Table of Contents INTRODUCTION ....................................................................................................... 1 SOME TYPES OF FINANCIAL FRAUD................................................................. 2 EMBEZZLEMENT ......................................................................................................... 2 Example................................................................................................................. 2 Ways to prevent embezzlement............................................................................... 3 ALTERATIONS ............................................................................................................. 4 Ways to Prevent Losses from Check Alteration ..................................................... 4 FORGED ENDORSEMENTS ........................................................................................... 5 COUNTERFEIT CHECKS ............................................................................................... 5 HOW TO PROTECT YOUR ACCOUNT................................................................. 7 CONCLUSION............................................................................................................ 8 |i Introduction Every year, increasingly sophisticated technology and techniques are developed to perpetrate financial fraud. Annual losses resulting from fraudulent activities are staggering. Embezzlement, check forgery, altered checks, the manufacture of false identities, and counterfeit credit cards are on the rise. Companies may appear to be more vulnerable to fraud because they may not have the resources or the time to implement fraud prevention programs, and may be less aware of the scope of the problem. Additionally, companies may not perform regular audits, causing many offenses to go undetected until significant losses occur. Combating financial fraud is a continual battle; one that requires attention and the implementation of stringent security and control procedures. JPMorgan can help protect your funds from financial fraud. Our Positive Pay service matches your check issuance information with the checks presented for payment. Checks that do not match are rejected and you receive a list of exception items to make a ‘pay’ or ‘return’ decision. By providing you with resources designed to mitigate check fraud, we can help you reduce your exposure to fraud losses. While Positive Pay does not prevent all types of fraudulent activity, it does protect against certain types of alterations and counterfeit activity. This document presents some information on trends we have seen in various types of financial fraud, and details specific measures that you can take to help protect your money and minimize risk. This document contains information that is confidential and the property of J.P. Morgan Chase & Co. It may not be copied, published or used, in whole or in part, for any purpose other than expressly authorized by J.P. Morgan Chase & Co. © J.P. Morgan Chase & Co. 2002. All Rights Reserved. |1 Some Types Of Financial Fraud Financial fraud usually encompasses four types of activities: embezzlement, alterations, forged endorsements, and counterfeit checks. Each type requires use of different approaches in order to prevent, detect or recover losses. Each of these types of fraudulent activity is discussed below. Embezzlement Embezzlement is the willful taking or converting to one’s own use, another’s money or property, of which the wrongdoer acquired possession of lawfully, by reason of some office of employment or position of trust. The most common way we see this done is when the wrongdoer intercepts checks being sent to the company and deposits them into an account for the wrongdoer’s personal benefit. Often the wrongdoer works for the company in accounts payable or accounts receivable, and thereby has a greater ability to conceal the true financial status of the company for a period of time. Example The following is an example of how embezzlement can occur: · Airline ABC purchases XYZ Air. · An employee opens several accounts with a similar name · The employee of XYZ Air manipulates the books for nine months to conceal the fact that the funds have not been applied to XYZ Air’s account. · The employee transfers funds to banks in Switzerland and the Cayman Islands, then leaves for vacation and never returns. · Once an audit is completed, it is discovered that more than $500,000 was embezzled over a nine-month period. There are several factors typically given for why this type of crime is able to be perpetrated in such a seamless manner including: · The employee was a long time employee. · There was no segregation of duties for balancing the company’s books. · No background check was conducted on the employee. · The employee experimented at first with low-value transfers, was successful, and was given a lot of autonomy at his job. · Several accounts were used to disburse the funds. · The employee’s desk was not audited regularly. This document contains information that is confidential and the property of J.P. Morgan Chase & Co. It may not be copied, published or used, in whole or in part, for any purpose other than expressly authorized by J.P. Morgan Chase & Co. © J.P. Morgan Chase & Co. 2002. All Rights Reserved. |2 Ways to prevent embezzlement Preventing and detecting embezzlement activity is an ongoing challenge; however prevention begins with the knowledge that embezzlement does occur. In addition, clients should implement a multifaceted program that may include the following initiatives: · Set a good example of honesty and integrity. Employees tend to emulate the behavior displayed by upper management. · Create a positive working-environment and be aware of discontent among your work force. Employees sometimes commit fraud and abuse as a way of getting back for perceived working injustices. · Check