Fraud Magazine - January + February, 2024
Fraud Magazine - January + February, 2024
Fraud Magazine - January + February, 2024
See P. 14
FROM THE PRESIDENT CONNECT WITH US
FM
TO FIGHT FRAUD
O
FM
ne important distinction of the Associa-
tion of Certified Fraud Examiners (ACFE) Download the Fraud
from other associations is the diversity of Magazine app for
our professional base. Most members of accounting iPhone or Android.
organizations, of course, are accountants. Internal audi-
tors have a group dedicated just to them. Bar associations
are comprised of attorneys. Physicians fill the rosters of
medical associations. Like the ACFE on
But ACFE members don’t have a single occupation Facebook for the latest
that unites us. We work in dozens of different profes- news, photos, videos and
sions, including accounting, consulting, law enforce- exclusive online content.
ment, cybersecurity, and banking and law, to name a
few. What does bind us together is the single ideology of
detecting and preventing fraudsters from taking advan-
tage of honest, hard-working people in more than 160 Follow @TheACFE
countries from Asia to the Americas to Europe. on Twitter and keep
I’ve been an enthusiastic fraud fighter for over 30 informed on break-
years, starting as a young lawyer working consumer ing news and industry
trends.
fraud cases until now as the president of the ACFE. And part of my passion centers around that
basic sense of fairness, which for me comes from my upbringing.
My parents grew up in small towns in southern Arkansas and had few advantages. They
couldn’t afford college, so they both started working for the largest employer in the area — a Make connections with
paper mill, where they earned a living for over 40 years before retiring. Their salaries were modest, fellow fraud fighters in
and they earned every cent they made. They were a wonderful example of doing things the right the ACFE Community at
way. You work hard and you earn what you make. You follow the rules because that’s the right Connect.ACFE.com.
thing to do.
We come in every day and work hard for what we earn. How dare someone try to “skip the line”
and get the rewards without doing the work to get them! That makes me mad. Talking with mem-
bers, I hear that sentiment echoed. View stories and photos
A good fraud examiner is someone who believes it’s wrong to ignore the rules and steal. Nor on Instagram and never
is it right when someone enriches themself at the expense of other employees who are following miss exclusive Fraud
Magazine content.
the rules and thinking of others. I’m so proud to meet and talk with like-minded souls online and
at events all over the world.
Fighting fraud is everyone’s responsibility, and I thank all of you, our members, for rising to
the challenge. Thank you also for finding and rooting out those people who try to grab the rewards CONTRIBUTE
without putting in the hard work. That passion for fairness and justice is the glue that binds us and
makes us stronger — regardless of our professional titles. I’m proud we’re part of the solution and Share your expertise
not the problem. n FM and earn up to 10 CPE
credits annually for your
published work. Visit
Fraud-Magazine.com/
John D. Gill, J.D., CFE, is president of the ACFE. Contact him at [email protected]. getpublished.
COVER STORY
Fraud for sale
By Rihonna Scoggins
14
For many, the dark web conjures up images
of poorly lit rooms where lone fraudsters
scam victims behind the veil of encrypted
messaging. But the reality is more akin
to an open marketplace, like an Amazon
for criminals — where they sell multiple
fraud products and focus on branding,
marketing and the bottom line. That may
be frightening, but it also presents an
14 FRAUD FOR SALE opportunity for law enforcement.
FEATURES
44 ENCRYPTED EMAILS
unspent transaction outputs Jennifer K. Gray, MAcc, CFE; Dunia Haddad, CFE; Robert
Holtfreter, Ph.D., CFE; Sezer Bozkus Kahyaoglu, CFE; Thomas
By Sean Tweed, CFE, CCAS, CCI 8 Cheney Lawson, CFE, CII; Philip C. Levi, CFE, CPA, FCA; Larry
Marks, CFE, CISA, PMP, CISSP, CSTE; Kevin Roach, CFE, MBA;
Elizabeth Rossen, CFE; Daniel Semick, MPA, CFE, CGFM; Iryna
Shkraba, CFE, ACCA, CIA; Sheryl L. Szeinbach, Ph.D., CFE;
GLOBAL FRAUD FOOTPRINT
Stéphane Vuille, CFE, PCI; Jessica Yohe, CFE, CPA
Balancing the benefits and 2023-2024 Board of Regents
risks of member-owned credit John D. Gill, J.D., CFE; Jeanette LeVie, CFE;
cooperatives Thomas A. Caulfield, CFE; Wendy Evans, CFE;
By Jennifer Liebman, CFE 68 Fraud Examiner,” “CFE Exam Prep Course,” “Fraud Magazine,” “Association of
Certified Fraud Examiners,” “Report to the Nations,” the ACFE Seal, the ACFE
Logo and related trademarks, names and logos are the property of the As-
CPE QUIZ 70
68 RASHA KASSEM, PH.D., CFE sociation of Certified Fraud Examiners, Inc., and are registered and/or used in
the U.S. and countries around the world.
SHIPPING FRAUD
The U.S. Department of Justice
charged a 21-year-old University of
Miami student with mail fraud for
running a scheme that bilked a mul-
tinational shipping, receiving and
supply chain management company
out of $3.5 million.
According to prosecutors,
Continuous monitoring
Easy integration with data sources
Pre-built, automated tasks
Data visualizations and dashboards
I
n late 2021, India’s Enforcement informal sector that helps to enhance their
Directorate, a law enforcement agency COLUMNIST bargaining power, and their ability to ad-
focused on economic crimes, arrested DURGESH PANDEY, vocate for better working conditions and
two people in connection to a scam at the PH.D., CFE, FCA social protections. As the Kenyan economy
Navjeevan Credit Co-operative Society that MANAGING PARTNER AT reopened in 2022 following the COVID-19
diverted funds out of the financial institu- DKMS & ASSOCIATES pandemic, Saccos experienced renewed
tion and into the pockets of its chairman growth, with a 4% annual increase in as-
COLUMNIST
and relatives. sets driven by gross loans. (See Figure 1 on
COLLINS WANDERI,
The chairman and his accomplices page 11.)
MBA, CFE, PGD (HRM)
had allegedly opened 200 branches of the CHAIR OF THE LSK SACCO There are two sides to the Sacco coin,
credit cooperative, luring depositors with SUPERVISORY COMMITTEE however. These cooperatives have inherent
promises of unrealistic returns on their vulnerabilities, including credit, liquidity
investment. The perpetrators then diverted and operational risks. In this context, it’s
depositors’ money to entities controlled (See “Sacco fraud: Nine arrested after
essential to recognize the significance of
by them. Board members were also later NIS Sacco loses Sh160 million,” by Esther
Saccos in promoting economic develop-
accused of taking interest-free advances Nyambura, The Standard, Sept. 25, 2023,
ment and financial inclusion in Kenya,
from the Navjeevan Credit Co-operative tinyurl.com/mr44mxvz and “Vet staff,
while also addressing the vulnerabilities
Society, one of several such institutions Kinoti warns banks, saccos over rising
that a cooperative model faces in the digi-
set up to help facilitate financial transac- fraud cases,” by Augustine Sang, Nation,
tal era — and where fraud fighters can lend
tions in the local community. (See “2 ar- Aug. 19, 2018, tinyurl.com/42sf2z9j.)
their skills and expertise to help shore up
rested in Navjeevan Credit Co-operative The credit cooperatives in the cases
Saccos’ defenses.
Society scam case,” The Statesman, Dec. above have become an important part
12, 2021, tinyurl.com/2eht85dt; “Navjeevan of the informal sectors in developing Bridging the inclusion gap
society scam: SOG arrests 2,” by The countries. But they’re also vulnerable to A cooperative’s main goal is to benefit
Times of India, May 24, 2023, tinyurl. fraud. In Kenya, for example, a significant the local communities where it operates.
com/36epx29d; and “Credit Cooperative proportion of the workforce operates in Since co-ops are nonprofit organizations,
Society,” by Dinesh Mishra, Legal Service India the largely unmonitored informal sector, the bulk of their revenue is used to meet
E-Journal, tinyurl.com/5da37ysa.) which often lacks the social security ben- the social, economic and cultural require-
And similar stories are playing out efits provided to formal-sector employees, ments of the community. As a result, the
in other parts of the world. Take Kenya, such as health and disability insurance and entire community benefits when a co-op
where nine employees of the National retirement benefits. Formal financial insti- succeeds. A successful and efficient coop-
Intelligence Services Sacco, a type of credit tutions, such as banks, only provide finan- erative model can, among other benefits,
cooperative, were arrested after Sh160 cial services to a small number of people, offer employment, investment opportuni-
million (over $1 million USD) allegedly particularly in rural areas. ties, collective growth and even income
disappeared. The arrested included the This is where savings and credit equality. India’s Amul Cooperative is a
Sacco’s internal auditor, loans manager, cooperative societies (Saccos as they are prime example of the success that can be
an accountant, two system analysts and an called in Kenya) enter the picture. Saccos, achieved through a cooperative model.
NIS officer. In 2018, the director of crimi- which are member-owned, play a vital Owned by members who are mainly small-
nal investigations (DCI) in Kenya, George role by bridging the gap and providing an scale dairy farmers, Amul was established
Kinoti, warned banks and mobile service inclusive measure of financial security with the aim of providing a sustainable
providers about the risk of fraud at the to individuals in the informal sector who source of income for them in the Gujarat
hands of their own employees, including may need access to formal financial insti- region of India. Like a Sacco, Amul is also a
an alleged case of theft against Harambee tutions. They also serve as a platform for member-owned cooperative that achieves
Sacco Limited as an example of the threat. collective action among workers in the economies of scale and is a testament to
S
uzie Johnson recently received a • Write down whom you spoke with and
mailed bill that said she had to COLUMNIST when. You may need to contact the
ROBERT HOLTFRETER,
start paying back her COVID-19 lender again.
PH.D., CFE
Economic Injury Disaster Loan (EIDL). DISTINGUISHED PROFES- • Know that the lender may require a
Suzie was befuddled because she knew SOR OF ACCOUNTING
copy of your FTC identity theft report
AND RESEARCH
nothing about the EIDL program and and other documents. Here’s a sample
never applied for one of its loans. She letter that can help you get started:
talked to her federal representative, and Save a copy of your report because
tinyurl.com/3mrfd9dp.
he advised her to contact the Small Busi- you’ll need to submit it to the SBA.
(See “What to do if you’re billed for
ness Administration (SBA) agency to • Follow the personal recovery plan to an SBA EIDL or PPP loan you don’t owe,”
report the problem, which told her that stop further misuse of your PII and by Rosario Méndez, FTC, Sept. 26, 2023,
someone had stolen her identity and help repair the damage the identity tinyurl.com/ym4jn9me.)
used it to apply for the loan. SBA then theft caused.
canceled the fraudulent loan, and Suzie’s Step 2. Visit the SBA’s website at Fraudsters target unpatched
problem was resolved. This fictitious sba.gov/idtheft. NetScaler Gateways to steal
case is representative of the recent SBA • Follow the steps to report the identity users’ credentials
EIDL and PPP loan scam. theft to the SBA, which is required to Here’s a warning to all organizations
If you’ve received a bill for an SBA start the review process. that offer customers all-in-one apps.
