profiling the fraudster · © 2012 protiviti member firm (middle east) consultancy confidential:...
TRANSCRIPT
![Page 1: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/1.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Profiling The Fraudster
Simon PadgettDirectorForensic Services
Hong Kong. November, 2012
![Page 2: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/2.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Elements of Fraud
Misrepresentation
Intention
Prejudice or potential
prejudice
Legality
![Page 3: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/3.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
What is One + One ??
1 1 1
1 1 1
Total 2 1 0
=SUM(B1:B2) =SUM(C1:C2) =SUM(D1:D2)
Format “1” to
Text
Format “-1” without brackets
![Page 4: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/4.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
All is NOT what it seems
![Page 5: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/5.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
…who’s next?
![Page 6: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/6.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
"Enron Executives Face Subpoenas"
“Criminal charges filed against auditor”
“Thousands of Enron employees jobless”
“Enron Pensions vanish overnight”
“Enron executive found dead in car in
apparent suicide”
![Page 7: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/7.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
ENRON EXECS prepare
to testify before a
house panel
![Page 8: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/8.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
ROARING’ GOOD TIME:
Director Rebecca Mark arrives at
an Enron party in Harley style,
belying her corporate image.
![Page 9: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/9.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
THE HOUSTON STRIP CLUB
Treasures, where Enron executives would
ring up thousands of dollars on private
dances and expensive champagne.
![Page 10: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/10.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
THE HOUSTON STRIP CLUB
Treasures, where Enron executives would
ring up thousands of dollars on private
dances and expensive champagne.
Mercury Engineering Co. Ltd.
Founded in 1948
Family Owned
32 employees
20M turnover p.a.
Accountant (Phyllis Wiesner) hired by company founder in 1950
1999 Phyllis retires
![Page 11: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/11.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
![Page 12: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/12.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
![Page 13: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/13.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
www.theinformationcenter.com
Mobile Card Reader....
For Sale ....$49.00 +
($13.00 S&H)... Runs on
a 9 volt battery!..Holds up
to 700 card swipes in its
own memory! Palm size!
Software included!
![Page 14: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/14.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
![Page 15: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/15.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 16: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/16.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
THE FORGER’S TOOLS
SCALPEL
HYPODERMIC NEEDLE
PRESTIK
RAZOR/ CRAFT KNIFE
PERFORATION CUTTER
ACID /SOLVENT
HAIR SPRAY
PUTTY
BRAKE FLUID AND LEMON JUICE
SAND
JIK
‘CORECTOR BILLE’
CORRECTABLE RIBBONS
TRANSFERABLE LETTERS (‘LETRASET’)
COLOURED PENCILS
SELLOTAPE
INK ERASER (RUBBER)
MAGNIFYING GLASS OR MICROSCOPE
COLOUR PHOTOCOPIER
COMPUTER, SCANNER, IMAGE PROCESSING
SOFTWARE AND COLOUR PRINTER
CORRECTOR PAPER AND BURNISHER
DRY ICE
SUNTAN LOTION
![Page 17: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/17.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
CHEQUE FRAUD – SYNDICATE STYLE
![Page 18: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/18.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
Forgery...Calligraphy ??
![Page 19: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/19.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
![Page 20: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/20.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
![Page 21: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/21.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
Beverage Division $ 65 114 000
Gaming Division $ 19 038 000
Entertainment Division $ 8 125 000
Insurance & IR $ 13 210 000
$ 105 487 000
“There are lots of people in Chicago that have me pegged as one of these bloodthirsty
Monsters – the kind that puts out his victims eyes with a red-hot poker, and grins while
he’s doing it. I’m not the worst person in the world. I’m a businessman”.
Why is this man
smiling?
![Page 22: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/22.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.Ac
cou
ntin
![Page 23: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/23.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
E&Y Fraud Survey – Key Findings
In the last year :
2 in 3 had been defrauded
1 in 10 had more than 50 frauds
82% were committed by employees
Half of the employees had over 5 years service
A quarter had more than 10 years service
A third of the frauds were by management
![Page 24: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/24.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.23
The first face is one of systems or controls
The other face is the human element
The Two faces of fraud
![Page 25: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/25.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.24
COSO identifies 5 components, which when integrated and
operating in all business units, will help establish an effective
internal control framework:
1. Control Environment
2. Risk Assessment
3. Control activities
4. Information and Communication
5. Monitoring
COSO
![Page 26: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/26.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.25
Organizations first identify risks and prioritize them by assessing
the impact and likelihood of an inherent risk.
