It has nothing to do with concrete blocks and mortar. Cranes and bulldozers are not involved, and it has no reference to the facility where you make your deposits or take out a loan. The first time you encounter it, you may think you’re ahead of the game. What it may all mean is the foundation for a scam to steal hard earned cash from the register. Building a bank, also known as “padding the register” is part of a theft scheme and you may never know it without a keen sense and knowledge of how it’s done and the skills to do something about it.
The Dishonest Cashier - The scheme starts with a strategic plan by a cashier. Armed with the knowledge of the cash register operation, audit processes, and supervisory skills of the management team, a dishonest cashier can steal cash and not have a shortage on the register. The cash thefts are cleverly disguised and hidden from routine cash drawer countdowns.
The Scheme - At opportunistic times while ringing the sales transaction, or sometime after, the dishonest cashier will manipulate the sale by various methods to cancel or reduce the sale. The cash components that are generally fraudulently manipulated are no sales, voids, price reductions, refunds, promotions, etc. During a legitimate sale, the cashier rings a no sale, but accepts the payment from the customer and places the cash in the register creating an overage in the amount of the sale. The overage that is created by building the bank is then stolen making the cash drawer even making the theft at first glance – undetectable. Other theft schemes that occur during a sales transaction are ringing in a discounted price, fictitious employee meal, or promotion code but charging the customer the higher amount.
Building the Bank - The theft schemes can be expanded to legitimate sales transactions after the sale has been completed. Sometime after the sale, the dishonest cashier voids the transaction or generates an unauthorized refund, again creating a cash overage. If the cashier has possession of manager override codes or swipe cards, thefts will increase dramatically with unauthorized use. The cashier continues the scam throughout the shift, each time leaving the cash in the register, thus building the bank or padding the register. The cash is left in the register until such time that it can be removed safely, without detection. It is important to keep track of the accumulated overage of cash in the register and the cashier does so with their own accounting methods. For example a nickel may be placed aside to represent a $5 overage, a dime - $10; or other items may be used to reference overages in the forms of paper clips, salt/pepper/condiment packs, straws, tooth picks, etc. They build the bank and keep track of the overages in lieu of stealing the cash each time they manipulate the sale because of the higher chance of getting caught.
Addressing the Issues - Addressing this type of theft begins with cash management policies and procedures understood by each cashier and supervisor. Comprehensive cash management controls also include random cash register audits, single cash drawer accountability, and review of cashier performance not only in cash overages and shortages, but the cash components as well in POS exception reports. A strong progressive disciplinary action program should address poor cashier performance.
Building the bank is a common theft scheme, particularly in locations with drive-thru windows where cashiers are working in isolation. Cashier thefts, however, can be easily accomplished at any register and in the office by dishonest supervisors after cash drawers have been turned in, so be alert for that as well.
Be clear on expectations of cashiers and managers following the rules of your cash management program and follow up for compliance. It will deter them from taking your money to their bank.
For more information on cash management, download a free whitepaper “Cash Shortage Control at the POS”.
written by Kim Rudisill on November 02, 2011
This scam is at least thirty years old and likely much older in some variation, but very effective in conditions of poor cash control and post-audit.
My question is simply this...You do not explain how the cashier avoids being caught with a serious drawer overage during a routine surprise count of the drawer. Unless management never does surprise counts, part of that poor cash control, an overage has to exist unless the count is coincidentally made immediately after the excess money has been removed by the cashier.
written by thief_kechr on January 14, 2013
Most current.cash theft schemes are far beyond bank building, as bank building creates potential for being caught. Most cashier thefts are more streamlined than this old school method.
Cashiers have higher thresholds than ever before, most having authority to line void, refund, post void, markdown or modify to certain levels before ever needing a manager to authorize these activities. This allows the dishonest cashier to;
1.) Conduct small dollar refunds repeatedly to steal.
2.) Conduct line voids or post voids after charging the customer and pocket the cash.
3.) Line void last item sold after charging the customer and pocket the cash.
4.) Ring totally fictious sales to generate gift card, coupon, or other non cash rewards, voiding the sale after. The rewards generally still remain active at least for a period of time where the cashier can use or sell off.
A great review for catchinv this activity.
Small cash overages or shortages (change) as cashiers will generally steal bills and do not count out coin (quicker, with less chance of being observed), loose or torn receipts near checkouts, refund slips missing or missing information, heavy line void activity, repeat items being refunded under threshold approval amounts, refunds occuring at a drive thru, etc.
Rarely, if ever, is loose coin seen these days as a mechanism for tracking cash theft, however - smart phones, texting, pics of receipts to generate refunds from bar codes are seen increasingly as a tool for theft.
Libby's Blog Archive
- March 2014(1)
- December 2013(2)
- August 2013(1)
- July 2013(1)
- June 2013(2)
- May 2013(2)
- March 2013(1)
- February 2013(1)
- January 2013(1)
- December 2012(1)
- November 2012(1)
- October 2012(1)
- September 2012(1)
- August 2012(1)
- July 2012(2)
- June 2012(2)
- May 2012(2)
- April 2012(1)
- March 2012(1)
- January 2012(2)
- December 2011(2)
- November 2011(3)
- October 2011(4)
- September 2011(2)
- August 2011(4)
- July 2011(2)
- June 2011(4)
- May 2011(4)
- April 2011(4)
- March 2011(5)
- February 2011(4)
- January 2011(4)
- December 2010(5)
- November 2010(4)
- October 2010(4)
- September 2010(4)
- August 2010(5)
- July 2010(3)
- June 2010(5)
- May 2010(2)