Professional Documents
Culture Documents
Prep Course 4
Prep Course 4
A. True
B. False
A Ponzi scheme is generally defined as an illegal business practice in which new investors’ money is
used to make payments to earlier investors. The investment opportunity is typically presented with the
promise of uncommonly high returns. While the scam is presented as a legitimate investment, there is
little or no actual commerce involved. When an enterprise promotes an investment opportunity that
invests little or none of the participants’ money and uses new investments to make dividend payments,
the enterprise is running a Ponzi scheme.
2. Advance-fee schemes, debt consolidation schemes, and diploma mills are all examples of
consumer fraud schemes.
A. True
B. False
Consumer fraud schemes involve a range of fraudulent conduct, usually committed by professional
scammers, against unsuspecting victims. Scammers are skilled fraudsters who develop strategies, select
targets, and use an appropriate method of delivery to lure their victims. Scammers usually act alone, but
they might group together for a particularly complex endeavor.
Some examples of consumer fraud schemes include advance-fee schemes, debt consolidation schemes,
and diploma mills.
3. A financial fund operator who insists that investors continually reinvest their profits, rather than
take payouts, is a red flag of a Ponzi scheme.
A. True
B. False
The following are red flags of Ponzi schemes:
Sounds too good to be true: If an investment sounds too good to be true, it probably is.
Promises of low risk or high rewards: Promoters of Ponzi schemes typically promise implausibly
high or quick returns with little risk. As all legitimate investments include some degree of risk, any
guarantee that an investment will perform in a certain way is a clear signal that it might be part of
a Ponzi scheme.
History of consistent returns: Any firm that generates remarkably consistent returns regardless of
market conditions should raise suspicions.
High-pressure sales tactics: Reputable investment firms and agents do not push potential
investors to act immediately, and legitimate investment opportunities are rarely that time
sensitive.
Pressure to reinvest: Often, fraudsters keep Ponzi schemes alive by convincing investors to
reinvest their profits rather than take a payout.
Complex trading strategies: Legitimate agents should be able to provide clear explanations about
their investment strategies. For obvious reasons, Ponzi-scheme boosters purposefully employ
complicated strategies that confound unsophisticated investors.
Lack of transparency or access: Secrecy surrounding the operations of a financial company
should be an immediate warning sign. Ponzi operators are often unlicensed, and their supposed
investments are typically unregistered. Additionally, a lack of access to regular statements or an
online account should trigger alarm.
Lack of separation of duties: Investors should be wary of any financial manager who manages,
administers, and retains custody of the fund in question.
4. All of the following are examples of schemes that specifically target older individuals EXCEPT:
A. A fraudster convinces a victim that their computer has a virus and offers unnecessary repair services
in exchange for a fee.
B. A fraudster informs an individual that they won a prize but must pay a sum of money before they can receive it.
C. A fraudster pretends to be the victim’s grandchild and requests money to help with a difficult financial situation.
D. A fraudster offers to eliminate an individual’s credit card debt after the individual pays for the service
with their card.
Elder fraud, also known as elder financial abuse, includes different types of consumer fraud schemes
perpetrated against older individuals.
In a tech-support scheme, a fraudster attempts to convince victims to pay for unnecessary computer
services to repair nonexistent viruses or other problems. The scheme usually begins with a fraudster
calling a victim and claiming to be a computer technician working for a well-known tech company (e.g.,
Microsoft or Apple). Alternatively, the victim might be tricked into calling the fraudster directly via pop-up
messages warning about nonexistent computer problems. Once the victim is on the phone, the fraudster
generally instructs the victim to download and run software that gives the fraudster remote access to the
victim’s computer. The fraudster proceeds to perform phony diagnostic tests on the victim’s computer,
and then falsely claims to have detected viruses or other problems and offers to fix the victim’s computer
for a fee. In addition to collecting a fee for unnecessary services, the fraudster might install spyware onto
the victim’s computer.
In a grandparent scheme, a scammer calls an older individual and asks if the individual knows who is
calling. When the grandparent guesses the name of a grandchild, the scammer pretends to be that
grandchild. The scammer claims to be in a financial bind and asks if the grandparent can send money via
the internet or a money transfer service. The scammer urges the grandparent to avoid telling anyone
about the situation. Once scammers receive the money, they continue to contact the grandparent for
more money.
In a sweepstake and prize scheme, fraudsters inform older individuals they won a prize but must pay a
fee to receive it. The fraudsters then convince their victims that they can eventually win the grand prize if
they send in another fee. This cycle continues until the victims catch onto the scheme or are no longer
able to send fees because they have depleted their savings.
A scheme in which a fraudster offers to eliminate an individual’s credit card debt after the individual pays
for the service with their card is an example of a credit card debt elimination scheme. Although anyone
could be a target of this kind of fraud, such schemes generally do not specifically target older individuals.
5. A favored device of phony charities is to send school-age children door to door to say that they
are raising money for antidrug programs or for a group that takes underprivileged kids on trips.
A. True
B. False
A favored device of phony charities is to send school-age children door to door to say that they are raising
money for antidrug programs or for a group that takes underprivileged kids on trips. Some of the children
repeat what they are told in exchange for a few dollars. Others believe they will receive rewards and free
trips when in fact they, too, are being scammed.
6. Real estate scams are easily recognized, as there is almost always an element of time pressure
or "now-or-never" pitch from the perpetrator.
A. True
B. False
Real estate scams are easily recognized. There is almost always an element of time pressure, with the
victims being convinced they are participating in a “once-in-a-lifetime, now-or-never” deal. Perpetrators
mislead victims into thinking they will miss the opportunity to make a fortune if they do not act fast.
7. In a/an _____________ scheme, the company that initially conned a consumer contacts that
consumer and offers to help retrieve the lost money. However, the investigation requires an up-
front fee and the consumer is swindled again.