A key differentiator between Internal Controls and Anti Fraud
Controls is the Human Element inherent in the decision to
defraud. Failure to assess the Human Element can cause frauds
to happen in organizations that otherwise seem to have a robust
and comprehensive internal control framework.
So, why do people commit fraud?
Fraud Risk Assessment
![Page 27: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/27.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.26
One of the best theories on why people commit fraud was
given by Donald Cressey in his book “Other People’s Money”
Cressey stated that Fraud occurs when an individual :
• Has a non sharable financial problem.
• Perceives an opportunity to resolve the situation.
• Has the ability to rationalize his misdeeds even before
committing them.
Other People’s Money
![Page 28: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/28.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.27
An individual may be under pressure from a financial
problem which the individual perceives cannot be
solved through other means. These problems often
manifest themselves into behavioral patterns or red
flags, which if spotted in time, could prevent a fraud
from happening.
The ACFE 2012 Report to the Nations, states that
81% of fraudsters exhibit such indicators prior to
defrauding. The most commonly cited behavioral red
flags were perpetrators living beyond their apparent
means or experiencing financial difficulties.
Pressure
![Page 29: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/29.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.2
8
Even if an individual has the motive, he cannot
perpetrate the fraud unless presented with an
opportunity. Opportunities present themselves as
weaknesses or gaps in internal controls..
Opportunity
![Page 30: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/30.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.29
Rationalisation
Rationalisation of the act is the last element in
understanding why people commit fraud. Most people
believe themselves as good and need to convince
themselves that their actions were justified.
Some of these justifications are:
• I was going to pay it back
• Everybody does it
• I am not hurting anyone
• I was helping my family
• This is nothing compared to what xyz did.
![Page 31: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/31.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.30
To sum up, when this individual under pressure is presented with
an opportunity and is able to rationalize his planned actions,
fraud occurs. This hypothesis is better known as the
Fraud Triangle.
FRAUD
The Fraud Triangle
![Page 32: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/32.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.31
To be able to effectively analyse and prioritize fraud risks, organizations should evaluate
the Human Element in the fraud risk. This can be achieved by applying the principles of
the Fraud Triangle to the traditional risk assessment criteria of Impact and Likelihood.
Traditional Risk Assessment Criteria
Fraud Risk Assessment Criteria IMPACT OPPORTUNITY SITUATIONAL
PRESSURE ATTITUDE OR
PERSONAL
INTEGRITY
FRAUD RISK PRIORITY
IMPACT LIKELIHOOD INHERENT RISK
RATING
The Human Elements
Fraud Risk Assessment Process
Likelihood
![Page 33: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/33.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.32
For example in an organization where an individual
performs a number of key controls – if this
individual’s personal integrity and values are high,
the chances of fraud happening is significantly
lower than when the individual’s personal integrity
is low. Understanding the people who manage key
internal controls in an organization, their values
and attitude could go a long way in minimizing the
incidence of fraud and help build effective anti-
fraud deterrents within an organization.
Key Controls and Personal Integrity
![Page 34: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/34.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.33
It is important for organizations to consider the human element while
managing fraud risks. An Anti-Fraud Program that considers the human
element may include the following fundamental controls:
•Establish a Code of Ethics.
•Develop Fraud Policies.
• Invest in a communication and training program on fraud and
corporate fraud policies for all employees.
•Ensure proper segregation of duties for key activities and functions.
•Set up appropriate recruitment procedures , psychometric testing etc.
•Set up policies for rotation of staff duties and forced vacations.
•Know your key fraud risks and controls. Monitor them regularly.
•Develop a Fraud Risk Assessment process.
•Set up a whistle blower hotline.
Anti-Fraud Program
![Page 35: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/35.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.34
1. Edwin H. Sutherland, 1939
Theory of differential association
– Crime is not genetic
– Learned from intimate personal groups
– These groups teach "definitions" (including skills,
motivations, attitudes, and rationalizations) either favourable
or unfavourable to the violation of the law. Criminal
behaviour results when one is exposed to an excess of
definitions favourable to the violation of the law over
unfavourable definitions.
![Page 36: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/36.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.35
2. Harvey Cardwell
Wrote a book in 1960 on the logic and language of auditing for fraud.
Found there are primarily 3 principal factors that contribute to
employees beginning to steal:
– The want for money - (early or late in life and the temporary urgent need)
“Years of honest service” become meaningless when presented with time
pressure.
– Aggrieved – stealing after years of honest work apparently when hopes
have faded, when honesty & effort have failed to produce the expected
measure of success. Deterrents of prior years are weakened by extreme
frustration.
