Quantcast
Channel: Ajit Vadakayil
Viewing all articles
Browse latest Browse all 852

WHAT ARTIFICIAL INTELLIGENCE CANNOT DO , a grim note to the top 100 intellectuals of this planet , Part 16 - Capt Ajit Vadakayil

$
0
0

THIS POST IS CONTINUED FROM PART 15, BELOW--



AI IS USED BY JEWS TO OBFUSCATE ,  HIDE HUMONGOUS CRIMES ,  EMBEZZLE MONEY,  RUN DRUGS,  BRING DOWN GOVERNMENTS ( BY HYPER INFLATION  EXAMPLE VENEZUELA ) , GRAB LAND ( BLOCKCHAIN  IN ISRAEL) ,  SUSTAIN TERRORISM --  AND THE WHOLE WORLD HAS ACQUIESCED..

I WAS ONCE ASKED TO FLY TO EUROPE THE MEET THE REAL OWNER OF THE SHIPPING COMPANY ON WHOSE SHIP I WAS TO WORK. 

AS A CAPTAIN YOU RARELY GET TO TALK TO THE SHIPOWNER..

THE OWNER, A YOUNG BLOKE, TOOK ME FOR DINNER AND THEN WHILE WE  WERE SIPPING  PREMIUM WINE, ASKED ME IF THERE IS ANY WAY TO STOP EMBEZZELMENT IN HIS COMPANY..   HIS COMPANY AND SHIP HAD ALL WHITES..  I WAS A OUTSIDER ,, A BROWN MAN..

HE SAID THAT HE WAS TOLD ONLY CAPT AJIT VADAKAYIL CAN PUT HIS FINGER AT THE RIGHT PLACE AND CONNECT DOTS .

SO I TOLD HIM..

“YOUR COMPANY HAS A SOFTWARE—A BLANKET ONE ENCOMPASSING ALL SHIP AND SHORE OPERATIONS —  WHICH IS “DELIBERATELY “ KEPT TOO COMPLICATED..

THE BIGGEST DRAW BACK IS THAT YOU DON’T GET A BIRDs  EYE VIEW OF THE SITUATION..  YOU ARE FORCED TO BE IN TUNNEL VISION MODE WITH NARROW SPECTRUM POP UP WINDOWS.   NO NORMAL BRAIN CAN COPE UP WITH THIS LOAD.. YOU ARE ARM TWISTED TO TRUST THE SOFTWARE..

UNLESS YOU ARE EXTREMELY BRIGHT, YOU CANT FIGURE OUT HOW MONEY IS BEING BLED..

PEOPLE IN YOUR OFFICE ARE STEALING LEFT, RIGHT AND CENTRE..   THE TECHNICAL SUPERINTENDENTS ARE IN LEAGUE WITH SHIP STAFF TO MAKE FALSE REQUISITIONS , SIGN FAKE INVOICES  ( FOR SHORT SUPPLY/ SERVICES  ) ” 

THIS SHIPOWNER NEARLY CHOKED .. AND HE BEGGED ME TO GIVE SOLUTIONS TO MITIGATE


I DID !



The consequences of embezzlement can be catastrophic to a small business who though they employed trustworthy staff

Embezzlement is when an employee or someone else in a trusted position steals from your business. They use the money or other assets for their own use.

Embezzlement often implies a white collar crime where funds are taken from bank accounts, or perhaps where check forgery or payroll fraud is involved.  But it’s not limited to those circumstances.

Here are a few embezzlement examples and workplace thefts to watch out for:--

Forging Checks

The employee writes company checks or makes electronic payments to himself. The employee then cooks the books to hide the theft.

This classic embezzlement example is made easier when a company uses a signature stamp of an executive’s signature.  A signature stamp is literally like handing employees a blank check because they can “sign” checks without your knowledge.

Prevention:  Separate responsibilities: one worker to process checks and another to reconcile transactions and approve documentation. If you don’t have enough staff for separate functions, then reconcile bank statements yourself. Require purchase orders or invoices for every payment. And stop using a signature stamp — or keep it under lock and key.

Cashing Customer Checks

The employee endorses and cashes customer checks payable to the company, then keeps the funds.

