CC White Paper

Total Page:16

File Type:pdf, Size:1020Kb

CC White Paper WHITE PREPARED BY WITH THE HELP OF THE PRODUCT PAPER TODD HOUGAARD AND MARKETING TEAMS S A F E D A T A TRANSFER IN THE MORTGAGE LENDING INDUSTRY THE BIGGEST SHELL GAME COLLABORATION CENTER PAGE 1 EXECUTIVE SUMMARY One of the biggest investments for the US consumer is the purchase of a home, primarily funded through a purchase loan, whereby borrowers are providing all of their most critical personal information to lenders. The mortgage industry processes trillions of dollars in financial transactions and handles massive amounts of borrower’s personal information every year. No banking product offers more information to In fact, cyber bad guys can even work the lender about the consumer than backwards through an email recipient the mortgage loan. list to hack anyone in the transaction -- even businesses with a ‘private network’ In one single transaction, critical – so there is much more at stake than personal data is floating back and borrower identity theft. This is equally forth between individuals and about your businesses security, financial service providers for the loan. And viability and reputation. while these businesses may have their own secure and private Everyone involved in the mortgage loan network, HOW the information is transaction is at risk when they being transferred between all those communicate in any way outside of an entities involved in the transaction enclosed, private ecosystem. is the core problem. With so few lenders and title companies Email, the tool that is most relied truly understanding that the success or upon for messaging and document failure of their business is resting on transfer between these entities, is their ability to deliver an where there lies a broken link in the uncompromised loan transaction, there process. Email isn’t secure… at all. is a unique opportunity to position your brand promise around an unparalleled safe and easy transaction. It’s through the transfer of data via TODD HOUGAARD email that cyber crime Product Management Manager lives and thrives. Mortgage Cadence COLLABORATION CENTER PAGE 2 3 CHANGING MARKET FORCES There are three changing market forces that are driving the need for a solution now. #1 SOCIAL FORCES With the devastating 2017 Equifax data breach, where 143 million American’s sensitive personal data was compromised, consumer confidence is low that organizations are being good stewards of their private data. Consumers expect that an organization puts their safety first in every transaction. They expect insurance, products for both lender and that their data will be managed with the consumer, quality assurance and utmost integrity. What they will soon closing, to name just a few. Meanwhile, learn is the dirty little secret -- that the other outside parties, including the real mortgage lending industry are laggards in estate sales professional, attorneys and data security. the borrower are contributing to the process with documents and messages. #2 ECONOMIC FORCES Data breaches and privacy laws prompted For each transaction, either all parties new regulations like the Gramm-Leach- succeed together (and are safe), or all Bliley Act and new regulatory agencies parties fail together (and lose data, lose like the Consumer Financial Protection money, sully their reputation, lose Bureau. These government “solutions” market share or incur fines). seek to hold financial services companies responsible when they expose their customers to identity theft and other potential cyber crimes. Your organization is responsible for protecting the consumer. Your success or failure is resting on your ability to manage this Borrowers expect that risk. their sensitive personal data will be managed The lending process is built upon a framework of partnerships with third- with the utmost integrity. party providers of data, products and services. These parties provide information for underwriting, COLLABORATION CENTER PAGE 3 #3 TECHNOLOGY FORCES exposing customer information to data Wire Fraud: In 2016, a 480% increase in thieves, cyber-fraudsters and other complaints filed by title companies about online attacks has been made business email compromise scams that impossible with the use of a common target all participants in RE transactions piece of technology – email. As long as – including buyers, sellers, agents & the mortgage industry depends upon lawyers. email for communication related to a mortgage transaction, cybersecurity will AN ILLUSTRATION continue to be a challenge. Imagine each of the parties in the lending process are on their own private and Instead, we propose that the entire secure island, seemingly safe from cyber mortgage industry must adopt a new crime, with a nice privacy network paradigm for working together, protecting the perimeter. While the communicating, and managing the information at rest on each island may be overall real estate purchase process. protected, it’s when data and messages flow between these islands (like notes in a