1 / 32

Financial Fraud in Cyberspace

Financial Fraud in Cyberspace. Ruzbeh Tusserkani. Is Financial Crime Like an Epidemic? . Public Health Epidemics spread through global travel and mutations of viruses Individuals must take their own precautions like hygiene and wearing masks

tariq
Télécharger la présentation

Financial Fraud in Cyberspace

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Financial Fraud in Cyberspace RuzbehTusserkani

  2. Is Financial Crime Like an Epidemic? Public Health • Epidemics spread through global travel and mutations of viruses • Individuals must take their own precautions like hygiene and wearing masks • Governments implement broad measures to disseminate information, monitor risks and act quickly upon detecting outbreaks Financial Health • Criminals cross borders physically and exchange data to establish new fraud methods • Individuals must protect their physical wallets and bank statements and takes sensible electronic measures • Banks can monitor customers’ risk profiles (KYC) and transactions for suspicious behavior Quarantine should be final resort

  3. Cyber Theft • The new computer-based technology allows criminals to operate more efficiently and effectively. • These thieves use cyberspace to distribute illegal goods and services or to defraud people for quick profit.

  4. Computer Fraud • These crimes include theft of information, “salami fraud” (skimming small amounts of money from many accounts) software theft, manipulation of accounts/banking, corporate espionage. • ATMs (Automatic teller machines) are especially vulnerable.

  5. Internet Securities Fraud • This crime involves using the Internet to intentionally manipulate the securities marketplace for profit. The three major types of this fraud are: • Market manipulation • Fraudulent offerings of securities • Illegal touting

  6. Identity Theft • This occurs when someone uses the Internet to steal another’s identity and/or impersonate the victim to open credit card accounts and/or other financial transactions. • Phishing (carding, spoofing)—some identity thieves create false e-mails or websites designed to gain illegal access to a victim’s personal information.

  7. Identity Theft & Identity Fraud • Identity theft involves acquiring key pieces of your identifying information without the victim’s knowledge. • Identity fraud occurs when thieves use the victims’ personal identifying information to order merchandise, obtain credit, or otherwise falsely represent themselves without the victim’s express consent.

  8. Internet Usage And ID Theft

  9. How Identities are Stolen High Tech Methods • Phishing • Spyware and Key Logging • Skimming • Trojan Horses, Viruses and Worms • Hacking • Spamming Low Tech Methods • Automobile dealers, retailers, restaurants • Personnel Files • Dumpster Diving • Lost/Stolen Wallets and Checkbooks • Healthcare Records • Mail Theft

  10. Phishing • High-tech scam using spam or pop-up messages from known businesses requesting account validation. • Warnings of dire consequences if the victim fails to respond. • Directs the victim to a Web site resembling a legitimate site where the operators trick the victim into divulging personal identifier information.

  11. Spyware and Key Logging • Software that collects personal information from your computer without your knowledge. • Downloaded to your computer from the websites you visit, or invites itself in unannounced when you agree to download another program.

  12. Skimming • Occurs anywhere a credit card is accepted • Rarely done at any location for more than 7 days • A collusive employee completes a valid sale, then captures a second (unauthorized) swipe covertly before returning the card to the cardholder • Fraudulent transactions frequently occur within 24-48 hours of the compromise • Cardholders are not aware that they have been victimized until they receive their credit card statements showing the fraudulent charges

  13. Skimming Devices Can be made easily accessible inside clothing Hand Held Skimmer/ “Wedge”

  14. Most Common Low Tech Schemes • Unknown caller posing as a bank employee trying to verify a SSN and mother’s maiden name • Fraudster requests a victim’s credit report • Dishonest employee with access uses or sells personal information • Fraudster changes the address on your account to their address through the financial institution • Thief who steals your information during a burglary

  15. Other Internet Fraud Schemes • Pet (selling) scams • Secret Shoppers and Funds Transfer Scams • Adoption and Charity Frauds • Romance Fraud

  16. Hacking • Hackers accessed more than 5 million Visa and MasterCard credit card accounts in the US. – February 2003 • Hackers accessed a U.S. military database containing Social Security numbers and other personal information for 33,000 Air Force officers and enlisted personnel. -August 2005 • Hackers compromised the confidentiality of 40 million credit card holders, and 200,000 records had left the network at Card-Systems. – June 2005 • T-Mobile notified 400 customers whose data was accessed, but left open the possibility of more victims as the case progresses. – February 2005

  17. Fraudulent Applications • Personal information of a true person used to open a new account • Common to add an additional fictitious person to the cardholder’s account • Driven in part by the ease of obtaining instant credit – vehicles, loans, department store accounts

  18. Credit Card Fraud • Test purchases with small charges before larger cash withdrawals • Obtain large advances within a very short period • Randomize banks using the same credit card • Exhaust credit limit as quickly as possible • Use bank or merchant insiders to avoid early detection

  19. Money Laundering

  20. What it is… • To move illegally acquired cash through financial systems so that it appears to be legally acquired • The purpose of such transactions is to hide the identity of the real owner of or the illegal origin of assets.

