Introduction
Investment and business fraud schemes cause massive financial losses globally. These sophisticated scams exploit people's desire for wealth and financial security. Understanding these fraud types is essential for investigators dealing with complex financial crimes.
By the end of this part, you will understand various investment fraud schemes, identify their warning signs, learn investigation techniques, and know the applicable legal framework.
Ponzi Scheme
A Ponzi scheme is a fraudulent investment operation where returns for earlier investors are paid using capital from newer investors, rather than from legitimate profits. Named after Charles Ponzi who became famous for this technique in the 1920s.
How Ponzi Schemes Work
- Promise: Fraudster promises high returns with little or no risk
- Initial Investment: Early investors put in money
- Early Returns: First investors receive impressive returns (from new investors' money)
- Word Spreads: Satisfied investors bring in friends and family
- Growth Phase: Scheme grows as more people invest
- Collapse: Eventually, new investments can't cover promised returns
Warning Signs (Red Flags)
Guaranteed High Returns
Promises of consistent high returns (20-50% annually) with little or no risk.
Unregistered Investment
Not registered with SEBI or other regulatory authorities.
Secretive Strategy
Investment strategy is vague or described as "proprietary" and confidential.
Withdrawal Difficulties
Difficulty receiving payments or cashing out investment.
The Saradha Group scam was one of India's largest Ponzi schemes, collecting approximately Rs. 2,500 crore from over 1.7 million investors. Operating under the guise of a chit fund and collective investment scheme, it collapsed in 2013.
Investigation Approach: ED, CBI, and state police coordinated to trace fund flows, seize assets, and arrest key operators. Investigation revealed a complex web of shell companies used for money laundering.
Investigation Techniques
- Trace fund flows from investor accounts to scheme operators
- Identify shell companies and their directors
- Analyze bank account transactions for patterns
- Interview early investors who received returns
- Examine promotional materials and promises made
- Calculate total investments vs. actual business revenue
Forex Trading Scam
Forex (Foreign Exchange) trading scams exploit the complexity and volatility of currency markets to defraud victims. These schemes often operate online and target inexperienced traders.
Common Forex Scam Types
| Type | Description | Red Flag |
|---|---|---|
| Signal Seller | Sells trading signals claiming to guarantee profits | No verifiable track record |
| Robot/EA Scam | Automated trading software promising consistent profits | Unrealistic backtesting results |
| Broker Scam | Unregulated broker manipulates trades against clients | Not registered with SEBI/RBI |
| Managed Account | Fund manager trades on behalf, but actually steals funds | Withdrawal restrictions |
| Pyramid MLM | Recruitment-based forex scheme | Emphasis on recruiting, not trading |
Forex trading through unauthorized platforms is illegal in India. Only RBI-authorized dealers can offer forex trading services. SEBI has repeatedly warned investors about unauthorized forex trading platforms operating from India and abroad.
Investigation Approach
- Verify if the platform is registered with SEBI/RBI
- Trace payment flows to platform operators
- Analyze trading platform's backend data (if accessible)
- Check domain registration and hosting details
- Coordinate with international agencies for offshore platforms
- Gather evidence from multiple victims to establish pattern
Crypto Investment Fraud
Cryptocurrency investment fraud has exploded with the popularity of digital currencies. These scams leverage the complexity and novelty of blockchain technology to deceive victims.
Types of Crypto Investment Fraud
Fake ICOs/Token Sales
Fraudulent initial coin offerings that collect funds and disappear.
Pump and Dump
Artificially inflating cryptocurrency price then selling, leaving investors with losses.
Fake Exchanges
Fraudulent trading platforms that steal deposits or manipulate trades.
Trading Bots
Automated trading systems promising guaranteed returns but actually draining funds.
Common Crypto Scam Modus Operandi
- Lure: Social media ads or influencer endorsements promising huge returns
- Platform: Professional-looking website with fake testimonials
- Initial Investment: Small amounts accepted, showing quick "profits"
- Confidence Building: Victims allowed to withdraw small amounts
- Larger Investment: Encouraged to invest more for better returns
- Exit: Platform becomes inaccessible or withdrawal blocked
Be extremely cautious of: guaranteed high returns, celebrity endorsements, pressure to invest quickly, complex withdrawal requirements, and platforms not disclosing their physical location or team identities.