bottle) the data gets picked up by pirates. They are eager to take even the smallest amount of information and parlay it into monetary gain on the dark As long as the mortgage web. industry depends upon email for communication, It is true that every service provider in a mortgage transaction has a responsibility cybersecurity will continue to to protect both the client’s personal be a challenge. information and the security of the entire transaction, but finding a way to reduce the risk of COLLABORATION CENTER PAGE 4 ● Pretexting: Asking a person for The Unintended information under the guise of a person who would likely request that Consequences of information, tricking the consumer into giving up information that would Email otherwise be private. ● When the first email system to include an Phishing: An email designed to look inbox was developed at MIT in 1965 it like it came from a company the was true innovation. (1) People had been consumer would normally be working sticking notes in other people’s with that then requests information directories on a shared network for years from the borrower that would not before this, but something about having a normally be disclosed. mailbox where all your messages would land had perfection written all over it. And it’s not just the consumer being The idea caught fire and today, email is duped. Often, it’s employees working the most prolific tool in use on the within the industry that fall prey to Internet. fraudsters using email. The Financial Crimes Enforcement Network cited the Who could have predicted that one day FBI in a targeted advisory notice that nefarious parties would create pointed to email compromise fraud technologies that could scan or divert schemes targeting financial institutions’ information packets traveling through the commercial customers in over 22,000 network that read email in transit reported cases since 2013 at a cost of between parties. It’s not just that emails $3.1 billion. (3) are, by default, transmitted over the public Internet in plain text, emails can In total, the FBI says email-related be intercepted, spoofed and compromised. financial crimes have cost U.S. financial The three most common email attacks are: institutions well over $5 billion over (2) the last four years. The past two years saw a 2,370-percent increase in losses ● Baiting: When an email promises one thing but delivers another, often a malicious software program that is then secretly downloaded onto the system, compromising it from the inside. As long as the mortgage industry depends upon email for communication, cybersecurity will continue to be a challenge. 1-(2017). Nethistory.info. 2- Elamawy, S. (2017). The 3 Main Types of Email Security Threats. Cwps.com. 3- The Growing Convergence of Cyber-Related Crime and Suspicious Activity Reporting. (2017). LawJournalNewsletters.com. COLLABORATION CENTER PAGE 5 from phishing attacks. The FBI reported altogether and switch to a solution that real estate-related wire fraud with total transaction security attacks increased last year by 480 integral to its design and function. percent. Email hacks account for more The only solution to the most serious than three-fourths of all social-based information security problem in the attacks. And our industry is situated mortgage industry today is to simply right in the fraudster’s crosshairs. stop using email. Part of the reason email fraud has been on the increase is the recent improvements in information security infrastructure that have made system- Taking a Page From to-system hacking much more difficult for them. In short, it’s our ability to Other Industry make companies look like fortresses that have driven criminals to exploit Playbooks this weakest link in online communication. Connecting groups of people and organizations into one secure network is The resurgent focus on email as a not new territory. Many companies primary attack vector has spawned recognized long ago this need to create an entire new categories of crime—such as enclosed environment that protects their the Business Email Compromise (BEC) customers and members. Companies like and the Email Account Compromise PayPal, Amex, Google Accounts, Facebook, (EAC)—leading to enormous increases in VISA, WhatsApp, ACH Payment and Uber wire fraud within the financial services have built their businesses on the promise sector. that users are protected when they do business with them. As the incidence of fraud continues to grow, many companies are redoubling The only way for these companies to their efforts to lock down email and uphold that brand promise is to bring their retrain users. In spite of the numerous users into their enclosed, encrypted, bolted-on security measures companies private and secure island. deploy to make email incrementally safer, they will never be enough. Every These companies have successfully changed new fix is inevitably followed by a how online users are connecting to one creative new way to defeat it. anotherstuff in an environment with a secure perimeter around it.
