<br>Preface</br><br>Acknowledgments</br><br>Introduction and Premise</br><br>Section I: An Introduction To The Wonderful World of Fraud</br><br> Chapter 1 The New-Old Global Business Environment</br><br> Introduction</br><br> Globalization of Business — Benefits to Nation-States</br><br> Expansions of the Global Marketplace and their Areas of Operations</br><br> Types of Corporations</br><br> Corporate Owners and Locations</br><br> Corporate Products</br><br> The High-Technology Factor</br><br> Nanotechnology1</br><br> High-Technology Related Frauds and Other Crimes</br><br> Advent of the Superhighways4</br><br> The Impact of Superhighways on Frauds and Other Crimes</br><br> A Short History of Crimes and Other Frauds Via the I-Way</br><br> Superhighway Frauds and Other Crimes to I-Way Robberies</br><br> I-Way Robbery — Its Prevalence </br><br> There Is No I-Way Patrol to Stop I-Way Robbers </br><br> Global Connectivity Via the I-Way = Global Exposure to</br><br> Attacks by Fraud-Threat Agents and Other Miscreants </br><br> Capabilities and Limitations of Law Enforcement </br><br> Challenges to Security Professionals and Others </br><br> Case Study 1</br><br> Case Study 2</br><br> Summary </br><br> Chapter 2 Corporate Assets, Frauds and Other Terms — What are They? </br><br> Introduction </br><br> Definition of General Fraud </br><br> Specific Fraud Definitions </br><br> Corporate Assets </br><br> Other Terms and Definitions </br><br> Case Study </br><br> Summary </br><br> Chapter 3 Fraud-Related Laws </br><br> Introduction </br><br> Some U.S. Federal Fraud-Related Laws </br><br> Relevant Consumer Protection Laws for Fraud in the United States </br><br> A Few Examples of U.S. Federal Enforcement of Fraud-Related Laws, Approach and Actions </br><br> Mail Fraud Statutes (condensed and paraphrased) </br><br> Money Laundering </br><br> Financial Institution Fraud (Bank Fraud) </br><br> Civil Litigation </br><br> U.S. Treasury Collection </br><br> Securities Violations </br><br> Role of Phone Companies </br><br> European Fraud-Related Laws </br><br> EU Fight Against Frauds </br><br> ASIA and Fighting Fraud </br><br> Case Study </br><br> "Blowing the Whistle" on Defrauders can be Dangerous </br><br> Summary </br><br> Chapter 4 Corporations Don't Commit Frauds, People Do</br><br> Introduction </br><br> Are Defrauders a Product of Their Environment, or is it in Their Genes?</br><br> Some Criminology Theories </br><br> Fraud-Threat Agents</br><br> Human Errors — Accidents </br><br> Man-Made or Malicious Fraud Threats </br><br> Potential Fraud-Threat Agents </br><br> Capabilities </br><br> Motivation </br><br> Access </br><br> Catalysts </br><br> Inhibitors </br><br> Amplifiers </br><br> Fraud-Related Factors for Attacking Systems </br><br> Relationship of Threat Elements </br><br> Case Study </br><br> Summary </br><br> Chapter 5 Fighting Fraud — Whose Job is it Anyway? </br><br> Introduction </br><br> Role of Executive Management </br><br> Role of Corporate Management </br><br> Role of the Corporate Employees </br><br> Role of the Ethics Director </br><br> Role of the Auditor </br><br> Role of the Fraud Examiner </br><br> Role of the Chief Security Officer (CSO) </br><br> Why the Corporate Security Professional? </br><br> Case Study </br><br> Summary </br><br> Chapter 6 Where There is a Will There is a Way — Fraud Schemes </br><br> Introduction </br><br> Types of Fraud Schemes </br><br> Financial </br><br> Credit Card Skimming </br><br> Mortgage Frauds </br><br> Computer and Telecommunications Frauds </br><br> ATM Frauds</br><br> Click Fraud</br><br> Clip-on Fraud</br><br> Securities Frauds</br><br> Employment Application Frauds</br><br> Identity Theft Scams</br><br> "Nigerian Scam"</br><br> Accounting Fraud Schemes</br><br> Bribery and Corruption</br><br> Conflicts of Interest</br><br> Purchasing — Four Basic Categories</br><br> Inventory17</br><br> Investments and Fixed Assets</br><br> Payroll and Personal Expenses</br><br> Procurement/Contracts</br><br> Telemarketing