Fighting Fraud Other Books Authored Or Co-Authored

Total Page:16

File Type:pdf, Size:1020Kb

Fighting Fraud Other Books Authored Or Co-Authored Fighting Fraud Other Books Authored or Co-Authored Information Systems Security Offi cer’s Guide: Establishing and Managing an Information Protection Program: May 1998, ISBN 0-7506-9896-9; by Dr. Gerald L. Kovacich; First Edition and July 2003, ISBN 0-7506-7656-6, Second Edition; published by Butterworth-Heinemann (Czech translation of First Edition also available). I-Way Robbery: Crime on the Internet: May 1999, ISBN 0-7506-7029-0; co- authored by Dr. Gerald L. Kovacich and William C. Boni; published by Butterworth- Heinemann; Japanese translated version published by T. Aoyagi Offi ce Ltd, Japan: February 2001, ISBN 4-89346-698-4. High-Technology Crime Investigator’s Handbook: Working in the Global Information Environment: First Edition, September 1999, ISBN 0-7506-7086-X; co-authored by Dr. Gerald L. Kovacich and William C. Boni; July 2003, and Second Edition; July 2006 ISBN 10: 0-7506-7929-8; ISBN 13: 9-780-7506-7929-9; co-authored with Dr. Andy Jones and published by Butterworth-Heinemann. Netspionage: The Global Threat to Information: September 2000, ISBN 0-7506-7257-9; co-authored by Dr. Gerald L. Kovacich and William C. Boni; published by Butterworth-Heinemann. Information Assurance: Surviving in the Information Environment: First Edition, September 2001, ISBN 1-85233-326-X; co-authored by Dr. Gerald L. Kovacich and Dr. Andrew J. C. Blyth; published by Springer-Verlag Ltd (London); Second Edition, ISBN 1-84628-266-7, published in March 2006. Global Information Warfare: How Businesses, Governments, and Others Achieve Global Objectives and Attain Competitive Advantages: June 2002, ISBN 0-84931-114-4; co-authored by Dr. Andy Jones, Dr. Gerald L. Kovacich and Perry Luzwick; published by Auerbach Publishers/CRC Press. The Manager’s Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program: April 2003, ISBN 0-7506-7487-3; co-authored by Dr. Gerald L. Kovacich and Edward P. Halibozek; published by Butterworth-Heinemann. Mergers & Acquisitions Security: Corporate Restructuring and Security Man- agement: April 2005, ISBN 0-7506-7805-4; co-authored by Dr. Gerald L. Kovacich and Edward P. Halibozek; published by Butterworth-Heinemann. Security Metrics Management: How to Manage the Costs of an Assets Protection Program: December 2005, ISBN 0-7506-7899-2; co-authored by Dr. Gerald L. Kovacich and Edward P. Halibozek; published by Butterworth-Heinemann. The Security Professional’s Handbook on Terrorism: Establishing and Manag- ing a Corporate Anti-Terrorism Program: To be released in September 2007, ISBN 0-7506-8257-4; co-authored with Edward P. Halibozek and Dr. Andy Jones; pub- lished by Butterworth Heinemann. Fighting Fraud How to Establish and Manage an Anti-Fraud Program Dr. Gerald L. Kovacich AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Butterworth-Heinemann is an imprint of Elsevier Elsevier Academic Press 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA 525 B Street, Suite 1900, San Diego, California 92101-4495, USA 84 Theobald’s Road, London WC1X 8RR, UK This book is printed on acid-free paper. Copyright © 2008, Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, E-mail: [email protected]. You may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Library of Congress Cataloging-in-Publication Data Kovacich, Gerald L. Fighting fraud : how to establish and manage an anti-fraud program / Gerald L. Kovacich. p. cm. Includes index. ISBN 978-0-12-370868-7 (alk. paper) 1. Commercial crimes. 2. Commercial crimes — Investigation. 3. Fraud — Prevention. 4. Fraud investigation. I. Title. HV6769.K68 2008 658.4′73 — dc22 2007013397 British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN 13: 978-0-12-370868-7 ISBN 10: 0-12-370868-0 For all information on all Elsevier Academic Press publications visit our Web site at www.books.elsevier.com Printed in the United States of America 08 09 10 11 12 13 10 9 8 7 6 5 4 3 2 1 Working together to grow libraries in developing countries www.elsevier.com | www.bookaid.org | www.sabre.org This book is dedicated to all those fraud fi ghters who combat defrauders and the other miscreants who try to take something of value from others without their permission and without providing the owners with just compensation. This book is especially dedicated to those whistleblowers who have the guts to stand up when a wrong has been committed! This page intentionally left blank Quotation* [T]he modern economic world centers on the controlling corporate organization. Executives of Enron, WorldCom, Tyco and others became the focus of widely publicized criticism, even outrage. Joining the language came the reference to corporate scandals. Avoided only was mention of the compelling opportunity for enrichment that had been