A. Scavenger
B. Advance-fee
C. Double-hustle
D. Retrieval
8. Telemarketing schemes target individuals, not businesses.
A. True
B. False
Telemarketing offenses are classified as consumer fraud, yet many businesses are affected by office
supply and marketing services scams. The nature of phone rooms, the geographical distances between
the perpetrators and their victims, and the resources and priorities of law enforcement agencies all make
enforcement efforts difficult.
A. True
B. False
Pyramid schemes are designed to pay off their earliest investors but not later investors. Probability
studies have shown that 93–95% of the participants in a pyramid scheme (all but those who join at the
earliest stage) will lose most of their money. Half can expect to lose all the money they invest.
10. Which of the following types of elder fraud schemes often involves property that does not exist or
is significantly different than promised?
Elder fraud, also known as elder financial abuse, includes different types of consumer fraud schemes
perpetrated against older individuals. In travel, vacation, and timeshare schemes, fraudsters post
advertisements for vacation properties that are nonexistent, significantly different than promised, or not
actually available for rent. Telemarketers sometimes target older individuals directly, promising
inexpensive vacation packages or timeshares that can be easily resold.
In a tech-support scheme, a fraudster attempts to convince victims to pay for unnecessary computer
services to repair nonexistent viruses or other problems. The scheme usually begins with a fraudster
calling a victim and claiming to be a computer technician working for a well-known tech company (e.g.,
Microsoft or Apple). Alternatively, the victim might be tricked into calling the fraudster directly via pop-up
messages warning about nonexistent computer problems. Once the victim is on the phone, the fraudster
generally instructs the victim to download and run software that gives the fraudster remote access to the
victim’s computer. The fraudster proceeds to perform phony diagnostic tests on the victim’s computer,
and then falsely claims to have detected viruses or other problems and offers to fix the victim’s computer
for a fee. In addition to collecting a fee for unnecessary services, the fraudster might install spyware onto
the victim’s computer.
In a grandparent scheme, a scammer calls an older individual and asks if the individual knows who is
calling. When the grandparent guesses the name of a grandchild, the scammer pretends to be that
grandchild. The scammer claims to be in a financial bind and asks if the grandparent can send money via
the internet or a money transfer service. The scammer urges the grandparent to avoid telling anyone
about the situation. Once scammers receive the money, they continue to contact the grandparent for
more money.
In a home improvement scheme, the fraudster recommends a friend who can perform needed home
repairs for an older individual at a reasonable price. This friend might require the homeowner to sign a
document upon completion, confirming repairs were made. In some cases, the victims later learn they
signed over the title of their house to the repairperson. In other cases, not only is the victim overcharged,
but the work is also performed improperly.
11. Maria, a successful restaurateur, has been informed of an unusually attractive investment
opportunity by a recent acquaintance and decides to invest in it. Several months and a couple of
underwhelming payments later, Maria grows frustrated with the diminishing disbursements and
attempts to withdraw her money. After several weeks of delay, she realizes that the promoter
seems to have vanished, along with her investment. Maria is the victim of which of the following
fraudulent ploys?
A. New friends who appear suddenly and without prior mention
The following are some common red flags for elder fraud schemes. While the presence of any one of
these circumstances does not necessarily indicate that elder fraud is occurring, individuals close to the
older individuals should take note of multiple occurrences of or patterns in these warning signs.
Outstanding bills
Disconnection notices for unpaid utilities
Large bank account withdrawals with no explanation
New friends who appear suddenly and without prior mention
The discovery of signed or forged legal documents (e.g., power of attorney [POA]) that the older
individual is not aware of
Another caregiver asking probing or unexpected questions about the older individual’s spending
habits
The older individual missing property or belongings
The discovery of financial decisions or arrangements made that the older individual is unaware of
(e.g., the opening of a new account in the person’s name)
13. A pyramid scheme is promoted by encouraging victim investors to recruit new members. The
more members recruited, the higher the investor rises in the ranks of the enterprise, and the more
money the investor is supposed to make.
A. True
B. False
In an illegal pyramid scheme, the more members that are recruited, the higher the investor is purported to
rise in the ranks of the enterprise, and the more money the investor is supposed to make.
The difference between a Ponzi scheme and an illegal pyramid lies in how the operation is promoted.
Illegal pyramids are promoted as pyramids, whereas Ponzi schemes are promoted as investment
opportunities. In an illegal pyramid, the pyramidal structure helps draw new players, each believing that
they will rise through the ranks of the pyramid. A Ponzi scheme, on the other hand, masquerades as
some type of investment.
14. Automatic debit program schemes occur when fraudsters obtain a consumer’s bank account
information and then use this information to draft money from the consumer’s bank account
without that person’s consent.
A. True
B. False
Automatic debit programs are a convenient way to pay bills, such as recurring charges for mortgages and
car loans. Fraudsters exploit these programs by obtaining consumers’ bank account information through
telemarketing schemes. Fraudsters then use this information to draft money from consumers’ bank
accounts without their consent.
15. Not every company that runs its business using a pyramid structure is operating an illegal
pyramid scheme.
A. True
B. False
Not all organizations with a pyramid structure are engaging in illegal activity. Some legitimate
merchandising companies use a pyramid structure to rank their employee-owners and to determine those
people’s compensation. A pyramid structure becomes an illegal pyramid scheme when the recruitment of
new members takes precedence over the product or service that the company is ostensibly promoting.
The more members that are recruited, the higher the investor is purported to rise in the ranks of the
enterprise, and the more money the investor is supposed to make.
16. A Ponzi scheme can best be described as an illegal business structure that might offer
merchandise or services but generates almost all of its revenues from the relentless recruitment
of new members.
A. True
B. False
A Ponzi scheme is generally defined as an illegal business practice in which new investors’ money is
used to make payments to earlier investors. The investment opportunity is typically presented with the
promise of uncommonly high returns. While the scam is presented as a legitimate investment, there is
little or no actual commerce involved.