Paycheck Protection Program (PPP) Step 3. If the identity theft involved (Think of apps for your bank or airline
a PPP loan and you know the private on your phone.) Fraudsters are continu-
or EIDL loan you never applied for, an
ing to attack a crucial “9.8 vulnerability”
identity thief probably has stolen your lender that issued the loan, also contact
in unpatched “NetScaler Gateways,”
personally identifiable information that lender.
according to an SC Media article. The
(PII) to get the government loan in your • Explain that an identity thief used
NetScaler Gateway system appliance,
name. your PII to get the PPP loan without
sold to organizations, allows customers
Here’s what to do to report the scam your knowledge or authorization. Tell
to access any app via the cloud from any
and initiate the SBA review process to them the loan is fraudulent. device through a single URL, according
help you resolve any credit problems: • Ask the lender to release you from the to Citrix Systems, Inc. It consolidates
Step 1. Report the identity theft to the loan and to take all the steps needed “remote access infrastructure” to pro-
Federal Trade Commission (FTC) at to remove information about the loan vide customers a single sign-on across
IdentityTheft.gov. from your credit files and to send you all applications whether in a data center,
• You’ll receive an FTC identity theft a letter explaining the actions it’s in the cloud or if the apps are delivered
report and a personal recovery plan. taken. as SaaS (software as a service), which
CONTINUED ON PAGE 71
By Rihonna Scoggins
Crypto Dark Web And Cyber Underground: intelligence, FaaS can now provide tools “The foremost issue is the pervasive
Podcast Ep. 74,” Chainalysis, Sept. 19, 2023, to fraudsters who in the past lacked any anonymity maintained by users through
tinyurl.com/2phrc4cr.) computer know-how at all, a trend that tools like Tor, making it exceptionally
some are calling the “democratization of difficult to trace and identify individuals
Fraud as a commodity fraud.” (See “Ambitious Cybercriminals involved in illicit activities,” says Bhatia.
are Going Big with FaaS: Fraud as a Ser- “Encrypted communications further ex-
The dark web has long been a haven for
vice,” Chargeback Gurus, June 16, 2021, acerbate this problem, as intercepting
illicit activities, from drug trafficking to
tinyurl.com/35z9jz9s and “What is the de- and deciphering messages becomes an
illegal arms dealing. However, in recent
mocratization of fraud?” Security Boule- intricate task ... Investigating dark-web
years there’s been a noticeable shift in mar-
vard, Aug. 10, 2023, tinyurl.com/bdykcc4k.) platforms with advanced infrastructure
kets. While narcotics and weapons still
For Certified Fraud Examiners (CFEs), demands a high level of technical profi-
have their place, a new breed of cybercrime
this evolution presents both challenges
— Fraud-as-a-Service (FaaS) — is rapidly ciency and poses a range of formidable
and opportunities. On one hand, the ac-
gaining ground. FaaS represents a bur- challenges.”
cessibility of FaaS means a broader range
geoning sector within the dark web, where
of individuals can engage in sophisticated
cyber criminals offer ready-made tools and The commercialization of fraud
fraud without needing advanced technical
services to facilitate various fraudulent ac- skills. On the other hand, the standard- In the past, fraud was often considered the
tivities. Much like legitimate Software-as- ized nature of these services can offer work of lone wolves or small groups oper-
a-Service (SaaS) models, FaaS provides cus- patterns and vulnerabilities that, when ating in the shadows. However, the land-
tomers with easy access to resources such recognized, can aid in detection and pre- scape has dramatically changed. Today,
as phishing kits, credit card cloning soft- vention of fraud. As FaaS continues to fraud has become a highly commercialized
ware and ransomware deployment tools, grow, it’s imperative for fraud examiners industry, complete with customer service,
often accompanied by customer support to stay abreast of these services, adapting marketing strategies and even subscrip-
a d regular
and l updates.
d t Th The rise
i off F
FaaSS on the
th th investigative techniques
their h to the
h ever- t
tion models.
dels.
d k web
dark b underscores
d the
h commercializa-
l evolving
l llandscape
d of cyberfraud.
b d. Th business-like operations of dark-
The
t
tion of cybercrime, with fraud now being g “Investigating
g g dark-web platforms web b marketplaces
rketplaces have led to a level of
packagedg and sold as standardized ser-- that
h employ l advanced
d d infrastructure pres-- p onalism among fraudsters that
professionalism
vices.
ces And d combined
co b ed with t newe technolo-
tec o o- ents severall daunting
d technical
h l challeng-
h ll - p
parallels s legitimate industries. There’s
g
gies, suchh as artificiall es,” Ritesh h Bhatia,
h CFE, cybercrime
b and
d h
a hierarchychy and specialization within
f
forensics investigator and d founder
d off h
these llicit organizations, with roles
illicit
V
V4WEB Cybersecurity,
y y tells F
Fraud
aud r
ranging from developers and hackers to
Magazine.
i e. c
customer er service representatives, each
a
aimed d att maximizing the efficiency and
profitability
ility of their fraudulent endeav-
o And
ors. d like any job market, there are
p
postingsgs for a wide range of positions
for cyber
b r criminals seeking individuals
The business-like operations of with difffferent
erent skill sets. (See “Exploring
nerds in their day-to-day The surge in illicit transactions on the dark web hasn’t gone
unnoticed by global authorities. In response, nations are bolster-
lives, but on the dark web, ing their domestic law enforcement capabilities to counteract
these cyber threats. A prime example is the FBI, which has refined
this secret digital world, its tactics to pierce the veil of anonymity that the dark web offers.
One of its notable strategies involves infiltrating the Tor network
they are living lives as by setting up nodes through which web traffic is directed. This
allows the FBI to unveil the identities and locations of certain
kingpins and crime lords concealed Tor-based sites. (See “The Truth About The Dark Web,”
by Aditi Kumar and Eric Rosenbach, International Monetary
and, in some cases, the Fund, September 2019, tinyurl.com/4mta7pcf and “The Dark Web
masterminds of vast Browser: What Is Tor, Is It Safe, and How to Use It,” by Deepan
Ghimiray, Avast, Aug. 4, 2022, tinyurl.com/34antn4p.)
networks of child abuse A landmark moment in this battle against dark-web crimi-
nality was the FBI’s dismantling of “Silk Road,” one of the first
and terrible things like that.” dark-web marketplaces, and its short-lived successor “Silk Road
2.0.” This notorious marketplace became a hub for thousands of
ANDY GREENBERG illegal vendors, peddling vast quantities of illicit drugs and other
prohibited goods to clientele exceeding 100,000. The platform not
The illusion of anonymity only facilitated these transactions but also played a pivotal role in
laundering vast sums, with sales exceeding 9.5 million in bitcoin
and its impact
— equivalent to roughly $1.2 billion at that time. (See “The FBI’s
Behind the cloak of the Tor browser and what was thought to be Plan For The Millions Worth Of Bitcoins Seized From Silk Road,”
untraceable cryptocurrency transactions, dark-web sellers have by Kashmir Hill, Forbes, Oct. 4, 2013, tinyurl.com/2ab7st5e.)
been emboldened to engage in audacious acts of cyberfraud with Filings in 2014 during the trial of Silk Road’s founder Ross Ul-
apparent impunity. The psychology behind this brazenness is bricht, who worked under the pseudonym “Dread Pirate Roberts,”
rooted in the dissociation between actions and consequences. The revealed that the FBI located the platform’s server by playing with
digital realm provides a buffer, distancing perpetrators from their the website’s login page. The agency found its internet protocol
victims and the repercussions of their actions. This detachment (IP) address and the server’s location by typing in “miscellaneous”
often desensitizes them to the moral and ethical implications of characters, according to a Wired magazine report. Ulbricht argued
their deeds, enabling them to rationalize their criminal activities that the FBI had used illegal means, suggesting the National
as merely exploiting the system. Security Agency helped law enforcement. (See “The FBI Finally
“They are people who live double lives,” Andy Greenberg, a Says How It ‘Legally’ Pinpointed Silk Road’s Server,” by Andy
Wired reporter who covers cybercrime, told Fraud Magazine last Greenberg, Wired, Sept. 5, 2014, tinyurl.com/2hxkws3m.)
year. “They are unassuming nerds in their day-to-day lives, but While the FBI and other law enforcement officials have
on the dark web, this secret digital world, they are living lives as been reluctant to reveal all the investigative techniques
kingpins and crime lords and, in some cases, the masterminds they have used in such cases, some old-fashioned
of vast networks of child abuse and terrible things like that.” policing and human error
(See “Sleuths on the cyber trail,” by Paul Kilby, Fraud Magazine, were certainly involved.
March/April 2023, tinyurl.com/4yad3b8m.) For instance, in
Yet this illusion of anonymity is a double-edged sword. On the case of
one hand, it facilitates a thriving marketplace for illegal activities,
from selling stolen financial data to
offering hacking services. On
Silk Road 2.0, which emerged after Ul- German police dismantled Russian dark- enforcement. Where do you aim when the
bricht’s arrest, it was an undercover net site,” by Joe Tidy, BBC, April 6, 2022, rats have scattered?
agent who helped uncover the fraud. tinyurl.com/3s5rk2zf.) Maimon analyzes the reconstruction
Once the FBI found the server, they no- And yet, much like the Greek myth of of market networks that displace dark-web
ticed emails were sent to a particular Hydra — the nine-headed water serpent platforms taken down by law enforcement.
Gmail account. The FBI then subpoenaed whose one decapitated head became two And his “findings reveal a highly inter-
Google for the user’s account and found — while law enforcement struck down the connected ecosystem created by vendors’
it was registered to Blake Benthall, who dark-web marketplace of the same name, mobility across digital marketplaces, with
was later convicted for running the site. new ones are likely to emerge or take its nearly all markets being directly or indi-
(See “Silk Road 2.0 Agent Within: How place. After all, there are many such sites, rectly linked,” he tells Fraud Magazine.
The FBI Infiltrated Illegal Drug Website whose administrators are all too happy “Importantly, these network char-
and Shut it Down,” by Alistair Charl- to wel- come Hy- acteristics remain robust even in the af-
ton, International Business Times, Nov. termath of a law enforcement operation,
7, 2014, tinyurl.com/8vnnc9yw; “Key as prior vendor flows can predict sub-
Player in ‘Silk Road 2.0’ Sentenced to sequent vendor movement following
Eight Years in Prison,” United States interdiction.”
