Financial Fraud in Cyberspace Ruzbeh Tusserkani. Is Financial Crime Like an Epidemic? Financial Health Criminals cross borders physically and exchange.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Anti-Money Laundering (AML)
E-banking.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Cyber Crimes.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Jeff loses his identity! Lesson 8: Identity Theft.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Business Compromise and Cyber Threat
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Financial Fraud in Cyberspace Ruzbeh Tusserkani

Is Financial Crime Like an Epidemic? Financial Health Criminals cross borders physically and exchange data to establish new fraud methods Individuals must protect their physical wallets and bank statements and takes sensible electronic measures Banks can monitor customers’ risk profiles (KYC) and transactions for suspicious behavior Public Health Epidemics spread through global travel and mutations of viruses Individuals must take their own precautions like hygiene and wearing masks Governments implement broad measures to disseminate information, monitor risks and act quickly upon detecting outbreaks Quarantine should be final resort

Cyber Theft The new computer-based technology allows criminals to operate more efficiently and effectively. These thieves use cyberspace to distribute illegal goods and services or to defraud people for quick profit.

Computer Fraud These crimes include theft of information, “salami fraud” (skimming small amounts of money from many accounts) software theft, manipulation of accounts/banking, corporate espionage. ATMs (Automatic teller machines) are especially vulnerable.

Internet Securities Fraud This crime involves using the Internet to intentionally manipulate the securities marketplace for profit. The three major types of this fraud are: – Market manipulation – Fraudulent offerings of securities – Illegal touting

Identity Theft This occurs when someone uses the Internet to steal another’s identity and/or impersonate the victim to open credit card accounts and/or other financial transactions. Phishing (carding, spoofing)—some identity thieves create false s or websites designed to gain illegal access to a victim’s personal information.

Identity Theft & Identity Fraud Identity theft involves acquiring key pieces of your identifying information without the victim’s knowledge. Identity fraud occurs when thieves use the victims’ personal identifying information to order merchandise, obtain credit, or otherwise falsely represent themselves without the victim’s express consent.

Internet Usage And ID Theft

How Identities are Stolen High Tech Methods Phishing Spyware and Key Logging Skimming Trojan Horses, Viruses and Worms Hacking Spamming Low Tech Methods Automobile dealers, retailers, restaurants Personnel Files Dumpster Diving Lost/Stolen Wallets and Checkbooks Healthcare Records Mail Theft

Phishing High-tech scam using spam or pop-up messages from known businesses requesting account validation. Warnings of dire consequences if the victim fails to respond. Directs the victim to a Web site resembling a legitimate site where the operators trick the victim into divulging personal identifier information.

Spyware and Key Logging Software that collects personal information from your computer without your knowledge. Downloaded to your computer from the websites you visit, or invites itself in unannounced when you agree to download another program.

Skimming Occurs anywhere a credit card is accepted Rarely done at any location for more than 7 days A collusive employee completes a valid sale, then captures a second (unauthorized) swipe covertly before returning the card to the cardholder Fraudulent transactions frequently occur within hours of the compromise Cardholders are not aware that they have been victimized until they receive their credit card statements showing the fraudulent charges

Skimming Devices Hand Held Skimmer/ “Wedge” Can be made easily accessible inside clothing

Most Common Low Tech Schemes Unknown caller posing as a bank employee trying to verify a SSN and mother’s maiden name Fraudster requests a victim’s credit report Dishonest employee with access uses or sells personal information Fraudster changes the address on your account to their address through the financial institution Thief who steals your information during a burglary

Other Internet Fraud Schemes Pet (selling) scams Secret Shoppers and Funds Transfer Scams Adoption and Charity Frauds Romance Fraud

Hacking Hackers accessed more than 5 million Visa and MasterCard credit card accounts in the US. – February 2003 Hackers accessed a U.S. military database containing Social Security numbers and other personal information for 33,000 Air Force officers and enlisted personnel. -August 2005 Hackers compromised the confidentiality of 40 million credit card holders, and 200,000 records had left the network at Card- Systems. – June 2005 T-Mobile notified 400 customers whose data was accessed, but left open the possibility of more victims as the case progresses. – February 2005

Fraudulent Applications Personal information of a true person used to open a new account Common to add an additional fictitious person to the cardholder’s account Driven in part by the ease of obtaining instant credit – vehicles, loans, department store accounts

Account Takeover Personal and account information of a true person is compromised. Victim’s documents, statements and identifying cards are diverted by changing the address with custodian. Fraudster usually waits one month to order checks and/or credit cards. Upon receipt of the credit card, fraud charges occur quickly and usually end after a short time. Account “kiting” may follow.