In contrast, an illegal pyramid scheme is unique in that the more members that are recruited, the higher
the investor is purported to rise in the ranks of the enterprise, and the more money the investor is
supposed to make.
17. Victims of consumer fraud are more likely to be organizations or businesses rather than
individuals.
A. True
B. False
Consumer fraud schemes involve a range of fraudulent conduct, usually committed by professional
scammers, against unsuspecting victims. Scammers are skilled fraudsters who develop strategies, select
targets, and use an appropriate method of delivery to lure their victims. Scammers usually act alone, but
they might group together for a particularly complex endeavor.
The victims can be organizations but more commonly are individuals. Victims can be old or young, male
or female, or wealthy or poor, and they are usually dispersed geographically. Many victims who become
the targets of consumer fraud are considered to be in the naïve segments of the population, such as older
individuals. It is important to note, however, that even the savviest consumers can become targets if they
are not aware of the schemes involving consumer fraud.
18. A confidence scheme designed to part victims from their money by falsely promising the future
delivery of a product or service in exchange for an up-front payment is called a(n):
19. Which of the following is NOT a type of scheme that is commonly used by fraudsters to take
advantage of older individuals?
Fill-and-split games are a type of pyramid scheme that uses gaming elements to keep the victims’
attention and distract them from the absurdity of the scheme. Fill-and-split games are not a type of fraud
scheme commonly used to take advantage of older individuals.
20. What is the primary difference between a Ponzi scheme and a pyramid scheme?
A. In a pyramid scheme, old investors are paid with money from new investors.
B. A pyramid scheme promotes itself as a pyramid, whereas a Ponzi scheme promotes itself as an investment
opportunity.
C. All pyramid schemes are legal, whereas all Ponzi schemes are illegal.
D. A Ponzi scheme is promoted by encouraging victim members to recruit new members.
The difference between a Ponzi scheme and an illegal pyramid lies in how the operation is promoted.
Illegal pyramids are promoted as pyramids, whereas Ponzi schemes are promoted as investment
opportunities. In an illegal pyramid, the pyramidal structure helps draw new players, each believing that
they will rise through the ranks of the pyramid. A Ponzi scheme, on the other hand, masquerades as
some type of investment.
21. Which of the following is NOT considered to be a red flag of a Ponzi scheme?
A. An investment that has a history of inconsistent returns coinciding with fluctuations in financial markets
B. An investment that promises extremely high or short-term returns with little risk involved
C. A financial manager who puts an unusual amount of pressure on investors to act immediately
D. A financial manager who manages, administers, and retains custody of the investment funds
Sounds too good to be true: If an investment sounds too good to be true, it probably is.
Promises of low risk or high rewards: Promoters of Ponzi schemes typically promise implausibly
high or quick returns with little risk. As all legitimate investments include some degree of risk, any
guarantee that an investment will perform in a certain way is a clear signal that it might be part of
a Ponzi scheme.
History of consistent returns: Any firm that generates remarkably consistent returns regardless of
market conditions should raise suspicions.
High-pressure sales tactics: Reputable investment firms and agents do not push potential
investors to act immediately, and legitimate investment opportunities are rarely that time
sensitive.
Pressure to reinvest: Often, fraudsters keep Ponzi schemes alive by convincing investors to
reinvest their profits rather than take a payout.
Complex trading strategies: Legitimate agents should be able to provide clear explanations about
their investment strategies. For obvious reasons, Ponzi-scheme boosters purposefully employ
complicated strategies that confound unsophisticated investors.
Lack of transparency or access: Secrecy surrounding the operations of a financial company
should be an immediate warning sign. Ponzi operators are often unlicensed, and their supposed
investments are typically unregistered. Additionally, a lack of access to regular statements or an
online account should trigger alarm.
Lack of separation of duties: Investors should be wary of any financial manager who manages,
administers, and retains custody of the fund in question.
22. In credit repair scams, the fraudster promises to “erase” or “doctor” an applicant’s credit history,
but in reality there is no way to erase bad credit.
A. True
B. False
Similar to loan scams are those that promise to repair credit. Fraudsters who pitch credit repair services
like to say that they can “wipe away,” “doctor,” or “cosmeticize” negative items on credit, insinuating they
have ways of changing or disguising a person’s credit history. Despite the fact that there is really no way
to erase bad credit, many people fall for this scam, paying large sums of money to expunge their records.
Glenn has just inherited a large amount of money from a deceased relative. Several weeks later, a
colleague of Glenn’s suggests an investment in a security that is sure to generate returns of 20% every
six months. Glenn is intrigued, but he is also worried that it might be a Ponzi scheme. Which of the
following actions should Glenn take before investing?
A. Find out if the financial manager is licensed and if the security is registered
B. Ensure that he can comprehend the details and strategy of the investment
A. The debt consolidation company collects payments but does not appropriately forward them.
B. The debt consolidation company guarantees the debtor will receive a loan or credit card regardless of the debtor's c
C. The debt consolidation company writes a letter to the debtor's creditors and arranges a payment plan.
D. The debt consolidation company charges an up-front processing fee and then disappears.
Unscrupulous debt consolidation schemes often involve the agency collecting the money from the debtor
but not forwarding it to the creditors. In some instances, considerable time can pass before the debtor
finds out that their money has been misappropriated. Another variation of the debt consolidation scheme
occurs when customers are guaranteed that they will receive a loan or a credit card regardless of their
credit rating. Typically, the victims have been rejected by legitimate financial institutions because their
credit ratings are poor. The victim must pay a processing fee for the application to be accepted. After the
victim pays the fee, the con artist disappears.
A. True
B. False
Not all organizations with a pyramid structure are engaging in illegal activity. Some legitimate
merchandising companies use a pyramid structure to rank their employee-owners and to determine those
people’s compensation. A pyramid structure becomes an illegal pyramid scheme when the recruitment of
new members takes precedence over the product or service that the company is ostensibly promoting.