– The ability to steal – has been deterred by fear of detection but
experience brings increased ability & self-confidence
![Page 37: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/37.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.36
3. Gottfredson & Hirschi’s general theory of
crime - 1990
Assume that individuals choose the behavior that they
wish to perform rationally. They will weigh the
potential pleasure of performing a behavior against
the potential pain of the behavior. When a behavior is
judged to be more pleasurable than painful, an
individual is likely to perform the behavior.
Central to this decision is low self-control.
![Page 38: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/38.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.37
4. Richard C. Hollinger, 1983
Hollinger-Clark study (1983) - Surveyed 10,000 workers:
1/3 had committed some form of fraud.
Many stole because of job dissatisfaction.
Employee perception of detection is important.
Employee-thieves exhibit other deviances
– Sloppy work, sick leave abuses, etc.
Increased security & controls may hurt, not deter.
![Page 39: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/39.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.38
5. Donald R. Cressey, 1953
Other Peoples Money
A criminologist who studied embezzlers
Why people become “trust violators”
Developed the Fraud Triangle
Cressey’s three learning principles
1) Non-shareable financial problem.
2) Perception that occupational situation can resolve the
problem.
3) Ability to Rationalize the act(s).
![Page 40: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/40.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
THE FRAUD TRIANGLE
Pressure/Frustration(Heat)
Opportunity(Fuel)
Rationalisation(Oxygen)
Opportunity is what a company has the most power to control in order to limit fraud
Opportunity
Pressure
Rationalization
(heat)
(oxygen)(fuel)
The Fraud Triangle
![Page 41: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/41.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.40
Fraud Risk Model
Attitude/
rationalization
Opportunity
Incentive/
pressure
High Risk
Medium
Risk
“…the auditor cannot assume that the absence one or two of these conditions means there is no risk…
“ The investigator should not assume that all 3 conditions must be evident before concluding that fraud risk is evident.
![Page 42: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/42.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.41
6. The triangle extended: the fraud diamond - Wolfe &
Hermanson - 2004Pressure
capability
opportunity
rationalisation
Position/function
The Human brain
Confidence/ego
Cultural issues
Coercion skills
Effective lying
Immunity to stress
![Page 43: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/43.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.42
The three parts of perceived
opportunity……
1. To commit fraud
2. To conceal fraud
3. To avoid punishment
Constant focus on
all three is,
psychologically,
very hard work.
![Page 44: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/44.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.4
3
pressure/rationalisation
capability
identify opportunity act
upon it;
will I be
caught?No
commit
fraud
Yes
don’t
do it
maybe
caught not
punisheddo it
![Page 45: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/45.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.44
Iceberg Theory of Dishonesty
Overt Aspects
- Hierarchy
- Financial resources
- Goals of the organisation
- Skills and abilities of
personnel
- Technological state
- Performances stds
- Efficiency measurements
Covert Aspects
- Attitudes
- Feelings (fear, anger, etc)
- Values
- Norms
- Interaction
- Supportiveness
- Satisfaction
Structural
Considerations
Behaviourial
Considerations
Waterline
![Page 46: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/46.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.45
Characteristics of a Fraudster
College educated, white Male. ¾ of frauds are committed by
men. Higher median loss (US$85,000 for men, US$ 48,000 for
women).
Intelligent. The challenge of “secure systems” overcomes
boredom.
Egotistical. Feel worth more than their position.
Inquisitive. Curious as to computer vulnerability.
Risk takers. Not afraid to fail. Fails to consider consequences.
Rule breakers. Likes shortcuts. Justifies infractions of laws.
![Page 47: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/47.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.46
Characteristics of a Fraudster, continued
Hard Workers. In early, out late, no vacations.
Excessive overtime
Immune from stress.
Financial pressure. Medical fees, bad marriage,
gambling.
Married.
Management.
Disgruntled. Feels abused, not promoted, underpaid.
Big Spender. Living beyond means.
![Page 48: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/48.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.47
Characteristics of a Fraudster, continued
Sudden large purchases
Close relationships with suppliers/customers.
Don’t like people reviewing work
Unable to relax
Often display drastic behavioral changes
Need turns to greed.
Nick Brignola – Louisiana State University.
“Fraud Perpetrator Profile”
![Page 49: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/49.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
HOW DID KUBLAI KHAN AND HIS MONGOLS BREAK THROUGH THE IMPENETRABLE GREAT WALL OF CHINA?
HE BRIBED THE GATEKEEPER!