accorded the managers of the modern corporate enterprise, and this in a world that approves of self-enrichment as the basic reward for economic merit . Great fi rms, particularly in energy and mass communications but not so confi ned, came to dominate the news. In all cases, the situation was the same, as was the result. Management was in full control. Own- ership was irrelevant, some auditors were compliant. Stock options added participant wealth and slightly concealed take. The least expected contribution to the adverse and even criminal activ- ity was the corrupt accounting . This provided cover for the devious actions that extended to outright theft. Individuals had long regarded accounting as both competent and honest. The corporate scandals and especially the associated publicity have led to discussion or appropriate regulation and some action — to positive steps to insure accounting honesty and some proposed remedies, as required, to counter management and lesser corporate fraud . Managers, not the owners of capital, are the effective power in the modern enterprise. So, as a very practical matter, power passed to the mentally quali- fi ed, actively participating management, and it did so irrevocably. The belief that ownership has a fi nal authority persisted, as it still does . The basic fact of the twenty-fi rst century — a corporate system based on the unrestrained power of self-enrichment. * From John K. Galbraith’s book, The Economics of Innocent Fraud: Truth for Our Time. Houghton Miffl in, Boston. 2004. vii This page intentionally left blank Table of Contents Preface xix Acknowledgments xxiii Introduction and Premise xxvii SECTION I: AN INTRODUCTION TO THE WONDERFUL WORLD OF FRAUD 1 1 The New-Old Global Business Environment 3 Introduction 3 Globalization of Business — Benefi ts to Nation-States 5 Expansions of the Global Marketplace and their Areas of Operations 6 Types of Corporations 7 Corporate Owners and Locations 7 Corporate Products 8 The High-Technology Factor 9 Nanotechnology 11 High-Technology Related Frauds and Other Crimes 14 Advent of the Superhighways 14 The Impact of Superhighways on Frauds and Other Crimes 15 A Short History of Crimes and Other Frauds Via the I-Way 17 Superhighway Frauds and Other Crimes to I-Way Robberies 18 I-Way Robbery — Its Prevalence 20 There Is No I-Way Patrol to Stop I-Way Robbers 21 Global Connectivity Via the I-Way = Global Exposure to Attacks by Fraud-Threat Agents and Other Miscreants 21 Capabilities and Limitations of Law Enforcement 22 Challenges to Security Professionals and Others 23 Case Study 1 24 ix x FIGHTING FRAUD Case Study 2 25 Summary 26 2 Corporate Assets, Frauds and Other Terms — What Are They? 27 Introduction 27 Defi nition of General Fraud 28 Specifi c Fraud Defi nitions 31 Corporate Assets 32 Other Terms and Defi nitions 33 Case Study 34 Summary 35 3 Fraud-Related Laws 37 Introduction 37 Some U.S. Federal Fraud-Related Laws 38 Relevant Consumer Protection Laws for Fraud in the United States 40 A Few Examples of U.S. Federal Enforcement of Fraud-Related Laws, Approach and Actions 40 Mail Fraud Statutes (condensed and paraphrased) 41 Money Laundering 43 Financial Institution Fraud (Bank Fraud) 43 Civil Litigation 43 U.S. Treasury Collection 44 Securities Violations 44 Role of Phone Companies 44 European Fraud-Related Laws 45 EU Fight Against Frauds 45 ASIA and Fighting Fraud 47 Case Study 48 “Blowing the Whistle” on Defrauders can be Dangerous 50 Summary 50 4 Corporations Don’t Commit Frauds, People Do 53 Introduction 53 Are Defrauders a Product of Their Environment, or Is It in Their Genes? 53 Some Criminology Theories 54 Fraud-Threat Agents 56 Table of Contents xi Human Errors — Accidents 56 Man-Made or Malicious Fraud Threats 57 Potential Fraud-Threat Agents 57 Capabilities 64 Motivation 65 Access 67 Catalysts 68 Inhibitors 69 Amplifi ers 71 Fraud-Related Factors for Attacking Systems 74 Relationship of Threat Elements 74 Case Study 74 Summary 78 5 Fighting Fraud — Whose Job Is It Anyway? 79 Introduction 79 Role of Executive Management 80 Role of Corporate Management 82 Role of the Corporate Employees 83 Role of the Ethics Director 83 Role of the Auditor 84 Role
Recommended publications
  • Identity Theft Literature Review
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Identity Theft Literature Review Author(s): Graeme R. Newman, Megan M. McNally Document No.: 210459 Date Received: July 2005 Award Number: 2005-TO-008 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. IDENTITY THEFT LITERATURE REVIEW Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement January 27-28, 2005 Graeme R. Newman School of Criminal Justice, University at Albany Megan M. McNally School of Criminal Justice, Rutgers University, Newark This project was supported by Contract #2005-TO-008 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S.