Attorney’s Office, June 3, 2016, The need to Even so, law enforcement has
tinyurl.com/y8pc89wc; and had considerable success in tak-
“How the FBI busted Silk Road navigate data privacy ing down these dark-web mar-
2.0 before it even launched,” ketplaces. Following Silk Road
by Kevin Collier, daily dot,
laws and address the 2.0’s demise, two major dark
web marketplaces, AlphaBay
updated May 30, 2021,
tinyurl.com/ycxyz8y5.)
challenge of securing and Hansa, rose to promi-
It’s a similar story with evidence without nence but met a similar fate
in 2017, further underscoring
Hydra, whose downfall
began with a simple tipoff compromising privacy the relentless pursuit of law
enforcement agencies. (See
suggesting its infrastructure
might be located in Germany. further complicates “Justice Department Takes
German authorities, with in- Down AlphaBay ‘Dark Web’
sights from U.S. officials monitor- investigations. Marketplace,” by Tim Ryan, Court-
ing darknet activities, embarked on house News Service, July 20, 2017,
tinyurl.com/3rfcurwn.)
a meticulous investigation starting in
mid-2021. After several months, they pin-
pointed a “bulletproof hosting” company dra’s cus- Tracing cryptocurrencies
in Germany that was hosting Hydra. Such tomer base. A quick Google search That success came in no small measure
measu e
companies are known for their reluctance reveals all sorts of dark-web market- from a group of law enforcement offi-
to cooperate with police requests and for places that specialize in a whole range cials, academics and technologists, who
not auditing the content they host. [See of illicit products and services. (See “The in recent years busted the myth that h
“BulletProof (DMCA ignored) hosting,” unseemly world of Darkweb marketplac- bitcoin was untraceable and showed,
showe in
Hostings.info, tinyurl.com/3rmcp5j2.] es,” by Ryan Francis, CSO, Jan. 17, 2017, fact, that bitcoin movements could
coul be
Armed with this evidence, German inves- tinyurl.com/2fhc7cxa.) The power vacuum traced across the internet. The allure of
o
tigators secured permission from a judge that existed after Hydra’s fall facilitated the cryptocurrencies for dark-web opera-
oper
to approach the server company and is- promotion of low-lying criminals eager tors largely stemmed from their
sue a takedown notice. Prior to Hydra’s to take advantage of the lack of a central- perceived anonymity and untrace-
closing, several other dark-web sites had ized market. While criminals compete to ability. However, this veil of ano-
closed down either voluntarily or because be the next “big thing,” they also benefit nymity is not as impenetrable as it
of police investigations. (See “Hydra: How from the overextended purview of law may seem. As blockchain technology
VISIT
FRAUDCONFERENCE.COM
TO REGISTER
REGISTER EARLY AND SAVE
26-27 FEBRUARY 2024 | ABU DHABI
n the 1990s, a Belgian fragrance manufacturer called Bellure substance.” The Dutch courts regarded the Lancôme fragrance
began producing replica fragrances of several perfumes as a copyrighted work under the law. (See “Perfume makers are
made by French cosmetic giant L’Oreal. The idea was to sell fighting back against an illegal fake scent boom,” by Carly Page,
fragrances that smelled like some of L’Oreal’s top brands Wired.co.uk, Nov. 23, 2020, tinyurl.com/msfy9x8y.)
to consumers who lacked the funds to buy the more luxurious And in 2020, Gucci and other luxury perfumers won a copy-
French names. Bellure marketed the perfumes in supermarkets right infringement case against Spanish company Equivalenza
and discount stores. The company even said they were imitations using results from gas chromatography analysis. Equivalenza
of L’Oreal perfumes and used similar packaging. was found guilty of illegal copying of original perfume, unfair
Unsurprisingly this didn’t sit well with L’Oreal. After all, competition and business reputation abuse for peddling Gucci
while Bellure was upfront about what it was doing, its actions knock-off fragrances. (See tinyurl.com/msfy9x8y.)
virtually replicated what the FBI describes as indicators of coun- Despite those legal victories, copyright protection for fra-
terfeits, such as using similar packaging to the authentic product
grances remains a bit of a gray area and has been dealt with on
and selling it at markedly lower prices at discount stores. In 2003,
a case-by-case and country-by-country basis. Indeed, fragrance
L’Oreal sued Bellure over trademark infringement and won the
manufacturers’ battles to protect their products underscore the
case in the European Court of Justice on the basis that Bellure had
complications of distinguishing between legitimate knockoffs
been “free riding” on L’Oreal’s prestigious trademark. That deci-
and outright fakes. (See “Inside the Complex World of Fragrance
sion was upheld by a U.K. court, though the judge expressed the
Dupes,” by Emily Jensen, allure, March 1, 2023, tinyurl.com/mr3f-
view that “countries with a healthy attitude to competition law
nthe; “Lost and Found: Intellectual Property of the Fragrance
such as the U.S., would not keep a perfectly lawful product off the
Industry; From Trade Secret to Trade Dress,” by Charles Cronin,
market by the use of trademark law to suppress truthful advertis-
NYU Journal of Intellectual Property & Entertainment Law, Feb.
ing.” (See “Perfume makers are fighting back against an illegal
2, 2016, tinyurl.com/5bepdz58; and “Perfume as an Artistic Ex-
fake scent boom,” Wired, Nov. 23, 2020, tinyurl.com/4rns37vp;
“Counterfeit Cosmetics, Fragrances Hazardous to Your Health,” pression: Scope of Intellectual Property Rights in Perfume,” by
FBI, Jan. 2, 2014, tinyurl.com/3dvhvvmx; and “L’Oreal’s Success Yashika Nagpal, Fashion & Law Journal, Oct. 3, 2021, tinyurl.
in Extending Protection for European Community Trademarks is com/bdejnn8z.)
Reluctantly Acknowledged by English Court,” by Hamish Porter, Against that backdrop, fraudsters see opportunities galore
Venable LLP, July 2010, tinyurl.com/36pt43ub.) in what is now a multibillion-dollar industry, sometimes with
L’Oreal’s success in protecting its brand from fakes contin- potentially lethal results. Counterfeit perfumes are regularly be-
ued. Its Lancôme subsidiary successfully proved in 2008 that ing seized at airports across the globe, with authorities warning
Dutch-based Kecofa had infringed on one of its fragrances by that they may even contain poisons or carcinogens. (See “Fears
using gas chromatography, a chemical method that separates fake designer perfume could contain cyanide and human urine,”
substances into individual components. The results showed that by Tom Sanders, Metro, Dec. 16, 2022, tinyurl.com/5n7a3t9y and
the Kecofa smell-alike product used 24 of 26 ingredients found in “Arrest made as fake cosmetics, perfumes seized in Hong Kong,”
the Lancôme fragrance, and therefore was classified as a “fixed by Phil Taylor, Securing Industry, tinyurl.com/46tnm4j6.)
What’s really in that perfume bottle? “notes” (classes of fragrant elements) that contribute to the
overall essence of the scent. Top notes contribute to the initial
Besides herbs, spices, florals and citrus elements used in fra-
scent upon opening a perfume or cologne bottle and linger for
grances, non-fragrance companies produce perfume and cos-
about 15 seconds. Middle notes are the secondary fragrances that
metic ingredients, especially base chemicals (oils and alcohols)
begin to dominate after the top notes dissipate. Bottom notes are
called “feedstocks” and common chemical “intermediaries.” For
scents that dominate after the middle notes have settled down
example, pulp and paper mills may provide chemical byproducts
and last from four to six hours. (See “Fragrance Buying Guide,”
called turpenoids that are used in fragrances, while petrochemi-
Costco.com, tinyurl.com/2bvh2xcw.)
cal companies might generate small quantities of phenylethanol
Why are fragrance notes important? A telltale signal of a
for use in perfumes as well. (See “The Chemistry of Fragrances:
counterfeit fragrance is how quickly the initial scent dissipates
From Perfumer to Consumer,” compiled by David H. Pybus and
without any follow-on trace because the bogus perfume lacks
Charles S. Sell, Royal Society of Chemistry Paperbacks, 1999,
the essential middle and bottom notes characteristic of legiti-
tinyurl.com/mrxmfwzz.)
mate fragrances.
People purchasing counterfeit fragrances and cosmetics
just to save money are gambling with their health and well-
being. Counterfeit health and beauty products often include Are ‘smell-alike’ fragrances illegal?
dangerous chemicals that cause acne, eczema and cancer when Companies that develop less expensive knock-off fragrances
absorbed through the skin. Bacteria, lead, beryllium, DEHP rely heavily on consumers’ familiarity with a reputable brand.
(a suspected human carcinogen), antifreeze — and urine — They claim that they offer an almost identical product, albeit
are other identified contaminants. (See “Fake Cosmetics and without the costly packaging, advertising and marketing. As the
Their Health Risks,” New York Department of State, dos.ny.gov, introductory cases showed, large perfume houses have struggled
tinyurl.com/dhu7enhw.) to protect their creations from knockoffs. The U.S. legal system
and trust. Fragrance then serves as a medium through which Soberon-Ferrer, The Journal of Consumer Affairs, March 4, 2005,
we create meaningful interactions and establish lasting impres- tinyurl.com/ybep4yx3.) That’s not to say a young, educated person
sions — something bogus fragrances consistently fail to achieve. who has a temporary lapse in cognitive discernment couldn’t fall
(See “The Counterfeit Self: The Deceptive Costs of Faking It,” by victim to a scent scam.
Francesca Gino, Michael I. Norton, and Dan Ariely, Association These bogus products make their way from global distri-
of Psychological Science, 2010, tinyurl.com/bdwczb44.) bution networks into independent discount retail locations,
The experience of wearing fake products leads to a feeling flea markets, online websites — even from street corners and
of being inauthentic, known as the counterfeit self, which plays a the trunks of cars. While appearing as petty counterfeiting, the
role in how counterfeit products affect unethical behavior due to revenue from the wholesale global distribution of counterfeit
the priming effect. Wearing counterfeit versions of high-end fra- goods often helps fund other criminal enterprises such as illegal
grances fools people into believing they possess the social status drugs, human trafficking and terrorism financing.
and wealth associated with the authentic scent. The research also No one is immune from falling victim to counterfeit scams.
reveals that people can’t accurately predict the impact counterfeit The Fraud Susceptibility Index helps explain how people fall for
products have on their ethicality, which further highlights the counterfeit products. The index uses three variables that help
deceptive nature of their costs. (See tinyurl.com/bdwczb44). determine if someone is susceptible to being conned: Paradox of
value (a person is attracted to an item with low utility value but
Consumer vulnerability high emotional value), information asymmetry (the seller knows
more about the product than the buyer), and direct/indirect dif-
Consumer susceptibility to types of fraud varies with differ-
fusion (a high likelihood of the rapid spread of “a good deal” by
ent demographics. Consumer fraud targets the elderly, the
word of mouth). (See “Fraudulent facets: shining a light through
less educated and the poor because of lower levels of cogni-
diamond fraud,” by Donn LeVie Jr., CFE, Fraud Magazine, May/
tive ability and social interaction. (See “Consumer Vulnerabil-
June 2018, tinyurl.com/4d247s6k.)
ity to Fraud: Influencing Factors,” by Jinkook Lee and Horacio
Major perfumers fight back Phony scents are never a ‘good deal’
LVMH, which owns Louis Vuitton, Christian Dior, Fendi, and
What motivates individuals to buy counterfeit fragrances, cosmet-
Givenchy brands, aggressively pursues fragrance counterfeit-
ics or any other fake product? No doubt most people believe the
ers with 60 lawyers and an annual budget of $17 million. The
company developed its own in-house blockchain tool called Aura benefits of counterfeits are greater than any potential costs and
that harnesses the power of Ethereum blockchain technology thus make a rational choice. However, it’s also possible that in
and seamlessly integrates with Microsoft’s Azure services. (See their zeal for a deal, people ignore or underestimate the negative
tinyurl.com/msfy9x8y.) and potentially harmful consequences of embracing counterfeit
For analyzing complex perfume mixtures, nuclear magnetic perfumes, fragrances and cosmetics.
resonance spectroscopy (NMR) can distinguish individual com- Counterfeiters, like all consumer con artists, bank on the
ponents in a single analysis. Since 2018, NMR technology has emotional, financial and/or cognitive vulnerabilities that plague
helped companies differentiate between authentic and coun-
many people. Their well-crafted tales can catch many off guard,
terfeit perfumes. (See “NMR provides effective discrimination
as our natural instinct is to trust others while giving way to un-
of counterfeit perfumes,” Bruker.com, tinyurl.com/4vtns3az.)
checked emotions, beliefs and gullibility. Our brains are wired
to be drawn to captivating stories, and these smooth-talking
Proactive product protection measures scammers skillfully create narratives that tap into deep desires
Pursuing copyright and trademark infringement of fragrances
and aspirations. It can be too tempting for some people to want
and perfumes is costly as an after-the-fact approach for luxury
a “discounted” designer or celebrity perfume, while paying little
consumer companies today. Many are now embracing edgy tech-
nology applications to protect their intellectual property and heed to the dangers to their physical health and emotional well-
products. being. ■ FM
Cosmetics company Mixer uses radio Frequency Identifica-
tion tags (RFID) technology to obtain digital information from a Donn LeVie Jr., CFE, is a staff writer for Fraud Magazine and
product and distinguish it based on its distinct digital identifier,
has presented and served as a career strategist at ACFE Global
which is stored in an embedded RFID tag within the product.
