Busting Fraud Rings with. Social Link Analysis

Size: px
Start display at page:

Download "Busting Fraud Rings with. Social Link Analysis"

Transcription

1 Busting Fraud Rings with Social Link Analysis

2 Table of Contents INTRODUCTION... 1 WHAT IS BUST-OUT FRAUD AND WHY IS IT SO HARD TO DETECT?... 2 SOCIAL LINK ANALYSIS (SLA): A POWERFUL NEW WEAPON... 3 HOW SOCIAL LINK ANALYSIS WORKS... 4 Access Enterprise and Third-Party Data... 5 Detect and Resolve Entities (Entity Resolution)... 6 Link Entities and Create Social Networks... 6 Analyze, Score and Prioritize... 7 Alert... 7 Visualize... 7 BUSINESS BENEFITS... 9 CONCLUSION... 9 ABOUT INFOGLIDE... 10

3 Introduction Financial institutions are forced to combat many types of fraudulent activity, but few are as damaging and difficult to detect as bust-out fraud. Analysts estimate that between 10% and 15% of all banks unsecured bad debt is actually bust-out fraud, resulting in tens of billions in losses every year. While this type of fraud is certainly not new, it remains a significant problem for banks because it is so hard for them to identify and take action in time. Organized bust-out fraud -- also referred to as sleeper fraud -- occurs when an organized group of individuals applies for credit cards, loans, overdrafts or other unsecured banking credit lines, and then uses them to make purchases with no intention of ever paying them back. The criminals hold onto accounts for some time and then quickly ramp up spending activity before the banks can act. Unfortunately for banks, bust-out fraud is difficult to detect by traditional anti-fraud measures because initially, the fraudsters behave like any other respectable customers, bypassing the bank s rules and analytically-based detection measures. To defend against these sophisticated threats, banks must be able to identify fraud rings earlier in their life cycle so perpetrators can be stopped before they act. Additionally, since fraud rings typically operate within a wide number of geographic locations and business channels, the fraud rings must be pieced together across the entire institution. Infoglide has developed a powerful new weapon, Infoglide Social Link Analysis (SLA), designed specifically to combat bust-out fraud by exploiting the number one weakness of bust-out fraud rings: reused identity information. In almost every case of large-scale fraud networks, there are bits and pieces of reused, fraudulently obtained identity information (such as names, phone numbers, addresses, etc.). Infoglide SLA uses sophisticated technology to identify and piece together both exact and inexact (fuzzy) linkages and nonobvious relationships using these recycled pieces of information. As a result, the fraud ring can be discovered before its members can strike the bank. This whitepaper introduces Social Link Analysis and discusses in depth why it is an effective tool against organized bust-out fraud. It also highlights examples and key business considerations for financial institutions.

4 What is Bust-Out Fraud and Why is it so Hard to Detect? Organized bust-out fraud is a type of first-party fraud that occurs when a group of individuals opens bank accounts with fraudulent identity information. Often facilitated by employees, the individuals then typically spend between a few months and a few years establishing themselves as engaged and trustworthy customers. Oftentimes, to simulate activity, the fraudsters will cycle cash among the various fraudulent accounts without the payments ever leaving the bank. Over time, individuals within a network will accumulate several credit cards with increasing levels of credit, along with personal loans and checking accounts. Once a fraudster reaches a desired bust level or time in the scheme, he or she will rapidly increase spending, max out credit card limits and attempt to get additional credit cards, loans or accounts. Since the fraudsters are collaborating with each other, they are able to make sure that they adhere to the rules and thresholds that might otherwise trigger an alarm, making bust-out fraud difficult to detect. Frequently, they will use credit cards and checks to purchase items such as electronics or large household appliances that can be sold quickly after purchase. Because of the speed with which all of this activity happens usually only a couple of days banking systems do not detect it fast enough to react and block purchases. Yet another problem is that banks often lack the tools to detect activities across different lines of business within the institution. For instance, a customer may take out a loan from the retail division to continue cycling their credit card payments. Since most banks analytics are focused on specific lines of business, they are unable to detect cross-channel fraud. Finally, the very nature of the crime makes it difficult to detect. There are many reasons banks see charge-offs and bad checks (for instance, when a customer experiences a divorce, job loss or other personal crisis), so these issues are not always indicative of fraudulent activity. However, estimates indicate that up to 15% of all charged-off credit is, in fact, uninvestigated first-party fraud.

5 Social Link Analysis (SLA): A Powerful New Weapon Although organized fraudsters are sophisticated, they often leave behind evidence that can be used to uncover networks of organized crime. The fraudsters know that due to Know Your Customer (KYC) and Customer Due Diligence (CDD) regulations, their account information will be verified. To pass these checks, the individuals will either modify their own identity or use a synthetic identity, which consists of combining real identity information (e.g., a social security number) with fake identity information (names, addresses, phone numbers, etc.). Fortunately for banks, false identity information required to successfully open accounts can be expensive and inconvenient to acquire and maintain. For example, apartments must be rented out to maintain a valid address. Additionally, there are only so many cell phones a person can carry at one time and only so many aliases that can be remembered. In response, fraudsters look to share recycled bits and pieces of these valuable assets. This reuse of identity information is what makes Infoglide SLA so effective in combating fraud. By examining the linkages between the recycled identities, Infoglide SLA is able to identify potential fraud networks. Once the networks are detected, Infoglide SLA applies advanced analytics to determine the risk level for both the network and each individual associated with that network.