employee references. Employees who seek out sensitive positions with the intent to perpetrate fraud may have a history of prior convictions. · Examine bank statements upon receipt. Investigating the first hint of any irregularity is a key step toward preventing significant fraud. · Institute a hot line for reporting suspected abuse. Employees are often in a position to observe improper conduct but frequently have no way to report it and might fear retribution—especially if the perpetrator is their superior. · Segregate duties. Employees who can manipulate the books and conceal their activities may be tempted to perpetrate fraud. Eliminate the temptation by disallowing employees who post entries to a general ledger account from reconciling the account. Also, have more than one person review invoices. · Audit employee’s functions occasionally and ensure that they take time off. Dishonest employees do not like leaving their desks, fearing that someone could review their activities. · Obtain a credit check for employees in sensitive financial positions. Employees suffering from extreme financial pressure might have a greater temptation to steal. · Monitor vendor relationships. When employees rely excessively on a particular outside provider, there is the possibility of kickbacks. · Monitor the activity between a purchasing manager in a position to pay invoices and an employee in a position of submitting them for payment. One company spent $2.8 million paying for goods that were never delivered. In another instance, a criminal submitted invoices of $1,000 per month to a company for 48 consecutive months. The money was paid without questioning the invoices. This document contains information that is confidential and the property of J.P. Morgan Chase & Co. It may not be copied, published or used, in whole or in part, for any purpose other than expressly authorized by J.P. Morgan Chase & Co. © J.P. Morgan Chase & Co. 2002. All Rights Reserved. |3 Alterations There are three primary types of alterations made to the face of a check: (1) the name of the payee is altered, (2) the amount is altered or (3) both the payee and the amount are altered. Several methods are typically used to alter checks, including dipping them into chemicals, using liquid correction fluid, typing over with darker and larger fonts, bleaching, microwaving, and using magnetic tape. A claim of alteration tendered to your bank that paid the altered item may be subject to many defenses, most of which center around your company’s negligence. Also, the recovery process may be very lengthy, costing the company time and money and may involve litigation. If the company attempting to hold the bank liable for paying or accepting an altered check has failed to exercise ordinary care in the handling of the item, the company may be found to be completely or partially responsible for the loss. Ways to Prevent Losses from Check Alteration A wide range of measures can help protect against the rising tide of losses from altered checks. · Determine a high-end limit for checks and investigate any items that are presented for more than that amount. · Develop an account payable system that tracks checks not cashed within 10 days. There appears to be a gap of at least 10 days before criminals present a check, possibly due to the time it takes to develop a plan by which they can negotiate a particular item. You can capitalize on this timeframe by inquiring quickly into the status of the check. · Develop an accounts receivable system that will serve the same purpose of tracking old invoices. You could set the same parameter of 10 days. · Monitor the flow of incoming mail. Limit access to only those necessary. Access to unauthorized individuals is sometimes overlooked. · Convert to ACH services when feasible; i.e. Direct Deposit of Payroll. · Use overnight delivery services for large and sensitive items. The fees associated with these services can be viewed as insurance to preserve your business relationships and to protect your revenue. · Consider sending payroll checks to the employees’ supervisor rather than to the address of the payee to avoid the risk of having the check stolen from the mail. This document contains information that is confidential and the property of J.P. Morgan Chase & Co. It may not be copied, published or used, in whole or in part, for any purpose other than expressly authorized by J.P. Morgan Chase & Co. © J.P. Morgan Chase & Co. 2002. All Rights Reserved. |4 Forged Endorsements Corporate forged endorsements tend to be for large amounts of money and perpetrated by employees capitalizing on careless storage of checks. In many situations forged endorsements can be concealed by perpetrators who are in a position where they can easily steal the checks as well as manipulate the books. Too often companies do not adequately address the possibility of forged endorsements that result from failure to adequately protect access to check stock. Instead, they submit forgery affidavits seeking reimbursement from the bank that paid the checks after the loss has occurred. If a company fails to promptly report any unauthorized signatures on their accounts, they could be prevented from recovering funds. Also, if the wrongdoer is an employee who is entrusted with responsibility with respect to the checks, the loss may fall on the employer who is in a better position to avoid the loss by care in choosing employees, in supervising them, and in adopting other measures to prevent forgeries. Counterfeit Checks Counterfeit checks are sometimes viewed the same as checks bearing a forged signature, and several law enforcement agencies and other banks treat them equally. They differ from forged signatures, however, in the sense that the actual check is replicated, not stolen. Only the account information is real. The volume of counterfeit checks is rising rapidly, both in number of checks and the