SlideShare a Scribd company logo
1 of 9
FRAUD – INSIDER THREAT
Ankit Manglik
SVP – RiskPro
www.Riskpro.in
AGENDA
 Fraud defined
 Insider Threat
 Causes/Factors Impacting Level of Fraud
 Case Study – Asset and Revenue Misstatement
WHAT IS FRAUD
As defined by Associate of Certified Fraud Examiners
In the broadest sense, fraud can encompass any crime for gain that uses
deception as its principal modus operandus. More specifically, fraud is
defined by Black’s Law Dictionary as
“A knowing misrepresentation of the truth or concealment of a material fact
to induce another to act to his or her detriment.1 “.
Consequently, fraud includes any intentional or deliberate act to deprive
another of property or money by guile, deception, or other unfair means.
THE INSIDER THREAT
In internal fraud scenarios :
 Employees exploit their familiarity with internal policies, procedures,
and technologies
 Inappropriate access to systems within the organization
 Even collaborate with external attackers. e.g.:
 Customer services fraud – Manipulation of internal systems to benefit friends, relatives and/or
external fraudsters
 Procurement fraud - An employee works with an outside vendor to defraud an employer
 Sensitive information abuse/leakage - Illegal extraction of the company’s sensitive information
(customer information, strategic future plans, etc.)
 Technical (IT/Network) fraud - Abuse of an insider’s system privileges to commit fraud
INSTANCES OF INSIDER FRAUD
 Employee embezzlement fraud
 Intellectual property infringement fraud
 Forex fraud
 Data theft
 Refund fraud
 Procurement fraud
 Recruitment fraud
 Payroll fraud
 Misappropriation of funds
 $7.2 billion trading loss, the largest in
history, was committed by a 31-year
old junior trader in the firm’s Paris
headquarters who had joined
SocGen in 2000. He was not a senior
trader (annual salary is reportedly
€100,000) as in some of the other
frauds. He moved to the trading floor
from the risk control group in 2006
 His role was to hedge exposures
using futures on European stock-
market indexes, including Euro Stoxx
50 ($50 billion daily volume),
Germany’s DAX Index and France’s
CAC-40
 By the end of December, the
positions were significantly in the
money, but became unprofitable
after the market turmoil occurred at
the beginning of 2008
 Risk control specialists first discovered
the suspicious trades when
investigating an outside trading
partner of the bank, whose account
showed unusually high finance
levels. The client, when asked by the
bank about the account’s finances,
denied knowing of it. The full extent
of the fraud was known within a day
or two
 The trader does not appear to have
profited from the fraudulent trades
and his motivations are unclear
 It has been reported that such
trading raised supervisory/risk
management suspicions in the past,
but that the trader had successfully
addressed any questions/suspicions
Source PwC
SOCGEN—A ROGUE TRADING INCIDENT
 SocGen missed 75 alerts between June 2006 and January
2007 on the activities of rogue trader Jerome Kerviel (JK)
 Risk control procedures were followed correctly, but
compliance officers rarely went beyond routine checks
and did not inform managers of anomalies, even when
large sums were concerned. “No initiative was taken to
check JK’s assertions and corrections he suggested, even
when they lacked plausibility. . . When the hierarchy was
alerted, they did not respond”
 The panel supported JK’s claim that he acted alone and
that he did not profit personally from the trades.
 The investigation found that JK started building up non-
authorized trading positions in 2005 and 2006 for small
amounts but the positions he took grew in size from March
2007 onwards
 By Christmas he was in profit by €1.4 billion but his
activities were discovered on January 8, fully identified
by January 18 and SocGen was forced to secretly
unwind the positions between January 21 and 23 in
falling markets, taking it to a €4.9 billion loss
 The red flags that should have alerted bosses to the
rogue trades included:
 A trade with a maturity date that fell on a Saturday
 Bets without identified counterparties
 Trades with counterparties within SocGen itself
 Trades that exceeded the limits of counterparties
 Missing broker names and large increases in broker fees
 There were also differences of up to €1.1 billion during
reconciliations of JK's trading books with SocGen's
online derivatives broker. The panel found seven false
emails sent by JK that attempted to explain his trading
and counterparties
According to the London Times, an independent report to SocGen’s Board includes the
following information:
Source PwC
SOCGEN—A ROGUE TRADING INCIDENT
Some of the conclusions derived from public sources include:
 Large speculative positions were concealed by equal and opposite fictitious trades, thus concealing
the MTM effect and market risk exposure.
 Unauthorized trades were possibly booked across a large number of either dormant or "dummy"
accounts thus were not necessarily monitored on a regular basis.
 The trader possibly entered into transactions with multiple large counterparties thus staying within limits
and possibly benefiting from cross-product netting for margin.
 Massive open positions would have been rolled-forward to avoid settlements.
 The trader may have used cancels and/or amendments on the fictitious trades to maintain the real
trades within limits.
 In anticipation of periodic reviews by Risk Control, the trader may have used book-entry transfers to
move the massive real positions between accounts.
 The trader most likely had access to both front and back systems through potential ID/password theft
and/or sharing or continued access from his previous role in Risk Control that should have been
terminated. Such access could have enabled manipulation of credit, market risk and trade-size
controls.
 Trader most likely did not take any vacation during this period and frequently worked late into the night
or on weekends.
 It remains possible, despite SocGen’s management’s declaration otherwise, that collusion with either
external or internal parties were involved. At a minimum, friendships established during years in risk
management were maintained and used to obtain information.
Source PwC
SOCGEN—A ROGUE TRADING INCIDENT
CAUSES/FACTORS IMPACTING LEVEL
OF FRAUD
 The absence of policies and procedures aimed at preventing and deterring
employees/vendors from committing fraud
 High growth rate in the information technology, coupled with an even higher attrition rate
 There is an absence of dedicated efforts/specialized skill sets to prevent/ detect fraud under
pressure situations. Inadequate infrastructure/processes for performing employee
background checks
 Misuse of the trust and responsibility obtained in an organization is another key cause for
committing frauds
 Pressure of expectations has been a determining factor for some of the employees in their
attitude towards fraud