6 How Social Link Analysis Works Social links, in a banking context, are made up of groups of accounts, customers, and employees that share some sort of relationship with each other. Examples of attributes that may be shared and linked can include: Personal identity information (e.g., names, addresses, phone numbers); Account information (such as an account number and its creator); and Transactional information (including payment transfers between accounts, or employees who approve customer information). Infoglide SLA detects the shared relationships between the customers, employees and known bad guy data and links them together into networks. Once the entities are linked together, advanced analytics are applied to determine the level of risk. SLA works by first analyzing data across product lines, matching information across accounts, identifying linkages and networks, and then scoring those links. If connections indicate a risk of fraud, SLA creates an alert using a visualization tool to display the linkage. These steps as well as additional benefits for financial institutions are discussed in more detail with an example and images in the next section.

7 Figure 1: Social Link Analysis Process Access Enterprise and Third-Party Data One of the biggest assets of Social Link Analysis is its ability to analyze information across product and geographic lines. Because such a threat may span multiple product lines, individual fraud solutions may detect only small pieces of the puzzle. Social Link Analysis, on the other hand, is able to put these pieces together. The ability to automatically integrate diverse data sources and identify networks can be a significant driver of efficiency and productivity for the enterprise risk function. With all the data available in one location, downstream analysis is much simpler and takes less time to deploy so that bank officials can quickly identify potential risks.

8 Detect and Resolve Entities (Entity Resolution) Ideally, personal and business information would always be standardized across an organization. However, in reality, most data is fraught with inaccuracies, duplicates, and false identities. For this reason, one of the most challenging aspects of linking entities is being able to determine and match entity attributes that are similar, but not exact. If similar attributes cannot be properly matched, then the resulting link analysis will either analyze incomplete networks (resulting in false negatives) or attribute entities that do not belong together (resulting in false positives). Infoglide is the leading provider of identity/entity resolution software, with mission-critical solutions deployed at the US Department of Homeland Security as well as major banks, insurance companies and retailers. SLA includes Infoglide s patented matching technology, designed to identify, address and display connections between both accurate and inaccurate data. For example, SLA can detect slight variations in names, addresses, telephone numbers, SSNs, etc. In addition, data anomalies such as misuse of data fields, visual scan errors, and transposed data can be accounted for. Link Entities and Create Social Networks Figure 2 is a simple illustration of how Infoglide Social Link Analysis detects links within fraudulent networks. In this example, the applicant A. Lisa Knight shares a telephone number with cardholder Lisa Anne Carr. Additionally, Lisa Anne Carr shares a similar (but not exact) address with a bank employee named Michelle S. Hart. Although A. Lisa Knight does not share any exact attributes with Michelle S. Hart, they can be considered part of a network because of their shared relationship with Lisa Anne Carr. Figure 2: Network relationships via transitive linkages

9 Analyze, Score and Prioritize Once the links are identified and the social networks are created, Infoglide's Social Link Analysis applies additional analytics to determine the risk level of each network and individual within the network. For example, some factors that would impact the risk score include: Relationships with known fraudsters: New applicants who are connected to accounts that are already in a bank's fraud or AML data; Suspicious relationships with bank insiders: Due to the fact that a large percentage of bust-out fraud is facilitated by employees; and/or Unusually large and diverse networks: Large, connected networks of accounts and customers may mean a growing scheme is ready to bust out. Alert Infoglide Social Link Analysis is capable of analyzing links and generating alerts in real time. For example, when a bank automatically processes new applications through link analysis, applications that exhibit suspicious relationships (as determined by analytics) can be flagged and sent as alerts. Visualize One key component of Infoglide SLA is an integrated link visualization interface. The link visualization can help investigators analyze the linkages of a person/account of interest. Social Link Analysis typically starts when an investigator wants to look at the relationships of a particular person of interest for example, if an alert is generated by the bank s existing anti-fraud solutions or a security officer receives a hot tip. From there, the attributes (such as name, address, and phone number) are searched and a representation of the person of interest s relationships is presented in a visual layout.

10 Example: An investigation starts off with Susie Smith, who has a checking account, credit card, a charged-off loan (a loan with debt that is unlikely to be collected by the bank) and an active loan. The visualization tool also shows Susie s phone number and address. A look into Susie s relationships begins to turn up some suspicious information (see Figure 3 below). Susie Smith is connected to Jack Wilson, another customer with the same phone number. Like Susie, Jack has some charged-off credit, a credit card and a charged-off loan. Susie Smith is also linked to John Benton because they share the same address. Not only does John Benton have a charged-off loan, but one of his other loans is under investigation at the bank. If fraud is not confirmed at this point, it certainly is when the analyst looks at third-degree relationships. Jack Wilson is connected through an address match to Mark Rivera, who is under investigation for mortgage fraud, and Mark Rivera is connected to John Benton through a matching phone number. As a result, Social Link Analysis has detected four members of a network, each with various amounts of charged-off fraud. Figure 3: Link Analysis Identifying Network Connections