Fraud Conferences since 2012. Now retired, though speak-
Unlike barcodes that rely on images, RFID uses radio waves to
ing at ACFE conferences occasionally, he has led people and
connect with microchips. This advanced system lets brands ef-
fortlessly keep tabs on their products at every step of the supply programs for Fortune 100 companies, the U.S. federal govern-
chain, with detailed data and improved inventory control. (See ment, and academia for more than 30 years prior to his becom-
“Helping Mixer to digitalize the cosmetics market with RFID ing a leadership influence strategist, award-winning author
technology,” Checkpointsystems.com, tinyurl.com/3wnw4xfz.) and speaker. Contact him at [email protected].
O
n July 31, 2023, Riad Sal- estate and illegally amass a fortune. family, and his associates in appar-
ameh retired from a 30-year Interpol has issued “red notices” for ent contravention of Lebanese law,
tenure as the governor of him — requests to law enforcement Salameh contributed to Lebanon’s
Banque du Liban (BdL), the central worldwide to locate and provisionally endemic corruption and perpetuated
bank of Lebanon. Instead of a retire- arrest him. Also, at least seven Euro- the perception that elites in Lebanon
ment party and a flattering press pean authorities, including French need not abide by the same rules that
release detailing his time at BdL, 16 and German prosecutors, have cre- apply to all Lebanese people,” said
days later, Wassim Mansouri, Salam- ated arrest notices for him. Under Secretary of the U.S. Treasury
eh’s successor, froze Salameh’s bank Lebanese authorities confiscat- for Terrorism and Financial Intelli-
accounts after the U.S., Britain and ed his Lebanese and French passports gence Brian E. Nelson in August of
Canada had imposed sanctions on in May 2023 to prevent Salameh from last year.
him for “contributing to the break- fleeing Lebanon, but as of publica- (See “The world’s worst central
down of the rule of law in Lebanon” tion his whereabouts were reportedly banker retires,” The Economist, July
following decades of alleged corrup- unknown. (See “Judiciary confiscates 31, 2023, tinyurl.com/yvc92eum;
tion. The international coalition con- passports of Lebanon’s central bank “Lebanon Freezes Accounts of For-
tends that several close to Salameh chief after French arrest warrant,”
mer Central Bank Governor,” by Liz
helped him funnel $330 million in by Bassem Mroue, Associated Press,
Alderman, The New York Times, Aug.
funds from BdL through shell May 24, 2023, tinyurl.com/3wpe9zyh
16, 2023, tinyurl.com/26v7abev; and
companies to invest and “Did Salameh leave Lebanon?
“Joining Partners, U.S. Treasury Sanc-
in European His agent: ‘If you know, tell me,’”
tion Former Central Bank Governor
real Farah Mansour, Al-Modn, Sept. 23,
of Lebanon and Co-conspirators in
2023, tinyurl.com/bdkpjb3s.)
International Corruption Scheme,”
“By using his position
U.S. Department of the Treasury, Aug.
to enrich him-
10, 2023, tinyurl.com/343f9xs5.)
self, his
Collapsing Lebanese economy creditors and that hid the true nature of the
The World Bank said Lebanon has endured one risks involved. (See “Lebanon Public Finance
of the “top 3 worst economic and financial crises Review: Ponzi Finance?” World Bank Group,
since the mid-nineteenth century.” That marks a July 2022, tinyurl.com/459e833n and “In Leba-
sad decline for a country that was once touted as non, a renowned central bank governor faces
the Switzerland of the Middle East. Even during attack,” by Tom Arnold, Reuters, Nov. 15, 2019,
the 2008 global financial crisis, Lebanon drew tinyurl.com/4uz3rr8h.)
media attention for being an oasis of stability Salameh’s appointment in 1993 was unprec-
amid the global economic turmoil. And Sal- edented because unlike previous central bank
ameh took much of the credit for the country’s governors, he came from the world of finance.
economic resiliency, earning him the nickname Salameh had been an investment banker with
“the magician.” However, since 2019, Lebanon’s Merrill Lynch who’d managed the portfolio of
economy has collapsed, which resulted in the Rafic Hariri — Lebanon’s first post-civil world
Lebanese pound (lira or LBP), once pegged at prime minister and, at the time, one of the rich-
1,500 to the U.S. dollar since 1997, losing 98% est individuals in Lebanon. (See “‘The magician’:
of its value and plummeting to the current Riad Salameh and the plundering of Lebanon,”
90,000 to the dollar trade value. Annual infla- by Raya Jalabi, The Financial Times, Aug. 19,
tion has soared over 100%, averaging 171.2% 2023, tinyurl.com/4tw9u7wn.)
in 2022, and gross domestic product has con- Hariri tasked Salameh with stabilizing the
tracted by 39.9%. (See “The world’s worst central lira to attract foreign inflows from neighboring
banker retires,” The Economist, July 31, 2023, countries and Lebanese migrants abroad, which
tinyurl.com/5cjnhtfp.) was key to Hariri’s reconstruction strategy. In
Lebanon’s economic collapse has shone a 1997, the lira was formally fixed to the U.S. dollar
spotlight on how BdL, and the policies spear- (USD), so the USD became the dominant cur-
headed by Salameh, were engineered to fun- rency for bank deposits, while the lira was used
nel millions for illicit gains under the banner for public expenditure. A constant inflow of
of economic reform. [See “Lebanon Economic the USD was required to pay interest on public
Monitor: Lebanon Sinking (To the Top 3),” World debt, maintain the peg and cover the cost of
Bank Group, Spring 2021, tinyurl.com/3a4tt77b; subsidies on imports, such as fuel. This would’ve
“Explainer: Lebanon’s financial meltdown and helped create a sense of stability in post-civil war
how it happened,” by Edmund Blair, Reuters, Lebanon. However, various impediments would
June 17, 2021, tinyurl.com/3dx38ue9; “Leba- remain unresolved, including an inadequate tax
non: Normalization of Crisis is No Road to Sta- regime, inefficient public expenditures and an
bilization” World Bank Group, May 16, 2023, excessive dependency on imports, which all lead
tinyurl.com/mrx8a3p9; “Lebanon ‘immune’ to a current account deficit and a subsequently
to financial crisis,” by Natalia Antelava, BBC overvalued lira. (See “The Origin of the Crisis
News, Dec. 5, 2008, tinyurl.com/272udc38; in the Lebanese Banking Sector,” by Alain Bi-
and “Lebanon is experiencing a tourism fani, Hoover Institution, Stanford University,
boom,” by The Economist, Aug. 24, 2023, 2021, tinyurl.com/yszks92w.) This mandate
tinyurl.com/bdjphw2x.] for a constant flow of the USD to support the
currency peg was strained by regional politi-
‘Financial engineered’ cal instability in 2011, particularly the Syrian
Ponzi scheme conflict, and tumbling oil prices in 2014, which
Indeed, experts have frequently described reduced foreign currency inflows.
the country’s financial system, designed in In an attempt to staunch the outflows of
part by Salameh, as a type of Ponzi scheme vital foreign currency reserves, bolster market
that depended on fresh money to pay existing confidence and in turn maintain the currency
TAX FRAUD
ETHICS
CORRUPTION
CYBERCRIME
FRAUDBRIBERY
CORPORATE GOVERNANCE
VENDOR AUDITS
MONEY LAUNDERING
AUDIT DATA ANALYSIS
ACFE.com/Corporate | [email protected]
financial products, including purchases or sales of financial almost imme-
instruments, such as certificates of deposit between BdL and diately trans-
commercial banks. In turn, Forry reportedly earned a broker’s ferred to an HSBC
fee of up to 0.375% of the value of each transaction. (See “What account under Raja
we know so far about Riad Salameh’s Swiss money laundering Salameh’s name, and of
probe,” by Lynn Sheikh Moussa, Beirut Today, April 15, 2021, that amount, $207 million
tinyurl.com/mrxhnptk and “Revealed: How investigators say Riad was transferred to five dif-
Salameh conducted central bank embezzlement operation,” by ferent Lebanese banks under his
Nada Maucourant Atallah, The National, tinyurl.com/bdhar2as.) name and titled “private expenses,”
According to a Financial Times article citing a Lebanese according to the Swiss authorities. The
judge’s summary note and other sources, the brokerage contract embezzled funds were disguised through a
was never shown to council members at the BdL, though Sal- complex layering process where the funds were
ameh has maintained that Forry had a legitimate contract with transferred through multiple bank accounts, offshore
the central bank. The same article cites Salameh saying that he companies and trusts in Switzerland, Panama, the U.S. and the
handled transactions to Forry himself through a subordinate. U.K. and linked to real estate acquisitions in Paris, New York and
Commissions from several banks reportedly went to a clearing Germany. [See “Forry Associates: How Lebanon’s Central Bank
account opened at BdL, and then they were routed to Forry’s Governor Embezzled Public Funds,” by Ali Noureddine, Fanack.
HSBC account in Switzerland, of which Raja was the beneficial com, Feb. 13, 2023, tinyurl.com/muvk3vht; “À l’attentiondes au-
owner. BdL contracted with one Lebanese bank to pay 3/8 of torités compétentes de la République du Liban Par l’intermédiaire
1% commission on the purchase of certificates of deposits, but du Département Fédéral de Justice et Police (DFJP),” Nov. 27,
the contract made no mention of Forry, and senior executives at 2020, tinyurl.com/5tfkwm23; and “Lebanon’s Offshore Gover-
local banks said that they’d never heard of the brokerage firm nor,” by Hazem Ameen and Alia Ibrahim (Daraj.com) and Tom
until Swiss authorities opened an investigation into the matter, Stocks, Riad Kobaissi and Rana Sabbagh (OCCRP), Aug. 11, 2020,
according to a Reuters report. (See “‘The magician’: Riad Salameh tinyurl.com/2bpdm5hu.]
and the plundering of Lebanon,” by Raya Jalabi, The Financial European investigators are also looking into multiple fam-
Times, Aug. 19, 2023, tinyurl.com/4d2hzxrf and “Contracts show ily members and close associates who they allege assisted Sal-
Lebanon’s central bank obscured recipients of commissions,” ameh in his scheme to defraud the BdL. Chief among them is
by Samia Nakhoul and Timour Azhari, Reuters, Feb. 20, 2022, Marianne Hoayek, a former assistant to Salameh at the BdL;
tinyurl.com/455dsudn.) Marwan Kheireddine, chairman of Lebanon’s Al-Mawarid Bank
Forry hit trouble in 2015, around the same time Salameh (AM Bank) and the former minister of state between 2011 and
was implementing his financial-engineering plans, when HSBC 2013; and Anna Kosakova, Salameh’s romantic partner for over
Switzerland detected irregularities. When HSBC demanded a copy two decades, who’s also accused of money laundering. Kosakova
of the brokerage contract, Raja provided a version with marked owned and managed several European real-estate management
discrepancies from the BdL original, including Forry’s address firms that purchased office space in Paris, part of which was
and the replacement of Kevin Walter’s signature with Raja’s. rented to the BdL. (See “France names Mother of Salameh’s daugh-
The bank refused to process those transfers and shuttered the ter as suspect in Central bank probe,” Ya Libnan, Dec. 6, 2022,
account; Raja dissolved Forry in 2016 because of a “drop in the tinyurl.com/muucf7y6.)