  21. Why do it… • Avoid prosecution • Increase profits • Avoid seizure of accumulated wealth • Appear legitimate • Tax evasion

  22. How to do it… • Structuring – “smurfing” • Bank Complicity • Asset Purchases • Securities’ Broker • Telegraphic Transfer of Funds • Travel Agencies • Gambling in Casinos

  23. It took 45 seconds to launder the money by a wire transfer, and it took the police officers 18 months to investigate the case.

  24. Insider Fraud Typologies • Embezzlement • Employee performs illegal activities in order to move money out of customer accounts • Activity could extend for months or years • Typical of : New employee, Employee experiencing financial pressure, Blackmail • Compromising Personal Information • Employee transfers, to his associates, sensitive customer information that can be used later for identity theft or • account take over • Usually involves multiple accounts • The information can be used later to: Enroll into On-Line • banking, Perform transfers, Order new check book etc • Bypassing account management controls • Employee works in collusion with a customer in order to compromise business controls and defraud the bank • Usually involves multiple accounts or a merchant • Typical for application approvals, merchant fraud, bank notes, deposit certificates, etc

  25. Example Online Banking Fraud • Eastern European network • Used internet forums to purchase account information (credit records, account records, etc) • Opened mule accounts in each bank where performed fraud by using false identities • Used account info to overtake accounts through multiple channels (using call center to get online password, and moving money through the E-banking products) • Used internet banking transfers to move money from overtaken accounts to the mule accounts • Relationship with a US based drug-addicts network that were shipped with the debit cards and took the money from ATMs

  26. Card Fraud Types • Stolen Cards • Focus on deviation from ordinary behavior, and on comparison to known fraud cases • Entities: cards, accounts, customers • Skimming • Differentiate between fraudulent and normal behavior at ATM/POS • Identify unlikely activities and behavior patterns of card usage • Proactively prevent mass fraud, by predicting fraudulent cards based on previously identified skimmed cards • Bust Out Fraud • Evaluating the risk of new applications and first card activity • “Tourism Fraud” • Smart card based fraud in exported to countries yet to deploy smart card systems

  27. Financial Crime Globalization Example • Team of Sri Lankan nationals caught withdrawing cash from ATMs in Phuket Thailand • 4,000 fake cards found, encoded with details of UK cards • Genuine UK cards were chip & pin encoded, but Thai ATMs had to rely on magnetic stripe only • Genuine card details are bought and sold on the Internet for as little as a few dollars • Machine to encode cards can also be bought on the internet for a few hundred dollars • Multiple groups of criminals performing different roles in the criminal food chain

  28. Money Laundering – AML / CFT • “Efforts to use or conceal illicit funds such as proceeds of drug trafficking and organized crime” • Many known typologies such as Structuring, Flow-though, Circulation, Grouping of accounts, Dummy loans, etc • Countering the Financing of Terrorism (CFT) • Avoid dealing with banned parties • Usually Driven by Regulations • “Know Your Customer” (Customer Due Diligence, Screening and Risk Profiling) • Cash transaction reporting can generate many “false positives” • Regulations can be “prescriptive” and inflexible, yet bank may be held responsible if fails to detect criminal behavior

  29. Tighter AML regulation in the US and Europe is pushing money laundering activity into Asia Pacific…

  30. Spending on anti-money laundering solutions in Asia will grow faster than in Europe or North America as regulators in Asia finally get serious about AML…

  31. Summary - The Challenge • Fraud Percentage • Very high data volumes and small number of fraud cases, result in extremely low (0.005%) percentage of fraudulent transactions that nevertheless can result in significant losses • Fraud Coverage and Complexity • Fraud takes many forms (Takeover, Financing, Mule, …) and is not limited to a single channel (Internet, Phone, Mail, …) • Dynamic Environment • Criminals constantly seek new methods, which requires the ability to be one step ahead and dynamically add new parameters and rules. • Simplistic Rules-Based AML approaches • Generate many Suspicious Transaction Reports, which may involve innocent customers while missing sophisticated criminals • Multiple products, multiple channels • Only monitoring all transactional activity on the enterprise level can reveal the fraudulent scenarios

  32. Financial Crime in 2008 and Beyond • New era of corporate accountability and governance requirements • Rapid changes in regulatory and legislative compliance • Global deployment of new client services exposes organizations to much great risk • Organized cross-border white collar Fraud Syndicates • Linkages between Fraud, Money Laundering and the Financing of Terrorism

More Related