The more members that are recruited, the higher the investor is purported to rise in the ranks of the
enterprise, and the more money the investor is supposed to make.
25. Which of the following would be the LEAST LIKELY target of an affinity fraud scheme?
Affinity fraud targets groups of people who have some social connection. Neighborhoods chiefly
populated by racial minorities, especially immigrant groups, are often the site of affinity frauds, and older
individuals and language minorities are frequent targets as well. In addition, religious and professional ties
are often exploited.
26. The most common giveaway scheme, in which a postcard arrives in the mail telling the recipient
they have already won a prize such as a luxurious vacation or cash, is known as:
A. A procurement employee has drafted bid specifications in a way that gives an unfair advantage to a certain
contractor.
B. A procurement employee has intentionally included unallowable costs in the projects’ contracts and budgets.
C. A procurement employee convinced their employer that it needs excessive or unnecessary products or services.
D. A procurement employee broke up a large project into several small projects that fall below the mandatory
bidding level.
2. All of the following activities are included in the pre-solicitation phase of procurements
involving open and free competition EXCEPT:
C. The procuring entity determines the method for acquiring the goods or services.
D. The procuring entity issues the solicitation document.
In the presolicitation phase, the procuring entity identifies its needs, develops the bid specifications (what,
how much, and how good), determines the method to use for acquiring the goods or services, and
develops the criteria used to award the contract.
Bid specifications are a list of elements, measurements, materials, characteristics, required functions, and
other specific information detailing the goods and services that a procuring entity needs from a contractor.
The procuring entity issues the solicitation document in the solicitation phase of the procurement process.
A. A contractor charging the procuring entity for labor costs that are not allowable
C. A contractor delivering goods or services that do not conform to the contract specifications
D. A procuring employee manipulating the bidding process to benefit a favored contractor
Nonconforming goods or services fraud, also known as product substitution or failure to meet contract
specifications, refers to attempts by contractors to deliver goods or services to the procuring entity that do
not conform to the underlying contract specifications. Once contractors deliver goods that do not conform
to the contract, they bill and receive payment for conforming goods or services without informing the
purchaser of the deficiency.
The following is a list of potential red flags for nonconforming schemes:
In the bid evaluation and award phase, the procuring employees evaluate the bids or proposals, conduct
discussions and negotiations, and give the bidders an opportunity to revise their proposals. Procuring
employees then select the winning bid or proposal.
5. A contractor who delivers materials of lesser quality than specified in the contract or uses
a lower quality staff than specified in the contract might be involved in which of the
following types of procurement fraud schemes?
6. An inaccurate vendor master file can result in greater risks of duplicate payments,
unfavorable payment terms, and noncompliance with regulations.
A. True
B. False
Procurement entities must maintain an accurate and up-to-date vendor master file. An inaccurate or
incomplete vendor master file can result in greater risks of duplicate payments, unfavorable payment
terms, and noncompliance with regulations. Thus, the vendor master file should be updated continuously
and reviewed on a regular basis for inaccurate or incomplete records.
7. The solicitation phase of procurements involving open and free competition includes
which of the following activities?
B. The procuring entity identifies its needs and develops the criteria used to award the contract.
C. The procuring entity determines the method for acquiring the goods or services.
The solicitation phase involves the bid solicitation, bid preparation, and bid submission. During this phase,
the procuring entity prepares the solicitation document, provides notices of solicitation, and issues the
solicitation document. After the procuring entity issues the solicitation document, the bidders prepare and
submit their bids or proposals.
10. ABC Paving and XYZ Asphalt are the only two companies in Greenwood County that lay
asphalt. An audit reveals that the government is paying more for asphalt work in
Greenwood County than in other counties in the region. A review of the records reveals
that of the last ten asphalt contracts awarded in Greenwood County, five have gone to
ABC and five have gone to XYZ. Which of the following procurement fraud schemes is
most likely occurring?
Schemes involving collusion among contractors seek to circumvent the competitive bidding process. In
these schemes, competitors in the same market collude to defeat competition or to inflate the prices of
goods and services artificially.
The following schemes are common forms of collusion between competitors:
Bid rotation: Bid rotation, also known as bid pooling, occurs when two or more contractors
conspire to alternate the business among themselves on a rotating basis.
Bid suppression: Bid suppression occurs when two or more contractors enter into an illegal
agreement whereby at least one of the conspirators refrains from bidding or withdraws a
previously submitted bid.
Market division: Market division (or market allocation) schemes involve agreements among
competitors to divide and allocate markets and to refrain from competing in each other’s
designated portion of the market.
12. Which of the following is NOT a common red flag of procurement fraud schemes
involving collusion among contractors?
D. Bid prices fall when a new competitor enters the competition.
Common red flags of procurement fraud schemes involving collusion among contractors include:
13. Which of the following is a common way a procuring employee might engage in a bid
manipulation scheme?
In bid manipulation schemes, a procuring employee manipulates the bidding process to benefit a favored
contractor or supplier. Some common ways to commit these schemes include:
14. Which of the following is NOT one of the key phases of procurement processes that
employ competitive bidding mechanisms?
For the purpose of fraud detection, procurement processes that employ competitive bidding mechanisms
can be reduced to four basic stages:
15. Which of the following statements about vendor management best practices is INCORRECT?
A. Vendor master files should be kept current to reduce the risk of duplicate payments.
B. The procedures used to monitor vendors should be based on the red flags of vendor schemes that pose the
greatest risk.
C. Vendors should be subject to a background check before they are added to the vendor master file.
D. The person who maintains the vendor master file should have the authority to approve invoices for payment.
The person responsible for the vendor master file should not be authorized to approve invoices for
payment or to sign checks.