Recommended publications
  • 140174NCJRS.Pdf
    If you have issues viewing or accessing this file contact us at NCJRS.gov. I' '. o f :, I\ BASIC COURSE i UNIT GUIDE J1 ! ( 6 ) ~__________ C_R_IM_E_S_A_G_A_IN_S_T_P_R_O_P_E_R_TY __________ J This unit guide covers the following performance objectives containe in Performance Objectives for the POST Basic Course: 3.9.1 3.12.2 3.13.5 3.16.2 3.9.2 3.13.1 3.14.1 3.16.3 3.9.3 3.13.2 3.15.1 3.11.1 3.13.3 3.15.2 • 3.12.1 3.13.4 3.16.1 NCJRS nAN 12 199~ ACQUISITIONS THE COMMISSION ON PEACE OFFICER STANDARDS AND TRAINING • STATE OF CALIFORNIA • This unit of instruction is designed as a guideline for performance obJective-based law enforcement basic training. It Is part of the POST Basic Course guidelines system developed by California law enforcement trainers and criminal Justice educators for the California Commission on Peace Officer Standards and Training. This guide is designed to assist the Instructor In developing an ,,' appropriate lesson plan to cover the performance objectives which are required as minimum content of the Basic Course . • 140174 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the oHicial position or policies of the National Institute of Justice. Permission to reproduce this copyrighted material has been gr~clt.et.t~ornia Ccnm. on Peace Officer Standards and Training to the National Criminal Justice Reference Service (NCJRS).
    [Show full text]
  • The Job Creation Shell Game: Ending the Wasteful Practice of Subsidizing Companies That Move Jobs from One State to Another
    January 2013 The Job Creation Shell Game: Ending the Wasteful Practice of Subsidizing Companies that Move Jobs From One State to Another by Greg LeRoy, Kasia Tarczynska, Leigh McIlvaine, Thomas Cafcas and Philip Mattera A Publication of: Good Jobs First January 2013 © Copyright 2013 Good Jobs First. All Rights Reserved. Acknowledgements Good Jobs First gratefully acknowledges the assistance of various organiza- tions and individuals. Any errors or omissions are ours, not theirs. ThanksWe wish also to to:thank Noah the Berger state ofand the local Massachusetts economic development Budget and Policy officials Center; and Amythe staffers Blouin andof regional Traci Gleason business of theorganizations Missouri Budgetwho answered Project; Kateour queries.Brew- ster of the Center for Economic Progress in Rhode Island; Brett Bursey of - nomic Development Council; Allan Freyer of the North Carolina Budget and Taxthe SouthCenter; Carolina Bill Howell Progressive of Tennesseans Network; forJeff Fair Finkle Taxation; of the InternationalChad Johnson Eco of AFSCME Local 1733 in Memphis; Gordon MacInnes and Jon Whiten of New Jersey Policy Perspective; Craig McDonald of Texans for Public Justice; James Parrott of the Fiscal Policy Institute in New York; Zach Schiller of Policy Matters Ohio; Andria Signore of the Edward Lowe Foundation; Wesley Tharpe of the Georgia Budget and Policy Institute; Don Walls of Walls & Associates; and Angie Wei and Sara Flocks of the California Labor Federation. Finally, thanks to our own Good Jobs New York director Bettina
    [Show full text]
  • Confidence Tricks - 08-12-2011 by Seolawtransfer - Law Firm Newswire
    Confidence Tricks - 08-12-2011 by seolawtransfer - Law Firm Newswire - http://www.lawfirmnewswire.com Confidence Tricks by seolawtransfer - Friday, August 12, 2011 http://www.lawfirmnewswire.com/law-center/criminal-defense/federal-fraud/confidence-tricks/ The term “confidence tricks” comes to mind when someone attends a fair or exhibition, where many games of chance, notably the shell game, are confidence tricks. Over time, this simple game has escalated into many more complex and intricate scams that have taken people in, resulting in them losing money and damaging their self-esteem. A confidence trick is an attempt to defraud someone or a group, by first getting them to trust the trickster. In other words, the goal is to gain their trust and confidence. The fraudster may work alone or with others, and their main goal is to take advantage of people’s weaknesses, such as compassion, vanity, greed, stupidity and/or irresponsibility. Whatever the target is, it is typically of more value than what the confidence trickster offers in return. “Confidence man” first appeared in the English language in 1849 in the news coverage of the trial of William Thompson. Thompson would chat up marks, ask them if they had the confidence to loan him their watch or other personal items, and then walk off with the booty. The police apprehended him when a victim spotted him on the street. Today’s confidence tricks tally up to a very long list of nefarious activities that include, but are not limited to: salting, the Nigerian scam, infomercial manipulation, cons by wire, missionary scam, romance scam, fortune telling fraud, coin collection, pig in a poke, white van speaker, Thai gem, and so on.