11 Business Benefits Bust-out fraud wastes bank resources not only through significant financial losses, but also by wasting staff time and affecting a bank's key risk predictions. Therefore, addressing bustout fraud using social link analysis can enable banks to significantly reduce fraud losses as well as improve operational expenses and investigator efficiencies. Implementing social link analysis: Reduces Fraud Losses: With social link analysis, banks can identify fraud rings while they are still active. As a result, they can take effective countermeasures, such as increased monitoring, shutting down the account, or taking legal action before fraudsters strike; Lowers Operational Expenses: Infoglide Social Link Analysis can complement fraud detection solutions already in place at the bank to streamline processes. For example, Infoglide SLA can provide additional analytics that can improve estimates of a specific threat to improve triage efforts; and Increases Investigator Efficiencies: Through its visual link analytics tool, investigators can quickly discover and visualize relationships of persons of interest. These visual references can improve collaborative efforts between different parts of the organization and with law enforcement. Conclusion Although bust-out fraud has been difficult for banks to tackle in the past, Infoglide s SLA can be deployed in a timely, efficient manner. By taking advantage of the most critical vulnerability of bust-out fraud rings reused and/or fraudulent identity information Social Link Analysis quickly pieces together and distinguishes elements of a fraud network. With the use of this product, banks can address issues and implement solutions before being attacked, improving fraud detection and potentially saving thousands of dollars in bad debt and staffing resources.

12 About Infoglide Infoglide ( is a leading provider of identity resolution and entity analytics solutions to government and commercial markets. Infoglide s flagship product, Identity Resolution Engine (IRE), searches disparate databases to discover possible matches and non-obvious relationships between people, places, and things. IRE has patented technology that is used to find matches and social links between entities despite errors in data and intentional attempts to deceive. The product is used by organizations in the insurance, banking, identity management, and government spaces for fraud detection, compliance, AML and screening. Incorporated in 1996, Infoglide Software is a privately held company headquartered in Austin, Texas.

13 Contact Us Infoglide Software Corporation 6500 River Place Blvd., Building II, Suite 450, Austin, Texas Fax: Copyright 2012 Infoglide Software. All Rights Reserved.

The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age Scoping Out Synthetic ID Fraud In the 18 years since synthetic identity fraud emerged as a significant

More information

Increase Effectiveness in Combating VAT Carousels

Increase Effectiveness in Combating VAT Carousels Increase Effectiveness in Combating VAT Carousels Detect, Prevent and Manage WHITE PAPER SAS White Paper Contents Overview....1 The Challenges...1 Capabilities...2 Scoring...3 Alert and Case Management....3

More information

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Tammy Behnke, Credit Union Program Director at ProSight Specialty

More information

Synthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved.

Synthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities A combination of fictitious and potentially stolen personally identifiable

More information

White Paper. Lifting the Veil Why Understanding Beneficial Ownership Is Now Essential for AML Compliance

White Paper. Lifting the Veil Why Understanding Beneficial Ownership Is Now Essential for AML Compliance White Paper Lifting the Veil Why Understanding Beneficial Ownership Is Now Essential for AML Compliance Fiserv White Paper Lifting the Veil Why Understanding Beneficial Ownership Is Now Essential for AML

More information

Banking Title Application Fraud: The Enemy at the Gates

Banking Title Application Fraud: The Enemy at the Gates WHITE PAPER Banking Title Application Fraud: The Enemy at the Gates It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. ii Contents Overview... 1 What Is Application

More information

INCREASING INVESTIGATOR EFFICIENCY USING NETWORK ANALYTICS

INCREASING INVESTIGATOR EFFICIENCY USING NETWORK ANALYTICS INCREASING INVESTIGATOR EFFICIENCY USING NETWORK ANALYTICS ACFE ANNUAL CONFERENCE ORLANDO, FL JUNE 20, 2012 DAN BARTA CPA, CFE DAVID STEWART CAMS Fraud & Financial Crimes Practice TOPICS INCREASING INVESTIGATOR

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions

More information

White Paper. Banking Application Fraud: The Enemy at the Gates. It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C.

White Paper. Banking Application Fraud: The Enemy at the Gates. It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. White Paper Banking Application Fraud: The Enemy at the Gates It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. Contents Overview... 1 What Is Application Fraud?...

More information

Using data mining to detect insurance fraud

Using data mining to detect insurance fraud IBM SPSS Modeler Using data mining to detect insurance fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information

A Model for Calculating User-Identity Trustworthiness in Online Transactions

A Model for Calculating User-Identity Trustworthiness in Online Transactions A Model for Calculating User-Identity Trustworthiness in Online Transactions Brian A. Soeder Suzanne Barber 2015 UT CID Report #1505 This UT CID research was supported in part by the following organizations:

More information

IBM Financial Crimes Insight for Insurance

IBM Financial Crimes Insight for Insurance IBM Financial Crimes Insight for Insurance Highlights Improve outcomes and reduce cost of counterfraud efforts Optimize assets for efficient and effective fraud management Quickly distinguish fraudsters

More information

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud EXECUTIVE SUMMARY A systematic approach for combating enrollment fraud OCTOBER 2017 Enrollment fraud is a serious and growing problem The proliferation of identity fraud and new ways of enrolling in health

More information

How to Choose a Total Chargeback Management Provider

How to Choose a Total Chargeback Management Provider How to Choose a Total Chargeback Management Provider Chargebacks impact all types of merchants physical goods, recurring, digital goods merchants to the tune of $40 billion every year. This problem continues