    [Show full text]
  • Effect of Pyramid Schemes to the Economy of the Country - Case of Tanzania
    International Journal of Humanities and Management Sciences (IJHMS) Volume 5, Issue 1 (2017) ISSN 2320–4044 (Online) Effect of pyramid schemes to the Economy of the Country - Case of Tanzania Theobald Francis Kipilimba come up with appropriate laws and mechanisms that will stop Abstract— Pyramid scheme, in their various forms, are not a those unscrupulous people praying on unsuspecting new thing in the world, however, they have reared their ugly individuals. Help supervisory institutions formulate menacing heads‘ in the Tanzanians society only recently. Before the appropriate policies that will require all investment plans to Development entrepreneurship Community Initiative (DECI) debacle be documented, filed and thoroughly scrutinized and come up other schemes such as Women Empowering, woman had already with the ways to recover assets of the culprits and use them to racked havoc in the society.This study intended to evaluate the extent compensate the victims of get rich quick schemes. to which Tanzanians knew about the pyramid schemes operating in the world, their participation in these schemes and their general feelings towards the scammers, our judicial system and the course II. BASIC VIEW OF PYRAMID SCHEME action they are likely to take in the event they are scammed. Results Pyramid scheme is a fraudulent moneymaking scheme in show that most Tanzanians are very naïve when it comes to pyramid which people are recruited to make payments to others above schemes, with very scant knowledge about these schemes. Many do them in a hierocracy while expecting to receive payments not know if they have participated in these schemes but in those instances that they had, they suffered huge financial losses.
    [Show full text]
  • Tracking Fraudulent Activities in Real Estate Transactions
    Tracking Fraudulent Activities in Real Estate Transactions Thaer SHUNNAR, Palestine and Michael BARRY, Canada Key words: ABC-Construction, Oklahoma Flip, Outlier Detection, Data Mining, Mortgage Fraud, Fraud in Real Estate, Classification, Quadratic Discriminant analysis. SUMMARY Land transaction fraud is a serious problem in many parts of the world, and it occurs under different land administration systems. In general, property transaction fraud falls into two categories; fraud by forgery and fraud by impersonation. Racketeers have three general motives to engage in real estate fraud: (1) to further other criminal activities, (2) for direct profit, and (3) to shelter money derived from other criminal activities. This paper discusses fraud specific to real estate. Many attributes of the real estate sector make it prone to criminal investment. Real estate is a high value, sizeable economic sector. However, it lacks transparency; each real estate object is unique, it provides a safe investing environment, and speculation in real estate is a tradition. Fraud in real estate is widespread in developed and developing countries, and in the former many of the fraudulent schemes are enabled by technology. The paper describes some of the schemes used to commit property frauds and the patterns that might be identified in a land registry database. Several indicators are used to identify a fraud case. These indicators may be related to the real estate object, the owner, the financier, the financing method or the purchase sum. The testing of a classification model using Quadratic Discriminant Analysis to identify real estate objects that might have been a target of an ABC-Construction scheme is described.