    [Show full text]
  • Anthropology
    CULTURAL ANTHROPOLOGY ETHNOGRAPHY IN A SHELL GAME: Turtles All the Way Down in Abidjan SASHA NEWELL Université Libre de Bruxelles https://orcid.org/0000-0003-3517-8629 . the seemingly straightforward contrast between clarity and opacity is complicated in regimes of truth that, like the ones found in Inhumbane, encourage ambiguation over clarification, and dissimulation over revelation and confrontation. In other words, in regimes of truth that privilege open- endedness. —Julie Soleil Archambault Dissimulation, deception, postponed dates, false pretexts, and the like are efficient ways of navigating and prolonging relationships. —Françoise Berthomé, Julien Bonhomme, and Grégory Delaplace We are currently living in an era when the North Atlantic faith in the value of transparency and sincerity (Keane 2002) faces severe challenges, as accusations of fake news undermine traditional voices of authority, as the distinction between legitimate news agencies and internet gossip becomes increasingly blurry, and as the workings of power and wealth within the invisible infrastructures of digital communication cause the Habermasian figure of democratic public transparency (see Habermas 1991) to teeter on a tightrope between tragedy and farce. As they CULTURAL ANTHROPOLOGY, Vol. 34, Issue 3, pp. 299–327, ISSN 0886-7356, online ISSN 1548-1360. © American Anthropological Association 2019. Cultural Anthropology journal content published since 2014 is freely available to download, save, reproduce, and transmit for noncommercial, scholarly, and educational purposes. Reproduction and transmission of journal content for the above purposes should credit the author and original source. Use, reproduction, or distribution of journal content for commercial purposes requires additional permissions from the American Anthropological Association; please contact [email protected].
    [Show full text]
  • The Divide: American Injustice in the Age of the Wealth Gap
    BY MATT TAIBBI The Divide: American Injustice in the Age of the Wealth Gap Griftopia: A Story of Bankers, Politicians, and the Most Audacious Power Grab in American History The Great Derangement: A Terrifying True Story o f War, Politics, and Religion Smells Like Dead Elephants: Dispatches from a Rotting Empire Spanking the Donkey: Dispatches from the Dumb Season WITH MARK AMES The Exile: Sex, Drugs, and Libel in the New Russia THE Illllllllil THE Illllllllll jri] AMERICAN INJUSTICE IN THE AGE OF THE WEALTH GAP MATT TAIBBI Illustrations by Molly Crabapple SPIEGEL & GRAU NEW YORK This is a work of nonfiction. Some names and identifying details have been changed. Copyright © 2014 by Matt Taibbi Illustrations copyright © 2014 by Molly Crabapple All rights reserved. Published in the United States by Spiegel & Grau, an imprint of Random House, a division of Random House LLC, a Penguin Random House Company, New York. Sp ie g e l & G r a u and the H o u s e colophon are registered trademarks of Random House LLC. Library of Congress Cataloging-in-Publication Data Taibbi, Matt. The divide: American injustice in the age of the wealth gap / Matt Taibbi. pages cm ISBN 978-0-8129-9342-4 eBook ISBN 978-0-679-64546-7 1. Social justice—United States. 2. Income distribution—United States. 3. Rich people—United States. 4. Poor—United States. I. Title. HM671.T35 2014 303.3'72—dc23 2013024907 Printed in the United States of America on acid-free paper www.spiegelandgrau.com 246897531 First Edition Book design by Christopher M.
    [Show full text]
  • Rochester Review
    beginning to see afresh and to rightly assess bygone times, for how often can we not see the woods for the trees! May we all strive to be wor­ thy instruments of that unseen power which Rochester Letters may yet save us from the folly of prejudice, greed, and war. Esther Thomforde de Gally '46E Review Santa Cruz Atoyac, Mexico Shell game University of Rochester Thanks for your great article on "( ot Quite) The World's Longest Race" in the Spring Summer 1985 Review. Let me share with you an earlier era when a former crew assembled on the banks of the Genesee under the University's auspices back in 1956-58. Medicine as a Human Conscientious objectors A stalwart group of Medical Center residents Experience 2 It blew my mind to read Jeffrey Mehr's article who were former college oarsmen obtained in the Rochester Review Spring issue: "War and On the difference between curing shells from Cornell and the West Side Rowing Peaceniks." Like sunshine thawing a frozen and healing Club of Buffalo to create a small fleet, choosing wilderness of unbidden doubts, it allows me a the ground-floor storage area under the Fauver Traveling the Distance 6 fresh perspective on that troubled time for con­ Stadium grandstand as our first boathouse. We Progress report on minority scientious objectors and their families. My heart erected a sturdy dock on the Genesee just oppo­ floods with memories, the good buried with the recruitment site this cavern and walked the shells over to the bad, I suddenly perceive - yet has the purpose launching site for a leisurely row.