More information

Mortgage Payoffs Under Siege

Mortgage Payoffs Under Siege NOVEMBER 8, 2018 Mortgage Payoffs Under Siege Cybercriminals target mortgage payoffs in new fraud schemes Created and published by Thomas W. Cronkright II, Esq. CEO/Co-Founder CertifID LLC 1410 Plainfield

More information

Internal Fraud The Threat from Within

Internal Fraud The Threat from Within make connections share ideas be inspired Internal Fraud The Threat from Within David Porter - SAS The new fraud landscape & the rise of the insider How to rob a bank How to detect fraudulent staff Fraud

More information

Kasasa Protect. FAQ and Product Overview

Kasasa Protect. FAQ and Product Overview Kasasa Protect FAQ and Product Overview Kasasa Protect... 3 Key Contact Info... 3 Included Benefits... 3 Credit Reporting... 4 Monthly Credit Score & Plotter... 4 24/7 Credit Monitoring... 5 Full-Service

More information

Know Your Customer (KYC) Executive Overview with Know Your Vendor (KYV) and Know Your Employee (KYE)

Know Your Customer (KYC) Executive Overview with Know Your Vendor (KYV) and Know Your Employee (KYE) Know Your Customer (KYC) Executive Overview with Know Your Vendor (KYV) and Know Your Employee (KYE) Purpose The goal of this whitepaper is to review the business drivers that are creating increased focus

More information

IVANS 2008 XCHANGE CONFERENCE Key Communications Issues Facing the Property/Casualty Insurance Industry in 2008

IVANS 2008 XCHANGE CONFERENCE Key Communications Issues Facing the Property/Casualty Insurance Industry in 2008 IVANS 2008 XCHANGE CONFERENCE Key Communications Issues Facing the Property/Casualty Insurance Industry in 2008 Tampa, Florida February 7, 2008 Jeanne. M. Salvatore Senior Vice President, Public Affairs

More information

UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division

UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division UI ID Theft in Texas 2014 UI Director s Conference Paul Carmona Director, Regulatory Integrity Division Overview Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term

More information

Anti-Money Laundering. How to set up a strong Compliance Program

Anti-Money Laundering. How to set up a strong Compliance Program Anti-Money Laundering How to set up a strong Compliance Program Importance of AML Protection Financial institutions face a growing number of threats from criminals that seek to misuse the U.S. financial

More information

KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud

KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud Inside: Fraud: A Problem That Won t Go Away How Criminals Exploit Vulnerabilities In Treasury Practices Fraud Prevention From An

More information

Fighting back against synthetic identity fraud

Fighting back against synthetic identity fraud Fighting back against synthetic identity fraud Digging deep into the data trails people leave behind can help banks detect whether their customers are real or not and stem losses from this fast-growing

More information

ANTI-MONEY LAUNDERING IN

ANTI-MONEY LAUNDERING IN ANTI-MONEY LAUNDERING IN THE ACQUIRING INDUSTRY Presented by Laura H. Goldzung, CAMS, CCFE, CFCF, CCRP AML Audit Services, LLC March 8, 2016 AGENDA AML Regulatory Overview OFAC Regulatory Overview AML

More information

Information on Identity Theft for Business, Partnerships and Estate and Trusts

Information on Identity Theft for Business, Partnerships and Estate and Trusts Page 1 of 5 HELP MENU Home News Fact Sheets Information on Identity Theft for Business Partnerships and Estate and Trusts Information on Identity Theft for Business, Partnerships and Estate and Trusts

More information

DUE DILIGENCE IN MORTGAGE OR LOAN TRANSACTIONS

DUE DILIGENCE IN MORTGAGE OR LOAN TRANSACTIONS Appendix 16 DUE DILIGENCE IN MORTGAGE OR LOAN TRANSACTIONS Mortgage fraud is a serious and growing problem in Ontario. In many cases, mortgage fraud involves the use of false identities (title fraud) and

More information

POLICIES FOR PROPER IMPLEMENTATION OF THE FOURTH ANTI MONEY LAUNDERING DIRECTIVE

POLICIES FOR PROPER IMPLEMENTATION OF THE FOURTH ANTI MONEY LAUNDERING DIRECTIVE POLICIES FOR PROPER IMPLEMENTATION OF THE FOURTH ANTI MONEY LAUNDERING DIRECTIVE I. OVERVIEW AND OBJECTIVES 1. The European Organization for Gaming Law (EOGL), representing the EU-wide licensed online

More information

GAO. EXPEDITED ASSISTANCE FOR VICTIMS OF HURRICANES KATRINA AND RITA FEMA s Control Weaknesses Exposed the Government to Significant Fraud and Abuse

GAO. EXPEDITED ASSISTANCE FOR VICTIMS OF HURRICANES KATRINA AND RITA FEMA s Control Weaknesses Exposed the Government to Significant Fraud and Abuse GAO For Release on Delivery Expected at 10 a.m. EST Monday, February 13, 2006 United States Government Accountability Office Testimony Before the Senate Committee on Homeland Security and Governmental

More information

FIGHTING AGAINST CRIME IN A DIGITAL WORLD DAVID HARTLEY DIRECTOR, SAS FRAUD & FINANCIAL CRIME BUSINESS UNIT

FIGHTING AGAINST CRIME IN A DIGITAL WORLD DAVID HARTLEY DIRECTOR, SAS FRAUD & FINANCIAL CRIME BUSINESS UNIT FIGHTING AGAINST CRIME IN A DIGITAL WORLD DAVID HARTLEY DIRECTOR, SAS FRAUD & FINANCIAL CRIME BUSINESS UNIT AGENDA Fraudsters love digital Fighting back Social Network Analysis BACKGROUND THE DIGITAL BUSINESS

More information

Addressing Vehicle Cloning

Addressing Vehicle Cloning Addressing Vehicle Cloning What s behind vehicle crime? 60% of stolen and hijacked vehicles remain in SA Estimated value of R3.5 Billion Market driven enterprise Used in commission of other crimes e.g.

