Embezzlement Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.Anti-spam check. Do not fill this in! ==Methods== {{unreferenced|section|date=July 2022}} Embezzlement sometimes involves falsification of records in order to conceal the activity. Embezzlers commonly secrete relatively small amounts repeatedly, in a systematic or methodical manner, over a long period of time, although some embezzlers secrete one large sum at once. Some very successful embezzlement schemes have continued for many years before being detected due to the skill of the embezzler in concealing the nature of the transactions or their skill in gaining the trust and confidence of investors or clients, who are then reluctant to "test" the embezzler's trustworthiness by forcing a withdrawal of funds. Embezzling should not be confused with [[Skimming (fraud)|skimming]], which is under-reporting [[income]] and pocketing the difference. For example, in 2005, several managers of the service provider [[Aramark]] were found to be under-reporting profits from a string of [[vending machine]] locations in the eastern United States.{{Citation needed|date=March 2024}} While the amount stolen from each machine was relatively small, the total amount taken from many machines over a length of time was very large. A technique employed by many small-time embezzlers can be covered by falsifying the records. (For example, by removing a small amount of money and falsifying the record the register would be consistent, while the manager would remove the profit and leave the float in; this method would effectively make the register short for the next user and throw the blame onto them.) Another method is to create a false vendor account and supply false [[Bill (payment)|bill]]s to the company being embezzled so that the checks that are cut appear completely legitimate. Yet another method is to create phantom employees, who are then paid with payroll checks. The latter two methods should be uncovered by routine audits, but often are not if the audit is not sufficiently in-depth, because the paperwork appears to be in order. A publicly traded company must change auditors and audit companies every five years. The first method is easier to detect if all transactions are by cheque or other instrument, but if many transactions are in cash, it is much more difficult to identify. Employers have developed a number of strategies to deal with this problem. In fact, [[cash register]]s were invented just for this reason. Some of the most complex (and potentially most lucrative) forms of embezzlement involve [[Ponzi scheme|Ponzi-like]] financial schemes where high returns to early investors are paid out of funds received from later investors duped into believing they are themselves receiving entry into a high-return investment scheme. The [[Madoff investment scandal]] is an example of this kind of high-level embezzlement scheme, where it is alleged that $65 billion was siphoned off from gullible investors and financial institutions. Summary: Please note that all contributions to Christianpedia may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here. You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Christianpedia:Copyrights for details). Do not submit copyrighted work without permission! Cancel Editing help (opens in new window) Discuss this page