The Reserve Bank today placed on its website a Working Paper titled “Estimation of Counterfeit Currency Notes in India – Alternative Methodologies” under the RBI Working Paper Series. The paper has been written by Shri Sanjoy Bose and Dr. Abhiman Das.
Counterfeiting poses increasing challenges to currencies all over the world, including India. Recent advances in printing technology have only aided production of counterfeit notes. Despite the extent of counterfeiting being apparently small in India, it poses serious threats to the currency and financial system. The Government and the Reserve Bank have responded to this threat by redesigning notes as also by attempting to improve public understanding about authenticity of currency through awareness campaigns. To assess the effectiveness of various measures to deter counterfeiting, however, one needs to understand the exact nature of the threat that counterfeiting poses on economic activity. It is necessary to examine the level of counterfeiting on a regular basis. Such examination is critical both from theoretical and empirical points of view.
The extent of counterfeiting is usually judged by observing the current flow of recoveries, or by estimating the outstanding stock of counterfeits as a ratio against total notes in circulation. However, the flow of recovery as well as seizure of counterfeits is directly observable, whereas the total stock of counterfeits cannot be measured directly. To fill this lacuna, the paper has proposed a probability model based methodology that could potentially provide a scientific and practical solution in obtaining credible statistical estimates of counterfeits in an enduring way.
This technical paper examines certain feasible methodologies for estimating counterfeit notes in India. This includes adopting inverse sampling technique at various stages of currency detection system and also exploring the procedures adopted by other central banks to understand the incidence of counterfeiting in India. Adoption of standard inverse sampling, however, demands data on notes processed at each and every intervening stage of the first, second and subsequent fake notes detected. This process is difficult to implement and is impractical. As such, the paper has proposed the following: