Fraud isn't just "bad people doing bad things"—it is a Design Flaw where the information system has decoupled from the physical system.
While most CFOs hunt for waste in electricity bills or raw material prices, they rarely look for the Information Ghosts that allow value to be extracted from the factory without a corresponding entry in the ledger.
I once audited a large railway catering operation where the "leak" wasn't in the kitchen—it was in the desk drawers.
The System: Passengers purchased coupon books and surrendered a coupon at the canteen for a meal. On paper, the transaction was closed: value exchanged, signal used.
The Forensic Reality: During the audit, I noticed that surrendered coupons were not being canceled, defaced, or destroyed. They were simply sitting in the managers' desk drawers.
The Discovery: When I asked a manager what happened to these "used" coupons, he laughed and replied, "We use them again to buy more food".
The "Signal Resurrection" Failure: Every financial signal must have a definitive Terminal Point. If a signal—be it a coupon, purchase order, or digital authorization—is not "killed" once value is realized, it becomes a Ghost Asset. It creates a circular economy of fraud where the organization pays for the same value multiple times.
To prevent the Fraud Tax, a Cost Architect must distinguish between two types of signals: the Identity Key (who you are) and the Value Trigger (what is happening).
The Single-Use Pulse (The Coupon)
A pulse is intended to trigger a one-time value exchange.
The Law: The signal must "die" the moment the physical event occurs.
The Failure: Treating a pulse like a reusable key allows for Signal Resurrection.
Reusable Signals (The Key Card and Open Pipe)
If not "architected" correctly, reusable signals are the primary source of the Fraud Tax.
The "Open Pipe" (Standing Authorizations): Pre-approved agreements, like a contract to buy 10,000 tons of steel, are often reused for every truck delivery. Without a "Meter" to kill the signal once the cap is reached, it becomes a permanent leak for unauthorized invoices.
The "Key Card" (Access Tokens): In a factory, an Operator ID "unlocks" a machine. While it identifies the person, it does not validate the work. An operator might "reuse" their signal to produce "off-the-books" inventory during an unsanctioned shift.
The "Base-Load" (Subscription Signals): SaaS fees or retainers often survive the "Death" of the value they provide—such as paying for a software subscription for a machine decommissioned six months ago.
A reusable signal is safe only if it is treated as a Metered Pulse rather than a static permission.
The Clinical Solution: Access signals (like passwords) should be Conditional—the "Key" only works if a secondary "Pulse" (like a specific Production Order) is present.
The Clinical Takeaway: A control system is only as strong as its disposal protocol. If your physical inventory does not "handshake" with your digital signal at every workstation, you are paying a Fraud Tax.
When was the last time you performed a "Terminal Audit"? Do your authorization signals die the moment value is exchanged, or are they sitting in a "Desk Drawer" waiting to be resurrected?