Procurement entities must maintain an accurate and up-to-date vendor master file. An inaccurate or
incomplete vendor master file can result in greater risks of duplicate payments, unfavorable payment
terms, and noncompliance with regulations. Thus, the vendor master file should be updated continuously
and reviewed on a regular basis for inaccurate or incomplete records.
To manage vendors, a procuring entity must establish clear procedures for setting up new vendors and
changing vendor master file records. For example, procuring entities should require accounts payable
personnel to verify new vendors (i.e., ensure that the vendors are qualified) by conducting a vendor
background check before entering them into the vendor master file.
Procuring entities must also use monitoring and auditing systems reasonably designed to detect criminal
conduct by their vendors. The procedures to monitor vendors are similar to those used to evaluate
vendors, and they should be based on red flags of vendor schemes that pose the greatest risk.
16. Which of the following is NOT an appropriate technique for detecting a nonconforming
goods or services scheme?
A. Segregating and identifying the source of the suspect goods or materials
B. Reviewing correspondence and contract files for indications of noncompliance with specifications
C. Reviewing the contractor’s statements, claims, invoices, and supporting documents
D. Reviewing the number of qualified bidders who submitted proposals
Nonconforming goods or services fraud, also known as product substitution or failure to meet contract
specifications, refers to attempts by contractors to deliver goods or services to the procuring entity that do
not conform to the underlying contract specifications. Once contractors deliver goods that do not conform
to the contract, they bill and receive payment for conforming goods or services without informing the
purchaser of the deficiency.
To detect nonconforming schemes, the fraud examiner should, at a minimum, examine the following for
red flags:
To detect nonconforming schemes through more extensive methods, the fraud examiner should:
Review correspondence and contract files for indications of noncompliance with specifications.
Request assistance from outside technical personnel to conduct after-the-fact tests.
Inspect or test questioned goods or materials by examining packaging, appearance, and
description to determine if the items are appropriate.
Segregate and identify the source of the suspect goods or materials.
Review inspection reports to determine whether the work performed and materials used in a
project were inspected and considered acceptable.
Review the contractor’s books, payroll, and expense records to see if they incurred necessary
costs to comply with contract specifications.
Review the inspection and testing reports of questioned goods or materials.
Conduct routine and unannounced inspections and tests of questioned goods or materials.
Examine the contractor’s books and manufacturing or purchase records for additional evidence,
looking for discrepancies between claimed and actual costs, contractors, etc.
Interview procurement personnel about the presence of any red flags or other indications of
noncompliance.
Search and review external records (e.g., court records, prior complaints, audit reports,
investigative reports, media sources) to determine if there is any history of misconduct.
17. To prevent contract and procurement fraud, companies should implement a continuous
monitoring program to monitor their procurement activities.
A. True
B. False
It is important for companies to implement a continuous, self-auditing program to monitor the performance
of their procurement activities. Continuous monitoring uses data analytics on a perpetual basis, thereby
allowing management to identify and report fraudulent activity more rapidly.
18. Which of the following is a red flag of a procurement fraud scheme in which vendors are
colluding to circumvent the competitive bidding process?
C. There is a pattern where the last party to bid wins the contract
Common red flags of procurement fraud schemes involving collusion among contractors include:
19. Which of the following is an appropriate technique for detecting change order abuse?
A. Interviewing complaining contractors and unsuccessful bidders about the presence of red flags
B. Examining contract change orders that increase the scope or price of the existing contract
C. Reviewing any change orders submitted by the contractor that add new items
20. Which of the following is NOT a common red flag of a bid tailoring scheme?
A. There are unusually broad specifications for the type of goods or services being procured.
B. A contract is not rebid even though fewer than the minimum number of bids are received.
Bid tailoring schemes (also known as specifications schemes) occur during the presolicitation phase. In
these schemes, an employee with procurement responsibilities, often in collusion with a contractor, drafts
bid specifications in a way that gives an unfair advantage to a certain contractor.
Some common red flags of bid tailoring include:
A. Reviewing the standard and actual labor rates to determine if there are any significant differences
B. Inspecting questioned goods or materials by examining packaging, appearance, and description
C. Examining the total hours expended on the contract and comparing them to hours billed
D. Comparing the direct and indirect labor account totals from the prior year to the current year
C. Submit invoices for work that was not performed or materials that were not delivered.
D. Submit token bids that are not serious attempts to win the contract.
Schemes involving collusion among contractors seek to circumvent the competitive bidding process. In
these schemes, competitors in the same market collude to defeat competition or to inflate the prices of
goods and services artificially.
Complementary bidding (also known as protective, shadow, or cover bidding) is a common form of
collusion between competitors, and it occurs when competitors submit token bids that are not serious
attempts to win the contract. Token bids give the appearance of genuine bidding, but, by submitting token
bids, the conspirators can influence the contract price and who is awarded the contract.
23. Which of the following practices is a potential indicator of a bid splitting scheme?
C. Two or more purchases from the same supplier in amounts just above competitive bidding limits
D. Sequential purchases under the competitive bidding limits that are followed by change orders
In general, procuring entities must use competitive methods for projects over a certain amount. To avoid
this requirement, a dishonest employee might break up a large project into several small projects that fall
below the mandatory bidding level and award some or all of the component jobs to a contractor with
whom the employee is conspiring.
Some common red flags of bid splitting schemes include:
Two or more similar or identical procurements from the same supplier in amounts just under
upper-level review or competitive-bidding limits
Two or more consecutive related procurements from the same contractor that fall just below the
competitive-bidding or upper-level review limits
Unjustified split purchases that fall under the competitive-bidding or upper-level review limits
Sequential purchases just under the upper-level review or competitive-bidding limits
Sequential purchases under the upper-level review or competitive-bidding limits that are followed
by change orders
24. Which of the following is NOT an appropriate technique for detecting a nonconforming
goods or services scheme?