pace of work in 2015,” according to an article in The National. Hoayek is being investigated for money laundering after
(See “Revealed: How investigators say Riad Salameh conducted receiving funds from Forry in 2008 and 2013. She began working
central bank embezzlement operation,” by Nada Maucourant at BdL in 2003 as an intern and progressed to senior executive
Atallah, The National, Feb. 1, 2023, tinyurl.com/53uz5663.) Ju- adviser in 2020. (See “Riad Salameh’s assistant faces European
dicial investigators have been unable to identify or locate Kevin investigators in Beirut,” by Nada Maucourant Atallah and Jamie
Walter, a broker license or a list of clients. Prentis, The National News, April 27, 2023, tinyurl.com/bdhvx67v;
Forry’s HSBC account received around $326 million via 310 “French prosecutors name bank chairman a suspect in Lebanese
transactions between April 2002 and October 2014, from BdL central bank probe,” by Layli Foroudi, David Gauthier-Villars and
and were marked as “commissions” or “fees,” according to the Timour Azhari, Reuters, April 8, 2023, tinyurl.com/vmck6stf;
Swiss authorities. Much of that money, about $248 million, was and “French Prosecutors Name Ukrainian Suspect in Lebanese
Central Bank Probe,” by David Gauthier- 2015, to Sept. 9, 2019, to six Lebanese • A&M identified no records confirm-
Villars, Reuters, U.S. News, Dec. 5, 2022, banks including AM Bank and one ing that a service was performed to
tinyurl.com/yeybmyn9.) HSBC Private Bank (Suisse) SA. Based justify some of the commission pay-
Kheireddine is accused of allowing on BdL’s records, A&M was unable ments. BdL at the time had provided
Salameh to process fund transfers through to confirm whether a service was no further documentation or explana-
AM Bank. Bank statements showed Sal- actually performed to justify commis- tion for the book entries and transfers
ameh’s accounts at AM Bank ballooning sion payment. (See pages 96 and 97 of in and out of the consulting account.
from $15 million in 1993 to more than $150 audit.) (See page 24 of the audit.)
million by 2019, according to Reuters. (See • A&M found eight credits booked to
“French prosecutors name bank chairman the consulting account totaling $92.97 Will justice be served?
a suspect in Lebanese central bank probe,” million between Jan. 31, 2015, and Several steps have been taken internation-
by Layli Foroundi, David Gauthier-Villars Dec. 31, 2020. BdL created two credits ally to provide some restitution. In 2022,
and Timour Azhari, Reuters, April 8, 2023, totaling $35.9 million when it carried the European Union Agency for Criminal
tinyurl.com/3eeae3ca and “Former French out financial-engineering transac- Justice Cooperation (Eurojust) announced
central bank governor investigated over the seizure of $130 million in assets linked
tions with Optimum Invest SAL, a
Riad Salameh ‘embezzlement’ scandal,” by to Salameh’s wealth, including bank ac-
Lebanese brokerage firm established
Nada Maucourant Atallah, The National, counts and real estate in Germany and
in 2004 with which the central bank
July 27, 2023, tinyurl.com/2aybkmuw.) France valued at 44 million euros. An-
signed a nonexclusive contract. This
was “explicitly to create commissions other 36.5 million British pounds in real
Audit reveals wrongdoing to be paid to third parties,” accord- estate assets tied to the Salameh family
Late last year, an audit by consulting firm were seized in the U.K. at the request of
ing to the audit. (See page 99 of audit
Alvarez & Marsal (A&M) allegedly revealed the French judiciary, while European au-
and “Broker used by Riad Salameh’s
more evidence of corruption and poor thorities also froze bank accounts in Lux-
Lebanon central bank accused of
management at BdL between Jan. 1, 2015, embourg and France worth 13.3 million
‘extravagant’ irregularities,” by Nada
and Dec. 31, 2020. The 330-page audit goes euros. (See “France, Germany and Lux-
Maucourant Atallah, The National,
into great detail about the BdL’s financial- embourg seize assets of Lebanon’s central
Sept. 6, 2023, tinyurl.com/y8uhp3ya.)
engineering operations and the commis- bank chief,” France 24, March 29, 2022,
BdL also sold treasury bills to Optium
sions funneled through what A&M calls tinyurl.com/y4xjd3dw; “European inves-
and repurchased them at a higher
a “consulting account.” Below are some tigators arrive in Beirut for corruption
price, whereby the additional premi-
of its findings. (See “Preliminary Forensic probe,” by Raya Jalabi, The Financial Times,
um was transferred from another BdL
Audit Report Banque du Liban,” Alvarez & Jan. 16, 2023, tinyurl.com/2fhzuj3y; and
account and credited to the consulting
Marsal Middle East Limited, Aug. 7, 2023, “More than £36m in UK property seized in
account.
tinyurl.com/y6zmrext.) Riad Salameh money laundering probe,” by
• Three credits totaling $43.45 million
• A&M highlights an account in the Nada Maucourant Atallah, The National,
records of the BdL titled “consulting” comprised commissions charged to
July 27, 2023, tinyurl.com/4b45yw5w.)
whose International Bank Account banks “to credit a credit balance that
In addition to the coordinated U.K.,
Number, or IBAN, is referenced as a could be used to offset the costs of
U.S. and Canada sanctions on Salameh,
source of payments to Forry, and con- financial engineering,” according to
Raja and their associates, the U.K. govern-
tains 27 debit and eight credit entries. the audit. (See page 103 of audit.)
ment utilized for the first time the Global
A&M says that the account holders or • Three credits accounted for $13.6 Anti-Corruption Sanctions regime against
the ultimate beneficiaries of this ac- million from another BdL account as individuals involved in corruption in Leba-
count are unavailable as BdL removed payment transfers received from AM non. (See “UK, US and Canada sanction
the beneficiaries’ name fields, citing Bank. (See page 103 of audit.) Lebanon’s former Central Bank Governor
banking secrecy laws. (See pages 94 • The BdL’s central council partly ap- Riad Salameh and close associates,” GOV.
and 95 of audit.) proved the credits, but the central UK, Foreign, Commonwealth & Develop-
• The 27 debit entries totaling $111.3 bank governor set their amounts and ment and Lord Ahmad of Wimbledon,
million were made from April 22, destinations. (See page 105 of audit.) Aug. 10, 2023, tinyurl.com/2wf7jffb
sight, corruption and excessive bureaucra- “Lebanon’s interim central bank chief vows Fadi Makdessi is a KYC analyst at Credit
cy — supplemented by a political system not to lend money to government, calls for Suisse, part of the UBS group, in North
that requires power to be shared among economic reform,” Yalibnan, Aug. 25, 2023, Carolina. Contact him at
Lebanon’s diverse religious factions — al- tinyurl.com/3p7p4bsz.) [email protected].
lowed Salameh to override BdL’s indepen- For years, Lebanon will bear the
dence as a central banking authority and burden of an unprecedented economic Rayan Mohamed, CFE, is a KYC assistant
its internal controls, and fully control its depression caused in great part by corrup- vice president at Credit Suisse, part of the
public function to misappropriate pub- tion, unchecked authority and illusionary UBS group, in North Carolina. Contact him
lic funds for his illicit enrichment. (See public oversight. FM■ at [email protected].
T
he new textile startup company, FabricFibre, worked with This article summarizes the methodology and outcomes of the
several third parties to produce their clothing lines. Its research and analysis.
internal auditors stressed to the executives that it should
conduct extensive “third-party due diligence” (TPDD) to verify Most control functions are TPDD
the transparency and reliability of the external companies. So, A 2019 Gartner study says that 60% of worldwide organizations
FabricFibre thoroughly investigated via open sources (paid and each work with more than 1,000 suppliers on average — a number
unpaid) its more than 100 suppliers’ corporate chains, profit- that will grow as business ecosystems continue to expand and
ability, reputations, viability and other criteria. become more complex. [See “Third Party Risk Management
The company, guided by savvy leaders, determined that the (TPRM),” Gartner, tinyurl.com/3prj5kjz.] However, according to
prospective suppliers employed email encryption services (EES), the Gartner study, more than 80% of the legal and compliance
which many upright organizations use to foster anonymity and leaders that participated said they identified third-party risk after
security in communications. However, criminal groups can also initial onboarding “suggesting traditional due diligence methods
in risk management policy fail to capture new and evolving risks.”
use EES to conceal their illicit activities and obstruct investiga-
Gartner’s study says that 73% of the effort of control functions
tions. And they can link their primary email addresses to EES
is dedicated to TPDD activities and recertification of counterpar-
services to avoid detection. FabricFibre delved deeper and found
ties, and 27% of the effort is devoted to identifying risks during
that two of its suppliers had some suspicious roots. The company
relationships. (Investopedia says a counterparty is simply the
gave those firms a wide berth, and probably saved itself a lot of
other side of a trade — a buyer is the counterparty to a seller. See
money and grief.
tinyurl.com/ms8cucww.)
EES primary emails could be red flags Improve your TPDD process
This fictitious story reflects a real concern as reputable organi- Organizations now extensively rely on TPDD for investigating
zations conduct TPDD and discover the possible EES red flags and verifying information about third parties — individuals or
among its suppliers. organizations who interact, for various reasons, with their ecosys-
Third parties can be primary sources of value, but they also tems — to prevent risks resulting from professional relationships
can be risky areas for organizations. The steady evolution of and transactions. (Third parties aren’t subjects already included
technology has led to a necessary evolution of the TPDD process. in corporate ecosystems, such as employees and members of
We conducted research to determine if potential suppliers’ use boards of directors.)
of EES, and their EES emails as their primary contacts, could TPDD helps minimize organizations’ and/or individuals’
be considered red flags (or not) in the context of TPDD activity. reputational, financial and/or operational risks. They focus on
potential third parties’ transparency, corporate governance open sources, the potential impact on your organization and
structures, profitability, the presence/absence of bad publicity, your risk appetite.
etc. Organizations aim to analyze corporate structures, financial
key performance indicators and reputational standings to help Using encrypted email as a third party’s main
answer questions about a third party such as: Who’s the benefi- point of contact
cial owner? Is the third party profitable? Has it been involved in Common email services are vulnerable to hackers. But EES uses
a financial scam? If I sign a contract with this third party, will I end-to-end encryption to protect the content of emails and ensure
incur any risks? that only legitimate recipients can access them. EES provides
An organization must include the changing global risk sce- reliable and secure global information infrastructures crucial
nario as a factor when performing TPDD. The widespread use for businesses and public and private organizations. (Individuals
of shell companies for money laundering and financial can also buy EES services.)
fraud — and the digital revolution that enables anon- However, criminals and terrorists use the ben-
ymous remote transactions without the need for efits of encryption to conceal their illicit activities.
geographical proximity — have increased the like- (See “Counter-Terrorism, Ethics and Technology:
lihood a company may encounter risky situations Emerging Challenges at the Frontiers of Counter-
while interacting with third parties. Therefore, you Terrorism,” Adam Henschke, Alastair Reed, Scott
must improve your TPDD process by integrating Robbins, Seumas Miller, editors, 2021, Springer,
drivers that address new risks, including analyzing tinyurl.com/enzxny8r.)
Bad actors can use EES to obstruct investigations (a
third parties’ official email addresses that they include on
phenomenon known as “going dark”) and prevent law enforce-
their websites and public documents. In the past, it was enough
ment agencies from gathering evidence for trials and dismantling
to analyze third parties’ physical addresses. No more. We must
large criminal organizations and terrorist attacks. (See “Shining
scrutinize digital addresses to find potential fraud or risk.
