Part 2 / 6

Investment & Business Fraud

🕑 90-120 minutes 📖 Advanced Level 📋 Module 7

Introduction

Investment and business fraud schemes cause massive financial losses globally. These sophisticated scams exploit people's desire for wealth and financial security. Understanding these fraud types is essential for investigators dealing with complex financial crimes.

📚 Learning Objectives

By the end of this part, you will understand various investment fraud schemes, identify their warning signs, learn investigation techniques, and know the applicable legal framework.

Ponzi Scheme

A Ponzi scheme is a fraudulent investment operation where returns for earlier investors are paid using capital from newer investors, rather than from legitimate profits. Named after Charles Ponzi who became famous for this technique in the 1920s.

How Ponzi Schemes Work

  1. Promise: Fraudster promises high returns with little or no risk
  2. Initial Investment: Early investors put in money
  3. Early Returns: First investors receive impressive returns (from new investors' money)
  4. Word Spreads: Satisfied investors bring in friends and family
  5. Growth Phase: Scheme grows as more people invest
  6. Collapse: Eventually, new investments can't cover promised returns

Warning Signs (Red Flags)

📈

Guaranteed High Returns

Promises of consistent high returns (20-50% annually) with little or no risk.

🔍

Unregistered Investment

Not registered with SEBI or other regulatory authorities.

📄

Secretive Strategy

Investment strategy is vague or described as "proprietary" and confidential.

🔒

Withdrawal Difficulties

Difficulty receiving payments or cashing out investment.

🔍
Case Study: Saradha Group Scam (India)

The Saradha Group scam was one of India's largest Ponzi schemes, collecting approximately Rs. 2,500 crore from over 1.7 million investors. Operating under the guise of a chit fund and collective investment scheme, it collapsed in 2013.

Investigation Approach: ED, CBI, and state police coordinated to trace fund flows, seize assets, and arrest key operators. Investigation revealed a complex web of shell companies used for money laundering.

Investigation Techniques

  • Trace fund flows from investor accounts to scheme operators
  • Identify shell companies and their directors
  • Analyze bank account transactions for patterns
  • Interview early investors who received returns
  • Examine promotional materials and promises made
  • Calculate total investments vs. actual business revenue

Forex Trading Scam

Forex (Foreign Exchange) trading scams exploit the complexity and volatility of currency markets to defraud victims. These schemes often operate online and target inexperienced traders.

Common Forex Scam Types

TypeDescriptionRed Flag
Signal SellerSells trading signals claiming to guarantee profitsNo verifiable track record
Robot/EA ScamAutomated trading software promising consistent profitsUnrealistic backtesting results
Broker ScamUnregulated broker manipulates trades against clientsNot registered with SEBI/RBI
Managed AccountFund manager trades on behalf, but actually steals fundsWithdrawal restrictions
Pyramid MLMRecruitment-based forex schemeEmphasis on recruiting, not trading
Regulatory Status in India

Forex trading through unauthorized platforms is illegal in India. Only RBI-authorized dealers can offer forex trading services. SEBI has repeatedly warned investors about unauthorized forex trading platforms operating from India and abroad.

Investigation Approach

  • Verify if the platform is registered with SEBI/RBI
  • Trace payment flows to platform operators
  • Analyze trading platform's backend data (if accessible)
  • Check domain registration and hosting details
  • Coordinate with international agencies for offshore platforms
  • Gather evidence from multiple victims to establish pattern

Crypto Investment Fraud

Cryptocurrency investment fraud has exploded with the popularity of digital currencies. These scams leverage the complexity and novelty of blockchain technology to deceive victims.

Types of Crypto Investment Fraud

💰

Fake ICOs/Token Sales

Fraudulent initial coin offerings that collect funds and disappear.

📊

Pump and Dump

Artificially inflating cryptocurrency price then selling, leaving investors with losses.

💻

Fake Exchanges

Fraudulent trading platforms that steal deposits or manipulate trades.

🤖

Trading Bots

Automated trading systems promising guaranteed returns but actually draining funds.