Today, as more payments become electronic the essential crime is the same. The employee may set up a bank account with a fictitious name similar to the employer’s to divert electronic payments into. Small banks and credit unions can be lax in allowing accounts to be established by the employee using fake “doing business as” names.

Prevention:  Separate the functions so that one person is responsible for processing payments and another for reconciling accounting entries. Implement controls to track customer payments at every step to avoid this kind of embezzlement.

Faking Vendor Payments

Next on our list of embezzlement examples is when an employee steals company funds, but tries to hide them as payments to vendors. Faithless employees may create fake vendor invoices and change accounting system entries to hide their tracks.

Prevention:  Regularly review detailed expense reports (not just summary reports) broken down by vendor, amount and purpose. If you stay familiar with your numbers, it’s easier to spot when a payment or accounting entry looks suspicious. If your company is big enough, separate the functions employees perform.

Overbilling Customers

The employee overbills customers, keeps the extra money and covers it up with false accounting entries.

Sometimes this a large-scale fraud where each customer or transaction is overbilled by a small “fee” for years. Other times it involves double billing the same amount twice or tacking on charges for items the customer did not buy.

You might be tempted to think of this as stealing from customers, but it’s really a type of embezzlement. Your company bears responsibility for overbillings and will have to make good to customers.

Prevention:  Conduct a periodic audit of customer billings. Pay close attention to customer complaints about billing errors and require thorough explanations from staff of how they occurred. Complaints may be a warning sign of a bigger problem.

Theft of Customer Card Data

An employee who takes phone orders may later use the customer’s credit card data to charge personal purchases online. Or a gas station manager may use a skimmer device to skim card data from terminals at the pumps.

A more nerdy version is when an employee downloads credit card data from company IT systems. Then he or she sells it on the dark web.

Prevention:  Limit access to customer data to only those who need it. Deploy technology that redacts credit card numbers or only prints out the last digits, to limit trash harvesting or unintentional sharing. Change permissions when someone with IT access leaves the company. If you use card terminals, install anti-skimming technology — some municipalities now require it.

Padding An Expense Account

Padding examples range from the occasional attempt to justify an expensive lunch using a “creative” description, all the way to elaborate embezzlement schemes.

Large enterprises take padding seriously – shouldn’t you? A Hewlett Packard CEO was ousted back in 2010 in the face of allegations he padded his expense account to hide an extramarital affair. HP saw the issue as one of trust.

Prevention:  Have a written policy detailing what is — and is not — reimbursable. Go over the policy in staff meetings. If employees do a lot of business travel, consider using an expense management app to control approvals and see scanned receipts all in one place.

Double Dipping

Next on our list of embezzlement examples is when there’s a single legitimate business expense, but the employee gets two reimbursements. She first pays for an expense with the company credit card. Later she submits a cash reimbursement request for the same expense.

Prevention:  Insist on seeing underlying receipts for all expenses (don’t just review the credit card statement). Use expense management software if your employees incur a lot of reimbursable expenses.

Using a Company Credit Card For Personal Use

The employee pays for personal expenses using a company credit card. The good news is, often these thefts are sporadic and the amounts are small.

However, what if the same employee also manages the accounting system and realizes no one but her pays attention?  Using a company credit card for personal use can turn into massive embezzlement examples when combined with falsified accounting records.

Prevention: Always have two people involved in the process: one to approve expenses and one to handle accounting. Require documentation of the expense purpose.

Voiding Transactions At The Cash Register

An associate at the cash register voids transactions and pockets the cash. This is a common way of skimming money from a retail small business.

Prevention:  Newer point-of-sale systems have security protocols to help prevent this kind of theft. For example, they allow clearance levels so you can require manager approval to void a sale. Employee ID numbers track how often a particular staff member voids transactions so you can spot repeat offenders.

Siphoning Off Cash Deposits

Before dropping off the cash deposit bag at the bank in the evening, the employee pockets some of the cash. The amount may be small enough not to be missed — perhaps $100. But week after week, it adds up to thousands of dollars.

Prevention:  Personally count the day’s cash, complete the deposit slip and enter the amount into the accounting records yourself before handing off the bag. Or separate the functions so two people are involved. Other strategies may help, such as security cameras in the area where cash is counted along with using locked deposit bags. See more tips for cash processing.

Raiding the Petty Cash Box or Safe

This theft can be as simple as the employee taking $200 out of the safe or petty cash box.

