent behaviour should not be ignored
just because there may be no recovery of losses. Fraud detection also allows for the
improvement of internal systems and controls. Many frauds exploit deficiencies in control
systems. Through detection of such frauds, controls can be tightened making it more difficult
Fraud prevention and fraud detection both have a role to play and it is unlikely that either will
fully succeed without the other. Therefore, it is important that organisations consider both fraud
prevention and fraud detection in designing an effective strategy to manage the risk of fraud.
immediate steps in the case of an actual fraud occuring. Fraud prevention and fraud detection
procedures must be set in the company policies. Further, fraud response strategies and measures
against perpetrators must be set. Incentives for fraud detection methods like whistle-blowing
must be included.
Fo this, an effective Anti-fraud strategy must be put into place, as explained before. It has four
main components:
Prevention
Detection
Deterrence
Response
The following diagram summarises these components and the context within which an anti-
o Yes
o No
The results of the survey indicated that 65.6% of organizations followed an ethics training and
Attitudes within an organisation often lay the foundation for a high or low fraud risk
environment. Where minor unethical practices may be overlooked (e.g. petty theft, expenses
also be treated in a similar lenient fashion. In this environment there may be a risk of total
Organisations which have taken the time to consider where they stand on ethical issues have
come to realise that high ethical standards bring long term benefits as customers, suppliers,
employees and the community realise that they are dealing with a trustworthy organisation.
Organizations have also realised that dubious ethical or fraudulent practices cause serious
A mission statement that refers to quality, or more unusually ethics and defines how the
Clear policy statements on business ethics and anti-fraud, with explanations about
A process of reminders about ethical and fraud policies- eg. Annual letter/ declarations
However, a code of ethics or an anti-fraud policy is not sufficient to prevent fraud though.
from senior management and ‘tone at the top’ is key. Employees are more likely to do what
they see their superiors doing than follow an ethics policy, and it is essential that management
to all employees, suppliers and business partners, and providing training programmes where
actions, organisations should ensure that senior management are committed to controlling the
risks of fraud. Senior management should be assigned with responsibility for fraud prevention,
as this sends a message to employees that the organisation is serious about fraud and ensures
that tackling fraud will be considered at senior levels. Adherence to policies and codes should
be regularly monitored and policed by appropriate people within the organisation (such as
management and/or internal audit), and the documents themselves should also be regularly
Almost every time a major fraud occurs many people who were unwittingly close to it are
shocked that they were unaware of what was happening. Therefore, it is important to raise
awareness through a formal education and training programme as part of the overall risk
management strategy. Particular attention should be paid to those managers and staff operating
in high risk areas, such as procurement and bill paying, and to those with a role in the
prevention and detection of fraud, for example, human resources and staff with investigation
responsibility.
Employees may be educated through a number of mediums, such as formal training sessions,
group meetings, posters, employee newsletters, payroll bulletins or awareness pages on internal
successful.
these fraud prevention and detection methods. This is become majority were found to have a
fraud risk compliance policy, and majority incorporated an ethics and training programme.
Thus, the null hypothesis, “ Organizations have become more sensitve to fraud risk” proved
to be true.
o Yes
o No
The survey results showed that 61.8% respondents felt that fraud is an inevitable cost of doing
business.
This is dangerous as it could lead to organisations having a tolerant approach towards fraud and
subsequently not investing enough in the appropriate fraud risk management controls and
framework. It also translates into a culture of merely reacting to fraud and not proactively
fraud risk management framework, failing which they would face stringent action.
However, this highlights that the problem of fraud risks is extremely hard pressing and needs
Organisations are facing a number of challenges in the current economic scenario. They
constantly deal with pressure of uncertain markets, escalating input costs, high labour turnover
and advent of technology. Additionally, companies have to meet rising consumer demand
across product categories with price innovation. Such challenges place further pressure on
companies and their business partners. Such pressures may provide opportunity and incentives
Hiring reliable management and building relationships with genuine clients, suppliers and
partners are of utmost importance for organizations. The lack of correct background
information can lead to both reputation and business risks. Effective background checks of
It is difficult but also necessary to integrate data from various sources to be able to derive the
integrating channels or within applications and tools (integrating online and ATM transactions,
retail banking and corporate banking or integrating subsidiary banks where different
The tone at the top is critical in the fight against fraud. Lack of customer and/or staff awareness
can result in failure of even the best of technology solutions. It takes a concerted effort to be
able to build, maintain and sustain an effective fraud risk management programme.
vulnerabilities and fraud schemes, to be able to remain one step ahead of the fraudsters.
order to ensure that incidents of fraud are managed without exposing the organisation to any
legal or reputational risks. Forensic tools can be used to navigate IT systems for evidence of
malfeasance such as information deletion, policy violations and unauthorised access. These
tools can help the company legal counsels to prepare for a suit to be filed against the fraudster.
Apart from internal controls, financial institutions need to also educate the customers. Since the
manoeuvres used by cyber-criminals to target sensitive financial data are sophisticated and
constantly changing, financial institutions must look at existing security controls with a new
The past decade has witnessed a steep rise in the organisations which have faced an increased
risk of fraud exposure. With any change in the environment of the businesses, the need to adapt
business organizations must equip themselves against fraud risks and exposure through a
systematic programme of fraud risk assessment, monitoring, incident response and remediation.
