Busting Fraud Rings with. Social Link Analysis
|
|
- Lindsey Joseph
- 5 years ago
- Views:
Transcription
1 Busting Fraud Rings with Social Link Analysis
2 Table of Contents INTRODUCTION... 1 WHAT IS BUST-OUT FRAUD AND WHY IS IT SO HARD TO DETECT?... 2 SOCIAL LINK ANALYSIS (SLA): A POWERFUL NEW WEAPON... 3 HOW SOCIAL LINK ANALYSIS WORKS... 4 Access Enterprise and Third-Party Data... 5 Detect and Resolve Entities (Entity Resolution)... 6 Link Entities and Create Social Networks... 6 Analyze, Score and Prioritize... 7 Alert... 7 Visualize... 7 BUSINESS BENEFITS... 9 CONCLUSION... 9 ABOUT INFOGLIDE... 10
3 Introduction Financial institutions are forced to combat many types of fraudulent activity, but few are as damaging and difficult to detect as bust-out fraud. Analysts estimate that between 10% and 15% of all banks unsecured bad debt is actually bust-out fraud, resulting in tens of billions in losses every year. While this type of fraud is certainly not new, it remains a significant problem for banks because it is so hard for them to identify and take action in time. Organized bust-out fraud -- also referred to as sleeper fraud -- occurs when an organized group of individuals applies for credit cards, loans, overdrafts or other unsecured banking credit lines, and then uses them to make purchases with no intention of ever paying them back. The criminals hold onto accounts for some time and then quickly ramp up spending activity before the banks can act. Unfortunately for banks, bust-out fraud is difficult to detect by traditional anti-fraud measures because initially, the fraudsters behave like any other respectable customers, bypassing the bank s rules and analytically-based detection measures. To defend against these sophisticated threats, banks must be able to identify fraud rings earlier in their life cycle so perpetrators can be stopped before they act. Additionally, since fraud rings typically operate within a wide number of geographic locations and business channels, the fraud rings must be pieced together across the entire institution. Infoglide has developed a powerful new weapon, Infoglide Social Link Analysis (SLA), designed specifically to combat bust-out fraud by exploiting the number one weakness of bust-out fraud rings: reused identity information. In almost every case of large-scale fraud networks, there are bits and pieces of reused, fraudulently obtained identity information (such as names, phone numbers, addresses, etc.). Infoglide SLA uses sophisticated technology to identify and piece together both exact and inexact (fuzzy) linkages and nonobvious relationships using these recycled pieces of information. As a result, the fraud ring can be discovered before its members can strike the bank. This whitepaper introduces Social Link Analysis and discusses in depth why it is an effective tool against organized bust-out fraud. It also highlights examples and key business considerations for financial institutions.
4 What is Bust-Out Fraud and Why is it so Hard to Detect? Organized bust-out fraud is a type of first-party fraud that occurs when a group of individuals opens bank accounts with fraudulent identity information. Often facilitated by employees, the individuals then typically spend between a few months and a few years establishing themselves as engaged and trustworthy customers. Oftentimes, to simulate activity, the fraudsters will cycle cash among the various fraudulent accounts without the payments ever leaving the bank. Over time, individuals within a network will accumulate several credit cards with increasing levels of credit, along with personal loans and checking accounts. Once a fraudster reaches a desired bust level or time in the scheme, he or she will rapidly increase spending, max out credit card limits and attempt to get additional credit cards, loans or accounts. Since the fraudsters are collaborating with each other, they are able to make sure that they adhere to the rules and thresholds that might otherwise trigger an alarm, making bust-out fraud difficult to detect. Frequently, they will use credit cards and checks to purchase items such as electronics or large household appliances that can be sold quickly after purchase. Because of the speed with which all of this activity happens usually only a couple of days banking systems do not detect it fast enough to react and block purchases. Yet another problem is that banks often lack the tools to detect activities across different lines of business within the institution. For instance, a customer may take out a loan from the retail division to continue cycling their credit card payments. Since most banks analytics are focused on specific lines of business, they are unable to detect cross-channel fraud. Finally, the very nature of the crime makes it difficult to detect. There are many reasons banks see charge-offs and bad checks (for instance, when a customer experiences a divorce, job loss or other personal crisis), so these issues are not always indicative of fraudulent activity. However, estimates indicate that up to 15% of all charged-off credit is, in fact, uninvestigated first-party fraud.