Light on the ‘Going Dark’ Phenomenon: U.S. Efforts to Overcome
Use publicly accessible “open sources” (free and paid), such
the Use of End-to-End Encryption by Islamic State Supporters,”
as mass media communications, computer-based data, company
by Ryan Pereira, Harvard Law School National Security Journal,
websites and annual reports, governmental records and academic
Sept. 3, 2021, tinyurl.com/3ahfjrks and “Hiding Crimes in Cyber-
information to find a third party’s corporate structure and identify
space,” by Dorothy E. Denning and William E. Baugh Jr., Dec. 2,
the ultimate beneficial owner. You can then discover the entity’s
2010, Taylor & Francis Online, tinyurl.com/3p5ub24j.)
profitability, viability and capitalization plus negative reports, in-
Recent studies of illicit markets, criminal organizations, drug
cluding possible links with criminal organizations. Moreover, you
traffickers and terrorist groups have found their increasing use of
can study the third party’s commitment to ESG (environmental,
EES, such as Protonmail, to reduce the risk of interception. (See
social and governance) sustainability issues. Your organization
then needs to rate the severity of the red flags you discover via Table 2 - The research sample
Count of #
372
turnover cost could in some cases indicate precarious financial for each company. All nine companies are dealing in the photog-
instability so they’re unable to meet clients’ demands. raphy and film retail trade. This might suggest that they’re owned
We detected the anomaly that seven Brazilian companies, by the same group or the same person; however, the managing
which all have the same encrypted email address, each show an partner is always different.
identical annual turnover cost and average number of employees Furthermore, seven out of the nine companies (two of the seven
in 2021. (See Table 4 on page 50.) companies share the same business address) appear to operate from
garages or private houses that don’t have any sign or indication of
Same email for different organizations commercial retail. (See Figure 3 on page 51. We extracted the images
The sample analysis also showed that 19 email addresses were from Google Maps after the incorporation dates of the companies.)
repeated for different organizations. Two of them are shared by two
companies, both based in Brazil and operating in the retail sector. Companies by sector
To assess how far this could be a risk vector, we examined We analyzed the incidence of the use of EES by sector by recoding
nine organizations with the same email address. The company product classification codes into 17 macro-categories. (See Table 5
name is always the same, except for the initial word, which varies on page 51. The category “Other” includes activities that are more
Incidence
2%
0%
Visit ACFE.com/CFE to learn how you can earn your CFE credential.
Encrypted emails
Turnover (€/100)
TOTAL
<1 1-10 10-20 20-50 50-100 100-200 n.a. Case study illustrates EES
<10 12 60 2 1 - - 9 84 addresses as red flag
Average n. of employees
Table 4 - Companies with the same email, turnover cost and number of employees
YEAR OF LAST
COMPANY LISTED TURNOVER AVG. NO. OF INCORPORA-
STATUS COUNTRY FINANCIAL INDUSTRY
NAME COMPANY (EURO) EMPLOYEES TION DATE
STATEMENT
Company 1 Active No Brazil 2021 253 16 01/27/2021 Retail trade of photography and filming articles
Company 2 Active No Brazil 2021 253 16 01/29/2021 Retail trade of photography and filming articles
Company 3 Active No Brazil 2021 253 16 01/29/2021 Retail trade of photography and filming articles
Company 4 Active No Brazil 2021 253 16 01/29/2021 Retail trade of photography and filming articles
Company 5 Active No Brazil 2021 253 16 02/05/2021 Retail trade of photography and filming articles
Company 6 Active No Brazil 2021 253 16 02/05/2021 Retail trade of photography and filming articles
Company 7 Active No Brazil 2021 253 16 02/05/2021 Retail trade of photography and filming articles
Source: The authors identified company headquarters with Google Street View, and images were generated using artificial intelligence.
domain f**********.pro appears to be traceable to the company Analyze third-party email addresses
“Russian Company 2,” which the Central Bank of the Russian In view of our findings, analyzing organizations’ email addresses
Federation and the National Commission for Companies and the as TPDD drivers is a good digital indicator — in conjunction with
Stock Exchange (CONSOB) placed on blacklists of unauthorized other critical factors — to identify potential risky third parties.
financial operators. Third parties that use EES services, especially small- and
The information we gathered appears to show an association medium-sized organizations, to send or receive confidential
between “Russian Company 1,” present in the sample and “Russian documentation to and from counterparties, isn’t a risk itself. In
fact, it can be a positive element because it indicates companies’
Company 2,” which is involved in irregular conduct on financial
focus on the security of their information, which could minimize
markets and suspended by both the Central Bank of the Russian
the risk of data breaches.
Federation and CONSOB.
However, it’s unusual for organizations to use encrypted main
email addresses. The choice of an organization to use an encrypted
Table 5 - Number of companies by sector
email address as its main contact could be synonymous with a
INCIDENCE
lack of transparency or non-traceability. Treat it as an anomaly
INDUSTRY ORGANIZATION N.
ON TOTAL (%) that you should assess to possibly find additional red flags.
Continue to religiously conduct third-party due diligence, but
Wholesale & Warehousing 93 17%
Retail trade 90 16% assure your methods are contemporary with digital advances. n FM
IT & Engineering 76 14%
Real Estate, Insurance, & Finance 44 8%
Antonio Rossi, CFE, is a manager – forensic services with a
Consulting 41 7%
multinational advisory firm and co-founder and member of
Industry 28 5%
the board of the nonprofit association OsintItalia. Contact him
Administrative Support 27 5%
Construction 21 4%
at [email protected].
Health and Care 14 3%
Marketing 13 2% Lucrezia Tunesi oversees security and threat intelligence
Hotels & Catering 9 2% activities at Italian energy infrastructure company Snam S.p.A.
Education & Culture 9 2% She’s a certified security expert and a member of the Italian
Legal Services 5 1% Association of Corporate Security Professions (AIPSA) and the
Agriculture & Fisheries 5 1%
nonprofit association OsintItalia. Contact her at
Research & Development 4 1%
[email protected].
Energy & Waste 3 1%
Other 77 14%
TOTAL 559 100%
W
Research. The Coindesk article reported that Alameda’s main asset
e’d just filed our Most was FTT, FTX’s native token, and that FTX was using FTT as collateral
Scandalous Frauds story on the balance sheet. When customers subsequently tried to with-
of 2022 when news of the draw their holdings from the platform, FTX was unable to meet the
implosion of multibillion-dollar crypto demand, and FTX’s collapse destabilized the crypto industry. The
exchange FTX broke. It might’ve been a prices of bitcoin and ether sunk and crypto lender BlockFi suspended
little too late for us to add what would its operations because of FTX’s demise. (See “What Happened To
become the biggest fraud scandal since Crypto Giant FTX? A Detailed Summary Of What We Actually Know
Theranos to the 2022 list, but the FTX So Far,” Forbes, Dec. 13, 2022, tinyurl.com/yftkmy3h and “Embattled
story didn’t disappear, and we had FTX Crypto Exchange FTX Files for Bankruptcy,” by David Yaffe-Bellany,
founder Sam Bankman-Fried’s trial and The New York Times, Nov. 11, 2022, tinyurl.com/2bx7hfdd.)
eventual guilty verdict to keep us riv- Bankman-Fried was arrested by U.S. authorities in the Bahamas
eted. Of course, FTX wasn’t the only in December 2022. The government accused him of diverting funds
high-profile case that shocked us; there from FTX investors to Alameda Research and giving Alameda an un-
were many others that had a big impact limited “line of credit” funded by crypto platform customers. The U.S.
on the anti-fraud profession. Here are government also accused him of using commingled FTX customers’
the five fraud cases we found most scan- funds at Alameda to buy real estate, make undisclosed investments
dalous in 2023. and fund political campaigns. While misusing his customers’ funds,
he was promoting FTX as a responsible crypto-asset trading platform
with sophisticated risk measures to protect customer assets. (See
“SEC Charges Samuel Bankman-Fried with Defrauding Investors in
Crypto Asset Trading Platform FTX,” U.S. Securities and Exchange
Commission press release, Dec. 13, 2022, tinyurl.com/2bxvze4f.)
Bankman-Fried’s trial provided plenty of drama — his top lieuten-
ants at FTX, including ex-girlfriend and head of Alameda Research,
01/ THE FALL Caroline Ellison, agreed to cooperate with the government and testify
against him. During her tearful testimony, Ellison told the jury that
5 M O S T S C A N D A L O U S F R A U D C A S E S of 2 0 2 3
5 MOST SCANDALOUS FRAUD CASES OF 2023
centers mostly traffick men, women and girls are also victims. centers in Myanmar have enriched the military junta that cur-
They’re often forced to provide sex as rewards to others at the rently controls the country.
scam centers. (See tinyurl.com/anyvam59.) CSIS says that social media and tech companies must step
Experts who work on behalf of victims of human trafficking up to address the problem by validating employers that advertise
say that governments need to address the underlying problems on their sites and to remove fraudulent job advertisements. (See
that create the conditions for these cyber scam centers to flourish. “Cyber Scamming as a New Destination for Human Trafficking
Pia Oberoi, a U.N. senior adviser on migration and human rights Victims,” by Lauren Burke, Liam Hamama and Marti Flacks, CSIS,
for the Asia-Pacific region, told The Guardian that widespread Aug. 17, 2023, tinyurl.com/35d744v6.)
corruption in the region is largely to blame.
In his address to ACFE’s 2023 Fraud Conference Asia-Pacific,
“It’s so incredibly lucrative that there is very little political
Matt Friedman, a human-trafficking expert and CEO of the Me-
will to address this holistically,” says Oberoi. “We see no signs of
kong Group, said that the private sector has a key role to play in
it really slowing down — other than the actors relocating their
fighting these human rights abuses. Organizations must do their
operations when there’s some law enforcement pressure.” Ac-
due diligence to determine that their supply chains aren’t tied to
cording to Oberoi, law enforcement authorities protect the scam
human trafficking, assess potential suppliers before entering any
centers. (See “Gangs forcing hundreds of thousands of people into
contracts and have policies in place to address vulnerabilities to
cybercrime in south-east Asia, says UN,” by Kaamil Ahmed, The
Guardian, Aug. 30, 2023, tinyurl.com/3ubt7jud.) human trafficking in their supply chains.
Indeed, the Center for Strategic and International Studies But Friedman also told attendees that one of the biggest
(CSIS) says that at the local level, poorly paid law enforcement problems in confronting human trafficking is a lack of fund-
officers, immigration officials and judges are subject to bribes ing. The money available to fight trafficking is just no match for
from the criminal syndicates that run these scam centers. But the excessive profits that these cyber scam centers reap. (See
CSIS also says that high-level government officials benefit from “Modern Slavery’s Threat to the Economy, Society and More,”
the economic growth generated by these scam centers, and thus by Stefanie Hallgren, Fraudconferencenews.com, Sept. 27, 2023,
they see no reason to fight them. Profits from massive cyber scam tinyurl.com/5c3ekvy9.) /03
IMPOSTER SYNDROME
Ozy Media’s descent began in 2021 when The New York Times reported that
the company’s chief operating officer, Samir Rao, impersonated a YouTube
Dishonorable executive during a prospective investor call with Goldman Sachs. The Times
MENTIONS story inspired numerous other reports of malfeasance at the news media
company, including misleading tactics to amplify audience metrics. And then,
just days after Rao pleaded guilty to securities and wire fraud charges in
Here are a few scandalous February, founder and CEO Carlos Watson was arrested. According to court
frauds that weren’t big filings, Watson, a former banker and TV host, told Rao what to say during
enough to make it into that 2021 call with Goldman Sachs. U.S. prosecutors also allege that Watson
the top 5, but still deserve lied to investors about his company’s financial health and falsely claimed that
a little extra shame. celebrities and high-profile companies had invested in Ozy. (See “Goldman
Sachs, Ozy Media and a $40 Million Conference Call Gone Wrong,” by Ben
Smith, New York Times, Sept. 26, 2021, tinyurl.com/bddx7bm9; “Ozy Media
founder Carlos Watson arrested for fraud scheme,” by Madeline Halpert,
BBC, Feb. 23, 2023, tinyurl.com/yc4c94jm; and “Ozy CEO arrested after
former exec pleads guilty to fraud,” by Sara Fischer, Axios Media, Feb. 23,
2023, tinyurl.com/c2e4jmz7.)
