DISCLAIMER - NIKZAFRI.BLOGSPOT.COM
In no event shall nikzafri.blogspot.com be liable for any damages whatsoever, including, without limitation, direct, special, indirect, consequential, or incidental damages, or damages for lost profits, loss of revenue, or loss of use, arising out of or related to the nikzafri.blogspot.com or the information contained in it, whether such damages arise in contract, negligence, tort, under statute, in equity, at law or otherwise.
BIODATA - NIK ZAFRI

https://nikzafri.wixstudio.com/nikzafriv2
Kelantanese, Alumni of Sultan Ismail College Kelantan (SICA), Business Management/Administration, IT Competency Cert, Certified Written English Professional US. Has participated in many seminars/conferences (local/ international) in the capacity of trainer/lecturer and participant.
Affiliations :- Council/Network Member of Gerson Lehrman Group, Institute of Quality Malaysia, Auditor ISO 9000 IRCAUK, Auditor OHSMS (SIRIM and STS) /EMS ISO 14000 and Construction Quality Assessment System CONQUAS, CIDB (Now BCA) Singapore),
* Possesses almost 30 years of experience/hands-on in the multi-modern management & technical disciplines (systems & methodologies) such as Knowledge Management (Hi-Impact Management/ICT Solutions), Quality (TQM/ISO), Safety Health Environment, Civil & Building (Construction), Manufacturing, Motivation & Team Building, HR, Marketing/Branding, Business Process Reengineering, Economy/Stock Market, Contracts/Project Management, Finance & Banking, etc. He was employed to international bluechips involving in national/international megaprojects such as Balfour Beatty Construction/Knight Piesold & Partners UK, MMI Insurance Group Australia, Hazama Corporation (Hazamagumi) Japan (with Mitsubishi Corporation, JA Jones US, MMCE and Ho-Hup) and Sunway Construction Berhad (The Sunway Group of Companies). Among major projects undertaken : Pergau Hydro Electric Project, KLCC Petronas Twin Towers, LRT Tunnelling, KLIA, Petronas Refineries Melaka, Putrajaya Government Complex, Sistem Lingkaran Lebuhraya Kajang (SILK), Mex Highway, KLIA1, KLIA2 etc. Once serviced SMPD Management Consultants as Associate Consultant cum Lecturer for Diploma in Management, Institute of Supervisory Management UK/SMPD JV. Currently – Associate/Visiting Consultants/Facilitators, Advisors/Technical Experts for leading consulting firms (local and international), certification bodies including project management. To name a few – Noma SWO Consult, Amiosh Resources, Timur West Consultant Sdn. Bhd., TIJ Consultants Group (Malaysia and Singapore), QHSEL Consultancy Sdn. Bhd.
Among Nik Zafri’s clients : Adabi Consumer Industries Sdn. Bhd, (MRP II, Accounts/Credit Control) The HQ of Royal Customs and Excise Malaysia (ISO 9000), Veterinary Services Dept. Negeri Sembilan (ISO 9000), The Institution of Engineers Malaysia (Aspects of Project Management – KLCC construction), Corporate HQ of RHB (Peter Drucker's MBO/KRA), NEC Semiconductor - Klang Selangor (Productivity Management), Prime Minister’s Department Malaysia (ISO 9000), State Secretarial Office Negeri Sembilan (ISO 9000), Hidrological Department KL (ISO 9000), Asahi Kluang Johor(System Audit, Management/Supervisory Development), Tunku Mahmood (2) Primary School Kluang Johor (ISO 9000), Consortium PANZANA (HSSE 3rd Party Audit), Lecturer for Information Technology Training Centre (ITTC) – Authorised Training Center (ATC) – University of Technology Malaysia (UTM) Kluang Branch Johor, Kluang General Hospital Johor (Management/Supervision Development, Office Technology/Administration, ISO 9000 & Construction Management), Kahang Timur Secondary School Johor (ISO 9000), Sultan Abdul Jalil Secondary School Kluang Johor (Islamic Motivation and Team Building), Guocera Tiles Industries Kluang Johor (EMS ISO 14000), MNE Construction (M) Sdn. Bhd. Kota Tinggi Johor (ISO 9000 – Construction), UITM Shah Alam Selangor (Knowledge Management/Knowledge Based Economy /TQM), Telesystem Electronics/Digico Cable(ODM/OEM for Astro – ISO 9000), Sungai Long Industries Sdn. Bhd. (Bina Puri Group) - ISO 9000 Construction), Secura Security Printing Sdn. Bhd,(ISO 9000 – Security Printing) ROTOL AMS Bumi Sdn. Bhd & ROTOL Architectural Services Sdn. Bhd. (ROTOL Group) – ISO 9000 –Architecture, Bond M & E (KL) Sdn. Bhd. (ISO 9000 – Construction/M & E), Skyline Telco (M) Sdn. Bhd. (Knowledge Management),Technochase Sdn. Bhd JB (ISO 9000 – Construction), Institut Kefahaman Islam Malaysia (IKIM – ISO 9000 & Internal Audit Refresher), Shinryo/Steamline Consortium (Petronas/OGP Power Co-Generation Plant Melaka – Construction Management and Safety, Health, Environment), Hospital Universiti Kebangsaan Malaysia (Negotiation Skills), Association for Retired Intelligence Operatives of Malaysia (Cyber Security – Arpa/NSFUsenet, Cobit, Till, ISO/IEC ISMS 27000 for Law/Enforcement/Military), T.Yamaichi Corp. (M) Sdn. Bhd. (EMS ISO 14000) LSB Manufacturing Solutions Sdn. Bhd., (Lean Scoreboard (including a full development of System-Software-Application - MSC Malaysia & Six Sigma) PJZ Marine Services Sdn. Bhd., (Safety Management Systems and Internal Audit based on International Marine Organization Standards) UNITAR/UNTEC (Degree in Accountacy – Career Path/Roadmap) Cobrain Holdings Sdn. Bhd.(Managing Construction Safety & Health), Speaker for International Finance & Management Strategy (Closed Conference), Pembinaan Jaya Zira Sdn. Bhd. (ISO 9001:2008-Internal Audit for Construction Industry & Overview of version 2015), Straits Consulting Engineers Sdn. Bhd. (Full Integrated Management System – ISO 9000, OHSAS 18000 (ISO 45000) and EMS ISO 14000 for Civil/Structural/Geotechnical Consulting), Malaysia Management & Science University (MSU – (Managing Business in an Organization), Innoseven Sdn. Bhd. (KVMRT Line 1 MSPR8 – Awareness and Internal Audit (Construction), ISO 9001:2008 and 2015 overview for the Construction Industry), Kemakmuran Sdn. Bhd. (KVMRT Line 1 - Signages/Wayfinding - Project Quality Plan and Construction Method Statement ), Lembaga Tabung Haji - Flood ERP, WNA Consultants - DID/JPS -Flood Risk Assessment and Management Plan - Prelim, Conceptual Design, Interim and Final Report etc., Tunnel Fire Safety - Fire Risk Assessment Report - Design Fire Scenario), Safety, Health and Environmental Management Plans leading construction/property companies/corporations in Malaysia, Timur West Consultant : Business Methodology and System, Information Security Management Systems (ISMS) ISO/IEC 27001:2013 for Majlis Bandaraya Petaling Jaya ISMS/Audit/Risk/ITP Technical Team, MPDT Capital Berhad - ISO 9001: 2015 - Consultancy, Construction, Project Rehabilitation, Desalination (first one in Malaysia to receive certification on trades such as Reverse Osmosis Seawater Desalination and Project Recovery/Rehabilitation), ABAC Centre of Excellence UK (ABMS ISO 37001) Joint Assessment (Technical Expert)
* Has appeared for 10 consecutive series in “Good Morning Malaysia RTM TV1’ Corporate Talk Segment discussing on ISO 9000/14000 in various industries. For ICT, his inputs garnered from his expertise have successfully led to development of work-process e-enabling systems in the environments of intranet, portal and interactive web design especially for the construction and manufacturing. Some of the end products have won various competitions of innovativeness, quality, continual-improvements and construction industry award at national level. He has also in advisory capacity – involved in development and moderation of websites, portals and e-profiles for mainly corporate and private sectors, public figures etc. He is also one of the recipients for MOSTE Innovation for RFID use in Electronic Toll Collection in Malaysia.