    [Show full text]
  • 2020 PAC Directory
    PAC CO-CHAIRS DANA HILL Hill Hill Carter Franco Cole & Black, P.C. [email protected] BRIAN LERNER Kim Vaughan Lerner, LLP [email protected] LAURIE SHERWOOD Walsworth [email protected] About NAMWOLF Labor & Employment PAC The Labor and Employment PAC is a national network of highly skilled and pre-screened minority and women owned law firms with significant expertise representing employers in labor and employment matters. Member firms have experience in a host of practice areas that fall under the labor and employment umbrella including (for example), litigation of discrimination, retaliation, harassment, ERISA and wage and hour claims; defense of class actions; trade secret litigation; affirmative action, OFCCP, Sarbanes-Oxley; OSHA compliance; Union negotiations and Arbitrations; training, counseling, handbooks and conducting internal investigations. Through the Pac, NAMWOLF brings together law firms and major employers to create mutually beneficial partnerships, develop cost effective workplace solutions, provide effective legal defense and achieve winning results. About NAMWOLF Founded in 2001, NAMWOLF is a nonprofit trade association comprised of minority and women-owned law firms who have exhibited excellence in the legal profession, and other interested parties throughout the United States. Many corporations and public entities committed to diversifying their outside law firm ranks have focused on the utilization of minority and female attorneys at majority firms. However, the most effective way for corporations and public entities to increase diversity in the legal profession is to increase their utilization of minority and women-owned law firms. NAMWOLF’s mission is to promote true diversity in the legal profession by fostering the development of long lasting relationships between preeminent minority and women-owned law firms and corporations and public entities.
    [Show full text]
  • Do Financial Misconduct Experiences Spur White-Collar Crime?*
    Do Financial Misconduct Experiences Spur White-Collar Crime? * Steffen Andersen Copenhagen Business School and CEPR [email protected] Tobin Hanspal Research Center SAFE Goethe University Frankfurt [email protected] Kasper Meisner Nielsen Copenhagen Business School and HKUST [email protected] October 2018 Abstract: We use individual police records on criminal activity to investigate whether personal experiences with financial misconduct spur white-collar crime. Experiences with financial misconduct derives from individuals holding accounts at distressed banks where executives are prosecuted for misconduct. We show that individuals with such experiences are two to three times more likely to be convicted of white-collar crime themselves, compared to similar customers of distressed banks where the financial supervisory authority did not press charges. Our results are driven by the extensive margin: the increase in white-collar crime is caused almost exclusively by customers who had no prior history of criminal activity. JEL Classifications: K42, D03, D14, G11, Keywords: Financial misconduct, Experiences, White-collar crime, Financial crisis, Economics of crime * We thank Martin Brown, Francesco D'Acunto, Stephen Dimmock, and Horst Entorf, and seminar participants at Copenhagen Business School, Danmarks Nationalbank, Goethe University Frankfurt, Lund University, University of Munich, and conference participants at the Research in Behavioral Finance Conference (RBFC 2018), German Finance Association, and Swiss Finance Association for helpful comments and suggestions. Andersen is grateful to the European Research Council for financial support through grant 639383. Hanspal thanks the Joachim Herz Stiftung and Research Center SAFE for generous support. Nielsen thanks Hong Kong Research Grant Council for financial support (RGC Grant 642312).
    [Show full text]
  • A Comparative Study of Financial Crimes and Criminal Networks in the United States
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Where Political Extremists and Greedy Criminals Meet: A Comparative Study of Financial Crimes and Criminal Networks in the United States Author: Roberta Belli, LL.M., Ph.D. Document No.: 234524 Date Received: June 2011 Award Number: 2009-IJ-CX-0006 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. WHERE POLITICAL EXTREMISTS AND GREEDY CRIMINALS MEET: A COMPARATIVE STUDY OF FINANCIAL CRIMES AND CRIMINAL NETWORKS IN THE UNITED STATES by Roberta Belli A dissertation submitted to the Graduate Faculty in Criminal Justice in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2011 This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • UNITED STATES DISTRICT COURT NORTHERN DISTRICT of ILLINOIS EASTERN DIVISION UNITED STATES of AMERICA V. DANIEL SAMUEL ETA, Also
    AO 91 (Rev. 11/11) Criminal Complaint AUSA Peter S. Salib (312) 697-4092 AUSA Charles W. Mulaney (312) 469-6042 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION UNITED STATES OF AMERICA CASE NUMBER: v. DANIEL SAMUEL ETA, also known as “Captain” and “Etaoko;” OLANIYI ADELEYE OGUNGBAIYE, also known as “DonChiChi;” BABATUNDE LADEHINDE LABIYI, also known as “Junior;” UNDER SEAL BARNABAS OGHENERUKEVWE EDJIEH; SULTAN OMOGBADEBO ANIFOWOSHE, also known as “Ayinde;” BABATUNDE IBRAHEEM AKARIGIDI, also known as “AK;” ADEWALE ANTHONY ADEWUMI; MIRACLE AYOKUNLE OKUNOLA; and OLUROTIMI AKITUNDE IDOWU, also known as “Idol” CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. From in or around 2016 to in or around August 2018, at Chicago, in the Northern District of Illinois, Eastern Division, and elsewhere, the defendant(s)s violated: Code Section Offense Description Title 18, United States Code, conspired with each other, and others known and Sections 1343 and 1349 unknown, to commit a wire fraud scheme This criminal complaint is based upon these facts: X Continued on the attached sheet. ANDREW JOHN INNOCENTI Special Agent, Federal Bureau of Investigation (FBI) Sworn to before me and signed in my presence. Date: December 4, 2018 Judge’s signature City and state: Chicago, Illinois JEFFREY COLE, U.S. Magistrate Judge Printed name and Title UNITED STATES DISTRICT COURT ss NORTHERN DISTRICT OF ILLINOIS AFFIDAVIT I, Andrew John Innocenti, being duly sworn, state as follows: I. INTRODUCTION 1. I am a Special Agent with the Federal Bureau of Investigation (FBI).