Fraud</br><br> Advance Fee Scheme</br><br> Common Health Insurance Frauds</br><br> Letter of Credit Fraud</br><br> Prime Bank Notes</br><br> The Ponzi Scheme</br><br> Pyramid Scheme</br><br> Case Study</br><br> Summary</br><br> Chapter 7 Fraud Cases and Commentary — Learning by Example</br><br> Introduction</br><br> Actual Fraud and Fraud-Related Cases</br><br> Phishers and Taxpayers</br><br> Fraud by Corporate Executives</br><br> Foreign Exchange Trading Fraud</br><br> Katrina Waste and Frauds</br><br> Organized Crime and Cybercrime</br><br> Securities Fraud in Cyberspace</br><br> Computer Hard Drives Lead to Frauds</br><br> Debt-Collecting Frauds</br><br> Government Contracting Fraud</br><br> Fraud-Threat Agents Can Be Anyone in Any Position</br><br> U.S. Securities and Exchange Commission (SEC) Fighting Fraud</br><br> Fraud in School Systems</br><br> Dead Soldiers and E-Mail Scams</br><br> Another Example of Insider Fraud</br><br> Executive Management and Accounting Fraud</br><br> Merchandise Receipt and Exchange Fraud</br><br> Click Frauds</br><br> Mortgage Fraud</br><br> Government Contractors and Fraud</br><br> Frauds and Microsoft Software</br><br> Y2K-Related Fraud</br><br> Data Storage Conducive to Fraud-Threat Agents</br><br> Another Example of Click Fraud</br><br> Pyramid Schemes Move on to the Internet</br><br> Prepaid Cellular Phone Fraud</br><br> Identifying International Corruption</br><br> Credit Card Information Theft and Frauds</br><br> Hackers, Crackers, Phishers, Oh My!</br><br> Urban Legends and Frauds</br><br> Medical Research Frauds</br><br> Corruption and the War in Iraq</br><br> Comments on Identity Thefts as a Vehicle to Fraud</br><br> Lobbyists and Corruption</br><br> Internet Scams are International</br><br> Faking a Medical Condition</br><br> Internet Fraud Sweep</br><br> ATM Fraud</br><br> Social Security Scam</br><br> Stamp Fraud</br><br> Banker and Identity Theft</br><br> Accounting Firm Fraud</br><br> Lawyers and Medical Rip-offs</br><br> Another Mention of the "Nigerian" Scams — Variations on a Theme</br><br> Case Study</br><br> Summary</br><br>Section II: Establishing and Managing an Anti-Fraud Program</br><br> Chapter 8 The International Widget Corporation</br><br> Introduction</br><br> IWC Background Information</br><br> Key Elements for the CSO to Consider</br><br> Getting to Know IWC</br><br> IWC's Business Plan</br><br> Strategic Business Plan</br><br> Tactical Business Plan</br><br> IWC's Annual Business Plan</br><br> IWC and the History of Its CSO</br><br> Key Elements of IWC's Annual Business Plan</br><br> Anti-Fraud Program Planning</br><br> IWC's Departments of Primary Importance to the CSO</br><br> IWC Vision, Mission, and Quality Statements</br><br> Plans</br><br> Other IWC Plans and CSO Support</br><br> Case Study</br><br> Summary</br><br> Chapter 9 Establishing an Anti-Fraud Program</br><br> Introduction</br><br> IWC's Anti-Fraud Program</br><br> Anti-Fraud Program Project Planning</br><br> IWC Anti-Fraud Program Project Planning and Management</br><br> Anti-Fraud Program Project Team</br><br> Anti-Fraud Drivers — The First Major Task in Anti-Fraud Program Development</br><br> IWC Anti-Fraud Program Requirements — Policies96</br><br> Risk Assessment — The Second Major Task in Developing an Anti-Fraud Program</br><br> Basics of IWC's Risk Assessment Process97</br><br> Threats</br><br> Natural Threats</br><br> Man-Made Threats</br><br> Vulnerabilities</br><br> Risks</br><br> Assets Protection Risk Assessments</br><br> Assets Protection Risk Analyses</br><br> Developing Anti-Fraud Defenses</br><br> Three Key Ingredients in an Anti-Fraud Program's Defenses</br><br> IWC's Anti-Fraud Policies</br><br> Anti-Fraud Requirements and Policy Directive</br><br> Anti-Fraud Procedures</br><br> The CSO and Security Department's Anti-Fraud Accountabilities</br><br> Off-Site Corporate Facilities</br><br> Recruiting Anti-Fraud Professionals</br><br> Case Study</br><br> Summary</br><br> Chapter 