Note :
Sunday, August 10, 2025
NGOs - THE DO AND THE DONTS - Overview by Nik Zafri
Friday, July 25, 2025
Cults, Charisma, and Cash: The Dark Web of Manipulation in Religion, Influence, and Crime - overview by Nik Zafri
Not every guru is wise. Not every movement is noble. Question everything.
Cults have both captivated and horrified the world, cloaked in charisma, religious undertones, and promises of salvation or special knowledge. While many think of cults as isolated religious oddities, the cult mindset and mechanisms have quietly evolved, seeping into modern scams, fake influencer cultures, and even organized crime. At the core, it’s not just about belief, it’s about control, manipulation, and ultimately, money.
Terrorism often begins this way too through cult-like indoctrination, amplifying grievances, promising martyrdom, or utopia. The ultimate currency? Blind loyalty, chaos and cash.
A. CLASSIC CULT MOVEMENT EXAMPLES
1. Heaven’s Gate (USA)
A doomsday cult in the 1990s that combined apocalyptic Christianity with science fiction. Members believed that a spaceship trailing the Hale-Bopp comet would transport them to salvation after death. This led to a mass suicide of 39 people in 1997.
2. Aum Shinrikyo (Japan)
Led by Shoko Asahara, this cult mixed Buddhist and Hindu ideas with conspiracy theories. In 1995, they carried out a deadly sarin gas attack on the Tokyo subway. Despite the violence, members were brainwashed into viewing Asahara as a divine figure.
3. Sky Kingdom (Malaysia – Ayah Pin)
Ayah Pin claimed to be a reincarnation of religious figures across major faiths. His commune was famous for its large teapot structure, symbolizing purification. Despite its seemingly peaceful doctrine, authorities saw it as deviant. It drew followers through the promise of divine truth and spiritual superiority, even as critics pointed to manipulation and financial exploitation.
B. MODERN CULT MECHANICS
Cults don’t always need compounds or temples. Today, cult-style tactics appear in subtler forms:
Fake Influencers and Online Gurus - Self-proclaimed “mentors” or “wealth coaches” build loyal followings using motivational language, fake luxury, and manipulated social proof. They mimic cult leaders, offering a vision, creating an “us vs. them” mindset, and using fear of missing out (FOMO) to retain loyalty,
Scammers and Ponzi Schemers - using the power of suggestion, many scammers construct narratives that blend religious hope with psychological manipulation. They often play on trust, faith, or status. Many victims don’t just lose money, they lose identity and social support after being brainwashed into defending their exploiters.
C. MANIPULATION, MAGIC AND MIND GAMES
While I'm not denying that black magic is occasionally invoked in cult narratives especially in Southeast Asia, the real power lies in suggestion and psychological manipulation. Among them are :
Repetition and Isolation eventually breaking down critical and logical thinking,
Religious symbolism adds emotional weight,
Charismatic leadership creates dependence,
Cover-ups and conspiracies are used to protect the inner circle and silence dissent.
D. MONEY TRAIL - ORGANIZED CRIME AND CULT POWER
Many cults have financial operations that resemble organized crime syndicates.
Money laundering through donations or businesses,
Flaunting of wealth to attract new recruits ("If God blesses me, follow me!"),
Land grabs, crypto scams, fake MLMs,
Sexual exploitation masked as spiritual rituals
Layered trust networks that prevent whistleblowing
At the heart of it all, even the most spiritual-sounding cult often boils down to power and money. Control of assets, of people, of belief and the ability to extract wealth in plain sight.
CONCLUSION
The cult isn’t dead, it’s just rebranded. Whether through robes and rituals or reels and retweets, the mechanics remain: isolate, indoctrinate, exploit. As lines blur between spiritual enlightenment and psychological enslavement, the world must sharpen its awareness. What starts as a community of belief can easily become a web of manipulation and when power is unchecked, the victims are often invisible until it’s too late.