However, businesses alone cannot combat the occurrences of frauds. It is imperative that the
government and other law enforcement agencies ensure the effective implementation of the
laws. This further implies the fight to reduce corruption and bribery in government agencies
itself. Actions for fraud awareness and education amongst citizens must be undertaken as well.
Thus, it is clear that the problem of financial frauds is a hard pressing one that needs immediate
BOOKS:
Fraud Advisory Panel, (2006), Fighting Fraud: A guide for SME’s 2nd Edition
Fisher, C. and Lovell, A., (2000), Accountants Responses to Ethical Issues at Work.
Management.
Iyer, N. and Samociuk, M., (2006), Fraud and Corruption: Prevention and Detection.
Turner, C., (2007), Fraud risk management: a practical guide for accountants.
Wells, J., (2007), Corporate fraud handbook: prevention and detection 2nd ed.
RESEARCH PAPER
Background Paper on Financial System Abuse, Financial Crime and Money Laundering—
Prepared by the Monetary and Exchange Affairs and Policy Development and Review
Departments.
“Subrata Roy: Confident of swimming on swimming the troubled waters”, Amrita Nair
"Harshad Mehta: From Pied Piper of the markets to India's best-known scamster",
“SC upholds Harshad Mehta’s Conviction”, Times of India, 14th January, 2003
“SAT upholds SEBI order on Sahara to refund money", The Hindu Business Line, 18th
October 2011
"SC orders CBI probe into Saradha chit fund scam", Times of India, 10th May 2014
“CBI investigated 171 financial fraud cases worth Rs. 20000 crore in 2015”, DNA, 2nd
March, 2016
“Investor frauds: Vanishing cos, Ponzi schemes face Govt. probe”, The Indian Express,
“Beware of financial fraud on social media”, Economic Times, 21st March, 2016
WEB LINKS:
https://www.int-comp.org/careers/a-career-in-financial-crime-prevention/what-is-
financial-crime/
http://www.kaplegal.com/upload/pdf/Corporate_Crime_Fraud_and_Investigations.pdf
https://en.wikipedia.org/wiki/Cheque_fraud
http://www.chequeandcredit.co.uk/information-hub/faqs/cheque-fraud
prevent-it_6269261.html
http://business.mapsofindia.com/finance/credit-cards/credit-card-frauds.html#
http://www.experian.in/assets/Experian-launches-India-Fraud-Report-2016.pdf
https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=5861
http://incometaxparaskochar.com/Image/BANKING%20FRAUDS.pdf
http://www.investopedia.com/terms/c/corporate-fraud.asp#ixzz4KMHQkLQl
http://www.accounting-degree.org/scandals/
https://en.wikipedia.org/wiki/Internet_fraud
https://www.bankbazaar.com/tax/tax-evasion.html
https://www.indiafilings.com/learn/penalties-income-tax-evasion-india/
http://www.whistleblowingprotection.org/?q=node/32
http://qz.com/590563/yet-another-massive-ponzi-scheme-goes-pop-in-india/
http://qz.com/379877/the-satyam-scandal-how-indias-biggest-corporate-fraud-unfolded/
https://en.wikipedia.org/wiki/Satyam_scandal
https://en.wikipedia.org/wiki/Subrata_Roy
http://www.hindustantimes.com/india/sahara-scandal-4-year-chain-of-events-that-lead-
to-subrata-roy-s-arrest/story-gDfYTWadLXecqtkw08xNQJ.html
http://www.grantthornton.in/globalassets/1.-member-firms/india/assets/pdfs/financial-
and-corporate-frauds.pdf
https://www.iimb.ernet.in/research/sites/default/files/WP%20No.%20505.pdf
https://www.pwc.in/assets/pdfs/publications/2015/current-fraud-trends-in-the-financial-
sector.pdf
http://www.ey.com/Publication/vwLUAssets/ey-global-fraud-survey-2016/$FILE/ey-
global-fraud-survey-final.pdf
https://factly.in/cyber-crimes-in-india-which-state-tops-the-chart/
http://www2.deloitte.com/content/dam/Deloitte/in/Documents/finance/in-finance-
annual-fraud-survey-noexp.pdf
https://www.slideshare.net/mobile/donsquire/presentation-on-fraud-prevention-
detection-control
http://m.economictimes.com/wealth/save/5-financial-frauds-you-need-to-keep-an-eye-
on-before-you-hand-out-your-account-details/articleshow/47455030.cms
http://qz.com/590563/yet-another-massive-ponzi-scheme-goes-pop-in-india/
http://www.moneylife.in/article/financial-crimes-and-frauds-when-and-how-to-
approach-the-eow/48074.html
http://tejas.iimb.ac.in/interviews/11.php
FINANCIAL FRAUDS
I am a student from H.R. College of Commerce and Economics, who is conducting this
Your responses will be kept confidential. Thank you for participating in my survey!
Best Regards,
Kahini Mehta
Age:
o 20-30
o 30-40
o 40-50
o 50-60
o Yes
o No
o Bribery / Corruption
o Money Laundering
o Bank Fraud
o Corporate Espionage
o Data Theft
o Securities Fraud
o Yes
o No
o Procurement
o Inventory
o Finance/payment
o Admin
o HR
o Employees
o Business Associate
o Customers
o Vendors / Agents
o Whistle-blower
o Ethics Hotline
o IT Controls
o By Accident
o Other
o Yes
o No
o Yes
o No
o No
o Yes
o No