5 Social Link Analysis (SLA): A Powerful New Weapon Although organized fraudsters are sophisticated, they often leave behind evidence that can be used to uncover networks of organized crime. The fraudsters know that due to Know Your Customer (KYC) and Customer Due Diligence (CDD) regulations, their account information will be verified. To pass these checks, the individuals will either modify their own identity or use a synthetic identity, which consists of combining real identity information (e.g., a social security number) with fake identity information (names, addresses, phone numbers, etc.). Fortunately for banks, false identity information required to successfully open accounts can be expensive and inconvenient to acquire and maintain. For example, apartments must be rented out to maintain a valid address. Additionally, there are only so many cell phones a person can carry at one time and only so many aliases that can be remembered. In response, fraudsters look to share recycled bits and pieces of these valuable assets. This reuse of identity information is what makes Infoglide SLA so effective in combating fraud. By examining the linkages between the recycled identities, Infoglide SLA is able to identify potential fraud networks. Once the networks are detected, Infoglide SLA applies advanced analytics to determine the risk level for both the network and each individual associated with that network.
6 How Social Link Analysis Works Social links, in a banking context, are made up of groups of accounts, customers, and employees that share some sort of relationship with each other. Examples of attributes that may be shared and linked can include: Personal identity information (e.g., names, addresses, phone numbers); Account information (such as an account number and its creator); and Transactional information (including payment transfers between accounts, or employees who approve customer information). Infoglide SLA detects the shared relationships between the customers, employees and known bad guy data and links them together into networks. Once the entities are linked together, advanced analytics are applied to determine the level of risk. SLA works by first analyzing data across product lines, matching information across accounts, identifying linkages and networks, and then scoring those links. If connections indicate a risk of fraud, SLA creates an alert using a visualization tool to display the linkage. These steps as well as additional benefits for financial institutions are discussed in more detail with an example and images in the next section.
7 Figure 1: Social Link Analysis Process Access Enterprise and Third-Party Data One of the biggest assets of Social Link Analysis is its ability to analyze information across product and geographic lines. Because such a threat may span multiple product lines, individual fraud solutions may detect only small pieces of the puzzle. Social Link Analysis, on the other hand, is able to put these pieces together. The ability to automatically integrate diverse data sources and identify networks can be a significant driver of efficiency and productivity for the enterprise risk function. With all the data available in one location, downstream analysis is much simpler and takes less time to deploy so that bank officials can quickly identify potential risks.
8 Detect and Resolve Entities (Entity Resolution) Ideally, personal and business information would always be standardized across an organization. However, in reality, most data is fraught with inaccuracies, duplicates, and false identities. For this reason, one of the most challenging aspects of linking entities is being able to determine and match entity attributes that are similar, but not exact. If similar attributes cannot be properly matched, then the resulting link analysis will either analyze incomplete networks (resulting in false negatives) or attribute entities that do not belong together (resulting in false positives). Infoglide is the leading provider of identity/entity resolution software, with mission-critical solutions deployed at the US Department of Homeland Security as well as major banks, insurance companies and retailers. SLA includes Infoglide s patented matching technology, designed to identify, address and display connections between both accurate and inaccurate data. For example, SLA can detect slight variations in names, addresses, telephone numbers, SSNs, etc. In addition, data anomalies such as misuse of data fields, visual scan errors, and transposed data can be accounted for. Link Entities and Create Social Networks Figure 2 is a simple illustration of how Infoglide Social Link Analysis detects links within fraudulent networks. In this example, the applicant A. Lisa Knight shares a telephone number with cardholder Lisa Anne Carr. Additionally, Lisa Anne Carr shares a similar (but not exact) address with a bank employee named Michelle S. Hart. Although A. Lisa Knight does not share any exact attributes with Michelle S. Hart, they can be considered part of a network because of their shared relationship with Lisa Anne Carr. Figure 2: Network relationships via transitive linkages
9 Analyze, Score and Prioritize Once the links are identified and the social networks are created, Infoglide's Social Link Analysis applies additional analytics to determine the risk level of each network and individual within the network. For example, some factors that would impact the risk score include: Relationships with known fraudsters: New applicants who are connected to accounts that are already in a bank's fraud or AML data; Suspicious relationships with bank insiders: Due to the fact that a large percentage of bust-out fraud is facilitated by employees; and/or Unusually large and diverse networks: Large, connected networks of accounts and customers may mean a growing scheme is ready to bust out. Alert Infoglide Social Link Analysis is capable of analyzing links and generating alerts in real time. For example, when a bank automatically processes new applications through link analysis, applications that exhibit suspicious relationships (as determined by analytics) can be flagged and sent as alerts. Visualize One key component of Infoglide SLA is an integrated link visualization interface. The link visualization can help investigators analyze the linkages of a person/account of interest. Social Link Analysis typically starts when an investigator wants to look at the relationships of a particular person of interest for example, if an alert is generated by the bank s existing anti-fraud solutions or a security officer receives a hot tip. From there, the attributes (such as name, address, and phone number) are searched and a representation of the person of interest s relationships is presented in a visual layout.