Prevention:  Lock up large sums and keep the key yourself, to minimize access and temptation by employees. Or use security cameras. Read: 20 Cash Handling Best Practices.

Pocketing Cash From Fundraisers

Skimming fundraiser money is all too common in non-profits. But this type of fraud also  occurs in businesses that take on a charitable cause. If one person has complete control over the money, from start to finish, the temptation to steal can prove too great.

Prevention: Always have at least two people involved in the workflow of collecting, recording, depositing and remitting donations. Don’t give temptation a chance.

Stealing Office Supplies

It’s shocking how many employees seem to feel it is okay to take large amounts of office supplies home. Theft of supplies usually involves consumable items like postage stamps, Post-it notes or coffee supplies.

The owners of one business started during the Great Depression had a solution. They were so frugal they required employees to turn in their pencils at the end of each day!  You don’t need to keep THAT tight a rein. But reasonable controls are a best practice.

Prevention:  Put most of your supplies under lock and key and replenish an open supply area sparingly, to keep shrinkage small. A security camera may help. Discuss the use of supplies in a company meeting to set the tone and convey company values.

In construction and manufacturing businesses, an employee may hide company property in a dumpster or storage area and retrieve it after hours.

Equipment theft also occurs in offices. Think laptops or small document scanners that can be slipped into a backpack or handbag.

Prevention:  Lock up or bolt down valuable items if feasible. Label important equipment with a number and let employees know you plan regular audits to ensure items are still on site. Use security cameras and electronic access systems.

Stealing Products

The employee steals company products. Examples include jewelry or perfume from a high end retail shop. Typical victims are small retailers that lack shrinkage controls. It is stunning how many owners simply stuff inventory into a storeroom with no tracking system.

Another variation is when a waiter does not charge friends for food or drinks in a restaurant.

Prevention:  Use security cameras. Implement an inventory management system and regularly check inventory levels. There’s even POS technology that tracks voided transactions and discounts, and alerts the owner or manager.

Burglarizing Company Premises

Think classic inside job — with or without accomplices. The employee leaves a door unlocked or uses a key to get in after hours. Your company gets ripped off.

Prevention:  Install security cameras. Implement an electronic security system to secure after-hours access, and record who is coming and going.

Stealing Returned Merchandise

This theft can occur in a retail or ecommerce setting, or in any business that swaps out old equipment. The employee simply takes returned items home or resells them on Craigslist or eBay.

A lack of controls makes this theft easier. In some small businesses, returns may be stacked haphazardly in a corner. Is it any wonder they disappear?

Prevention:  Implement control systems for managing returns and other property.

Claiming a Company Laptop Was Lost

The employee gives a laptop or mobile device to a family member and tells the employer it was lost. The company then replaces the item.

Prevention: Use device management software that enables the company to disable lost devices and track their location.

Setting Up Fake Employees

The embezzling employee sets up fake employees, pockets the pay, and cooks the books to hide the transaction. This happens in businesses with absentee owners or over-trusting owners who do not pay attention.

Prevention:  Implement systems to reconcile headcount with staffing expenses. Regularly review a detailed headcount report breaking down expenses by employee. Remember, detailed reports are your friend. Embezzlement is much harder to spot if all you ever look at are summary reports or a high-level P&L.

Falsifying Overtime

This may include schemes where co-workers clock in and out for each other. Or it may involve a payroll clerk creating false entries for supposed overtime that he pays himself.

Prevention:  Use electronic timesheet systems. Watch overtime pay closely for unusual increases. Compare detailed reports to identify exactly which employees are getting overtime and when — you may spot suspicious patterns.

Failing To Remit Payroll Tax Money

The employee embezzles money earmarked for the employer’s payroll tax remittances or other tax money. Eventually the taxing authority will come down hard on the business owner for not sending in the tax money, and may file a lien against the business or seize property. So not only do you face losses from embezzlement, but you have the IRS on your tail — a double whammy!

This embezzlement example is perpetrated by dishonest bookkeepers, financial staff, payroll clerks and even small outside payroll services.

Prevention:  Outsource to a large reputable payroll service such as Paychex or ADP. It goes a long way to prevent an embezzlement nightmare. Or require a regular audit by an outside accounting firm.