    [Show full text]
  • 1996 Annual Report
    1996 ANNUAL REPORT U.S. FEDERAL TRADE COMMISSION WASHINGTON, D.C. Annual Report of the Federal Trade Commission For Fiscal Year Ended September 30, 1996 For sale by the Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. 20402 Prepared by Bureau of Competition Judith Bailey, Patricia Foster, James Mongoven Bureau of Consumer Protection Darlene Cossette, Clovia Hutchins, Ruth Sacks Bureau of Economics Janice Johnson, Paul Pautler, William Rosano, Michael Wise Office of the Executive Director Richard Arnold, Elliott Davis, James Giffin, Keith Golden, Julius Justice Office of Information and Technology Management Marie Barrett, Erika Beard, Kristine Titzer FEDERAL TRADE COMMISSION - 1996 ROBERT PITOFSKY, Chairman MARY L. AZCUENAGA, Commissioner JANET D. STEIGER, Commissioner ROSCOE B. STAREK, III, Commissioner CHRISTINE A. VARNEY, Commissioner DONALD S. CLARK, Secretary EXECUTIVE OFFICES OF THE FEDERAL TRADE COMMISSION Pennsylvania Avenue at Sixth Street, N.W. Washington, D.C. 20580 Regional Offices Atlanta, Georgia Denver, Colorado Suite 5M35, Midrise Building Suite 1523 60 Forsyth Street, S.W. 1961 Stout Street Zip Code: 30303 Zip Code: 80294-0101 Phone: (404) 656-1390 Phone: (303) 844-2272 Boston, Massachusetts Los Angeles, California Suite 810 Room 13209 101 Merrimac Street 11000 Wilshire Boulevard Zip Code: 02114-4719 Zip Code: 90024 Phone: (617) 424-5960 Phone: (310) 235-4040 Chicago, Illinois New York, New York Suite 1860 13th Floor 55 East Monroe Street 150 William Street Zip Code: 60603-5701 Zip Code: 10038 Phone: (312) 353-8156 Phone: (212) 264-8290 Cleveland, Ohio San Francisco, California Suite 520-A Suite 570 668 Euclid Avenue 901 Market Street Zip Code: 44114 Zip Code: 94103 Phone: (216) 522-4210 Phone: (415) 356-5270 Dallas, Texas Seattle, Washington Suite 2150 Suite 2896 1999 Bryan Street 915 Second Avenue Zip Code: 75201 Zip Code: 98174 Phone: (214) 979-9350 Phone: (206) 220-6350 FEDERAL TRADE COMMISSION 1996 ANNUAL REPORT Contents Page COMMISSIONERS ......................................................