10 Example: An investigation starts off with Susie Smith, who has a checking account, credit card, a charged-off loan (a loan with debt that is unlikely to be collected by the bank) and an active loan. The visualization tool also shows Susie s phone number and address. A look into Susie s relationships begins to turn up some suspicious information (see Figure 3 below). Susie Smith is connected to Jack Wilson, another customer with the same phone number. Like Susie, Jack has some charged-off credit, a credit card and a charged-off loan. Susie Smith is also linked to John Benton because they share the same address. Not only does John Benton have a charged-off loan, but one of his other loans is under investigation at the bank. If fraud is not confirmed at this point, it certainly is when the analyst looks at third-degree relationships. Jack Wilson is connected through an address match to Mark Rivera, who is under investigation for mortgage fraud, and Mark Rivera is connected to John Benton through a matching phone number. As a result, Social Link Analysis has detected four members of a network, each with various amounts of charged-off fraud. Figure 3: Link Analysis Identifying Network Connections
11 Business Benefits Bust-out fraud wastes bank resources not only through significant financial losses, but also by wasting staff time and affecting a bank's key risk predictions. Therefore, addressing bustout fraud using social link analysis can enable banks to significantly reduce fraud losses as well as improve operational expenses and investigator efficiencies. Implementing social link analysis: Reduces Fraud Losses: With social link analysis, banks can identify fraud rings while they are still active. As a result, they can take effective countermeasures, such as increased monitoring, shutting down the account, or taking legal action before fraudsters strike; Lowers Operational Expenses: Infoglide Social Link Analysis can complement fraud detection solutions already in place at the bank to streamline processes. For example, Infoglide SLA can provide additional analytics that can improve estimates of a specific threat to improve triage efforts; and Increases Investigator Efficiencies: Through its visual link analytics tool, investigators can quickly discover and visualize relationships of persons of interest. These visual references can improve collaborative efforts between different parts of the organization and with law enforcement. Conclusion Although bust-out fraud has been difficult for banks to tackle in the past, Infoglide s SLA can be deployed in a timely, efficient manner. By taking advantage of the most critical vulnerability of bust-out fraud rings reused and/or fraudulent identity information Social Link Analysis quickly pieces together and distinguishes elements of a fraud network. With the use of this product, banks can address issues and implement solutions before being attacked, improving fraud detection and potentially saving thousands of dollars in bad debt and staffing resources.
12 About Infoglide Infoglide ( is a leading provider of identity resolution and entity analytics solutions to government and commercial markets. Infoglide s flagship product, Identity Resolution Engine (IRE), searches disparate databases to discover possible matches and non-obvious relationships between people, places, and things. IRE has patented technology that is used to find matches and social links between entities despite errors in data and intentional attempts to deceive. The product is used by organizations in the insurance, banking, identity management, and government spaces for fraud detection, compliance, AML and screening. Incorporated in 1996, Infoglide Software is a privately held company headquartered in Austin, Texas.
13 Contact Us Infoglide Software Corporation 6500 River Place Blvd., Building II, Suite 450, Austin, Texas Fax: Copyright 2012 Infoglide Software. All Rights Reserved.
The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age Scoping Out Synthetic ID Fraud In the 18 years since synthetic identity fraud emerged as a significant
More informationIncrease Effectiveness in Combating VAT Carousels
Increase Effectiveness in Combating VAT Carousels Detect, Prevent and Manage WHITE PAPER SAS White Paper Contents Overview....1 The Challenges...1 Capabilities...2 Scoring...3 Alert and Case Management....3
More informationDig Deep into the Root Causes of Fraud to Prevent Future Attacks
Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Tammy Behnke, Credit Union Program Director at ProSight Specialty
More informationSynthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved.
Synthetic Identities Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities A combination of fictitious and potentially stolen personally identifiable
More informationWhite Paper. Lifting the Veil Why Understanding Beneficial Ownership Is Now Essential for AML Compliance
White Paper Lifting the Veil Why Understanding Beneficial Ownership Is Now Essential for AML Compliance Fiserv White Paper Lifting the Veil Why Understanding Beneficial Ownership Is Now Essential for AML
More informationBanking Title Application Fraud: The Enemy at the Gates
WHITE PAPER Banking Title Application Fraud: The Enemy at the Gates It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. ii Contents Overview... 1 What Is Application
More informationINCREASING INVESTIGATOR EFFICIENCY USING NETWORK ANALYTICS
INCREASING INVESTIGATOR EFFICIENCY USING NETWORK ANALYTICS ACFE ANNUAL CONFERENCE ORLANDO, FL JUNE 20, 2012 DAN BARTA CPA, CFE DAVID STEWART CAMS Fraud & Financial Crimes Practice TOPICS INCREASING INVESTIGATOR
More informationROCHESTER INSTITUTE OF TECHNOLOGY
ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3
More informationAutomotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
More informationWhite Paper. Banking Application Fraud: The Enemy at the Gates. It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C.
