​​​​​​​​​

 Case Studies

Criminals use different types of crimes to accumulate or gather their proceeds. The FIC publishes case studies to raise awareness on some of the methods criminals use. This is intended to assist business and individuals to identify typical criminal behaviour, thereby helping them to avoid falling victim to crimes.  ​

a form of fraud that lead to monetary losses for the entity involved … duplicate payment into the perpetrator’s account … An entity will make a payment to a service provider …
Date: 5/14/2018 Size: 156KB

from their trust accounts for normal business expenses in contravention of …  Transfers from attorneys’ trust accounts into personal accounts …  Absence of a business account to service the …
Date: 5/14/2018 Size: 145KB

notes10 pyramid scheme What is it … A form of fraud that promises participants payment or services for recruiting others into what is presented as a legitimate business …
Date: 8/15/2016 Size: 55KB

 Suspicious credits outside of normal salary credits …  High value vehicles and immovable property …  Use of third party accounts, often family members … The FIC established that the subject …
Date: 5/14/2018 Size: 146KB

notes13 account hijacking What is it … An account hijacker uses another person’s bank account … how it works A person, often unemployed or a low-income earner, is paid to open a bank account …
Date: 8/15/2016 Size: 152KB

recruiting people rather than selling products … The originator of the scheme usually makes an initial payment and thereafter others need to be recruited … The continued growth of the scheme …
Date: 5/14/2018 Size: 146KB

explained in South African legislation, deals with dishonest or fraudulent conduct by … those in power, typically involving bribery for some type of gain … The FIC was part of a multiagency …
Date: 5/14/2018 Size: 145KB

notes20 remittance scam What is it … The use of moneygrams to transfer the proceeds of crime across national borders … how it works Moneygrams – person-to-person money transfers – are a fast …
Date: 8/15/2016 Size: 77KB

Cybercrime is the utilisation of technology to commit crime … Cyber criminals steal credit card details, online banking passwords and any other data that can compromise entities or …
Date: 5/14/2018 Size: 145KB

notes16 trade-based money laundering What is it … Money laundering is the processing of criminal proceeds to disguise their illegal origin … it is typically used to disguise the profits of …
Date: 8/15/2016 Size: 62KB