Monday, July 07, 2025
MALAYSIANS INVOLVEMENT IN COUNTERFEIT CARD OPERATIONS IN THE UK
Friday, August 16, 2024
A BRIEF ON HOW TO DETECT FRAUD IN BANKING AND FINANCIAL SECTORS - Nik Zafri
Please also read my other articles about money laundering and anti-corruption.
Detecting fraud is usually linked money laundering, and corruption in the banking and financial sectors is crucial for maintaining the integrity of the financial system. there are strategies and technologies need to be taken into account.
1. Fraud Detection
a. Transaction Monitoring Systems (TMS)
These systems analyze transaction patterns in real-time or near real-time to detect suspicious activities. They use predefined rules, statistical models, and machine learning algorithms to flag anomalies. This will enable banks to proactively detect and investigate suspicious activities, helping to prevent them from escalating into more significant financial crimes. By identifying and halting illegal transactions early, banks can avoid potential losses and reduce the risk of regulatory scrutiny.
b. Anomaly Detection (AI)
Machine learning techniques (AI), such as supervised and unsupervised learning, are employed to detect deviations from typical behavior. These methods can identify unusual patterns that may indicate fraud. Machine learning models has proven effective in detecting anomalies by identifying unusual patterns in vast datasets. These AI models continuously learn from transaction data, adapting to emerging fraudulent schemes in real-time.
c. Behavioural Analytics
Sometimes, a user behaviour can also indicate fraudulent activity. These include frequent login times, transaction types, and sometimes at different locations and mixture of transactions (frequent use of cash deposit machine with significantly large amounts at different locations and online transfers/interbank transfer)
d. Multi-factor Authentication (MFA)
Implementing MFA helps in preventing unauthorized access to banking systems, which is a common precursor to fraud. It can pose problems to the customers with too many authentications and verifications but it will protect both customers and bank from fraud and scamming. MFA adds an extra layer of security beyond just a password. Customers must provide two or more verification factors—such as something they know (a password), something they have (a smartphone or security token), or something they are (a fingerprint or facial recognition). This makes it much more difficult for unauthorized users to gain access, as even if they manage to obtain one factor, they would still need the additional factor(s) to successfully log in.
2. Money Laundering Detection (Anti-Money Laundering or AML)
a. Know Your Customer (KYC) and Customer Due Diligence (CDD)
KYC involves verifying the identity of customers, while CDD involves ongoing monitoring of their transactions to help identify potentially suspicious behavior linked to money laundering.
b. Suspicious Activity Reporting (SAR)
Banks are required to file SARs for any transactions that they suspect may involve money laundering. These reports are then reviewed by financial regulatory authorities such as Bank Negara.
c. Risk-Based Approach
Financial institutions categorize customers and transactions based on their risk level. Higher-risk transactions are monitored more closely to detect potential money laundering.
d. Transaction Structuring Detection
Money launderers often structure transactions in small amounts to avoid detection. Advanced algorithms can detect patterns of structuring across multiple accounts or over time.
e. Beneficial Ownership Identification
It's essential to determine the true owners behind complex corporate structures, as money launderers often hide behind layers of corporate entities.
3. Corruption Detection
a. Conflict of Interest Checks
Regular audits and checks can help identify situations where employees or executives of the bank might have conflicts of interest, potentially leading to corrupt activities via specific client favoritisms.
b. Vendor and Third-Party Risk Management
Financial institutions should monitor and evaluate the integrity of vendors and third-party relationships to detect corrupt practices, such as bribery or kickbacks.
c. Whistleblower Programs
Encouraging employees to report corrupt activities internally through protected channels can lead to the early detection of corruption.
d. Internal Audits and Controls
Regular internal audits can identify weaknesses in financial controls that could be exploited for corrupt purposes.