White Paper Banking Application Fraud: The Enemy at the Gates It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. Contents Overview... 1 What Is Application Fraud?...
More informationUsing data mining to detect insurance fraud
IBM SPSS Modeler Using data mining to detect insurance fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts
More informationA Model for Calculating User-Identity Trustworthiness in Online Transactions
A Model for Calculating User-Identity Trustworthiness in Online Transactions Brian A. Soeder Suzanne Barber 2015 UT CID Report #1505 This UT CID research was supported in part by the following organizations:
More informationIBM Financial Crimes Insight for Insurance
IBM Financial Crimes Insight for Insurance Highlights Improve outcomes and reduce cost of counterfraud efforts Optimize assets for efficient and effective fraud management Quickly distinguish fraudsters
More informationEXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud
EXECUTIVE SUMMARY A systematic approach for combating enrollment fraud OCTOBER 2017 Enrollment fraud is a serious and growing problem The proliferation of identity fraud and new ways of enrolling in health
More informationHow to Choose a Total Chargeback Management Provider
How to Choose a Total Chargeback Management Provider Chargebacks impact all types of merchants physical goods, recurring, digital goods merchants to the tune of $40 billion every year. This problem continues
More informationMortgage Payoffs Under Siege
NOVEMBER 8, 2018 Mortgage Payoffs Under Siege Cybercriminals target mortgage payoffs in new fraud schemes Created and published by Thomas W. Cronkright II, Esq. CEO/Co-Founder CertifID LLC 1410 Plainfield
More informationInternal Fraud The Threat from Within
make connections share ideas be inspired Internal Fraud The Threat from Within David Porter - SAS The new fraud landscape & the rise of the insider How to rob a bank How to detect fraudulent staff Fraud
More informationKasasa Protect. FAQ and Product Overview
Kasasa Protect FAQ and Product Overview Kasasa Protect... 3 Key Contact Info... 3 Included Benefits... 3 Credit Reporting... 4 Monthly Credit Score & Plotter... 4 24/7 Credit Monitoring... 5 Full-Service
More informationKnow Your Customer (KYC) Executive Overview with Know Your Vendor (KYV) and Know Your Employee (KYE)
Know Your Customer (KYC) Executive Overview with Know Your Vendor (KYV) and Know Your Employee (KYE) Purpose The goal of this whitepaper is to review the business drivers that are creating increased focus
More informationIVANS 2008 XCHANGE CONFERENCE Key Communications Issues Facing the Property/Casualty Insurance Industry in 2008
IVANS 2008 XCHANGE CONFERENCE Key Communications Issues Facing the Property/Casualty Insurance Industry in 2008 Tampa, Florida February 7, 2008 Jeanne. M. Salvatore Senior Vice President, Public Affairs
More informationUI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division
UI ID Theft in Texas 2014 UI Director s Conference Paul Carmona Director, Regulatory Integrity Division Overview Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term
More informationAnti-Money Laundering. How to set up a strong Compliance Program
Anti-Money Laundering How to set up a strong Compliance Program Importance of AML Protection Financial institutions face a growing number of threats from criminals that seek to misuse the U.S. financial
More informationKeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud
KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud Inside: Fraud: A Problem That Won t Go Away How Criminals Exploit Vulnerabilities In Treasury Practices Fraud Prevention From An
More informationFighting back against synthetic identity fraud
Fighting back against synthetic identity fraud Digging deep into the data trails people leave behind can help banks detect whether their customers are real or not and stem losses from this fast-growing
More informationANTI-MONEY LAUNDERING IN
ANTI-MONEY LAUNDERING IN THE ACQUIRING INDUSTRY Presented by Laura H. Goldzung, CAMS, CCFE, CFCF, CCRP AML Audit Services, LLC March 8, 2016 AGENDA AML Regulatory Overview OFAC Regulatory Overview AML
More informationInformation on Identity Theft for Business, Partnerships and Estate and Trusts
Page 1 of 5 HELP MENU Home News Fact Sheets Information on Identity Theft for Business Partnerships and Estate and Trusts Information on Identity Theft for Business, Partnerships and Estate and Trusts