    [Show full text]
  • Flashing the Truth on the Marconi Wireless Swindle
    ROTTEN TO THE CORE (Continu .J} Marconi Wireless Stocks Based On Stolen Property ED STATES OFFICIALS and the LORD CHIEF JUSTICE OF ENGLAND CO-CONSPIRATORS IN A FRAUDULENT TRANSACTION. 11icity Campaign Twenty Pages Part Five PUBLISHED BY J. HUGH BAUERLEIN. DENVER , COLO. Ba$ed on Facts -- ~============================================= -. ' .r­ EARL READING THE LORD CHIEF JUSTICE OF EN<SLAND. THE STAR CONSPIRATOR OF THE MARCONI CLIQUE INTRIGUE. THE DIRTIEST s~7LE ON REC{)RD J • • 2 MARCONI WIRELESS SWINDLE EXPOSED Earl Reading The Lord Chief Justice of England Heralded by His Nationality as the Greatest Jew in the World. Some ) ear:< ago, ther•• was a lillie bnr oC je,vish DENIED THAT HE WAS INTERESTED nallumtllt) braudccl wit11 the IH,nonthle name or Hu­ Hufu;;-uow th" Lnr<l C'hi••l' .)UHtice uf illngland, Cus J)u.nie.l lS(U.Il'R, tt•hu at the age or R~\~enu~en yc::u·~~ lll<t' all ''g·o<Hl'' men, lHld to fa e au UllJIIeasanL pre­ •lesired to bel·ume n sailot·, to travel 011 the might)· llicanH•nt. lit>on being duly sworn an<! e"aminP "'"ean to see the glo>·inu,: worl<1. lie shiJIJJE'L1 on lt uucl~r n<lth 11y Lhe Belect ('ornmi\lee of the Parll Hcottish l'rafl-"'The Blair Athol''-trading to Rto mcnl, slated thal lw neYer bad any tl<.:alings in eit with <'nal. His duties were to keep the brasr;:-worJ;o the ~lan.:oni 01~ auy \\ i1·eh•sR ent~rprh;e- :5l'e Q. 5, elean. but little Hufus got discouraged.
    [Show full text]
  • Corruption and Economic Crime
    Transparency International Anti-Corruption Helpdesk Answer Corruption and economic crime Author: Jorum Duri, [email protected] Reviewers: Maira Martini and Matthew Jenkins, Transparency International Date: 15 March 2021 Historically, corruption has been seen as an enabler of some types of economic crime and organised criminality, for example through payment of bribes to law enforcement agencies or undue influence in decision -making. However, modern forms of corruption – which the paper interprets as usually transnational in nature – are even more intertwined with economic crime. Both sets of crimes share similar drivers, rely on similar mechanisms to move and launder illicit funds, and deprive societies of much needed financial resources, threatening not only economic and social stability of other countries across the globe, but also the rule of law and democracy. Due to these common characteristics, certain instruments to combat corruption and economic crime could be productively brought into closer alignment. For instance, a public register on beneficial ownership may prevent the use of shell companies to launder proceeds from both corruption and economic crime. Moreover, international cooperation is required in the investigation and prosecution of both corruption and economic crime schemes, as well as for asset recovery purposes. Transparency in political funding may also ensure that political and electoral campaigns are not tainted by proceeds of corruption and economic crime, and could help prevent capture of state institutions. © 2021 Transparency International. All rights reserved. This document should not be considered as representative of the Commission or Transparency International’s official position. Neither the European Commission,Transparency International nor any person acting on behalf of the Commission is responsible for the use which might be made of the following information.