More information

RC & TACKLING BENEFICIAL OWNERSHIP IN AML PROGRAMMES. risk compliance RISK & COMPLIANCE MAGAZINE. risk& compliance REPRINTED FROM: JAN-MAR 2019 ISSUE

RC & TACKLING BENEFICIAL OWNERSHIP IN AML PROGRAMMES. risk compliance RISK & COMPLIANCE MAGAZINE. risk& compliance REPRINTED FROM: JAN-MAR 2019 ISSUE R E P R I N T RC & risk compliance & TACKLING BENEFICIAL OWNERSHIP IN AML PROGRAMMES REPRINTED FROM: RISK & COMPLIANCE MAGAZINE JAN-MAR 2019 ISSUE RC & risk& compliance Visit the website to request a free

More information

Anti-Money Laundering Awareness Training Insurance Industry-Hong Kong

Anti-Money Laundering Awareness Training Insurance Industry-Hong Kong Anti-Money Laundering Awareness Training Overview This program is intended to give individuals working in the Hong Kong Insurance Industry a basic knowledge of money laundering and terrorism financing,

More information

Fraud Detection in Public Schools

Fraud Detection in Public Schools Fraud Detection in Public Schools Goal: To learn how to prevent and detect fraud from actual evidence uncovered during fraud investigations Format: We will discuss three of the largest fraud cases over

More information

Good From The Inside Out. Saturday, April 8, 2017

Good From The Inside Out. Saturday, April 8, 2017 Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU

More information

DRAFT An Act Providing for the Detection and Prevention of Fraud, Waste, Abuse and Improper Payments in State Government

DRAFT An Act Providing for the Detection and Prevention of Fraud, Waste, Abuse and Improper Payments in State Government !" #" $" %" &" '" (" )" *"!+"!!"!#"!$"!%"!&"!'"!("!)"!*" #+" #!" ##" #$" #%" #&" #'" #(" #)" #*" $+" $!" $#" $$" $%" $&" $'" $(" $)" $*" %+" %!" %#" %$" %%" %&" %'" DRAFT An Act Providing for the Detection

More information

Services and Features

Services and Features Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.

More information

Strategic Security Management: Risk Assessments in the Environment of Care. Karim H. Vellani, CPP, CSC

Strategic Security Management: Risk Assessments in the Environment of Care. Karim H. Vellani, CPP, CSC Strategic Security Management: Risk Assessments in the Environment of Care Karim H. Vellani, CPP, CSC Securing the environment of care is a challenging and continual effort for most healthcare security

More information

Bank Secrecy Act (BSA)/Anti-Money Laundering (AML) Employee & Agent Training

Bank Secrecy Act (BSA)/Anti-Money Laundering (AML) Employee & Agent Training Bank Secrecy Act (BSA)/Anti-Money Laundering (AML) Employee & Agent Training OVERVIEW The Bank Secrecy Act, or BSA, was passed by congress in 1970. The BSA required banks to maintain records of certain

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

Minimize risks and make insightful decisions at every step of the policy lifecycle. Life Insurance Solutions from LexisNexis Risk Solutions

Minimize risks and make insightful decisions at every step of the policy lifecycle. Life Insurance Solutions from LexisNexis Risk Solutions Minimize risks and make insightful decisions at every step of the policy lifecycle. In the last decade, one thing has become clear for life insurance providers and customers alike: Technology is changing

More information

Defining Entities for Better Risk Assessment

Defining Entities for Better Risk Assessment WHITEPAPER Defining Entities for Better Risk Assessment Revealing Hidden Risk Authors Jill Coppersmith and Anju Govil Moody s Analytics Contact Us Americas +1.212.553.1653 Europe +44.20.7772.5454 Asia-Pacific

More information

Insurtech 101. A complete guide for both veterans and entrepreneurs launching products in the insurance marketplace.

Insurtech 101. A complete guide for both veterans and entrepreneurs launching products in the insurance marketplace. A Guide to Launching a New Insurance Product Insurtech 101 A complete guide for both veterans and entrepreneurs launching products in the insurance marketplace. In Insurtech 101, we review the fundamentals

More information

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW A Review of Actual Fraud Cases in 2017 FRAUD REVIEW Contents Introduction 3 Fraud Snapshot 4 Case Studies Credit Card Fraud 5 Business Email Compromise Fraud 6 Payroll Fraud 7 Supplier Fraud 8 Outlook

More information

How to Ace Your BSA Exam & Risk Assessment

How to Ace Your BSA Exam & Risk Assessment How to Ace Your BSA Exam & Risk Assessment LeVar Anderson, CAMS, AAP Auditor, Carolinas Credit Union League Agenda NCUA Examiners review compliance with BSA as part of every exam cycle using examination

More information

Implementing behavioral analytics to drive customer value: Insurers cannot afford to wait.