More informationDUE DILIGENCE IN MORTGAGE OR LOAN TRANSACTIONS
Appendix 16 DUE DILIGENCE IN MORTGAGE OR LOAN TRANSACTIONS Mortgage fraud is a serious and growing problem in Ontario. In many cases, mortgage fraud involves the use of false identities (title fraud) and
More informationPOLICIES FOR PROPER IMPLEMENTATION OF THE FOURTH ANTI MONEY LAUNDERING DIRECTIVE
POLICIES FOR PROPER IMPLEMENTATION OF THE FOURTH ANTI MONEY LAUNDERING DIRECTIVE I. OVERVIEW AND OBJECTIVES 1. The European Organization for Gaming Law (EOGL), representing the EU-wide licensed online
More informationGAO. EXPEDITED ASSISTANCE FOR VICTIMS OF HURRICANES KATRINA AND RITA FEMA s Control Weaknesses Exposed the Government to Significant Fraud and Abuse
GAO For Release on Delivery Expected at 10 a.m. EST Monday, February 13, 2006 United States Government Accountability Office Testimony Before the Senate Committee on Homeland Security and Governmental
More informationFIGHTING AGAINST CRIME IN A DIGITAL WORLD DAVID HARTLEY DIRECTOR, SAS FRAUD & FINANCIAL CRIME BUSINESS UNIT
FIGHTING AGAINST CRIME IN A DIGITAL WORLD DAVID HARTLEY DIRECTOR, SAS FRAUD & FINANCIAL CRIME BUSINESS UNIT AGENDA Fraudsters love digital Fighting back Social Network Analysis BACKGROUND THE DIGITAL BUSINESS
More informationAddressing Vehicle Cloning
Addressing Vehicle Cloning What s behind vehicle crime? 60% of stolen and hijacked vehicles remain in SA Estimated value of R3.5 Billion Market driven enterprise Used in commission of other crimes e.g.
More informationRC & TACKLING BENEFICIAL OWNERSHIP IN AML PROGRAMMES. risk compliance RISK & COMPLIANCE MAGAZINE. risk& compliance REPRINTED FROM: JAN-MAR 2019 ISSUE
R E P R I N T RC & risk compliance & TACKLING BENEFICIAL OWNERSHIP IN AML PROGRAMMES REPRINTED FROM: RISK & COMPLIANCE MAGAZINE JAN-MAR 2019 ISSUE RC & risk& compliance Visit the website to request a free
More informationAnti-Money Laundering Awareness Training Insurance Industry-Hong Kong
Anti-Money Laundering Awareness Training Overview This program is intended to give individuals working in the Hong Kong Insurance Industry a basic knowledge of money laundering and terrorism financing,
More informationFraud Detection in Public Schools
Fraud Detection in Public Schools Goal: To learn how to prevent and detect fraud from actual evidence uncovered during fraud investigations Format: We will discuss three of the largest fraud cases over
More informationGood From The Inside Out. Saturday, April 8, 2017
Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU
More informationDRAFT An Act Providing for the Detection and Prevention of Fraud, Waste, Abuse and Improper Payments in State Government
!" #" $" %" &" '" (" )" *"!+"!!"!#"!$"!%"!&"!'"!("!)"!*" #+" #!" ##" #$" #%" #&" #'" #(" #)" #*" $+" $!" $#" $$" $%" $&" $'" $(" $)" $*" %+" %!" %#" %$" %%" %&" %'" DRAFT An Act Providing for the Detection
More informationServices and Features
Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.
More informationStrategic Security Management: Risk Assessments in the Environment of Care. Karim H. Vellani, CPP, CSC
Strategic Security Management: Risk Assessments in the Environment of Care Karim H. Vellani, CPP, CSC Securing the environment of care is a challenging and continual effort for most healthcare security
More informationBank Secrecy Act (BSA)/Anti-Money Laundering (AML) Employee & Agent Training
Bank Secrecy Act (BSA)/Anti-Money Laundering (AML) Employee & Agent Training OVERVIEW The Bank Secrecy Act, or BSA, was passed by congress in 1970. The BSA required banks to maintain records of certain
More informationIdentity Theft Prevention Program Lake Forest College Revision 1.0
Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:
More informationMinimize risks and make insightful decisions at every step of the policy lifecycle. Life Insurance Solutions from LexisNexis Risk Solutions
Minimize risks and make insightful decisions at every step of the policy lifecycle. In the last decade, one thing has become clear for life insurance providers and customers alike: Technology is changing
More informationDefining Entities for Better Risk Assessment
WHITEPAPER Defining Entities for Better Risk Assessment Revealing Hidden Risk Authors Jill Coppersmith and Anju Govil Moody s Analytics Contact Us Americas +1.212.553.1653 Europe +44.20.7772.5454 Asia-Pacific
More informationInsurtech 101. A complete guide for both veterans and entrepreneurs launching products in the insurance marketplace.