    [Show full text]
  • Case 1:13-Cv-07789-LGS Document 656 Filed 08/31/16 Page 1 of 10
    Case 1:13-cv-07789-LGS Document 656 Filed 08/31/16 Page 1 of 10 81,7('67$7(6',675,&7&2857 6287+(51',675,&72)1(:<25. ,15()25(,*1(;&+$1*( 1RFY/*6 %(1&+0$5.5$7(6$17,75867 /,7,*$7,21 -2,17'(&/$5$7,212) 9,1&(17%5,*$17, *5(*25<6$6&,2//$ Case 1:13-cv-07789-LGS Document 656 Filed 08/31/16 Page 2 of 10 9LQFHQW%ULJDQWLDQG*UHJRU\6$VFLROODMRLQWO\GHFODUHSXUVXDQWWR86& DVIROORZV 9LQFHQW%ULJDQWL LVDVKDUHKROGHUZLWKWKHILUP/RZH\'DQQHQEHUJ&RKHQ +DUW 3& ³/RZH\´ *UHJRU\ 6 $VFLROOD LV D SDUWQHU DW WKH ILUP /DEDWRQ 6XFKDURZ//3 ³/DEDWRQ 6XFKDURZ´ :H ERWK SDUWLFLSDWHG DV $OORFDWLRQ &RXQVHO LQ WKH DERYH FDSWLRQHG PDWWHU DQG VXEPLWWKLVGHFODUDWLRQLQVXSSRUWRIWKH>3URSRVHG@3ODQRI'LVWULEXWLRQ7KHWHUPVXVHGKHUHLQ KDYHWKHVDPHPHDQLQJVDVLQWKH>3URSRVHG@3ODQRI'LVWULEXWLRQXQOHVVRWKHUZLVHLQGLFDWHG ([SHULHQFHRI$OORFDWLRQ&RXQVHO /RZH\DQG/DEDWRQ6XFKDURZKDYH H[WHQVLYH H[SHULHQFHSURVHFXWLQJ FODLPVXQGHUWKH&RPPRGLW\([FKDQJH$FW ³&($´ 86&et seq. DQG 6KHUPDQ $QWLWUXVW $FW 86& et seq. LQFOXGLQJ WKRVH DULVLQJ RXW RI WKH PDQLSXODWLRQRIILQDQFLDOEHQFKPDUNV )RUH[DPSOH/RZH\ VXFFHVVIXOO\SURVHFXWHG DV FRXUWDSSRLQWHGOHDGFROHDG RU LQGLYLGXDOSODLQWLII¶VFRXQVHOZKDWZHUHDWWKHWLPHWKHILUVWVHFRQGWKLUGDQGIRXUWKODUJHVWFODVV DFWLRQUHFRYHULHVXQGHUWKH&RPPRGLW\([FKDQJH$FWIn re Sumitomo Copper Litig.1R&9 6'1< 3ROODFN - PLOOLRQ VHWWOHPHQW Hershey v. Pacific Investment Management Corp.1R& 5$* 1',OO PLOOLRQVHWWOHPHQW In re Natural Gas Commodity Litig.1R&9 6'1< 0DUUHUR- PLOOLRQVHWWOHPHQW DQG In re Amaranth Natural Gas Commodities Litig.1R&LY 6'1< 6FKHLQGOLQ- PLOOLRQVHWWOHPHQW /RZH\LVFXUUHQWO\ FRXUWDSSRLQWHGOHDGRUFODVVFRXQVHOLQ VHYHUDOFDVHVDOOHJLQJ DQWLFRPSHWLWLYHFRQGXFWDQGPDQLSXODWLRQRIWKHZRUOG¶VPRVW LPSRUWDQWILQDQFLDOEHQFKPDUNV Case 1:13-cv-07789-LGS Document 656 Filed 08/31/16 Page 3 of 10 LQFOXGLQJWKH (XUR\HQ7RN\R,QWHUEDQN2IIHUHG5DWH ³7,%25´ DQG <HQ/RQGRQ,QWHUEDQN 2IIHUHG5DWH ³/,%25´ Laydon v. Mizuho Bank et al.1RFY *%' 6'1< Sonterra Capital Master Fund Ltd.