4. Technology and Data Analytics
a. Artificial Intelligence and Machine Learning:
AI and ML are increasingly used to detect complex fraud, money laundering, and corruption schemes. These technologies can analyze large datasets and identify patterns that humans might miss.
b. Blockchain Technology
Blockchain’s transparency and immutability make it a powerful tool in preventing fraud and money laundering, especially in tracking the provenance of funds.
c. Big Data Analytics
Analyzing vast amounts of structured and unstructured data helps in identifying suspicious activities across different systems and jurisdictions.
d. Network Analysis
Analyzing relationships between different entities (e.g., customers, accounts, transactions) can reveal hidden connections that may indicate fraudulent or corrupt activity.
5. Regulatory Compliance and Reporting
a. Regulatory Technology
Regulatory Technology help financial institutions comply with regulatory requirements by automating the monitoring, reporting, and auditing processes.
b. Continuous Training and Awareness
Financial institutions must regularly train their employees on the latest fraud, AML, and anti-corruption techniques and regulations to ensure vigilance and compliance.
c. Collaboration with Law Enforcement
Financial institutions often work closely with law enforcement agencies such as Bank Negara Malaysia, Security Commission, the Police (PDRM), Company Commission etc. to share information and intelligence, helping to detect and prevent illicit activities.
6. Challenges and Emerging Threats
a. Cyber Fraud
As banking becomes increasingly digital, cyber fraud (e.g., phishing, hacking) poses a significant threat. Institutions must continuously update their cybersecurity measures.
b. Cross-Border Transactions
Detecting fraud and money laundering in cross-border transactions is challenging due to differing regulations and the complexity of tracking funds across multiple jurisdictions.
c. Cryptocurrency Risks
The rise of cryptocurrencies presents new challenges for detecting money laundering, as these digital assets offer a degree of anonymity and are harder to trace.
Conclusion
Detecting fraud, money laundering, and corruption requires a multi-faceted approach that combines advanced technology, strict regulatory compliance, and robust internal controls. As threats evolve, financial institutions must stay ahead by adopting innovative detection methods and continuously improving their risk management strategies.
Friday, June 07, 2024
INSURANCE REPORTING PROCEDURE? (Malaysia)
Disclaimer : This brief article represents solely my personal research findings. I do not act as a representative of any mentioned party. The views expressed are strictly my own and do not represent those of the parties referenced herein. Additionally, I may not be updated with the latest insurance reporting procedures. Your input to rectify any inaccuracies in my research is greatly appreciated.
The Anti-Money Laundering, Anti-Terrorism and Proceeds of Unlawful Activities Act 2001 (“the Act”) came into force on 15.1.2001 is aimed at thwarting money laundering, terrorism financing, and the utilization of illicit funds. Reporting entities are mandated to disclose any dubious circumstances, as outlined in the Act, along with sector-specific directives or rules set forth by the Bank Negara Malaysia.
Insurance fraud entails engaging in deceptive actions to achieve illegitimate gains within an insurance procedure. It happens when either the insurer or the claimant seeks to acquire benefits they are not rightfully entitled to, or when an insurer deliberately withholds benefits rightfully owed.
Fraud like these adversely affects policyholders, resulting in millions of ringgits lost through elevated premiums and inflated prices for goods and services. Pinpointing the precise cost of insurance fraud proves challenging as a significant portion of instances remain undisclosed.
Examples of insurance fraud that may involve the claimant and/or be known to insurer officials include:
a. Fabricating Claims - Orchestrating staged accidents, such as fake "oil spillage" incidents or chain collisions, to gain possession of the vehicle(s) for repairs.
b. Exaggerating Loss Amounts - Submitting inflated claims where the severity of damage or injuries sustained in a legitimate accident is overstated.
c. Providing False Information for Compensation - Presenting inflated or "padded" claims where the extent of damage or injuries sustained in a genuine accident is misrepresented.
Quoting 14A. (1) of Anti-Money Laundering, Anti-Terrorism, Financing and Proceeds of Unlawful Activities Act (AMLATFPUA) 2001 :
Any person who knows or has reason to suspect that a reporting institution is proposing to report, is reporting or has lodged a report under section 14 or is proposing to provide, is providing or has provided any other related information to the competent authority and discloses such knowledge, suspicion or information to any other person commits an offence and shall on conviction be liable to a fine not exceeding three million ringgit or to imprisonment for a term not exceeding five years or to both.
