{"id":644,"date":"2016-06-06T15:14:55","date_gmt":"2016-06-06T19:14:55","guid":{"rendered":"http:\/\/www.bringingfreudtofraud.com\/?p=644"},"modified":"2016-06-06T17:39:17","modified_gmt":"2016-06-06T21:39:17","slug":"three-ways-to-steal","status":"publish","type":"post","link":"https:\/\/bringingfreudtofraud.com\/?p=644","title":{"rendered":"THREE WAYS TO STEAL"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>(By <a title=\"KNOW THE AUTHORS:  Dr. Joseph W. Koletar\" href=\"http:\/\/www.bringingfreudtofraud.com\/?p=319\">Dr. Joseph W. Koletar<\/a>) While there are hundreds of dishonest ways one person can take money from another person they fall into three basic categories. In reverse order of frequency they are:<\/p>\n<p>\u2022 Force, or Threat of Force (We call these Armed Robbery, Extortion, and Kidnapping);<\/p>\n<p>\u2022 Stealth (We call these Auto Theft, Burglary, and Shoplifting);<\/p>\n<p>\u2022 Trust.<\/p>\n<p>Although there are hundreds of variations, all frauds are a violation of trust. There is a term in our lexicon called \u201cCon Man.\u201d \u201cCon\u201d stands for \u201cConfidence.\u201d If I can gain your trust, you have confidence in me. That is when you become vulnerable.<\/p>\n<p>How do we protect ourselves against such risks?<\/p>\n<p>\u2022 With regard to <strong>Force<\/strong>, we avoid risky areas and dicey people.<\/p>\n<p>\u2022 With regard to <strong>Stealth<\/strong>, we lock our doors, use alarms, and keep an eye on shady customers.<\/p>\n<p>\u2022 With regard to <strong>Trust<\/strong>, we must learn to be discerning, because trust is ubiquitous. We can not function as individuals or societies without relying on a high degree of trust. We must assume teachers have the best interests of our children at heart; we must assume medical personnel are competent; we must assume engineers have designed our homes, cars, bridges, and airplanes correctly; and we must assume our police are honest and our elected officials are prudent.<\/p>\n<p>This is fine, but common sense and experience tell us that such trust is often violated in ways great and small. Some teachers are pedophiles; some medical personnel are incompetent or dishonest; some contractors cut corners and some car maker\u2019s fake emission standards; some police are brutal or corrupt; and some elected officials leave a lot to be desired.<\/p>\n<p>Do we hide under our beds, and trust no one? Impossible. Poor construction could still cause the house to fall in on you.<\/p>\n<p>These are issues both complex and vexing.<\/p>\n<p>Such issues are the reason the <em>Behavioral Forensics Group<\/em> (BFG) was created. It is a group of five well-educated, experienced professionals who approach such issues from a variety of perspectives. Each perspective is valuable, but combined they bring a more comprehensive approach to complex issues, such as our need and tendency to \u201ctrust.\u201d Their expertise ranges from psychiatry to psychology, from law to executive management, to law enforcement, accounting, auditing, and corporate governance.<\/p>\n<p>A compendium of our approach to issues of trust (human behavior) can be found in our book, <a title=\"ABOUT THE BOOK\u2026.\" href=\"http:\/\/www.bringingfreudtofraud.com\/?p=371\">The A.B.C.\u2019s of Behavioral Forensics<\/a> (John Wiley &amp; Sons, 2013.) You can learn more about our thoughts on current events involving violations of trust by visiting our blog site, \u201cBringing Freud to Fraud.\u201d<\/p>\n<p>We are available for consultation on a select basis. Our contact information appears on here on this blog site.<\/p>\n<p>\u00a9 2016<br \/>\nJoseph W. Koletar<\/p>\n<p align=\"center\"><b><span style=\"color: #000000; font-family: Calibri; font-size: medium;\">BEHAVIORAL FORENSICS GROUP<\/span><\/b><\/p>\n<p align=\"center\"><b><span style=\"color: #000000; font-family: Calibri; font-size: medium;\">\u00a0<\/span><\/b><\/p>\n<p><span style=\"color: #000000; font-family: Calibri; font-size: medium;\">The\u00a0<i>Behavioral Forensics Group<\/i>\u00a0is a team of professionals with vast experience in detecting fraud, understanding why it occurs, and in recommending steps to mitigate fraud incidence within the corporate workplace, particularly within higher-level (and therefore more costly to the enterprise) executives.\u00a0\u00a0The fields of investigation, organizational psychiatry, accounting and behavioral forensics, and law enforcement are represented within the\u00a0<i>Behavioral Forensics Group<\/i>.\u00a0\u00a0Acting in synergy to help organizations prevent, find, and\/or reduce fraud, BFG is a premier, pioneering practice in this field.<\/span><\/p>\n<p><span style=\"color: #000000; font-family: Calibri; font-size: medium;\">We are blogging at:\u00a0<\/span><a href=\"mailbox:\/\/C:\/Users\/Jack%20Bigelow\/AppData\/Roaming\/Thunderbird\/Profiles\/aezbilra.default\/Mail\/Local%20Folders\/Outlook%20Express%20Import.sbd\/Morrisons.sbd\/redir.aspx?REF=OmahVLz-td4MDSbxCRkN2lcl0EIVE-Q_S1KBN0c_3xMD3hKNMXDTCAFodHRwOi8vd3d3LmJyaW5naW5nZnJldWR0b2ZyYXVkLmNvbQ..\" target=\"_blank\"><span style=\"text-decoration: underline;\">http:\/\/www.bringingfreudtofraud.com<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; (By Dr. Joseph W. Koletar) While there are hundreds of dishonest ways one person can take money from another person they fall into three basic categories. In reverse order of frequency they are: \u2022 Force, or Threat of Force (We call these Armed Robbery, Extortion, and Kidnapping); \u2022 Stealth (We call these Auto &hellip; <a href=\"https:\/\/bringingfreudtofraud.com\/?p=644\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">THREE WAYS TO STEAL<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-644","post","type-post","status-publish","format-standard","hentry","category-audit"],"_links":{"self":[{"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=\/wp\/v2\/posts\/644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=644"}],"version-history":[{"count":7,"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=\/wp\/v2\/posts\/644\/revisions"}],"predecessor-version":[{"id":652,"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=\/wp\/v2\/posts\/644\/revisions\/652"}],"wp:attachment":[{"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bringingfreudtofraud.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}