A Guide to Launching a New Insurance Product Insurtech 101 A complete guide for both veterans and entrepreneurs launching products in the insurance marketplace. In Insurtech 101, we review the fundamentals
More informationA Review of Actual Fraud Cases in 2017 FRAUD REVIEW
A Review of Actual Fraud Cases in 2017 FRAUD REVIEW Contents Introduction 3 Fraud Snapshot 4 Case Studies Credit Card Fraud 5 Business Email Compromise Fraud 6 Payroll Fraud 7 Supplier Fraud 8 Outlook
More informationHow to Ace Your BSA Exam & Risk Assessment
How to Ace Your BSA Exam & Risk Assessment LeVar Anderson, CAMS, AAP Auditor, Carolinas Credit Union League Agenda NCUA Examiners review compliance with BSA as part of every exam cycle using examination
More informationImplementing behavioral analytics to drive customer value: Insurers cannot afford to wait.
Implementing behavioral analytics to drive customer value: Insurers cannot afford to wait. 2 A case for behavioral analytics and automated response imagine Two customers phone into your call center. One
More informationRental Exchange Frequently Asked Questions
Rental Exchange Frequently Asked Questions We have prepared this document which we hope will answer any questions you may have about the Rental Exchange. However, if you have a question that has not been
More informationINSURANCE. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in
INSURANCE Forensic services Helping to protect your business from fraud, misconduct and non-compliance ADVISORY kpmg.com/in The insurance industry has been growing at a fast pace in India. To differentiate
More informationChart 1 How Fraudulently Used Consumer Information is Obtained M A Y
M A Y 2 0 0 6 Payments Fraud: Consumer Considerations by Terri Bradford, Payments System Research Specialist, Federal Reserve Bank of Kansas City, and Bruce Cundiff, Research Analyst, Javelin Strategy
More informationGuidelines for Anti-Money Laundering and Combating the Financing of Terrorism
[Provisional Translation] The original texts of the Guidelines are prepared in Japanese, and this translation is only provisional. The translation is to be used solely as reference material to aid the
More informationPersonal Lending Products
Personal Lending Products Terms and Conditions Introduction The details of your credit facilities are set out in the agreement which comes with this booklet. The agreement also sets out the specific terms
More informationEquifax Data Breach: Your Vital Next Steps
Equifax Data Breach: Your Vital Next Steps David A. Reed Partner, Ann Davidson Vice President Risk Consulting/ Bond Division Allied Solutions, LLC Do You Remember When this Was the Biggest Threat to Data
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationAnalytic Technology Industry Roundtable Fraud, Waste and Abuse
Analytic Technology Industry Roundtable Fraud, Waste and Abuse 1. Introduction 1.1. Analytic Technology Industry Roundtable The Analytic Technology Industry Roundtable brings together analysis and analytic
More informationRecognizing Credit Card Fraud
1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended
More informationCITIZENS, INC. BANK SECRECY ACT/ ANTI-MONEY LAUNDERING POLICY AND PROGRAM
I. Introduction CITIZENS, INC. BANK SECRECY ACT/ ANTI-MONEY LAUNDERING POLICY AND PROGRAM The Bank Secrecy Act/Anti-Money Laundering Responsibilities of Insurance Companies U.S. insurance companies have
More informationANTI-MONEY LAUNDERING PROCESS MATURITY
ANTI-MONEY LAUNDERING PROCESS MATURITY NEPAL BANKING INDUSTRY Survey Report 2017 Survey Partner AML PROCESS MATURITY - NEPAL BANKING INDUSTRY Survey Report 2017 Anti-Money Laundering (AML) and Combating
More informationStatement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security
Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC Before the Subcommittee on Crime, Terrorism and Homeland Security Of the Judiciary Committee HR 1731: The Identity Theft
More informationPredictive Modeling and Analytics for Health Care Provider Audits. Sixth National Medicare RAC Summit November 7, 2011
Predictive Modeling and Analytics for Health Care Provider Audits Sixth National Medicare RAC Summit November 7, 2011 Predictive Modeling and Analytics for Health Care Provider Audits Agenda Objectives
More informationgamevy Anti- Money Laundering Detecting and Preventing Financial Crime Training for Gamevy
gamevy Anti- Money Laundering Detecting and Preventing Financial Crime Training for Gamevy Introduction This document is Gamevy s training on anti- money laundering regulations within the context of our
More informationHow Credit Card Chargebacks Really Impact your Bottom Line
How Credit Card Chargebacks Really Impact your Bottom Line Reducing Fraud, Chargebacks, and Lost Profits for Recurring Merchants There are many considerations to take into account when attempting to prevent,
More informationMoney Laundering and Terrorist Financing Risks in the E-Money Sector
Money Laundering and Terrorist Financing Risks in the E-Money Sector Thematic Review TR18/3 October 2018 TR18/3 Contents 1 Introduction 3 2 Overview 5 3 Findings 7 Annex 1 Glossary 16 How to navigate this
More informationMONROE COUNTY SHERIFF S OFFICE. General Order
MONROE COUNTY SHERIFF S OFFICE General Order CHAPTER: 34 - D EFFECTIVE DATE: August 19, 2009 REFERENCE: CALEA 42.2.8 NO. PAGES: 8 TITLE: Identification Theft Investigation Procedures AMENDED: RESCINDS:
More informationLENDING SHORT TERM AND INSTALMENT LENDING. 10 Reasons why Callcredit will help you make smarter decisions
SHORT TERM AND INSTALMENT LENDING 10 Reasons why Callcredit will help you make smarter decisions CONTENTS WE HELP DELIVER FAST, ACCURATE AND RESPONSIBLE LENDING DECISIONS 2 1. Unrivalled Data Coverage
More informationPredictive Claims Processing