In this context :
• Any person : claimant/insurer officials,
• Reporting Institution: Insurance Company,
• Competent Authority: Persatuan Insurans Am Malaysia (PIAM)
The competent authority duly authorized by BNM for reporting fraud is Persatuan Insurans Am Malaysia (PIAM).
However, I noticed some limitations:
Possible ambiguity regarding whether compliance officials (or a member of general public) can utilize the same form (FRCF) to report against another officials - if so, will it reach BNM or any other authority (will such insurance compliance official be protected under the Witness Protection Act 2009 (Act 696),
The general reporting period allocated is six (6) months but clarity is potentially lacking on other types of cases,
Unresolved issues can be reported to either the Ombudsman for Financial Services (OFS) or BNM.
Nevertheless, there appear to be limitations on BNM side in handling complaints of misconduct, which may not be consistent with Section 14 (A) of AMLATFPUA.
The reporting procedure by other institutions such as Banking and Financial Institutions are generally clear, but there appear to be "some exceptions" regarding reporting insurance incidents, which I consider vague, especially concerning officials reporting misconduct against another official.
If these are valid concerns - there's a need for improvement to ensure that there are no restrictions on disclosing reports directly to Bank Negara Malaysia, aside from PIAM or OFS.
Sunday, December 03, 2023
SOME OF THE SHADY TACTICS OF MONEY LAUNDERING - NIK ZAFRI
1) Professional services firms for example accounting, legal and even consultancy firms may unwittingly or knowingly become entangled in money laundering schemes.
Saturday, September 02, 2023
ANTI-MONEY LAUNDERING, ANTI TERRORISM AND PROCEEDS OF UNLAWFUL ACTIVITIES ACT 2001 - MY THOUGHT FOR THE DAY
The Malaysian Anti-Money Laundering, Anti-Terrorism and Proceeds of Unlawful Activities Act 2001 is clear in terms of enforcement, reporting institutions and entities, detecting of red flags, sanctions, seizures, etc.
However, there is a possibility of overlapping of duties between several agencies, leaving the general public unclear about "who can do what." This includes Bank Negara Malaysia, Security Commission, Company Commission of Malaysia, Malaysian Anti-Corruption Agency, Royal Military Police, and Special Forces. It's important to sort out these duties to ensure transparency and clarity in the system.
Other potential shortcomings include different reporting periods, accessing databases, listing and global sharing of information. I hope to see improvements in the near future.
Saturday, January 28, 2023
PART 2 - ANTI-BRIBERY MANAGEMENT SYSTEM - by Nik Zafri
Note : For all parters of my articles, I will not touch clause 2.0 and 3.0. The articles may follow the sequential order of the standard clauses or quoting certain paras/phrase from the standard but the contents are mostly self-explanation based on my understanding and experience. The contents may also be customized to the Malaysian environment with some references cited from international laws and case studies.
Scope
All documented information is recommended to use anti-bribery laws and voluntary commitments as their guidelines.
Among others, ISO 37001:2016 entails the need for detect, prevent and respond to many types of bribery. The scope involves personnel, associates, business activities, 3rd parties from public, private and not-for-profit sectors (example NGO).
This means that it's not limited only to clients but also branching out to customers, JV, JV partners, consortium partners, outsourcing providers, contractors, consultants, sub-contractors, suppliers, vendors, advisors, agents, distributors, representatives, intermediaries and investors.
For public official, the system should also cover person holding a legislative, administrative or judicial office, whether by appointment, election or succession, or any person exercising a public function, including for a public agency or public enterprise, or any official or agent of a public domestic or international organization, or any candidate for public office.
These requirements are typically addressed in the Anti Bribery Management System (ABMS) Manual.
Although the standard may not be thorough, to organizations practicing (corporate) governance especially Public and Public Listed Company, the manual and the associated procedures should include fraud, cartels, anti-trust/competition offences, money laundering etc.
However, this may require a joint effort between those in the financial positions and the duly authorized personnel from the management.
It is recommended the organization work closely to Bank Negara Malaysia, Security Commission, Registrar of Company/Society etc. for more information on legislation or conditions for public-listing/investment.