IT FOUND SUBSTANTIAL EVIDENCE THAT and William K. Rashbaum, The New York Times, Jan. 23,
2023, tinyurl.com/mvu2s4pb and “Charles McGonigal, ex-FBI
SANTOS COMMITTED FEDERAL CRIMES. official, pleads guilty to concealing $225,000 in payments,”
by Robert Legare, Caitlin Yilek, CBS News, Sept. 22, 2023,
tinyurl.com/2p85353a.)
05/ FROM RICHES sold to 5,500 investors; Guo told them that the company
was worth $2 billion. The reality was that GTV had no
W
hile investigating South few. (See “Global fraud is the same - legal
COLUMNIST
American drug traffick- systems aren’t,” by Dr. Joseph T. Wells,
ers, I had to track their
LOURDES C.
CFE, CPA, Fraud Magazine, July/August
MIRANDA, CFE
movements as they traveled with their CHIEF CONSULTANT, 2019, tinyurl.com/mrypfupj.) Savvy
families between South America and THE FINTECH ADVISORY fraud examiners should also know to
the U.S., but the only information I had GROUP, A DIVISION OF
conduct reconnaissance of the region so
RALYTICS, LLC.
were the men’s surnames. While this that they can successfully navigate the
information might seem vital to tracing terrain. Before you head out, read up on
Public Library, Nov. 17, 2020, tinyurl.
someone’s flights between continents, threats to the location, whether it’s ter-
com/42a7dpzp; “Lourdes C. Miranda,
having grown up in a Puerto Rican rorist organizations or human traffick-
CFE,” by Jennifer Liebman, CFE, Fraud
family and in a neighborhood of South ing or weather, and spend time studying
Magazine, November/December 2023,
American families, I knew that it’s not the local culture and customs to better
tinyurl.com/383vn9z3; and “12 Red Flags
uncommon for South Americans to use interact with people.
for ‘Funnel Accounts’ Used to Launder
both maternal and paternal surnames, No matter where you go, you’ll
Money,” by Denise Hutchings, Verafin,
and it was possible they were using their need to get around once you get there.
Feb. 25, 2015, tinyurl.com/52k5zpf3.)
wives’, mothers’ or maternal grand- I’ve been conducting international Whether you’re meeting with subjects
mothers’ last names to travel. At first, financial fraud investigations for more or witnesses for interviews or collecting
my team was skeptical that searching than 25 years, including when I was a documents for an investigation, you’ll
for the women’s names would help, but CIA officer and FBI analyst, and while need transportation, and you’ll need to
knowing this information soon paid off. the latest technologies and investigative confidently get to your destination like
The men and their spouses were indeed methods are important to my cases, I’ve a local. But not all locations are created
traveling under the women’s surnames found that my knowledge of the human equal when it comes to extensive public
since it was culturally and legally accept- side of the equation — the cultural cus- transportation systems, especially if
able for them to do so. Not only were we toms and the language — was essential you’re in a rural area. Find out what
able to track their travels to and from the to closing a case. modes of transportation the locals use,
U.S., but we were also able to find their and plan to use those. Of course, this
“funnel accounts” — bank accounts that Be prepared for anything might mean that you’ll need to learn a
receive deposits in multiple locations so Fraud examiners know that before they new skill.
that money launderers can circumvent travel to a different jurisdiction, they When I was in the CIA leading a
reporting requirements for transac- need to consider whether they’re going team in South America and in Europe,
tions — because they’d used maternal to be working within a civil or com- I first had to take a defensive-driving
surnames to open them. (See “Dos mon law system, what rules of evidence training course so that I could learn how
Apellidos: When Families Have Two they’ll need to follow, and the digital to evade people who might be follow-
Surnames,” by Nicolás Cabrera, Denver privacy laws of the land, just to name a ing us and keep up with the suspects
“chavos,” which is Puerto Rican slang It assured them that they were respected and field officers collect weak intel-
for money. In other Spanish-speaking and that I could relate to them. We were ligence because they didn’t have the
countries people might say plata, dinero, always able to gather more intelligence cultural knowledge they needed. When
chirola, billete, luca, quivo or barras and evidence when we could speak you’re working in countries and with
when referring to currency. to someone using their language. I people with vastly different cultures
Identifying different dialects is also strongly recommend that fraud inves- from yours, you can’t rely on the ways
crucial when interviewing. In one case tigators take language classes taught you’re used to doing things. You must
while I was in the CIA, an Argentinian by native speakers. Even if you never adapt to your surroundings and learn
man I interviewed knew right away become fluent in a language, having the ways of your host country — even
that I was Puerto Rican based on my some understanding of what’s being better, learn about a place before you
dialect. He also knew I was raised in said while you sit in on a meeting, or go there. Taking the time to understand
the U.S. because of my accent. I learned an interview, enables you to ask ques-
other people and their ways of doing
an important lesson about mastering tions that can help build a strong case
things enables you to relate to them and
the dialect. During an investigation in or gather valuable intelligence that can
can even protect you when working on a
Spain, I brought a translator with me to help you develop leads.
sensitive case. ■ FM
help navigate the differences between In my experience, investigations
the Spanish and Castilian languages, can collapse when people don’t learn
because they’re quite different. In my about or understand the customs and Lourdes C. Miranda, CFE, is chief con-
experience, interviewees were much the people involved in their cases. I’ve sultant for the FinTech Advisory Group,
more relaxed with me when I could seen fraud investigators miss opportuni- a division of RaLytics, LLC. Contact her
communicate with them in their dialect. ties to build strong cases, and analysts at [email protected].
Attend
in person
or watch
online.
Figure 2
With any data analytics initiative, to make these assessments through (1) Fraud Tree,” tinyurl.com/4c4vhs7u.)
you need to start by asking the right internal reporting hotlines; (2) decision This doesn’t include external threat ac-
business questions. For fraud examin- advisory hotlines; (3) well-designed tors in the context of cyber threats, but
ers wishing to conduct proactive fraud surveys given months after training to when it comes to the business functions
prevention and detection, the best place assess employees reactions to scenarios of the company, those are the only three
to start is your risk assessment. In an implicating choices between compli- types of entities we’re concerned with.
investigation, the starting points are the ance and profits; (4) exit interviews; As you know, they often work together,
allegations. At this beginning phase, (5) adoption of an analytic detection or require one another — often without
it’s a common trap to get caught up in system that incorporates data from the other party knowing — touching
a single data source where you think internal hotlines, HR complaints about multiple data sources to commit the
the relevant information lies. If you’re unethical behavior (including sexual malfeasance. A rogue employee may
searching for high-risk payments, you harassment), consumer complaints, and overcharge a customer or receive a kick-
might jump to the accounts payable (6) carefully calibrated performance back from a vendor. A rogue, or even
subledger. If you’re responding to an indicators that can raise red flags about fake, vendor may submit multiple bogus
investigation, you might first jump to potential misconduct. Advances in AI- invoices to the company, where they’re
the suspect’s email. As we’ve previously assisted monitoring of performance and approved by an employee. You get the
discussed, let’s not fall into that trap, transaction data may also prove a boon idea. They interact via accounting sys-
and instead ask more holistic questions to identifying ‘red flags’ or anomalies in tems, approval processes and email, to
of the data. If the risk or accusation is data that may be predictive of suspicious name a few. Keeping a 360-degree view
around payments to third-party vendors, conduct. Firms also should audit their of customers, vendors and employees
for example, you’ll want to consider systems for detecting and investigating is paramount to an effective control
multiple data sources including the misconduct to determine whether those environment for fraud prevention and
vendor master data, the accounts pay- systems are working well.” [See “The detection. And breaking down the data
able subledger, invoices, payments and Compliance Function,” by Jennifer Ar- silos to get there is something we should
purchase order data. You’ll even want to len, The Oxford Handbook of Corporate all be working towards. Keep innovat-
consider non-accounting data such as Law and Governance (Jeffrey N. Gordon
ing! ■ FM
the due diligence that was performed (or and Wolf-Georg Ringe, eds., Oxford
not performed) on the third party, and University Press 2d ed., forthcoming) at
what, if any, email communications are tinyurl.com/mwta5v4f.] Vincent M. Walden, CFE, CPA, is the
in line with that vendor. CEO of Kona AI, an AI-driven anti-fraud
Professor Jennifer Arlen, director Vendors, customers and compliance technology company
of corporate compliance and enforce- and employees providing easy-to-use, cost-effective
ment at New York University’s School If you think about the ACFE Fraud Tree third-party payment and transaction
of Law, describes the importance of and the occupational fraud schemes it analytics software around corruption,
analyzing/integrating multiple data addresses, there are only three entities investigations, fraud prevention, internal
sources to effectively assess misconduct that can rip you off in the context of audit and compliance monitoring. He
or unethical behavior, writing: “Compa- those schemes: vendors, customers (or welcomes your feedback and ideas. Con-
nies can obtain the information needed distributors) and employees. (See “The tact Walden at [email protected].
Visit ACFE.com/womensdenim or
ACFE.com/mensdenim to learn more.
Visit ACFE.com/EFDIA to learn more.
I’M A CFE
Rasha Kassem, Ph.D., CFE
Associate Professor, Aston
University, U.K.
As a senior academic and researcher, Rasha Kassem seeks to mitigate fraud risks, improve
methods of fighting fraud, and better understand why fraud criminals do what they do.
She says that investigating fraud isn’t enough to stop it and urges fraud examiners to
innovate and explore new techniques for prevention.
I am fortunate to have lived in U.K. Government Counter Fraud My interest in fraud began with
two countries with great histories: Profession. the collapse of Enron. The scale
England and Egypt. I was born in and impact of that case was
Cairo, Egypt, and lived there for I investigate fraud through my re- shocking and made me question
over 20 years. In 2012, I moved search. I analyze real-world fraud where the auditors and regula-
to the U.K. to study and work, and cases and interview professionals, tors were and what went wrong.