Predictive s Processing Transforming the Insurance s Life Cycle Using Analytics WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Fraud Management.... 2 Recovery Optimization.... 3 Settlement
More informationServices & Features for Employee Benefit Members
Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific
More informationRisk Management on Prepaid Cards
Responsibilities CenterState Bank of Florida, NA (CSBF) is the issuing financial institution of all prepaid cards and owner of the associated network BINs. CSBF is responsible for all program monitoring
More informationSTEP CERTIFICATE IN ANTI-MONEY LAUNDERING. Syllabus
STEP CERTIFICATE IN ANTI-MONEY LAUNDERING Syllabus In collaboration with Delivered by INTRODUCTION This document contains the detailed syllabus for the. This syllabus should be read in conjunction with
More informationNo company provides a more powerful fraud detection solution than. Experian, the global leader in information solutions.
Fraud Shield SM Intelligent defense against application fraud No company provides a more powerful fraud detection solution than Experian, the global leader in information solutions. Fraud Shield from Experian
More informationROI CASE STUDY SPSS INFINITY PROPERTY & CASUALTY
ROI CASE STUDY SPSS INFINITY PROPERTY & CASUALTY THE BOTTOM LINE Infinity Property & Casualty Corporation (IPACC) deployed SPSS to reduce its payments on fraudulent claims and improve its ability to collect
More informationAnti-Fraud Policy Date: Version: Review Date:
Anti-Fraud Policy Date: July 2017 Version: 4.0 Review Date: July 2019 Policy Title Anti-Fraud Policy Policy Number: POL 022 Version 4.0 Policy Sponsor Policy Owner Committee Chief Executive Director of
More informationThe Guide to Budgeting for Insider Threat Management
The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management This guide is intended to help show you how to approach including Insider Threat Management within
More informationAn overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud
An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud Every business is susceptible to fraud But some are more susceptible than others. That
More informationAnti-Money Laundering and Counter Terrorism
1 Anti-Money Laundering and Counter Terrorism 1. INTRODUCTION SimpleFX Ltd. ( The Company ) aims to prevent, detect and not knowingly facilitate money laundering and terrorism financing activities. The
More informationFrequently Asked Questions
Frequently Asked Questions How do you protect my identity? We use our proprietary software to proactively monitor various sources. Through PrivacyArmor, you will also have the power to create thresholds
More informationTestimony. Submitted for the Record. American Bankers Association. Financial Institutions and Consumer Credit Subcommittee
Testimony Submitted for the Record from the American Bankers Association for the Financial Institutions and Consumer Credit Subcommittee of the Committee on Financial Services United States House of Representatives
More informationANTI-FRAUD PLAN INTRODUCTION
ANTI-FRAUD PLAN INTRODUCTION We recognize the importance of preventing, detecting and investigating fraud, abuse and waste, and are committed to protecting and preserving the integrity and availability
More informationCONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA
CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. CREDIT CARD FRAUD SCHEMES Introduction Consumers make purchases using credit every day. Credit card companies
More informationLeveraging Innovative Technologies to Combat Health Care Fraud Kathy Mosbaugh, Director State Government Health Care NCSL Fall Forum 2011
Leveraging Innovative Technologies to Combat Health Care Fraud Kathy Mosbaugh, Director State Government Health Care NCSL Fall Forum 2011 Paying for Care to Dead People Boston Herald, October 30, 2011
More informationTable 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud
Anchin Alert: ACFE Report to the Nations 2018 The Association of Certified Fraud Examiners ( ACFE ) recently published the Report to the Nations 2018 Global Study on Occupational Fraud and Abuse (the 2018
More informationKnow Your Customer Risk Assessment Guide. Release 2.0 May 2014
Know Your Customer Risk Assessment Guide Release 2.0 May 2014 Know Your Customer Risk Assessment Guide Release 2.0 May 2014 Document Control Number: 9MN12-62110023 Document Number: RA-14-KYC-0002-2.0-04
More informationFighting Fraud in Financial Services: three success stories
Fighting Fraud in Financial Services: three success stories Dr. Wojtek Kowalczyk wojtek@liacs.nl wojtek@fdec.nl Fraud Detection Expertise Center Leiden Institute of Advanced Computer Science Leiden, 18-01-2017
More informationEdward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:
Edward J. Finn 1275 Drummers Lane, Suite 302 Office: 267-930-4776 Wayne, PA 19087 Fax: 267-930-4771 Email: efinn@mullen.law VIA U.S. MAIL AND EMAIL Office of the Attorney General 1125 Washington Street
More informationAn interview with James Sherwood-Rogers, managing director, Quest
Publication: Topic: Author: Words: 1573. Advertorial Mortgage Finance Gazette (Technology Supplement) Mortgage Valuation Technology James Sherwood-Rogers, managing director, Quest www.questuk.com An interview
More informationIncreasing pressure on PBMs to identify fraudulent providers
Increasing pressure on PBMs to identify fraudulent providers How PBMs can use data, analytics and advanced technology to reduce their risk In July 2017, the Justice Department arrested more than 400 people
More informationPersonal Lending Products
Personal Lending Products Terms and conditions Applies from 15th July 2017 Introduction The details of your credit facilities are set out in the agreement which comes with this booklet. The agreement
More informationminimise card fraud in your business.