    [Show full text]
  • Madoff Trustee Sues UBS for $2 Billion by Michael Rothfeld the Wall Street Journal November 24, 2010
    Madoff Trustee Sues UBS for $2 Billion By Michael Rothfeld The Wall Street Journal November 24, 2010 The trustee recovering money for victims of Bernard Madoff's Ponzi scheme is seeking $2 billion from UBS AG through a lawsuit that accuses the giant Swiss bank of actively participating in the fraud. In a lawsuit filed in federal bankruptcy court in New York, trustee Irving Picard alleged 23 counts of financial fraud and misconduct against UBS and related entities. Mr. Picard said the bank "lent an aura of legitimacy" to several international feeder funds, including Luxalpha SICAV, by serving as their sponsor, custodian and administrator. At the same time, it avoided legal responsibility for the funds' actions through undisclosed indemnity agreements, he said. The bank had indications of fraud, but it nonetheless made Mr. Madoff the subcustodian of the feeder funds, ceding authority to him to value them, said Mr. Picard, who is overseeing the bankruptcy of Bernard L. Madoff Investment Securities. "Madoff's scheme could not have been accomplished unless UBS had agreed not only to look the other way, but also to pretend that they were truly ensuring the existence of assets and trades when in fact they were not and never did," said Mr. Picard's counsel, David Sheehan. UBS didn't immediately respond to a request for comment. Mr. Madoff pleaded guilty to running a multi-billion dollar Ponzi scheme in March 2009. He is serving a 150-year sentence in federal prison in North Carolina. The lawsuit comes as Mr. Picard faces a legal deadline next month, two years from Mr.
    [Show full text]
  • Accounting Ethics.Pdf
    Accounting Ethics Accounting Ethics, Second Edition. Ronald Duska, Brenda Shay Duska, and Julie Ragatz © 2011 John Wiley & Sons, Ltd. Published 2011 by John Wiley & Sons, Ltd. ISBN: 978-1-405-19613-0 Foundations of Business Ethics Series editors: W. Michael Hoffman and Robert E. Frederick Written by an assembly of the most distinguished fi gures in business ethics, the Foundations of Business Ethics series aims to explain and assess the fundamental issues that motivate interest in each of the main subjects of contemporary research. In addition to a general introduction to business ethics, individual volumes cover key ethical issues in management, marketing, fi nance, accounting, and computing. The books, which are complementary yet complete in themselves, allow instructors maximum fl exibility in the design and presentation of course materials without sacrifi cing either depth of coverage or the discipline - based focus of many business courses. The volumes can be used separately or in combination with anthologies and case studies, depending on the needs and interests of the instructors and students. 1 John R. Boatright, Ethics in Finance , second edition 2 Ronald Duska, Brenda Shay Duska, and Julie Ragatz, Accounting Ethics , second edition 3 Richard T. De George, The Ethics of Information Technology and Business 4 Patricia H. Werhane and Tara J. Radin with Norman E. Bowie, Employment and Employee Rights 5 Norman E. Bowie with Patricia H. Werhane, Management Ethics 6 Lisa H. Newton, Business Ethics and the Natural Environment 7 Kenneth E.
    [Show full text]
  • Cracking Down on the Professionals Who Enable Tax and White Collar Crimes
    Ending the Shell Game: Cracking down on the Professionals who enable Tax and White Collar Crimes White collar crimes like tax evasion, bribery, and corruption are often concealed through complex legal structures and financial transactions facilitated by lawyers, accountants, financial institutions and other “professional enablers” of such crimes. These crimes have significant impacts on government revenue, public confidence and economic growth, including the recovery from COVID-19. This report sets out a range of strategies and actions for countries to take to tackle professional intermediaries who enable tax evasion and other financial crimes on behalf of their criminal clients. The report highlights the damaging role played by these intermediaries and the importance of concerted domestic and Ending the Shell Game international action in clamping down on the enablers of crime, and includes recommended counter-strategies for deterring, disrupting, investigating and prosecuting the professionals who Cracking down on the Professionals enable tax and white collar crimes. who enable Tax and White Collar Crimes For more information: [email protected] www.oecd.org/tax/crime @OECDtax | 1 Ending the Shell Game: Cracking down on the Professionals who enable Tax and White Collar Crimes ENDING THE SHELL GAME: CRACKING DOWN ON THE PROFESSIONALS WHO ENABLE TAX AND WHITE COLLAR CRIMES © OECD 2021 PUBE This document was approved by the OECD Committee on Fiscal Affairs on 16 November 2020 and prepared for publication by the OECD Secretariat. This document, as well as any data and map included herein, are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area.
    [Show full text]