![Page 50: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/50.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.49
Changes in Behaviour
Sudden large purchases. House, Car, Jewellery
Brags about purchases
Carry large amounts of cash
Fending off creditors
Borrows money from co-workers
Moody, Irritable
Defensive attitude to questioning
Territorial over responsibilities
![Page 51: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/51.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.50
Changes in Behaviour, continued
Workaholic
Mentions financial/family problems
Exhibits signs of addiction. Absenteeism, looks ill
Decrease in productivity
Spending excessive time with vendors/suppliers
Nervous
“Minor” infringements
![Page 52: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/52.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.51
Characteristics of a Victim Organisation
Most costly abuses in organizations of less than 100 employees.
Where fraud is not perceived a risk
Management ignore irregularities
Morale is low
High employee turnover
Lack of training
Rapid increase in revenues and profits
Strong, egotistical leader
Profit is the ultimate goal, to be reached no matter what
Salary structure tied to profit
![Page 53: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/53.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.52
ACFE Report to the Nations on
Occupational Fraud and Abuse -
2012
The latest report was compiled from 1,388 cases and covered
cases from almost 100 countries on 6 continents.
ACFE Report to the Nations on
Occupational Fraud and Abuse -
Asia Pacific Edition - 2010
![Page 54: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/54.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.53
Victims of Occupational FraudThe Asia-Pacific Report provides some information on the types of
businesses that were victims of occupational frauds. The highs and
lows are as follows:
% of
cases
Median
loss
High Banking
and
finance
20.2% US$
200,000
Low Religious,
Charitable
0.6% Education US$
513,000
![Page 55: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/55.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.54
Profiling by Fraudster Position in Organisation This is explained on the basis that more senior people in management
levels and executive positions have a greater opportunity to commit and
hide larger frauds. This is a common theme throughout the remainder of
the profiles.
The study also found that lower level employees committed more frauds in
number than executives - probably because there are many more lower
level employees that executives.
Employee Management Owner/Executive
33.8% 49.8% 16.4%
$200,000 $242,000 $1,000,000
![Page 56: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/56.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.55
Profiling by Job Description in Organisation
% of cases Median loss
HighsSales
Accounting
20%
17.1%
US$143,000
US$190,000
Lows Internal Audit 0.3% $14,000
The greatest number of cases are committed by people within
sales and the accounting areas of the business, as these
employees will have the knowledge of how to commit and hide
the fraud and access to the records to do so.
![Page 57: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/57.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.56
Profiling by Fraudster Gender
The % of males committing fraud is much higher in the Asia
Pacific region than worldwide. Perhaps more males in the
workplace ?
Male Female
Percentage 84.3% 15.7%
Median Loss US$300,000 US$215,000
![Page 58: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/58.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.57
Profiling by Fraudster Age
Under
2626 to 30 31 to 40 41 to 50 51 to 60 over 60
% 5.0% 11.7% 39.4% 32.5% 10.7% 0.7%
Median losses increase with the age of employees.
![Page 59: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/59.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.58
Profiling by Educational Standard
High SchoolSome College
EducationCollege Education Post Graduate
Percentage 18.9%% 10.6%% 50.0% 20.5%
Median Loss $250,000 $145,000 $234,000 $333,000
Smarter people - smarter frauds?
![Page 60: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/60.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.59
Past Criminal History in Asia Pacific Region
About 85% of people caught and convicted of
occupational fraud had not previously been
charged or convicted of a crime, and over 83%
have never been terminated from a job. This
means that background checks may be of limited
value when trying to find people who might commit
fraud.
![Page 61: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/61.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.60
The Invisible Fraudster
The Internet ………….Cybercrime
The Anonymous fraudster
![Page 62: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/62.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 63: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/63.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
“With Banc of Africa you can be totally (TOTALLY) sure
that under NO circumstances, under NO conditions
whatsoever will your deposits be touched and/or
bothered at all!
Provided, understandably, that the source of your
deposits will be legally earned (something that we would
largely consider so, otherwise we would not normally
accept to be deposited), then NO ONE WHATSOEVER can
learn, bother, touch, inquire, alter, exchange, transfer,
verify or anything else without your absolutely verifiable
acceptance! Never! “
Bank of Africa - Disclaimer
![Page 64: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/64.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 65: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/65.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 66: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/66.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 67: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/67.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 68: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/68.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Note site name
Note email address
![Page 69: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/69.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Note email warning
Note address
Who are you dealing with?????
![Page 70: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/70.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 71: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/71.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Genuine Passport??
![Page 72: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/72.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 73: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/73.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
![Page 74: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/74.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
FRAUD AND AML…
![Page 75: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/75.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.74
![Page 76: Profiling The Fraudster · © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed](https://reader033.vdocuments.net/reader033/viewer/2022050607/5fae1a25f01da10f516e66d4/html5/thumbnails/76.jpg)
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.75