minimise card fraud in your business. First National Bank Tanzania Limited - a subsidiary of FirstRand Limited. A Registered Commercial Bank in Tanzania (CBA00050). There is a real possibility that your
More informationBEYOND. THE CREDIT HEADER FILE How Your Business Can Use Unregulated Data to Boost Revenue, Increase Agility and Reduce Risk WHITEPAPER
WHITEPAPER BEYOND THE CREDIT HEADER FILE How Your Business Can Use Unregulated Data to Boost Revenue, Increase Agility and Reduce Risk BEYOND THE CREDIT HEADER FILE Table of Contents Executive Summary
More informationAnti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide
Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Compliance Program Creation Guide January 2015 1 Compliance Program Creation Guide January 2015 2 Insert Business
More informationUsing analytics to prevent fraud allows HDI to have a fast and real time approval for Claims. SAS Global Forum 2017 Rayani Melega, HDI Seguros
Paper 1509-2017 Using analytics to prevent fraud allows HDI to have a fast and real time approval for Claims SAS Global Forum 2017 Rayani Melega, HDI Seguros SAS Real Time Decision Manager (RTDM) combines
More informationDecreasing Tax Fraud Using Validation. through Taxpayer Pattern Matching
Decreasing Tax Fraud Using Validation CASE STUDY through Taxpayer Pattern Matching Introduction One of the greatest challenges facing financial institutions and main street America is identity fraud (IDF).
More informationFrequently Asked Questions
Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds
More informationIntroduction to Detailed Claim Information Reporting. Lesson 4: Resources and Tools
Introduction to Detailed Claim Information Reporting Lesson 4: Resources and Tools 1 LESSON 4 OBJECTIVES Learn which DCI reporting resources and tools you need and which tools can assist you in the DCI
More informationDivided we fall: Fighting payments fraud together
Divided we fall: Fighting payments fraud together Mark N. Greene It is a great pleasure to be addressing this august group. As some of you know, I began my career at the Federal Reserve back in 1982. So
More informationThe Foreign Account Tax Compliance Act (FATCA)
The Foreign Account Tax Compliance Act (FATCA) And its impact on technology and operations WHITE PAPER SAS White Paper Table of Contents Foreword... 1 Overview.... 1 FATCA is firmly on the horizon....
More informationANTI-MONEY LAUNDERING AND COUNTER TERRORISM FINANCING PROCEDURE MANUAL. Fcorp Services Ltd
ANTI-MONEY LAUNDERING AND COUNTER TERRORISM FINANCING PROCEDURE MANUAL Fcorp Services Ltd The manual is property of Fcorp LTD The reproduction in whole or in part in any way including the reproduction
More informationRISKS WITH SAME DAY ACH
RISKS WITH SAME DAY ACH Kevin Olsen, AAP, NCP SVP of Payments Education About epayresources Not-for-profit Regional Payments Association Educational Programs & Payments Publications Member Benefits Voice
More informationRed Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper
Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of
More informationRegistry General September 2015
Registry General September 2015 1 Charities Compliance Officer Training Topics What is FATF? How FATF relates to charities Guidance Notes on the Charities (Anti-Money Laundering, Anti-Terrorist Financing
More informationby: Stephen King, JD, AMLP
Community Bank Audit Group Compliance Management Structure / Compliance Risk Assessment June 2, 2014 by: Stephen King, JD, AMLP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS
More information