More Related Content

What's hot

KYC Regulations - Mel Georgie Racela
KYC Regulations - Mel Georgie RacelaKYC Regulations - Mel Georgie Racela
KYC Regulations - Mel Georgie RacelaSWIFTAsiaPac
 
The 4th EU Anti-Money Laundering Directive and YOU!
The 4th EU Anti-Money Laundering Directive and YOU!The 4th EU Anti-Money Laundering Directive and YOU!
The 4th EU Anti-Money Laundering Directive and YOU!CDDS
 
Procurement Fraud
Procurement FraudProcurement Fraud
Procurement FraudGPTraining
 
Run your clients' aml profile
Run your clients' aml profileRun your clients' aml profile
Run your clients' aml profileCDDS
 
Identification and namecheck : Clarification - by CDDS
Identification and namecheck : Clarification - by CDDS Identification and namecheck : Clarification - by CDDS
Identification and namecheck : Clarification - by CDDS CDDS
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
In my honest Opinion: a frank look at client onboarding procedures
In my honest Opinion: a frank look at client onboarding proceduresIn my honest Opinion: a frank look at client onboarding procedures
In my honest Opinion: a frank look at client onboarding proceduresTHRONE Compliance Services Ltd
 
Fraud Report 2009 Presentation
Fraud Report 2009 PresentationFraud Report 2009 Presentation
Fraud Report 2009 Presentationandrewrmarshall
 
Fraud Report 2009 Presentation
Fraud Report 2009 PresentationFraud Report 2009 Presentation
Fraud Report 2009 Presentationkatytaylor100
 
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing IIR Middle East
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
StubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-researchJustin Saunders
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Resurgent India
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 

What's hot (19)

KYC Regulations - Mel Georgie Racela
KYC Regulations - Mel Georgie RacelaKYC Regulations - Mel Georgie Racela
KYC Regulations - Mel Georgie Racela
 
Risk based approach
Risk based approachRisk based approach
Risk based approach
 
The 4th EU Anti-Money Laundering Directive and YOU!
The 4th EU Anti-Money Laundering Directive and YOU!The 4th EU Anti-Money Laundering Directive and YOU!
The 4th EU Anti-Money Laundering Directive and YOU!
 