Collecting Kickbacks From Vendors

In this scheme, the employee gets vendor kickbacks and you are unaware. Kickbacks can be cash. They also can take the form of additional products and services used in an employee’s side business or home. A warning sign is an unusually close relationship between a vendor and an employee.

Prevention:  Get involved in choosing vendors yourself. This minimizes collusion between vendors and faithless employees.

Selling Trade Secrets; Corporate Espionage

The employee sells sensitive information to a competitor. Or the employee takes  confidential documents and trade secrets with him when switching jobs.

You see this in high tech startups. For example, a former Google executive was indicted on criminal charges for stealing 14,000 files for self-driving car technology and taking them to a startup later acquired by Uber.

Prevention:  Have strong employee agreements. Shared cloud storage systems help you manage and track who has access to what.

Business Identity Theft

An employee secures a line of credit or loan in your company name, using the money for personal purchases. The embezzler then uses company funds to make the payments. Typical embezzlers are finance staff or bookkeepers with access to accounting records and legitimate accounts used to cover their tracks.

A similar theft is when a partner or family member in a family business takes out unauthorized loans in the company name.

Prevention:  Implement internal controls for checks and balances. Require detailed reports to see where money is going. Sudden cash flow issues or a negative change in your company credit score may be warning signs of embezzlement.  Pay particular attention to services like PayPal and others than allow pre-approved loans or advances against your account.

Starting A Business Using Company Resources

In this situation, employees start their own businesses on company time. In the worst situations employees use company resources such as software code in their new software product, or steal raw materials.

Make no mistake about it: this is theft. Yet, some delusional souls brag on social media about what they are doing!

Still, the employer may get the last laugh. Why? Because generally speaking, an employer owns all work product created on company time.

Prevention:  Set expectations properly with employees — and make your policy clear, whatever is. Some employers encourage side businesses but others have a no moonlighting policy. Even if you allow side businesses, make it clear that activities  should not be conducted during work hours, and company resources may not be used.

Final Thoughts on Embezzlement


It’s important to be an engaged business owner. Pay attention, ask questions and review detailed reports. Deploy technology to control access and approval levels, and provide early warning of anything unusual. Most of all, implement checks and balances in your processes to make sure no single employee has complete control. Steps like these help protect the livelihoods of everyone in the business.

  1. https://asiatimes.com/2020/03/china-suppressed-covid-19-with-ai-and-big-data/

    SOMEBODY ASKED ME-- CAPTAIN, WHAT IS BIG DATA?

    AI HAS THE CAPABILITY OF WORKING ON ENORMOUS AMOUNTS OF DATA. THE DATA COLLECTED IS NOT JUST SIMPLE DATA BUT RATHER DATA THAT INCLUDES EVERY MINUTE DETAIL ABOUT AN EVENT OR TRANSACTION. THIS IS ALSO KNOWN AS “BIG DATA”.

    BIG DATA IS A FIELD THAT TREATS WAYS TO ANALYZE, SYSTEMATICALLY EXTRACT INFORMATION FROM, OR OTHERWISE DEAL WITH DATA SETS THAT ARE TOO LARGE OR COMPLEX TO BE DEALT WITH BY TRADITIONAL DATA-PROCESSING APPLICATION SOFTWARE.

    DATA WITH MANY CASES (ROWS) OFFER GREATER STATISTICAL POWER, WHILE DATA WITH HIGHER COMPLEXITY (MORE ATTRIBUTES OR COLUMNS) MAY LEAD TO A HIGHER FALSE DISCOVERY RATE.BIG DATA CHALLENGES INCLUDE CAPTURING DATA, DATA STORAGE, DATA ANALYSIS, SEARCH, SHARING, TRANSFER, VISUALIZATION, QUERYING, UPDATING,

    INFORMATION PRIVACY AND DATA SOURCE. BIG DATA WAS ORIGINALLY ASSOCIATED WITH THREE KEY CONCEPTS: VOLUME, VARIETY, AND VELOCITY.

    WHEN WE HANDLE BIG DATA, WE MAY NOT SAMPLE BUT SIMPLY OBSERVE AND TRACK WHAT HAPPENS. THEREFORE, BIG DATA OFTEN INCLUDES DATA WITH SIZES THAT EXCEED THE CAPACITY OF TRADITIONAL SOFTWARE TO PROCESS WITHIN AN ACCEPTABLE TIME AND VALUE.