Stock Market Scam
Stock market scams manipulate securities prices or deceive investors about investment opportunities. These can involve market manipulation, insider trading, or fraudulent advisory services.
Types of Stock Market Fraud
| Type | Method | Legal Provision |
|---|---|---|
| Pump and Dump | Spread false information to inflate stock price | SEBI (PFUTP) Regulations |
| Front Running | Trading ahead of client orders using insider knowledge | SEBI Act Section 12A |
| Circular Trading | Creating artificial volume through coordinated trades | SEBI (PFUTP) Regulations |
| Tip Selling | Selling fake stock tips claiming guaranteed profits | SEBI (IA) Regulations |
| Unauthorized Portfolio Management | Managing funds without SEBI registration | SEBI (PMS) Regulations |
Investigation Steps
- Analyze trading patterns for suspicious activity
- Identify connections between traders and promoters
- Review social media and messaging platforms for coordinated promotion
- Examine timing of trades relative to information release
- Check SEBI registration status of advisors
- Correlate price movements with promotional activity
Business Email Compromise (BEC)
BEC is a sophisticated scam targeting businesses that conduct wire transfers. Criminals compromise legitimate business email accounts or spoof executive email addresses to trick employees into transferring funds or revealing sensitive information.
BEC Attack Types
CEO Fraud
Attacker impersonates CEO requesting urgent wire transfer to finance department.
Invoice Fraud
Compromising vendor email to send fake invoices with changed bank details.
Account Compromise
Hacking employee email to send payment requests to contacts.
Attorney Impersonation
Impersonating lawyers handling confidential or time-sensitive matters.
BEC Investigation Approach
- Email Header Analysis: Examine full email headers to identify spoofing or compromise
- IP Tracing: Trace origin IP addresses of fraudulent emails
- Account Review: Check for unauthorized email forwarding rules
- Login History: Analyze account login locations and times
- Financial Trail: Trace transferred funds through beneficiary accounts
- Domain Analysis: Check for lookalike domains used in spoofing
A Mumbai-based company lost Rs. 12 crore in a BEC attack where fraudsters compromised their vendor's email account. The attackers monitored email communications for months, then sent a fake invoice with altered bank details during a legitimate transaction.
Investigation Key: Email header analysis revealed the fraudulent email originated from Nigeria. SWIFT recall was attempted but only Rs. 2 crore was recovered. Remaining funds had already been withdrawn.
Prevention and Detection
- Implement multi-factor authentication for email accounts
- Verify payment changes through phone call to known numbers
- Use email authentication (SPF, DKIM, DMARC)
- Train employees to recognize BEC attempts
- Establish dual authorization for large transfers
Legal Framework
Applicable Laws
| Law | Relevant Sections | Application |
|---|---|---|
| IT Act 2000 | Sections 66, 66C, 66D | Computer fraud, identity theft, cheating by personation |
| BNS 2023 | Sections 318, 319, 316 | Cheating, cheating by personation, criminal breach of trust |
| SEBI Act | Sections 11, 12A, 24 | Market manipulation, fraudulent trades |
| PMLA 2002 | Sections 3, 4 | Money laundering from proceeds of crime |
| Companies Act | Sections 447, 448 | Fraud by companies |
| Prize Chits and MLM Act | Various | Unauthorized chit funds and MLM schemes |
- Ponzi schemes use new investor funds to pay returns to earlier investors
- Forex trading through unauthorized platforms is illegal in India
- Crypto investment fraud exploits lack of regulatory clarity and technical complexity
- Stock market scams involve price manipulation and fake advisory services
- BEC attacks target businesses through email compromise and social engineering
- Investigation requires tracing fund flows and analyzing digital evidence
- Multiple laws apply depending on the nature and scale of fraud