Common Crypto Scam Modus Operandi

  1. Lure: Social media ads or influencer endorsements promising huge returns
  2. Platform: Professional-looking website with fake testimonials
  3. Initial Investment: Small amounts accepted, showing quick "profits"
  4. Confidence Building: Victims allowed to withdraw small amounts
  5. Larger Investment: Encouraged to invest more for better returns
  6. Exit: Platform becomes inaccessible or withdrawal blocked
Warning Signs

Be extremely cautious of: guaranteed high returns, celebrity endorsements, pressure to invest quickly, complex withdrawal requirements, and platforms not disclosing their physical location or team identities.

Stock Market Scam

Stock market scams manipulate securities prices or deceive investors about investment opportunities. These can involve market manipulation, insider trading, or fraudulent advisory services.

Types of Stock Market Fraud

TypeMethodLegal Provision
Pump and DumpSpread false information to inflate stock priceSEBI (PFUTP) Regulations
Front RunningTrading ahead of client orders using insider knowledgeSEBI Act Section 12A
Circular TradingCreating artificial volume through coordinated tradesSEBI (PFUTP) Regulations
Tip SellingSelling fake stock tips claiming guaranteed profitsSEBI (IA) Regulations
Unauthorized Portfolio ManagementManaging funds without SEBI registrationSEBI (PMS) Regulations

Investigation Steps

  • Analyze trading patterns for suspicious activity
  • Identify connections between traders and promoters
  • Review social media and messaging platforms for coordinated promotion
  • Examine timing of trades relative to information release
  • Check SEBI registration status of advisors
  • Correlate price movements with promotional activity

Business Email Compromise (BEC)

BEC is a sophisticated scam targeting businesses that conduct wire transfers. Criminals compromise legitimate business email accounts or spoof executive email addresses to trick employees into transferring funds or revealing sensitive information.

BEC Attack Types

👥

CEO Fraud

Attacker impersonates CEO requesting urgent wire transfer to finance department.

📦

Invoice Fraud

Compromising vendor email to send fake invoices with changed bank details.

📧

Account Compromise

Hacking employee email to send payment requests to contacts.

👤

Attorney Impersonation

Impersonating lawyers handling confidential or time-sensitive matters.

BEC Investigation Approach

  1. Email Header Analysis: Examine full email headers to identify spoofing or compromise
  2. IP Tracing: Trace origin IP addresses of fraudulent emails
  3. Account Review: Check for unauthorized email forwarding rules
  4. Login History: Analyze account login locations and times
  5. Financial Trail: Trace transferred funds through beneficiary accounts
  6. Domain Analysis: Check for lookalike domains used in spoofing
🔍
Case Study: BEC Attack on Indian Company

A Mumbai-based company lost Rs. 12 crore in a BEC attack where fraudsters compromised their vendor's email account. The attackers monitored email communications for months, then sent a fake invoice with altered bank details during a legitimate transaction.

Investigation Key: Email header analysis revealed the fraudulent email originated from Nigeria. SWIFT recall was attempted but only Rs. 2 crore was recovered. Remaining funds had already been withdrawn.

Prevention and Detection

  • Implement multi-factor authentication for email accounts
  • Verify payment changes through phone call to known numbers
  • Use email authentication (SPF, DKIM, DMARC)
  • Train employees to recognize BEC attempts
  • Establish dual authorization for large transfers

Applicable Laws

LawRelevant SectionsApplication
IT Act 2000Sections 66, 66C, 66DComputer fraud, identity theft, cheating by personation
BNS 2023Sections 318, 319, 316Cheating, cheating by personation, criminal breach of trust
SEBI ActSections 11, 12A, 24Market manipulation, fraudulent trades
PMLA 2002Sections 3, 4Money laundering from proceeds of crime
Companies ActSections 447, 448Fraud by companies
Prize Chits and MLM ActVariousUnauthorized chit funds and MLM schemes
📚 Key Takeaways
  • Ponzi schemes use new investor funds to pay returns to earlier investors
  • Forex trading through unauthorized platforms is illegal in India
  • Crypto investment fraud exploits lack of regulatory clarity and technical complexity
  • Stock market scams involve price manipulation and fake advisory services
  • BEC attacks target businesses through email compromise and social engineering
  • Investigation requires tracing fund flows and analyzing digital evidence
  • Multiple laws apply depending on the nature and scale of fraud