10 Managing an Anti-Fraud Program</br><br> Introduction</br><br> CSO Leadership</br><br> Management versus Leadership</br><br> Meeting Customers' Expectations</br><br> IWC Internal Customers</br><br> IWC External Customers</br><br> IWC Executive Management Expectations of a CSO</br><br> Managing Risk</br><br> Security's Vision, Mission, and Quality Statements</br><br> Managing the IWC Anti-Fraud Program</br><br> Planning</br><br> Some Aspects to Incorporate into an Anti-Fraud Program Plan</br><br> Budgeting</br><br> Controlling</br><br> Quality, Process Improvement, and Assessment of Organization Performance</br><br> Process Management</br><br> Performance Management</br><br> Using Technology to Deliver Anti-Fraud Program Support and Services</br><br> Managing Quality and Management Oversight</br><br> What is Risk Management As It Relates to IWC's Anti-Fraud Program?</br><br> Managing and Reducing Risks to Corporate Assets</br><br> Program for Managing Anti-Fraud Defensive Risks</br><br> Responding to Fraud Incidents</br><br> Managing Fraud Threats</br><br> Case Study</br><br> Summary</br><br> Chapter 11 Winning through Teaming</br><br> Introduction</br><br> Anti-Fraud Program Team Building</br><br> Executive Management as Team Members</br><br> Teaming with IWC Executive Management Through a Business Approach</br><br> Teaming with Corporate Peers</br><br> Teaming and Dealing with Office Politics</br><br> Teaming with Your Security Managers</br><br> Teaming with Your Security Staff</br><br> Teaming and Dealing with Satellite Offices in IWC Headquarters in the United States</br><br> Teaming and Dealing with Satellite Offices in Foreign Lands</br><br> Case Study</br><br> Summary</br><br> Chapter 12 Anti-Fraud Functions</br><br> Introduction</br><br> Anti-Fraud Project Team Functional Tasks</br><br> Anti-Fraud Functions</br><br> Anti-Fraud Program's Non-Security Team Functions and Members</br><br> Case Study</br><br> Summary</br><br> Chapter 13 Are We Winning the Battle? How Do We Know?</br><br> Measure it!</br><br> Introduction</br><br> Measuring an Anti-Fraud Program's Costs, Benefits,</br><br> Successes, and Failures</br><br> Common LOE Measurement Techniques for Each Function</br><br> Examples of Metrics by Function</br><br> Investigations and NCIS Metric Chares</br><br> Examples of Anti-Fraud Investigations Metrics</br><br> Process Measurements</br><br> Case Study</br><br> Summary</br><br>Section III: The Fraudulent Future</br><br> Chapter 14 What Will the Fraudulent Future Hold for Corporations?</br><br> Introduction</br><br> Globalization of Business to Continue</br><br> Employees of the Future</br><br> The Future Global Corporation</br><br> Future of Fraud Attacks on Corporations</br><br> Future Anti-Fraud Protection Needs of Corporations</br><br> Case Study</br><br> Summary</br><br> Chapter 15 The Impact of High Technology on Fraud</br><br> Introduction</br><br> High-Technology Frauds</br><br> High-Technology Anti-Fraud Defenses</br><br> Case Study</br><br> Summary</br><br> Chapter 16 What the Security and Other Anti-Fraud Professionals Must Do Now to Personally Prepare to Combat Tomorrow's Frauds</br><br> Introduction</br><br> Becoming and Staying Proactive and Aggressive in Fighting Fraud</br><br> Getting a Fraud Education</br><br> Gaining Fraud-Related Certifications</br><br> Associations</br><br> Gaining Anti-Fraud Experience</br><br> To Conduct or not to Conduct Fraud Lectures and Write Fraud Articles</br><br> Case Study</br><br> Summary</br><br> Chapter 17 Summary and Final Thoughts</br><br> Introduction</br><br> Summary</br><br> Final Thoughts</br><br> hat Others Think About the Anti-Fraud Leadership</br><br> Position in a Corporation</br><br> Toby J. F. Bishop, CFE, CPA, FCA, President and Chief</br><br> Executive Office, Association of Certified Fraud Examiners</br><br> World Headquarters</br><br> In Conclusion-My Thoughts</br><br> Some References</br><br> End of Line</br><br>About the Author</br><br>Index</br><br></br>