Procurement Fraud
Procurement FraudProcurement Fraud
Procurement Fraud
 
Run your clients' aml profile
Run your clients' aml profileRun your clients' aml profile
Run your clients' aml profile
 
Identification and namecheck : Clarification - by CDDS
Identification and namecheck : Clarification - by CDDS Identification and namecheck : Clarification - by CDDS
Identification and namecheck : Clarification - by CDDS
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
In my honest Opinion: a frank look at client onboarding procedures
In my honest Opinion: a frank look at client onboarding proceduresIn my honest Opinion: a frank look at client onboarding procedures
In my honest Opinion: a frank look at client onboarding procedures
 
Fraud Report 2009 Presentation
Fraud Report 2009 PresentationFraud Report 2009 Presentation
Fraud Report 2009 Presentation
 
Fraud Report 2009 Presentation
Fraud Report 2009 PresentationFraud Report 2009 Presentation
Fraud Report 2009 Presentation
 
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
StubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit Unions
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
AML Manual AltosEscondidos
AML Manual AltosEscondidosAML Manual AltosEscondidos
AML Manual AltosEscondidos
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 

Similar to Fraud – insider threat

Need for regulation in securities market
Need for regulation in securities marketNeed for regulation in securities market
Need for regulation in securities marketAnjiyaa
 
Homework guidePlease read the following note on fraud to broaden.docx
Homework guidePlease read the following note on fraud to broaden.docxHomework guidePlease read the following note on fraud to broaden.docx
Homework guidePlease read the following note on fraud to broaden.docxadampcarr67227
 
Preventing financial fraud
Preventing financial fraudPreventing financial fraud
Preventing financial fraudRishalHalid1
 
Preventing Financial Fraud UAE.pdf
Preventing Financial Fraud UAE.pdfPreventing Financial Fraud UAE.pdf
Preventing Financial Fraud UAE.pdfFiyona Nourin
 
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskThe CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskKyriba Corporation
 
HomeworkPlease read the following note on fraud to broaden your .docx
HomeworkPlease read the following note on fraud to broaden your .docxHomeworkPlease read the following note on fraud to broaden your .docx
HomeworkPlease read the following note on fraud to broaden your .docxadampcarr67227
 
Subject Forensic AccountngAs we move forward, and computer te.pdf
Subject  Forensic AccountngAs we move forward, and computer te.pdfSubject  Forensic AccountngAs we move forward, and computer te.pdf
Subject Forensic AccountngAs we move forward, and computer te.pdfakilastationarrymdu
 
181203 YCM-Invest 0./1/15 V.0364
181203  YCM-Invest 0./1/15 V.0364181203  YCM-Invest 0./1/15 V.0364
181203 YCM-Invest 0./1/15 V.0364Didier Essemini
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Pairat Srivilairit
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptxjaramulat
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfShwethaAcharya20
 

Similar to Fraud – insider threat (20)

Need for regulation in securities market
Need for regulation in securities marketNeed for regulation in securities market
Need for regulation in securities market
 
Homework guidePlease read the following note on fraud to broaden.docx
Homework guidePlease read the following note on fraud to broaden.docxHomework guidePlease read the following note on fraud to broaden.docx
Homework guidePlease read the following note on fraud to broaden.docx
 
Preventing financial fraud
Preventing financial fraudPreventing financial fraud
Preventing financial fraud
 
Risk Assessment1.ppt
Risk Assessment1.pptRisk Assessment1.ppt
Risk Assessment1.ppt
 
Preventing Financial Fraud UAE.pdf
Preventing Financial Fraud UAE.pdfPreventing Financial Fraud UAE.pdf
Preventing Financial Fraud UAE.pdf
 