A. Determining if contract costs have exceeded or are expected to exceed the contract value
B. Interviewing procurement personnel about the presence of any red flags
D. Reviewing the inspection and test reports of questioned goods or materials
Determining if contract costs have exceeded or are expected to exceed the contract value is a technique
for detecting a cost mischarging scheme involving materials, not a nonconforming goods or services
scheme.
Nonconforming goods or services fraud, also known as product substitution or failure to meet contract
specifications, refers to attempts by contractors to deliver goods or services to the procuring entity that do
not conform to the underlying contract specifications. Once contractors deliver goods that do not conform
to the contract, they bill and receive payment for conforming goods or services without informing the
purchaser of the deficiency.
To detect nonconforming schemes, the fraud examiner should, at a minimum, examine the following for
red flags:
To detect nonconforming schemes through more extensive methods, the fraud examiner should:
Review correspondence and contract files for indications of noncompliance with specifications.
Request assistance from outside technical personnel to conduct after-the-fact tests.
Inspect or test questioned goods or materials by examining packaging, appearance, and
description to determine if the items are appropriate.
Segregate and identify the source of the suspect goods or materials.
Review inspection reports to determine whether the work performed and materials used in a
project were inspected and considered acceptable.
Review the contractor’s books, payroll, and expense records to see if they incurred necessary
costs to comply with contract specifications.
Review the inspection and testing reports of questioned goods or materials.
Conduct routine and unannounced inspections and tests of questioned goods or materials.
Examine the contractor’s books and manufacturing or purchase records for additional evidence,
looking for discrepancies between claimed and actual costs, contractors, etc.
Interview procurement personnel about the presence of any red flags or other indications of
noncompliance.
Search and review external records (e.g., court records, prior complaints, audit reports,
investigative reports, media sources) to determine if there is any history of misconduct.
25. Which of the following is NOT a red flag that might indicate the existence of a need
recognition scheme?
A. The purchasing entity's materials are being ordered at the optimal reorder point.
B. The purchasing entity does not have a satisfactory list of backup suppliers.
C. The purchasing entity has unusually high requirements for stock and inventory levels.
D. The purchasing entity has large numbers of surplus items written off as scrap.
Generally, procurement actions begin with the procuring entity making a determination of its general
needs. These initial determinations include assessments of the types and amounts of goods or services
required to meet the entity’s needs. In need recognition schemes, procurement employees convince their
employer that it needs excessive or unnecessary products or services.
There are several red flags that might indicate a need recognition scheme. An organization with unusually
high requirements for stock and inventory levels might reveal a situation in which a corrupt employee is
seeking to justify unnecessary purchases from a certain supplier. Likewise, if an organization’s materials
are not being ordered at the optimal reorder point, this should raise a red flag. An employee might also
justify unnecessary purchases of inventory by writing off large numbers of surplus items as scrap. As
these items leave the inventory, they open up spaces to justify additional purchases. Another indicator of
a need recognition scheme is a need that is defined in a way that can only be met by a certain supplier or
contractor. In addition, the failure to develop a satisfactory list of backup suppliers might reveal an
unusually strong attachment to a primary supplier—an attachment that is explainable by the acceptance
of bribes from that supplier.
26. Which of the following activities is included in the post-award and administration phase of
procurements involving open and free competition?
During the post-award and administration phase, the contracting parties fulfill their respective duties
through the performance of their contractual obligations. Activities that occur during this phase include
contract modifications (i.e., change orders); review of completed portions and release of monies; and
assessment of deliverables for compliance with the contract terms, including quality control.
Payment Fraud
1. Credit and debit card counterfeiting operations might include the use of which of the following?
One common method of producing counterfeit credit and debit cards includes the use of blank plastic
cards. This scheme uses credit-card-sized plastic with embossed account numbers and names. This
scheme often works in conjunction with a corrupt and collusive merchant or a merchant’s employee.
Other counterfeit cards are wholly manufactured using high-speed printing facilities. Additional tools that
are common in the reproduction process include desktop computers, embossers, tipping foil, and
laminators.
A. A customer is pumping gasoline and notices a strange device attached to the self-payment apparatus
B. A server walks away from a customer’s table to process a card payment
A. A person who has stolen information about another person’s bank account instructs a biller to obtain payment from
B. An employee of a person-to-person (P2P) provider misappropriates a customer’s account and password information
C. A hacker obtains consumer account and password information to direct funds from consumers’ accounts
There are several ways in which fraud can be perpetrated through the electronic transfer of funds.
Potential sources of fraud include the following:
A biller might send a bill for services not rendered or for goods never sent.
A person who has obtained information about another person’s bank account might instruct a
biller to obtain payment from the other person’s account.
A hacker might obtain passwords and usernames from an aggregator and use that information to
direct transfers from a consumer’s bank account.
An employee at the site providing electronic bill presentment and payment (EBPP) services who
knows consumers’ usernames and passwords for screen-scraping purposes might use that
information to direct transfers from consumers’ bank accounts.
A bank employee might use customer information to direct transfers from a customer’s account.
4. Which of the following is NOT a red flag of a fraudulent credit or debit card
transaction?
D. A customer insists on taking a large item home even when delivery is included.
While any of the following can occur in a perfectly legitimate transaction, these characteristics
are frequently present during fraudulent transactions. Tellers and merchants should be advised to be alert
for customers who:
Purchase an unusually large number of expensive items.
Make random purchases, selecting items with little regard to size, quality, or value.
Do not ask questions on major purchases.
Sign the sales draft slowly or awkwardly.
Charge expensive items on a newly valid card.
Cannot provide a photo identification when asked.
Rush the merchant or teller.
Purchase a large item, such as a television, and insist on taking it at the time, even when delivery
is included in the price.
Make purchases and leave the store but then return to make more purchases.
Become argumentative with the teller or merchant while waiting for the transaction to be
completed.
Make large purchases just as the store is closing.
5. Due to the paper trail involved and the emphasis placed on the problem by law
enforcement, the vast majority of check fraud offenders are pursued and prosecuted.