Implementing behavioral analytics to drive customer value: Insurers cannot afford to wait. Implementing behavioral analytics to drive customer value: Insurers cannot afford to wait. 2 A case for behavioral analytics and automated response imagine Two customers phone into your call center. One

More information

Rental Exchange Frequently Asked Questions

Rental Exchange Frequently Asked Questions Rental Exchange Frequently Asked Questions We have prepared this document which we hope will answer any questions you may have about the Rental Exchange. However, if you have a question that has not been

More information

INSURANCE. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in

INSURANCE. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in INSURANCE Forensic services Helping to protect your business from fraud, misconduct and non-compliance ADVISORY kpmg.com/in The insurance industry has been growing at a fast pace in India. To differentiate

More information

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y M A Y 2 0 0 6 Payments Fraud: Consumer Considerations by Terri Bradford, Payments System Research Specialist, Federal Reserve Bank of Kansas City, and Bruce Cundiff, Research Analyst, Javelin Strategy

More information

Guidelines for Anti-Money Laundering and Combating the Financing of Terrorism

Guidelines for Anti-Money Laundering and Combating the Financing of Terrorism [Provisional Translation] The original texts of the Guidelines are prepared in Japanese, and this translation is only provisional. The translation is to be used solely as reference material to aid the

More information

Personal Lending Products

Personal Lending Products Personal Lending Products Terms and Conditions Introduction The details of your credit facilities are set out in the agreement which comes with this booklet. The agreement also sets out the specific terms

More information

Equifax Data Breach: Your Vital Next Steps

Equifax Data Breach: Your Vital Next Steps Equifax Data Breach: Your Vital Next Steps David A. Reed Partner, Ann Davidson Vice President Risk Consulting/ Bond Division Allied Solutions, LLC Do You Remember When this Was the Biggest Threat to Data

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Analytic Technology Industry Roundtable Fraud, Waste and Abuse

Analytic Technology Industry Roundtable Fraud, Waste and Abuse Analytic Technology Industry Roundtable Fraud, Waste and Abuse 1. Introduction 1.1. Analytic Technology Industry Roundtable The Analytic Technology Industry Roundtable brings together analysis and analytic

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

CITIZENS, INC. BANK SECRECY ACT/ ANTI-MONEY LAUNDERING POLICY AND PROGRAM

CITIZENS, INC. BANK SECRECY ACT/ ANTI-MONEY LAUNDERING POLICY AND PROGRAM I. Introduction CITIZENS, INC. BANK SECRECY ACT/ ANTI-MONEY LAUNDERING POLICY AND PROGRAM The Bank Secrecy Act/Anti-Money Laundering Responsibilities of Insurance Companies U.S. insurance companies have

More information

ANTI-MONEY LAUNDERING PROCESS MATURITY

ANTI-MONEY LAUNDERING PROCESS MATURITY ANTI-MONEY LAUNDERING PROCESS MATURITY NEPAL BANKING INDUSTRY Survey Report 2017 Survey Partner AML PROCESS MATURITY - NEPAL BANKING INDUSTRY Survey Report 2017 Anti-Money Laundering (AML) and Combating

More information

Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security

Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC Before the Subcommittee on Crime, Terrorism and Homeland Security Of the Judiciary Committee HR 1731: The Identity Theft

More information

Predictive Modeling and Analytics for Health Care Provider Audits. Sixth National Medicare RAC Summit November 7, 2011

Predictive Modeling and Analytics for Health Care Provider Audits. Sixth National Medicare RAC Summit November 7, 2011 Predictive Modeling and Analytics for Health Care Provider Audits Sixth National Medicare RAC Summit November 7, 2011 Predictive Modeling and Analytics for Health Care Provider Audits Agenda Objectives

More information

gamevy Anti- Money Laundering Detecting and Preventing Financial Crime Training for Gamevy

gamevy Anti- Money Laundering Detecting and Preventing Financial Crime Training for Gamevy gamevy Anti- Money Laundering Detecting and Preventing Financial Crime Training for Gamevy Introduction This document is Gamevy s training on anti- money laundering regulations within the context of our

More information

How Credit Card Chargebacks Really Impact your Bottom Line

How Credit Card Chargebacks Really Impact your Bottom Line How Credit Card Chargebacks Really Impact your Bottom Line Reducing Fraud, Chargebacks, and Lost Profits for Recurring Merchants There are many considerations to take into account when attempting to prevent,

More information

Money Laundering and Terrorist Financing Risks in the E-Money Sector

Money Laundering and Terrorist Financing Risks in the E-Money Sector Money Laundering and Terrorist Financing Risks in the E-Money Sector Thematic Review TR18/3 October 2018 TR18/3 Contents 1 Introduction 3 2 Overview 5 3 Findings 7 Annex 1 Glossary 16 How to navigate this

More information

MONROE COUNTY SHERIFF S OFFICE. General Order

MONROE COUNTY SHERIFF S OFFICE. General Order MONROE COUNTY SHERIFF S OFFICE General Order CHAPTER: 34 - D EFFECTIVE DATE: August 19, 2009 REFERENCE: CALEA 42.2.8 NO. PAGES: 8 TITLE: Identification Theft Investigation Procedures AMENDED: RESCINDS:

More information

LENDING SHORT TERM AND INSTALMENT LENDING. 10 Reasons why Callcredit will help you make smarter decisions