Forensic Audit.pptx
Forensic Audit.pptxForensic Audit.pptx
Forensic Audit.pptx
 
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskThe CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
 
HomeworkPlease read the following note on fraud to broaden your .docx
HomeworkPlease read the following note on fraud to broaden your .docxHomeworkPlease read the following note on fraud to broaden your .docx
HomeworkPlease read the following note on fraud to broaden your .docx
 
Into to Fraud Examination
Into to Fraud ExaminationInto to Fraud Examination
Into to Fraud Examination
 
Auditing for Internal Fraud
Auditing for Internal FraudAuditing for Internal Fraud
Auditing for Internal Fraud
 
Subject Forensic AccountngAs we move forward, and computer te.pdf
Subject  Forensic AccountngAs we move forward, and computer te.pdfSubject  Forensic AccountngAs we move forward, and computer te.pdf
Subject Forensic AccountngAs we move forward, and computer te.pdf
 
181203 YCM-Invest 0./1/15 V.0364
181203  YCM-Invest 0./1/15 V.0364181203  YCM-Invest 0./1/15 V.0364
181203 YCM-Invest 0./1/15 V.0364
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
Summary presentation Highliths
Summary presentation HighlithsSummary presentation Highliths
Summary presentation Highliths
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptx
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
 

Recently uploaded

Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...CIToolkit
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramCIToolkit
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
Motivational theories an leadership skills
Motivational theories an leadership skillsMotivational theories an leadership skills
Motivational theories an leadership skillskristinalimarenko7
 
Management and managerial skills training manual.pdf
Management and managerial skills training manual.pdfManagement and managerial skills training manual.pdf
Management and managerial skills training manual.pdffillmonipdc
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Giuseppe De Simone
 
Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingGiuseppe De Simone
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionCIToolkit
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsCIToolkit
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 

Recently uploaded (20)

Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
Motivational theories an leadership skills
Motivational theories an leadership skillsMotivational theories an leadership skills
Motivational theories an leadership skills
 
Management and managerial skills training manual.pdf
Management and managerial skills training manual.pdfManagement and managerial skills training manual.pdf
Management and managerial skills training manual.pdf
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
 
Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful Thinking
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem Resolution
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 