A. True
B. False
Many merchants overburden police and prosecutors with reports of check fraud rather than implementing
effective training and controls to help prevent such schemes from the outset; therefore, law enforcement
and prosecutors do not have the time or manpower to pursue all such cases and are often uneager to do
so. Furthermore, check fraud perpetrators frequently migrate from one location to another, making their
apprehension and prosecution difficult.
A. Smart cards are embedded with a microchip that is not easily replicated.
B. Smart cards are designed to prevent fraudulent online card-not-present (CNP) transactions.
C. Smart cards are immune from physical, side-channel, and environmental attacks.
D. Smart cards contain special holograms that identify the cardholder.
A smart card is a plastic card, the size of a credit or debit card, embedded with a microchip. A key
advantage of smart cards is that, unlike regular magnetic stripe credit and debit cards, they cannot be
easily replicated. Similarly, smart cards cannot be easily counterfeited, which greatly reduces the potential
for fraud with in-person transactions. Smart cards include a wide variety of hardware and software
features capable of detecting and reacting to tampering attempts and countering possible attacks. If
someone tries to tamper with a chip on a smart card, the card detects the intrusion and shuts itself down,
rendering the card useless.
Although smart cards are designed to withstand different kinds of potential attacks on security, they are
not immune from attacks. There are four main classes of attacks on smart cards: physical, side-channel,
software, and environmental.
While the adoption of smart cards has significantly reduced fraud for card-present (CP) transactions,
much of the fraud has been displaced to card-not-present (CNP) transactions on the internet. Significant
increases in CNP fraud have occurred globally in the years following the transition to smart cards. Large-
scale data breaches and the continued increase in online spending have also contributed to the rising
volume of CNP fraud.
7. Which of the following is a reason why prepaid debit and gift card fraud schemes are
attractive to fraudsters?
C. Prepaid cards are difficult to track after they have been purchased and activated
In recent years, prepaid cards have gained popularity. Prepaid gift and debit cards are commonly used by
those who do not have a bank account or who prefer relatively anonymous payment methods.
Unfortunately, these consumers are often targeted with prepaid card fraud schemes that can manifest in
many ways. Prepaid cards can be purchased at countless retailers and are difficult to track after they
have been purchased and activated.
8. Liam is the manager of a small bank that has recently experienced an increase in the
amount of fraud related to electronic funds transfers (EFTs). Which of the following
methods can Liam implement to reduce his bank’s exposure to EFT fraud?
A. Separate the duties of bank employees so that responsibilities for the issuance of access devices are
separate from the issuance of PINs
B. Ensure that PINs are mailed to the customer separately from other associated account information
C. Send a welcome letter to new customers to determine if the address submitted on the account application
is valid
A. The computer-initiated deposit of an employee’s paycheck directly into the employee’s bank account
B. A transfer of funds from a checking account to a savings account performed on a personal computer
D. An airline ticket purchased through the internet with the use of a credit card
An electronic funds transfer (EFT) is any transfer of funds, other than one originated by a check or similar
paper instrument, that is initiated through an electronic terminal, telephonic instrument, or computer or
magnetic tape that orders or purports to authorize a financial institution to debit or credit an account.
Because it does not result in a transfer of funds, the use of a credit card to make a payment does not
constitute an EFT. Although jurisdiction-specific regulations and terminology might differ, each of the
following could generally be considered an EFT:
A customer’s withdrawal of funds from the customer’s own account by use of an automated teller
machine (ATM)
A customer’s transfer of funds from the customer’s checking account to the customer’s savings
account at the same financial institution initiated by the customer through a personal computer
A customer’s transfer of funds from the customer’s checking account to the customer’s savings
account at the same financial institution initiated by the customer through the bank’s automated
telephone service
A customer’s use of a debit card to purchase goods from a merchant who swipes the card
through a point-of-sale (POS) device to authorize the deduction of the amount of the sale from
the customer’s checking account
A customer’s transfer of funds from the customer’s bank account to a third party initiated by the
customer through a personal computer
An employer’s instruction, initiated by computer or through a magnetic tape, to a financial
institution to deposit funds representing an employee’s pay into the employee’s account
A noncustomer’s instruction, initiated by computer or through a magnetic tape, to a financial
institution to withdraw funds from a customer’s checking account and transfer the funds to a
noncustomer’s bank account
C. Microchip
A card skimming scheme requires a device, often referred to as a skimmer, wedge, or shimmer, that
scans and stores a large amount of credit and debit card numbers; skimmers scan magnetic strips, while
shimmers read microchips in smart cards.
11. If a customer reports the loss or theft of an access device, the financial institution should
attempt to prevent fraud related to electronic funds transfers (EFTs) by canceling the
existing card, personal identification number (PIN), or other form of access and issuing a
new one.
A. True
B. False
The following are safeguards that banks can perform to reduce the risk that they or their customers
become victimized by unauthorized electronic funds transfers (EFTs):
Confirm phone and mailing addresses on the application to ensure that they are consistent with
information about the applicant that is available from other sources and, with respect to existing
customers, consistent with current records about these customers. This might involve obtaining
credit reports about the applicant or obtaining copies of utility bills that show the applicant’s
address.
Make sure that the area or city code in the applicant’s telephone number matches the
geographical area for the applicant’s address.
Send a welcome letter to the address on the application with the bank’s return address so that the
letter is returned if the applicant does not live there.
Verify by telephone or additional mailings any change of address requests in the same way that
new account applications are verified.
If a customer reports the loss or theft of an access device, cancel the existing card, personal
identification number (PIN), or other form of access and issue a new one.
If a customer reports that a person previously authorized to use an access device no longer has
that authority, cancel all cards, PINs, or other access devices and issue new ones to the
customer.
Always mail PINs separately from other information, such as usernames, with which they are
associated.