    KOSHER INSURANCE COMPANIES MANIPULATE BIG DATA TO LAUGH ALL THE WAY TO THE BANK..

    ON AUG. 6, 2019, THE U.S. FOOD AND DRUG ADMINISTRATION (FDA) PUBLICLY REBUKED THE SWISS PHARMACEUTICAL COMPANY NOVARTIS FOR MANIPULATING DATA INVOLVING ITS $2.1 MILLION GENE THERAPY.

    RESULTS ARE OFTEN DIFFICULT TO REPRODUCE ACCURATELY, BEING OBSCURED BY NOISE, ARTIFACTS, AND OTHER EXTRANEOUS DATA.

    THAT MEANS THAT EVEN IF A SCIENTIST DOES FALSIFY DATA, THEY CAN EXPECT TO GET AWAY WITH IT – OR AT LEAST CLAIM INNOCENCE IF THEIR RESULTS CONFLICT WITH OTHERS IN THE SAME FIELD.

    THERE ARE NO "SCIENTIFIC POLICE" WHO ARE TRAINED TO FIGHT SCIENTIFIC CRIMES; ALL INVESTIGATIONS ARE MADE BY EXPERTS IN SCIENCE BUT AMATEURS IN DEALING WITH CRIMINALS.

    IT IS RELATIVELY EASY TO CHEAT ALTHOUGH DIFFICULT TO KNOW EXACTLY HOW MANY SCIENTISTS FABRICATE DATA

    https://www.statnews.com/2019/10/29/data-falsification-still-problematic-china-india-generic-drug-plants/

    FABRICATION IS MAKING UP RESULTS AND RECORDING OR REPORTING THEM. THIS IS SOMETIMES REFERRED TO AS "DRYLABBING". A MORE MINOR FORM OF FABRICATION IS WHERE REFERENCES ARE INCLUDED TO GIVE ARGUMENTS THE APPEARANCE OF WIDESPREAD ACCEPTANCE, BUT ARE ACTUALLY FAKE, OR DO NOT SUPPORT THE ARGUMENT.

    FALSIFICATION IS MANIPULATING RESEARCH MATERIALS, EQUIPMENT, OR PROCESSES OR CHANGING OR OMITTING DATA OR RESULTS SUCH THAT THE RESEARCH IS NOT ACCURATELY REPRESENTED IN THE RESEARCH RECORD.

    FOR CASES OF FABRICATED EVIDENCE, THE CONSEQUENCES CAN BE WIDE-RANGING, WITH OTHERS WORKING TO CONFIRM (OR REFUTE) THE FALSE FINDING, OR WITH RESEARCH AGENDAS BEING DISTORTED TO ADDRESS THE FRAUDULENT EVIDENCE.

    THE PILTDOWN MAN / PEKING MAN/ LUCY FRAUDS ARE CASES IN POINT—TO PROVE THAT MAD MAN CHARLES DARWIN IS RIGHT.. EVEN GOOGLE PLAYED KOSHER BALL GIVING A DOODLE TO LUCY THE MISSING LINK..

    EVIL PHARMA HIRES HIT MEN MERCENARIES TO KILL WHISTLE BLOWERS..

    IN STATISTICS, A MISLEADING GRAPH, ALSO KNOWN AS A DISTORTED GRAPH, IS A GRAPH THAT MISREPRESENTS DATA, CONSTITUTING A MISUSE OF STATISTICS AND WITH THE RESULT THAT AN INCORRECT CONCLUSION MAY BE DERIVED FROM IT.

    THERE IS A FOREIGN PAYROLL LOBBY IN INDIA TOSHOWCASE THAT INDIA IS A BEGGAR NATION ( UNDER MODI ) , WHEN INDIA IS THE ONLY ROARING ECONOMY ON THIS PLANET,, THE ONLY ONE WITH POTENTIAL.

    CONTINUED TO 2-
    1. CONTINUED FROM 1--

      ROTHSCHILDs RATING AGENCIES FITCH/ MOODYs / S&P ARE PART OF THIS CONSPIRACY..