Credit Card Fraud Test purchases with small charges before larger cash withdrawals Obtain large advances within a very short period Randomize banks using the same credit card Exhaust credit limit as quickly as possible Use bank or merchant insiders to avoid early detection

Money Laundering

What it is… To move illegally acquired cash through financial systems so that it appears to be legally acquired The purpose of such transactions is to hide the identity of the real owner of or the illegal origin of assets.

Why do it… Avoid prosecution Increase profits Avoid seizure of accumulated wealth Appear legitimate Tax evasion

How to do it… Structuring – “smurfing” Bank Complicity Asset Purchases Securities’ Broker Telegraphic Transfer of Funds Travel Agencies Gambling in Casinos

It took 45 seconds to launder the money by a wire transfer, and it took the police officers 18 months to investigate the case.

Insider Fraud Typologies Embezzlement – Employee performs illegal activities in order to move money out of customer accounts – Activity could extend for months or years – Typical of : New employee, Employee experiencing financial pressure, Blackmail Compromising Personal Information – Employee transfers, to his associates, sensitive customer information that can be used later for identity theft or – account take over – Usually involves multiple accounts – The information can be used later to: Enroll into On-Line – banking, Perform transfers, Order new check book etc Bypassing account management controls – Employee works in collusion with a customer in order to compromise business controls and defraud the bank – Usually involves multiple accounts or a merchant – Typical for application approvals, merchant fraud, bank notes, deposit certificates, etc

Example Online Banking Fraud  Eastern European network  Used internet forums to purchase account information (credit records, account records, etc)  Opened mule accounts in each bank where performed fraud by using false identities  Used account info to overtake accounts through multiple channels (using call center to get online password, and moving money through the E-banking products)  Used internet banking transfers to move money from overtaken accounts to the mule accounts  Relationship with a US based drug-addicts network that were shipped with the debit cards and took the money from ATMs

Card Fraud Types Stolen Cards – Focus on deviation from ordinary behavior, and on comparison to known fraud cases – Entities: cards, accounts, customers Skimming – Differentiate between fraudulent and normal behavior at ATM/POS – Identify unlikely activities and behavior patterns of card usage – Proactively prevent mass fraud, by predicting fraudulent cards based on previously identified skimmed cards Bust Out Fraud – Evaluating the risk of new applications and first card activity “Tourism Fraud” – Smart card based fraud in exported to countries yet to deploy smart card systems

Financial Crime Globalization Example Team of Sri Lankan nationals caught withdrawing cash from ATMs in Phuket Thailand 4,000 fake cards found, encoded with details of UK cards Genuine UK cards were chip & pin encoded, but Thai ATMs had to rely on magnetic stripe only Genuine card details are bought and sold on the Internet for as little as a few dollars Machine to encode cards can also be bought on the internet for a few hundred dollars Multiple groups of criminals performing different roles in the criminal food chain

Money Laundering – AML / CFT “Efforts to use or conceal illicit funds such as proceeds of drug trafficking and organized crime” Many known typologies such as Structuring, Flow- though, Circulation, Grouping of accounts, Dummy loans, etc Countering the Financing of Terrorism (CFT) – Avoid dealing with banned parties Usually Driven by Regulations – “Know Your Customer” (Customer Due Diligence, Screening and Risk Profiling) – Cash transaction reporting can generate many “false positives” – Regulations can be “prescriptive” and inflexible, yet bank may be held responsible if fails to detect criminal behavior

Tighter AML regulation in the US and Europe is pushing money laundering activity into Asia Pacific…

Spending on anti-money laundering solutions in Asia will grow faster than in Europe or North America as regulators in Asia finally get serious about AML…

 Fraud Percentage  Very high data volumes and small number of fraud cases, result in extremely low (0.005%) percentage of fraudulent transactions that nevertheless can result in significant losses  Fraud Coverage and Complexity  Fraud takes many forms (Takeover, Financing, Mule, …) and is not limited to a single channel (Internet, Phone, Mail, …)  Dynamic Environment  Criminals constantly seek new methods, which requires the ability to be one step ahead and dynamically add new parameters and rules.  Simplistic Rules-Based AML approaches  Generate many Suspicious Transaction Reports, which may involve innocent customers while missing sophisticated criminals  Multiple products, multiple channels  Only monitoring all transactional activity on the enterprise level can reveal the fraudulent scenarios Summary - The Challenge

Financial Crime in 2008 and Beyond New era of corporate accountability and governance requirements Rapid changes in regulatory and legislative compliance Global deployment of new client services exposes organizations to much great risk Organized cross-border white collar Fraud Syndicates Linkages between Fraud, Money Laundering and the Financing of Terrorism