overall exposure. It is not uncommon for accounts to experience counterfeit activity more than once. After the activity temporarily ceases, the counterfeiters might strike again with another style of checks and a different pattern of fraud. Counterfeiters are not selective about the type of accounts they chose to create counterfeit checks on. They counterfeit any type of check on any account information that they can steal. The information needed to create a counterfeit check may be bought from genuine payees (whether vendors or employees), or it may be stolen from the bank, post office, company mailroom or from accounts payable and accounts receivable departments. The only information needed to counterfeit a check is the account number and the approximate check range being used. This is a worldwide problem. In recent years, we have received fraudulent counterfeit check claims from over 25 countries around the world. This document contains information that is confidential and the property of J.P. Morgan Chase & Co. It may not be copied, published or used, in whole or in part, for any purpose other than expressly authorized by J.P. Morgan Chase & Co. © J.P. Morgan Chase & Co. 2002. All Rights Reserved. |5 There are a number of ways to create high-quality counterfeit checks. A personal computer with desktop publishing capabilities can be used or a PC with a scanner. To a much lesser extent, some counterfeiters have also used color copiers. Another tactic is to simply buy checks through the mail using stolen account information. Some counterfeiters use contradictory information on the check or an invalid account number. For example, the name of the bank does not correspond with the routing number, and the abbreviation on the top of the check is also different. This may create a delay for banks processing the items and buy the counterfeiter more time to take the money and run. The counterfeiter might use a corporate style of checks or use the account of a corporation and style them like a personal check. They often hire young people to act on their behalf, again making it difficult to catch the actual counterfeiter. This document contains information that is confidential and the property of J.P. Morgan Chase & Co. It may not be copied, published or used, in whole or in part, for any purpose other than expressly authorized by J.P. Morgan Chase & Co. © J.P. Morgan Chase & Co. 2002. All Rights Reserved. |6 How To Protect Your Account JPMorgan’s Positive Pay Service provides one of the most efficient and comprehensive ways of protecting accounts from fraud. The Positive Pay Service compares all items presented for payment against your original issuance file to determine whether a check is to be paid. Any discrepancies are flagged as exception items and routed to you for a decision to pay or return the item. As counterfeit activity becomes more sophisticated and widespread, Positive Pay is an increasingly critical service. Companies that do not convert to Positive Pay continue to leave open a window of opportunity for financial criminals. Increasingly, banks are taking the position that companies are negligent and assume the risk for forgeries or altered checks that could have been prevented had they subscribed to the Positive Pay Service or any other cost effective service reasonably designed to help prevent fraud. In litigation involving check fraud, the loss may be allocated to the party that was in the best position to prevent the fraud. When a company is offered Positive Pay Services and the company fails to utilize those services, the loss may be allocated totally to the company. This document contains information that is confidential and the property of J.P. Morgan Chase & Co. It may not be copied, published or used, in whole or in part, for any purpose other than expressly authorized by J.P. Morgan Chase & Co. © J.P. Morgan Chase & Co. 2002. All Rights Reserved. |7 Conclusion It appears that financial fraud is here to stay. Organized crime rings, the proliferation of new technology, and a high degree of tenacity lead to greater and more sophisticated methods of financial fraud. Fighting the various forms of financial fraud needs to be a focus when doing business in the 21st century. Education and awareness are critical first steps toward deterring and detecting check fraud within and against your company. You need to monitor the morale of your organization, maintain checks and balances, track and review all disbursement activity, and recognize that highly deceptive practices can happen where and when least expected. Check fraud is a growing problem that requires greater attention regarding secure storage of check stock, as well as specific check features on the check itself. Converting to electronic payment processes, such as ACH, may help prevent the primary sources of check fraud. Today, one of the most comprehensive and effective tools for reducing exposure to forgeries and counterfeiting is the Positive Pay Service. By electronically identifying any discrepancies between checks presented for payment and your original issuance file, Positive Pay provides that, under most circumstances, altered and counterfeit checks will be identified before they are ever paid. Although, combating financial fraud may appear to be costly and timeconsuming, a sharpened focus on security leads to a wide range of benefits that include: better control over check issuance procedures, improved management of accounts, and enhanced attention to operations. The losses your company avoids through the use of Positive Pay may more than pay for the service. This document contains information that is confidential and the property of J.P. Morgan Chase & Co. It may not be copied, published or used, in whole or in part, for any purpose other than expressly authorized by J.P. Morgan Chase & Co. © J.P. Morgan Chase & Co. 2002. All Rights Reserved. |8
© Copyright 2026 Paperzz