      MISLEADING GRAPHS MAY BE CREATED INTENTIONALLY TO HINDER THE PROPER INTERPRETATION OF DATA

      THE FIELD OF DATA VISUALIZATION DESCRIBES WAYS TO PRESENT INFORMATION THAT AVOIDS CREATING MISLEADING GRAPHS. DATA VISUALIZATION IS THE GRAPHIC REPRESENTATION OF DATA.

      ACCOUNTING FRAUD IS THE INTENTIONAL MANIPULATION OF FINANCIAL STATEMENTS TO CREATE A FALSE APPEARANCE OF CORPORATE FINANCIAL HEALTH.

      THE ENRON SCANDAL IS ONE OF THE MOST FAMOUS EXAMPLES OF ACCOUNTING FRAUD IN HISTORY. WE STILL HAVE NOT PUNISHED ENRON.. THE CEO OF ENRON REBECCA MARKS USED TO COME TO INDIA IN MINISKIRT WITHOUT PANTIES AND FLASH HER BLONDE HAIRY TWAT AT MARATHA MANOOS POLITICIANS.

      Read all 33 parts -
      http://ajitvadakayil.blogspot.in/2017/02/shell-companies-for-money-laundering.html

      FROM SHARAD PAWAR TO SURESH PRABHU, THE ENRON-DABHOL SAGA HAS INDEED TRAVELLED A LONG DISTANCE—KICKED UNDER THE KOSHER CARPET .

      I EXPOSED ENRON AND THEIR INDIAN AGENTS— BUT HEY, MODI DISHED OUT PADMA VIBHUSHAN TO THE POINT MAN POLITICIAN. THIS IS THE SAD STORY OF INDIA...

      capt ajit vadakayil
      ..

CURRENT USAGE OF THE TERM BIG DATA TENDS TO REFER TO THE USE OF PREDICTIVE ANALYTICS, USER BEHAVIOR ANALYTICS, OR CERTAIN OTHER ADVANCED DATA ANALYTICS METHODS THAT EXTRACT VALUE FROM DATA, AND SELDOM TO A PARTICULAR SIZE OF DATA SET.

DATA SETS GROW RAPIDLY, TO A CERTAIN EXTENT BECAUSE THEY ARE INCREASINGLY GATHERED BY CHEAP AND NUMEROUS INFORMATION-SENSING INTERNET OF THINGS DEVICES SUCH AS MOBILE DEVICES, AERIAL (REMOTE SENSING), SOFTWARE LOGS, CAMERAS, MICROPHONES, RADIO-FREQUENCY IDENTIFICATION (RFID) READERS AND WIRELESS SENSOR NETWORKS


BIG DATA ANALYTICS EFFICIENTLY HELPS OPERATIONS TO BECOME MORE EFFECTIVE. THIS HELPS IN IMPROVING THE PROFITS OF THE COMPANY. BIG DATA ANALYTICS TOOLS LIKE HADOOP HELPS IN REDUCING THE COST OF STORAGE. THIS FURTHER INCREASES THE EFFICIENCY OF THE BUSINESS. 

HADOOP IS AN OPEN-SOURCE SOFTWARE FRAMEWORK USED FOR STORING AND PROCESSING BIG DATA IN A DISTRIBUTED MANNER ON LARGE CLUSTERS OF COMMODITY HARDWARE.



CAN AI EVER BE THE JUDGE OF A HUMOR CONTEST ?













JEW ROTHSCHILD WHO COOLED UP PALI SPEAKING / PIG EATING GAUTAMA BUDDHA AND PALI SCRIPT FOR THIS BURMESE DIALECT , CONVERTED—

SHRADDHA TO SADDA
CHAKRA TO CHAKKA,
DHARMA TO DHAMMA,
KARMA TO KAMMA,
SUTRA TO SUTTA ,
SATVA TO SATTA ,
PUTRA TO PUTTA ,
VASTU TO VATTU ETC..

SO ROMILA BABY , LET US ALL DANCE TO HUMMA ( HARAMI ).

https://www.youtube.com/watch?v=IhdUyiK-TTI

capt ajit vadakayil
..

SEND THIS COMMENT TO ROMILA THAPAR


THIS POST IS NOW CONTINUED TO PART 17, BELOW--





CAPT AJIT VADAKAYIL

..

Viewing all articles
Browse latest Browse all 852

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>