I’ve been there ever since. law enforcement and policymak- Imagining Enron’s impact on its
ers in various sectors to explore employees, who lost their jobs
I am currently an associate profes- the psychology of fraud criminals, and pensions, and investors, who
sor at Aston University. I teach at the methods of fraud perpetration lost their investments and confi-
and how to mitigate fraud risks.
the executive, postgraduate and dence in the capital markets, mo-
undergraduate levels; conduct tivated me to help prevent future
When I find that fraud is prevalent
impactful research; and exchange frauds. Back then, I recognized the
in a specific sector, I conduct pri-
knowledge with policymakers, power of anti-fraud education and
mary research to understand more
law enforcement officials and research in raising awareness of
about it. Specifically, I interview
practitioners. My expertise is in fraud and enhancing the skills of
various professionals, members of
fraud, forensic accounting, gover- law enforcement and policymak- future fraud fighters.
nance and auditing, and I research ers to understand more about the
these areas in the private, public prevalence of the fraud risk, its My experience in fraud research,
and voluntary sectors. I am also impact and perpetration methods, the knowledge I gained through
a consultant on insider fraud for and how it can be mitigated. I my Certified Fraud Examiner
the fraud prevention organization then publish my research in aca- (CFE) credential, and the con-
Cifas, and a member of the ACFE demic and professional journals versations I have regularly with
Advisory Council and the Cross to raise awareness of fraud and various fraud examiners and other
Sector Advisory Group for the inform policy and practice. fraud fighters have enhanced my
critical-thinking, analytical and victims to support them. Exploring Obtaining the CFE credential
research skills. victims’ vulnerability is crucial for has given me other great op-
disrupting fraudsters and pre- portunities, such as joining the
I’ve analyzed various real-world venting future victimization. Also, ACFE Advisory Council. The CFE
fraud cases through my research; fighting fraud is not the job of a credential is well respected and
however, Wirecard is one of the single individual or profession. It recognized among fraud profes-
most shocking cases from my requires collaboration from fraud sionals globally. Being part of the
perspective. The case involved examiners, policymakers, educa- CFE community connects me with
corruption, asset misappropria- tors and practitioners. other passionate CFEs.
tion, financial fraud and money
laundering, just to name a few. It I learned about the ACFE through Succeeding in the fraud-fighting
highlights the consequences of a search for fraud-fighting orga- profession requires the passion
ethical erosion and the failure of nizations on the internet, and the to learn more about the nature of
audits and governance within in- ACFE appeared at the top of my fraud and the determination and
stitutions. It also shows the impact Google search results. Browsing willingness to stop it. Enhance
of weak regulations and account- the ACFE website and learning your knowledge and skills by
ability and investigative journal- about its mission encouraged me reading about recent fraud topics
ism’s significant role in revealing to become a CFE. I am also a big and cases through the ACFE web-
fraud cases. fan of the resources that the ACFE site and attending ACFE confer-
The Wirecard case showed offers such as Fraud Magazine and ences and other anti-fraud events
that fighting fraud requires a ho- Report to the Nations as they raise in your country. Connect with
listic approach, including imple- awareness of fraud in interesting more experienced fraud examin-
menting robust anti-fraud controls and engaging ways. ers to learn from them. The ACFE
and governance systems, uphold- mentoring program is an excellent
ing the integrity and the tone at The CFE study materials and opportunity for doing this. Fight-
the top, reinforcing accountability, exam enhanced my knowledge ing fraud takes time, so do not
strengthening regulations, invest- of fraud, especially insider fraud. give up.
ing in technology and individuals The materials are designed with
capable of detecting and report- care and are interactive. Publish-
I love playing badminton. It re-
ing fraud, and enhancing interna- ing an article in Fraud Magazine
minds me of my childhood when I
tional collaboration. is also an excellent opportunity
used to run, jump, and laugh with
for CFEs to raise awareness and
friends and family. I also love my
Investigating fraud is insufficient enhance their knowledge of cur-
usual shopping trips, listening to
to stop it. Fraud examiners must rent fraud issues, and I am proud
music, eating out and going to the
be more proactive in their ap- of my two articles in the magazine.
theater with friends. We all need
proach to fighting fraud, and we I consider my fraud publications
time to relax, and these are just
need to explore new ways to pre- to be my greatest achievement.
the ones for me. n FM
vent it. This requires a thorough So far, I have published more than
understanding of the psychology 30 fraud-related pieces and hope
of fraudsters and their methods. In to continue publishing more to Jennifer Liebman, CFE, is assistant
the meantime, we need to bet- raise fraud awareness and inform editor of Fraud Magazine. Contact
ter understand fraud’s impact on practice and policy. her at [email protected].
1. According to the article, “Fraud for sale,’’ what 6. According to the article, “What’s that smell?” what are
distinguished Hydra from other darknet marketplaces? the Fraud Susceptibility Index variables that help explain
A. Bad customer service. if someone is susceptible to being conned?
B. A disorganized crime unit. A. A person is attracted to an item with high utility value
and low emotional value.
C. Advanced infrastructure and user-friendly experiences.
B. A buyer knows a lot about a product.
D. A solitary fraudster sitting in a basement.
C. Paradox of value, information asymmetry and direct/
2. According to the article, “Fraud for sale,” how do the indirect diffusion.
business-like operations of the dark-web marketplaces D. No one is talking about the product.
parallel legitimate industries?
A. They’ve limited their customer base. 7. According to the article, “Is a third party’s use of encrypted
email services a safeguard or a red flag?” what did the
B. There’s hierarchy, specialization and analysis show about organizations that adopt encrypted
professionalization among fraudsters.
email addresses as their primary communication channel?
C. Their level of marketing is unsophisticated and
disorganized. A. They were mostly long-established organizations.
D. They’ve stopped trying to appear legitimate to B. They had huge organizational structures.
potential customers. C. They mostly had an annual turnover cost placed below
20,000 euros.
3. According to the article, “Corrupt central bank governor
D. They mostly had an annual turnover cost placed above
allegedly helped push Lebanon’s economy off the cliff,” 20,000 euros.
experts have frequently described Lebanon’s financial
system as a type of Ponzi scheme that depended on fresh 8. According to the article, “Is a third party’s use of encrypted
money to pay existing creditors and that hid the true email services a safeguard or a red flag?” analyzing
nature of the risks involved. organizations’ email addresses as TPDD drivers isn’t a
A. True. good digital indicator to identify potential risky third
B. False. parties.
A. True.
4. According to the article, “Corrupt central bank governor
B. False.
allegedly helped push Lebanon’s economy off the
cliff,” what factor(s) allowed Salameh to override BdL’s 9. According to the article, “5 most scandalous fraud cases of
independence as a central banking authority to 2023,” Arizona suspended 100 residential and outpatient
misappropriate public funds? treatment facilities providers that had allegedly defrauded
A. Fragmented regulatory oversight, corruption and the state’s Medicaid program out of hundreds of millions
excessive bureaucracy. of dollars.
B. A political system dominated by one religious faction. A. True.
C. Overly strong state institutions. B. False.
D. Fraud permeating only the private sector.
10.According to the article, “5 most scandalous fraud cases of
5. According to the article, “What’s that smell?” what’s a 2023,” which ransomware gangs took credit for the attacks
telltale signal of a counterfeit fragrance? on MGM and Caesars?
A. How quickly the initial scent dissipates. A. LockBit and REvil.
B. The scent has excessive middle notes. B. Black Basta and Ryuk.
C. The scent’s bottom notes are too dominant. C. Maze and Hive.
D. The scent has a heavy citrus note. D. BlackCat and Scattered Spider.
DO NOT SUBMIT THIS FORM. Log in to your My Learning and Resources page after purchasing the Fraud
Magazine Quiz set to submit your answers or record your answers on the answer sheet and submit online.
CPE QUIZ
you a quote. If anyone or any site asks for
your financial information, such as your
bank account or credit card number, to get
The Fraud Magazine CPE Quiz has moved to an online
a quote, that’s a scam.
self-study format, making it easier for CFEs to earn 10 ACFE
4. Medical discount plans aren’t medical (non-NASBA) CPE. CFEs can earn 10 CPE by taking quizzes
insurance. (See “Medical Discount Plans online after reading featured articles in Fraud Magazine.
and Scams,” FTC, tinyurl.com/2cywsby7.)
Scammers often pitch medical discount
plans by convincing people they’re the
same as insurance — but they’re not. They
often just take your money for very little in
Visit ACFE.com/FMQuiz
return. and follow the steps below:
If you spot a CHIP scam, report it to
the FTC at ReportFraud.ftc.gov. (Also, see
1. Select the Online Fraud Magazine CPE Quizzes
“Children’s Health Insurance Program: Spot
by year from the dropdown*.
the scam,” by Marissa Hopkins, FTC, Sept. 22,
2023, tinyurl.com/2btdunmc.) 2. Click the “Add to Cart” button and complete the
checkout process.
I’m here to help
Please use information about these scams 3. Read featured articles in Fraud Magazine that
correspond to the year of the quiz set you purchased.
in your outreach programs and among your
family members, friends and co-workers. 4. Access your quiz set by logging into your ACFE.com
As part of my outreach program, please account, clicking on the “My Transactions” tab and
contact me if you have any questions on clicking on the quiz set you purchased.
identity theft or cyber-related issues that you
need help with or if you’d like me to research 5. Pass 5 of 6 quizzes with a score of 70% or higher and
a scam and possibly include details in future receive your CPE certificate instantly via email.
columns or as feature articles.
I don’t have all the answers, but I’ll do
my best to help. I might not get back to you For more information, please review
immediately, but I’ll reply. Stay tuned! n FM the “CPE Info” and “FAQs” tabs
or contact a representative:
Robert E. Holtfreter, Ph.D., CFE, is a
distinguished professor of accounting and [email protected]
research at Central Washington University.
He’s a member of the Accounting Council (800) 245-3321 / +1 (512) 478-9000
for the Gerson Lehrman Group, a research
Secure online chat service*
consulting organization, and a member of
the White Collar Crime Research Consortium
Advisory Council. He’s also the vice president
*
Quizzes will be added to the current year’s set as issues of Fraud Magazine are published.
of the ACFE’s Pacific Northwest Chapter and CPE can only be obtained from the current year’s quizzes after the fifth quiz is made avail-
able in September.
serves on the ACFE Advisory Council and
Please Note: The Fraud Magazine CPE Service CPE credits apply only to the CFE status and
the Editorial Advisory Committee, and he not to any other professional designations. Fraud Magazine CPE is not registered with the
was recently selected to serve on the ACFE’s National Association of State Board of Accountancy (NASBA).
The ACFE collects and stores your personal data in the U.S. to provide member services
inaugural CFE Exam Content Development
and fulfill transactions requested by you. For a full explanation of your rights regarding how
Committee. Holtfreter was the recipient of we store and use your data, visit ACFE.com/privacy-policy.aspx.
Specialized certificate programs are designed to provide CFEs and seasoned anti-fraud professionals
with the skills to enhance and demonstrate their proficiency related to specializations within the
anti-fraud profession.
• You’re already a CFE or have extensive anti-fraud training and would like to further market your
proficiency in a specialization within the anti-fraud profession while earning NASBA-approved
continuing professional education credits.
• You have experience in the anti-fraud profession, but you’re not ready to take the CFE Exam.
• You’ve had anti-fraud training in the past, but you’d like more in-depth information about a
specialization within the anti-fraud profession.
• You work in a job or department that involves a high risk of fraud or have a role that involves a
specialization within the anti-fraud profession.
JAN FEB
LEADERSHIP SKILLS FOR ANTI- GETTING PAST NO: HOW TO GET THE ROLE OF SOFT INTERNAL
FRAUD PROFESSIONALS RELUCTANT INTERVIEWEES TO CONTROLS IN THE FIGHT AGAINST
Virtual Seminar SHARE INFORMATION FRAUD
Webinar
January 11, 2024 Webinar
February 1, 2024
January 25, 2024
MAR APR
CFE EXAM REVIEW COURSE 2024 ACFE FRAUD CFE EXAM REVIEW COURSE
Virtual Seminar CONFERENCE EUROPE New York, NY and Virtual
March 4-7, 2024 London and Virtual April 8-11, 2024
March 13-15, 2024