LENDING SHORT TERM AND INSTALMENT LENDING. 10 Reasons why Callcredit will help you make smarter decisions SHORT TERM AND INSTALMENT LENDING 10 Reasons why Callcredit will help you make smarter decisions CONTENTS WE HELP DELIVER FAST, ACCURATE AND RESPONSIBLE LENDING DECISIONS 2 1. Unrivalled Data Coverage

More information

Predictive Claims Processing

Predictive Claims Processing Predictive s Processing Transforming the Insurance s Life Cycle Using Analytics WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Fraud Management.... 2 Recovery Optimization.... 3 Settlement

More information

Services & Features for Employee Benefit Members

Services & Features for Employee Benefit Members Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific

More information

Risk Management on Prepaid Cards

Risk Management on Prepaid Cards Responsibilities CenterState Bank of Florida, NA (CSBF) is the issuing financial institution of all prepaid cards and owner of the associated network BINs. CSBF is responsible for all program monitoring

More information

STEP CERTIFICATE IN ANTI-MONEY LAUNDERING. Syllabus

STEP CERTIFICATE IN ANTI-MONEY LAUNDERING. Syllabus STEP CERTIFICATE IN ANTI-MONEY LAUNDERING Syllabus In collaboration with Delivered by INTRODUCTION This document contains the detailed syllabus for the. This syllabus should be read in conjunction with

More information

No company provides a more powerful fraud detection solution than. Experian, the global leader in information solutions.

No company provides a more powerful fraud detection solution than. Experian, the global leader in information solutions. Fraud Shield SM Intelligent defense against application fraud No company provides a more powerful fraud detection solution than Experian, the global leader in information solutions. Fraud Shield from Experian

More information

ROI CASE STUDY SPSS INFINITY PROPERTY & CASUALTY

ROI CASE STUDY SPSS INFINITY PROPERTY & CASUALTY ROI CASE STUDY SPSS INFINITY PROPERTY & CASUALTY THE BOTTOM LINE Infinity Property & Casualty Corporation (IPACC) deployed SPSS to reduce its payments on fraudulent claims and improve its ability to collect

More information

Anti-Fraud Policy Date: Version: Review Date:

Anti-Fraud Policy Date: Version: Review Date: Anti-Fraud Policy Date: July 2017 Version: 4.0 Review Date: July 2019 Policy Title Anti-Fraud Policy Policy Number: POL 022 Version 4.0 Policy Sponsor Policy Owner Committee Chief Executive Director of

More information

The Guide to Budgeting for Insider Threat Management

The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management This guide is intended to help show you how to approach including Insider Threat Management within

More information

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud Every business is susceptible to fraud But some are more susceptible than others. That

More information

Anti-Money Laundering and Counter Terrorism

Anti-Money Laundering and Counter Terrorism 1 Anti-Money Laundering and Counter Terrorism 1. INTRODUCTION SimpleFX Ltd. ( The Company ) aims to prevent, detect and not knowingly facilitate money laundering and terrorism financing activities. The

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions How do you protect my identity? We use our proprietary software to proactively monitor various sources. Through PrivacyArmor, you will also have the power to create thresholds

More information

Testimony. Submitted for the Record. American Bankers Association. Financial Institutions and Consumer Credit Subcommittee

Testimony. Submitted for the Record. American Bankers Association. Financial Institutions and Consumer Credit Subcommittee Testimony Submitted for the Record from the American Bankers Association for the Financial Institutions and Consumer Credit Subcommittee of the Committee on Financial Services United States House of Representatives

More information

ANTI-FRAUD PLAN INTRODUCTION

ANTI-FRAUD PLAN INTRODUCTION ANTI-FRAUD PLAN INTRODUCTION We recognize the importance of preventing, detecting and investigating fraud, abuse and waste, and are committed to protecting and preserving the integrity and availability

More information

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. CREDIT CARD FRAUD SCHEMES Introduction Consumers make purchases using credit every day. Credit card companies

More information

Leveraging Innovative Technologies to Combat Health Care Fraud Kathy Mosbaugh, Director State Government Health Care NCSL Fall Forum 2011

Leveraging Innovative Technologies to Combat Health Care Fraud Kathy Mosbaugh, Director State Government Health Care NCSL Fall Forum 2011 Leveraging Innovative Technologies to Combat Health Care Fraud Kathy Mosbaugh, Director State Government Health Care NCSL Fall Forum 2011 Paying for Care to Dead People Boston Herald, October 30, 2011

More information

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud Anchin Alert: ACFE Report to the Nations 2018 The Association of Certified Fraud Examiners ( ACFE ) recently published the Report to the Nations 2018 Global Study on Occupational Fraud and Abuse (the 2018

More information

Know Your Customer Risk Assessment Guide. Release 2.0 May 2014

Know Your Customer Risk Assessment Guide. Release 2.0 May 2014 Know Your Customer Risk Assessment Guide Release 2.0 May 2014 Know Your Customer Risk Assessment Guide Release 2.0 May 2014 Document Control Number: 9MN12-62110023 Document Number: RA-14-KYC-0002-2.0-04

More information

Fighting Fraud in Financial Services: three success stories

Fighting Fraud in Financial Services: three success stories Fighting Fraud in Financial Services: three success stories Dr. Wojtek Kowalczyk wojtek@liacs.nl wojtek@fdec.nl Fraud Detection Expertise Center Leiden Institute of Advanced Computer Science Leiden, 18-01-2017

