Encyclopedia of Security and Emergency Management

Living Edition
| Editors: Lauren R. Shapiro, Marie-Helen Maras

Investigations: Bank Fraud

  • Sonny SmithEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-69891-5_52-1
Fraud, as an all-encompassing term, is a problem that has negatively affected institutions across the world to the tune of approximately $3.5 trillion per year, with $16.8 billion in US losses (Pascual et al. 2018). In 2014, McAfee and the Center for Strategic and International Studies found the losses from cybercrime alone to be between $375 and $575 billion per year (Insurance Information Institute 2018). Schemes such as identity fraud, credit card fraud, skimming, wire fraud, check tampering, and financial statement fraud have been some of the more common and lucrative methods employed in these schemes. These fraud schemes impact multiple sectors of society, such as government and public service organizations, individuals, financial institutions, online retailers, and traditional brick and mortar merchants.

“Data! Data! Data!” he cried impatiently. “I can’t make bricks without clay.”

Sherlock Holmes

–The Adventure of the Abbey Grange


Just as Sherlock Holmes implored...

This is a preview of subscription content, log in to check access.


  1. 2016 New York Laws :: PEN – Penal :: Part 3 – SPECIFIC OFFENSES :: Title K – OFFENSES INVOLVING FRAUD :: Article 190 – (190.00 – 190.89) OTHER FRAUDS :: 190.05 – Issuing a bad check. (n.d.). Retrieved 1 May 2018, from https://law.justia.com/codes/new-york/2016/pen/part-3/title-k/article-190/190.05
  2. ACFE Report to the Nations | 2018 Global Fraud Study. (2018). Retrieved 13 Apr 2018, from http://www.acfe.com/report-to-the-nations/2018/
  3. Austria’s FACC, hit by cyber fraud, fires CEO. (2016, May 25). Retrieved 20 Apr 2018, from https://www.reuters.com/article/us-facc-ceo/austrias-facc-hit-by-cyber-fraud-fires-ceo-idUSKCN0YG0ZF.
  4. Bennett, W. W., & Hess, K. M. (2004). Criminal investigation (7th ed.). Belmont: Wadsworth/Thompson.Google Scholar
  5. California Code, Penal Code – PEN § 470. (n.d.). Retrieved 1 May 2018, from https://codes.findlaw.com/ca/penal-code/pen-sect-470.html.
  6. Facts + Statistics: Identity theft and cybercrime. (n.d.). Retrieved 15 Apr 2018, from https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime.
  7. Finkle, J., & Volz, D. (2015, December 29). Database of 191 million U.S. voters exposed on Internet: Researcher. Retrieved 1 Apr 2018, from https://www.reuters.com/article/us-usa-voters-breach/database-of-191-million-u-s-voters-exposed-on-internet-researcher-idUSKBN0UB1E020151229.
  8. Langone, A. (2018, January 30). What is ATM jackpotting? and how to protect yourself | money. Retrieved 27 Mar 2018, from http://www.time.com/money/5125106/what-is-atm-jackpotting/
  9. Malwarebytes (Ed.). (2017). The new mafia: Gangs and vigilantes-A guide to cybercrime for CEO’s. Retrieved 1 Apr 2018, from https://www.malwarebytes.com/pdf/white-papers/Cybercrime_NewMafia.pdf.
  10. Osterburg, J. W. (1981). Scientific method and criminal investigation. Journal of Police Science and Administration, 9(2), 135–142. Retrieved 5 Apr 2018.Google Scholar
  11. Park, M. (2017, March 16). Meet the FBI’s top 5 most wanted for cyber crimes. Retrieved 27 Apr 2018, from https://www.cnn.com/2017/03/16/us/fbi-most-wanted-cyber-crimes/index.html
  12. Pascual, A., Marchini, K., & Miller, S. (2018, February 06). 2018 identity fraud: Fraud enters a new era of complexity. Retrieved 20 May 2018, from https://www.javelinstrategy.com/coverage-area/2018-identity-fraud-fraud-enters-new-era-complexity
  13. PENAL CODE CHAPTER 37. PERJURY AND OTHER FALSIFICATION. (n.d.). Retrieved 1 May 2018, from https://statutes.capitol.texas.gov/Docs/PE/htm/PE.37.htm
  14. Sennewald, C. A., & Tsukayama, J. K. (2015). The process of investigation: Concepts and strategies for investigators in the private sector (4th ed.). Amsterdam: Elsevier Butterworth-Hein.Google Scholar
  15. The Investigative Mission. (2018). Retrieved 1 May 2018, from https://www.secretservice.gov/investigation/.
  16. White-Collar Crime. (2016, May 03). Retrieved 27 Apr 2018, from https://www.fbi.gov/investigate/white-collar-crime

Future Reading

  1. Almandoz, J. (2017). Robert S. Pasley: Anatomy of a banking scandal: The keystone bank failure – Harbinger of the 2008 financial crisis.Google Scholar
  2. Biskupic, S. M. (1998). Fine tuning the bank fraud statute: A prosecutor’s perspective. Marq L Rev, 82, 381.Google Scholar
  3. Dagogo, D. W. (2018). Bank fraud and financial intermediation.Google Scholar
  4. Gottschalk, P. (2018). Characteristics of white-collar crime. In Investigating white-collar crime (pp. 1–12). Cham: SpringerGoogle Scholar
  5. Hoffmann, A. O., & Birnbrich, C. (2012). The impact of fraud prevention on bank-customer relationships: An empirical investigation in retail banking. The International Journal of Bank Marketing, 30(5), 390–407.CrossRefGoogle Scholar
  6. Hughes, G., Comber, J., & Austin, E. (2018). Insider dealer or unknowing participant: HK court of appeal confirms SFC’s broad powers to pursue insider dealing and fraud offences. Journal of Investment Compliance, 19, 38–41.CrossRefGoogle Scholar
  7. Oa, F. J., & Titiloye, E. O. (2012). Application of continued fractions in controlling bank fraud. International Journal of Business and Social Science, 3(9), 210–213.Google Scholar
  8. Smith-Ditizio, A. A., & Smith, A. D. (2018). Computer fraud challenges and its legal implications. In Encyclopedia of information science and technology (4th ed., pp. 4837–4848). IGI Global.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Texas A&M UniversityCollege StationUSA