Separate the responsibility of bank employees who have custody of information relating to access
devices from those who have responsibility for issuance, verification, or reissuance of PINs.
Ensure that any communication concerning usernames or passwords is sent in a secure,
encrypted format.
Require customers who register for electronic bill presentment and payment (EBPP) or person-to-
person (P2P) systems to provide information indicating that they are authorized to use the bank
account or credit card from which payments will be made.
Employ multifactor authentication to verify transfers via EBPP or P2P systems.
12. When fabricating a counterfeit credit or debit card, which of the following is the most
difficult facet to reproduce?
The hologram is the most difficult aspect of a credit or debit card to reproduce. True holograms use a
lenticular refraction process; counterfeits are generally only reflected materials, usually foil with an image
stamped on it. These decals are attached to the card's surface rather than fixed into the plastic, as is the
case with legitimate cards. Some fraudulent holograms do not change colors—as legitimate ones do—
when viewed from various angles.
13. Smart cards include a wide variety of hardware and software features capable of
detecting and reacting to tampering attempts and countering possible attacks.
A. True
B. False
A smart card is a plastic card, the size of a credit or debit card, embedded with a microchip. A key
advantage of smart cards is that, unlike regular magnetic stripe credit and debit cards, they cannot be
easily replicated. Similarly, smart cards cannot be easily counterfeited, which greatly reduces the potential
for fraud with in-person transactions. Smart cards include a wide variety of hardware and software
features capable of detecting and reacting to tampering attempts and countering possible attacks. If
someone tries to tamper with a chip on a smart card, the card detects the intrusion and shuts itself down,
rendering the card useless.
14. Fraudsters often use stolen credit or debit cards to purchase prepaid gift or debit cards to
quickly convert illicit card funds into a legitimate cash equivalent.
A. True
B. False
Among the schemes that prepaid cards are used to facilitate are credit and debit card theft schemes.
Thieves use stolen credit and debit cards to purchase prepaid debit or gift cards, thus quickly converting
the illicit credit or debit card funds into a legitimate cash equivalent.
15. Which of the following factors enables or enhances fraudsters’ abilities to conduct
account takeover schemes?
B. Consumers using the same log-in and password information on multiple accounts
D. Payment accounts offering the ability to be notified when they are accessed or changed
16. To conduct an electronic payment using a person-to-person (P2P) system, the two
individuals must meet in person at a financial institution to sign an order requesting the
transfer of money from one person’s account to the other.
A. True
B. False
Account takeover fraud occurs when a fraudster surreptitiously takes control of a payment account.
Targeted accounts can include credit cards, banking, brokerage, or any type of online retail account (e.g.,
Amazon).
Because consumers often use the same username and password for multiple accounts, hackers
commonly create code that can run credentials obtained from a data breach at one company to see if
they are valid at another.
Account takeover fraud has increased significantly in recent years. Consumers should opt for multifactor
authentication when available, request notification of account access or changes when offered, and
regularly check any online accounts that hold payment information.
17. Which of the following steps is/are often taken during an account takeover scheme?
Account takeover fraud occurs when a fraudster surreptitiously takes control of a payment account.
Targeted accounts can include credit cards, banking, brokerage, or any type of online retail account (e.g.,
Amazon).
To take over an account, thieves obtain email addresses or other log-in information and use various
means to obtain passwords, such as phishing emails or password-cracking botnet attacks.
Once the thief overtakes an account, communication methods and contact information are altered to keep
the account holder unaware of the fraudulent activity. The thief is then free—depending on the type of
account—to place orders using stored payment information, transfer funds, or request duplicate credit or
debit cards.
18. Which of the following types of transactions is LEAST LIKELY to use a person-to-person
(P2P) payment system?
19. The equipment needed to run a check fraud ring is very expensive and difficult to obtain.
A. True
B. False
Check fraud rings thrive because the items needed to commit check fraud are easily obtainable and the
cost is minimal. Often, the only necessary equipment for a check fraud ring is a scanner, printer, and
personal computer.
20. Mario, an employee of a person-to-person (P2P) payment company, has been writing
down the account numbers and passwords of customer accounts with the intent of
fraudulently using them to pay for items he purchases online. Mario is engaging in:
21. Frequent check deposits in round numbers or for the same amount and checks written to
individuals for large, even amounts might be indicators of check fraud.
A. True
B. False
Frequent deposits in round numbers or for the same amount and checks issued to individuals for large,
even amounts are both indicators of check fraud.
22. Which of the following is NOT a common type of credit or debit card fraud?
C. Skimming
D. Profiling
Advance payments, card counterfeiting, and skimming are all forms of credit and debit card fraud;
profiling is not a type of credit or debit card fraud.
23. Jason, a server at a popular restaurant, takes a customer’s credit card to process a
payment. While he is on the other side of the dining area with his back facing the
customer, Jason swipes the card through a small device that he regularly uses to steal
his customers’ card information. Jason is engaging in a scheme known as card
________.
A. Scanning
C. Probing
A. True
B. False
Check fraud is considered a relatively low-risk crime; the chances of being arrested and prosecuted are
low, and the penalties are relatively mild in most jurisdictions.
25. Mobile payments that require biometric authentication, such as a partial fingerprint or
three-dimensional facial scan, are usually less vulnerable to cyberattacks.
A. True
B. False
The ubiquitous presence of mobile devices has fostered a demand for mobile payments. These payments
are typically made through contactless technology, such as digital wallets or applications—also known
as in-app payments. Most mobile payments require users to authenticate themselves, and the technology
available in many mobile devices allows for biometric authentication, such as a partial fingerprint or three-
dimensional facial scan, which is difficult for fraudsters to bypass.
Mobile payments that do not require or offer biometric authentication can be more vulnerable to
cyberattacks due to the common practice of using the same log-in credentials for multiple applications. If
one application is hacked, criminals might attempt to access various platforms with the same credentials.