Fraud – insider threat

  • 1. FRAUD – INSIDER THREAT Ankit Manglik SVP – RiskPro www.Riskpro.in
  • 2. AGENDA  Fraud defined  Insider Threat  Causes/Factors Impacting Level of Fraud  Case Study – Asset and Revenue Misstatement
  • 3. WHAT IS FRAUD As defined by Associate of Certified Fraud Examiners In the broadest sense, fraud can encompass any crime for gain that uses deception as its principal modus operandus. More specifically, fraud is defined by Black’s Law Dictionary as “A knowing misrepresentation of the truth or concealment of a material fact to induce another to act to his or her detriment.1 “. Consequently, fraud includes any intentional or deliberate act to deprive another of property or money by guile, deception, or other unfair means.
  • 4. THE INSIDER THREAT In internal fraud scenarios :  Employees exploit their familiarity with internal policies, procedures, and technologies  Inappropriate access to systems within the organization  Even collaborate with external attackers. e.g.:  Customer services fraud – Manipulation of internal systems to benefit friends, relatives and/or external fraudsters  Procurement fraud - An employee works with an outside vendor to defraud an employer  Sensitive information abuse/leakage - Illegal extraction of the company’s sensitive information (customer information, strategic future plans, etc.)  Technical (IT/Network) fraud - Abuse of an insider’s system privileges to commit fraud
  • 5. INSTANCES OF INSIDER FRAUD  Employee embezzlement fraud  Intellectual property infringement fraud  Forex fraud  Data theft  Refund fraud  Procurement fraud  Recruitment fraud  Payroll fraud  Misappropriation of funds
  • 6.  $7.2 billion trading loss, the largest in history, was committed by a 31-year old junior trader in the firm’s Paris headquarters who had joined SocGen in 2000. He was not a senior trader (annual salary is reportedly €100,000) as in some of the other frauds. He moved to the trading floor from the risk control group in 2006  His role was to hedge exposures using futures on European stock- market indexes, including Euro Stoxx 50 ($50 billion daily volume), Germany’s DAX Index and France’s CAC-40  By the end of December, the positions were significantly in the money, but became unprofitable after the market turmoil occurred at the beginning of 2008  Risk control specialists first discovered the suspicious trades when investigating an outside trading partner of the bank, whose account showed unusually high finance levels. The client, when asked by the bank about the account’s finances, denied knowing of it. The full extent of the fraud was known within a day or two  The trader does not appear to have profited from the fraudulent trades and his motivations are unclear  It has been reported that such trading raised supervisory/risk management suspicions in the past, but that the trader had successfully addressed any questions/suspicions Source PwC SOCGEN—A ROGUE TRADING INCIDENT
  • 7.  SocGen missed 75 alerts between June 2006 and January 2007 on the activities of rogue trader Jerome Kerviel (JK)  Risk control procedures were followed correctly, but compliance officers rarely went beyond routine checks and did not inform managers of anomalies, even when large sums were concerned. “No initiative was taken to check JK’s assertions and corrections he suggested, even when they lacked plausibility. . . When the hierarchy was alerted, they did not respond”  The panel supported JK’s claim that he acted alone and that he did not profit personally from the trades.  The investigation found that JK started building up non- authorized trading positions in 2005 and 2006 for small amounts but the positions he took grew in size from March 2007 onwards  By Christmas he was in profit by €1.4 billion but his activities were discovered on January 8, fully identified by January 18 and SocGen was forced to secretly unwind the positions between January 21 and 23 in falling markets, taking it to a €4.9 billion loss  The red flags that should have alerted bosses to the rogue trades included:  A trade with a maturity date that fell on a Saturday  Bets without identified counterparties  Trades with counterparties within SocGen itself  Trades that exceeded the limits of counterparties  Missing broker names and large increases in broker fees  There were also differences of up to €1.1 billion during reconciliations of JK's trading books with SocGen's online derivatives broker. The panel found seven false emails sent by JK that attempted to explain his trading and counterparties According to the London Times, an independent report to SocGen’s Board includes the following information: Source PwC SOCGEN—A ROGUE TRADING INCIDENT
  • 8. Some of the conclusions derived from public sources include:  Large speculative positions were concealed by equal and opposite fictitious trades, thus concealing the MTM effect and market risk exposure.  Unauthorized trades were possibly booked across a large number of either dormant or "dummy" accounts thus were not necessarily monitored on a regular basis.  The trader possibly entered into transactions with multiple large counterparties thus staying within limits and possibly benefiting from cross-product netting for margin.  Massive open positions would have been rolled-forward to avoid settlements.  The trader may have used cancels and/or amendments on the fictitious trades to maintain the real trades within limits.  In anticipation of periodic reviews by Risk Control, the trader may have used book-entry transfers to move the massive real positions between accounts.  The trader most likely had access to both front and back systems through potential ID/password theft and/or sharing or continued access from his previous role in Risk Control that should have been terminated. Such access could have enabled manipulation of credit, market risk and trade-size controls.  Trader most likely did not take any vacation during this period and frequently worked late into the night or on weekends.  It remains possible, despite SocGen’s management’s declaration otherwise, that collusion with either external or internal parties were involved. At a minimum, friendships established during years in risk management were maintained and used to obtain information. Source PwC SOCGEN—A ROGUE TRADING INCIDENT
  • 9. CAUSES/FACTORS IMPACTING LEVEL OF FRAUD  The absence of policies and procedures aimed at preventing and deterring employees/vendors from committing fraud  High growth rate in the information technology, coupled with an even higher attrition rate  There is an absence of dedicated efforts/specialized skill sets to prevent/ detect fraud under pressure situations. Inadequate infrastructure/processes for performing employee background checks  Misuse of the trust and responsibility obtained in an organization is another key cause for committing frauds  Pressure of expectations has been a determining factor for some of the employees in their attitude towards fraud

Editor's Notes

  1. 6
  2. 7