More information

Edward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:

Edward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax: Edward J. Finn 1275 Drummers Lane, Suite 302 Office: 267-930-4776 Wayne, PA 19087 Fax: 267-930-4771 Email: efinn@mullen.law VIA U.S. MAIL AND EMAIL Office of the Attorney General 1125 Washington Street

More information

An interview with James Sherwood-Rogers, managing director, Quest

An interview with James Sherwood-Rogers, managing director, Quest Publication: Topic: Author: Words: 1573. Advertorial Mortgage Finance Gazette (Technology Supplement) Mortgage Valuation Technology James Sherwood-Rogers, managing director, Quest www.questuk.com An interview

More information

Increasing pressure on PBMs to identify fraudulent providers

Increasing pressure on PBMs to identify fraudulent providers Increasing pressure on PBMs to identify fraudulent providers How PBMs can use data, analytics and advanced technology to reduce their risk In July 2017, the Justice Department arrested more than 400 people

More information

Personal Lending Products

Personal Lending Products Personal Lending Products Terms and conditions Applies from 15th July 2017 Introduction The details of your credit facilities are set out in the agreement which comes with this booklet. The agreement

More information

minimise card fraud in your business.

minimise card fraud in your business. minimise card fraud in your business. First National Bank Tanzania Limited - a subsidiary of FirstRand Limited. A Registered Commercial Bank in Tanzania (CBA00050). There is a real possibility that your

More information

BEYOND. THE CREDIT HEADER FILE How Your Business Can Use Unregulated Data to Boost Revenue, Increase Agility and Reduce Risk WHITEPAPER

BEYOND. THE CREDIT HEADER FILE How Your Business Can Use Unregulated Data to Boost Revenue, Increase Agility and Reduce Risk WHITEPAPER WHITEPAPER BEYOND THE CREDIT HEADER FILE How Your Business Can Use Unregulated Data to Boost Revenue, Increase Agility and Reduce Risk BEYOND THE CREDIT HEADER FILE Table of Contents Executive Summary

More information

Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide

Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Compliance Program Creation Guide January 2015 1 Compliance Program Creation Guide January 2015 2 Insert Business

More information

Using analytics to prevent fraud allows HDI to have a fast and real time approval for Claims. SAS Global Forum 2017 Rayani Melega, HDI Seguros

Using analytics to prevent fraud allows HDI to have a fast and real time approval for Claims. SAS Global Forum 2017 Rayani Melega, HDI Seguros Paper 1509-2017 Using analytics to prevent fraud allows HDI to have a fast and real time approval for Claims SAS Global Forum 2017 Rayani Melega, HDI Seguros SAS Real Time Decision Manager (RTDM) combines

More information

Decreasing Tax Fraud Using Validation. through Taxpayer Pattern Matching

Decreasing Tax Fraud Using Validation. through Taxpayer Pattern Matching Decreasing Tax Fraud Using Validation CASE STUDY through Taxpayer Pattern Matching Introduction One of the greatest challenges facing financial institutions and main street America is identity fraud (IDF).

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds

More information

Introduction to Detailed Claim Information Reporting. Lesson 4: Resources and Tools

Introduction to Detailed Claim Information Reporting. Lesson 4: Resources and Tools Introduction to Detailed Claim Information Reporting Lesson 4: Resources and Tools 1 LESSON 4 OBJECTIVES Learn which DCI reporting resources and tools you need and which tools can assist you in the DCI

More information

Divided we fall: Fighting payments fraud together

Divided we fall: Fighting payments fraud together Divided we fall: Fighting payments fraud together Mark N. Greene It is a great pleasure to be addressing this august group. As some of you know, I began my career at the Federal Reserve back in 1982. So

More information

The Foreign Account Tax Compliance Act (FATCA)

The Foreign Account Tax Compliance Act (FATCA) The Foreign Account Tax Compliance Act (FATCA) And its impact on technology and operations WHITE PAPER SAS White Paper Table of Contents Foreword... 1 Overview.... 1 FATCA is firmly on the horizon....

More information

ANTI-MONEY LAUNDERING AND COUNTER TERRORISM FINANCING PROCEDURE MANUAL. Fcorp Services Ltd

ANTI-MONEY LAUNDERING AND COUNTER TERRORISM FINANCING PROCEDURE MANUAL. Fcorp Services Ltd ANTI-MONEY LAUNDERING AND COUNTER TERRORISM FINANCING PROCEDURE MANUAL Fcorp Services Ltd The manual is property of Fcorp LTD The reproduction in whole or in part in any way including the reproduction

More information

RISKS WITH SAME DAY ACH

RISKS WITH SAME DAY ACH RISKS WITH SAME DAY ACH Kevin Olsen, AAP, NCP SVP of Payments Education About epayresources Not-for-profit Regional Payments Association Educational Programs & Payments Publications Member Benefits Voice

More information

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of

More information

Registry General September 2015

Registry General September 2015 Registry General September 2015 1 Charities Compliance Officer Training Topics What is FATF? How FATF relates to charities Guidance Notes on the Charities (Anti-Money Laundering, Anti-Terrorist Financing

More information

by: Stephen King, JD, AMLP

by: Stephen King, JD, AMLP Community Bank Audit Group Compliance Management Structure / Compliance Risk Assessment June 2, 2014 by: Stephen King, JD, AMLP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS

More information