    [Show full text]
  • Apgyearly Typologies Report
    APG YEARLY TYPOLOGIES REPORT 2016 Methods and Trends of Money Laundering and Terrorism Financing Asia/Pacific Group on Money Laundering Approved and adopted, 8 September 2016 APG Yearly Typologies Report 2016 Applications for permission to reproduce all or part of this publication should be made to: APG Secretariat Locked Bag A3000 Sydney South New South Wales 1232 AUSTRALIA Tel: +61 2 9277 0600 E Mail: [email protected] Web: www.apgml.org © 8 September 2016/All rights reserved 2 CONTENTS INTRODUCTION ................................................................................................................................................. 4 1. WORKSHOPS AND PROJECTS UNDERTAKEN BY APG IN 2015 - 2016 ......................................... 5 1.1 2015 APG Typologies Workshop ............................................................................................................ 5 1.2 Status of current and possible new typologies projects ............................................................................ 6 2. OVERVIEW OF FATF AND FATF-STYLE REGIONAL BODIES’ TYPOLOGY PROJECTS ........ 7 2.1 FATF Typology Projects .......................................................................................................................... 7 2.2 EAG – Eurasian Group on Combating Money Laundering and Financing of Terrorism ......................... 8 2.3 ESAAMLG – The Eastern and Southern Africa AML Group ................................................................. 8 2.4 MONEYVAL – The Committee of Experts on the Evaluation
    [Show full text]
  • Unemployment Fraud Guide in the United States Unemployment Claims Fraud Can Occur at Any Time
    Unemployment Fraud Guide In the United States unemployment claims fraud can occur at any time. It is important to remain vigilant in auditing and reporting fraud. This guide will provide CCC clients with an overview of unemployment fraud and solutions for both preventing and managing unemployment fraud claims. How do the criminal actors get the data they use to file the fraudulent unemployment claims? The criminals obtain the stolen identity using a variety of techniques, including • The online purchase of stolen PII (Personal Identifying Information), • Previous data breaches, • Computer intrusions, • Cold-calling victims while using impersonation scams, • Email phishing schemes, • Physical theft of data from individuals or third parties, • Theft of data from public websites and social media accounts • Other methods. How are fraudulent unemployment claims identified? Most employers become aware of fraudulent unemployment claims by receiving an claim notice from a state unemployment agency for an employee who continues to be employed. Many victims of identity theft related to unemployment insurance claims do not know they have been targeted until they try to file a claim for unemployment insurance benefits, receive a notification from the state unemployment insurance agency, receive an IRS Form 1099-G showing the benefits collected from unemployment insurance, or get notified by their employer that a claim has been filed while the victim is still employed. How are employees affected by fraudulent unemployment claims? Employees that are still employed by the employer are at increased risk for other types of identity theft including: • Debit/Credit Card Fraud • Driver’s License/ID Theft • Account Takeover • Mortgage Fraud • Tax Return Theft • Auto lending Fraud • Employment Fraud Laid-off workers may remain in limbo for weeks or months.
    [Show full text]
  • FROM the SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION and RATIONALIZATION by Subia Ansari
    FROM THE SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION AND RATIONALIZATION by Subia Ansari A Thesis Submitted to the Faculty of Purdue University In Partial Fulfillment of the Requirements for the degree of Master of Science Department of Computer and Information Technology West Lafayette, Indiana August 2020 THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF COMMITTEE APPROVAL Dr. Ida Ngambeki, Chair Department of Computer and Information Technology Dr. Kathryn Seigfried-Spellar Department of Computer and Information Technology Dr. John Springer Department of Computer and Information Technology Approved by: Dr. John Springer 2 Dedicated to my mother and my father. 3 ACKNOWLEDGMENTS First and foremost, I’d like to thank my mother and father for being a constant source of inspiration to me and for always believing in me. I could not have gotten here without your guidance and support. I will forever be grateful to you for the opportunities you have given. To my brothers thank you for being there and helping me relax when I was under pressure. To the rest of my family and friends, thank you for everything you have done to support me and help me follow my dreams. To Dr. Ida Ngambeki, thank you for your insight and support during this study. It was with your guidance and constant feedback that I was able to produce a study of this quality. You have inspired me in many ways, I have always been in awe of the amount of knowledge you have, and I have learnt a lot from you. I am extremely grateful that I had the opportunity to work with you.
    [Show full text]
  • Forensic Fraud: Evaluating Law Enforcement and Forensic Science Cultures in the Context of Examiner Misconduct
    Forensic Fraud: Evaluating law enforcement and forensic science cultures in the context of examiner misconduct Presented by Brent E. Turvey, MS Student ID: 13057167 Submitted in total fulfillment of the requirements of the degree of Doctor of Philosophy September 2012 Criminology Department Faculty of Humanities and Social Sciences Bond University Queensland, Australia Abstract Forensic fraud occurs when forensic examiners provide sworn testimony, opinions, or documents (e.g., reports and professional resumes) bound for court that contain deceptive or misleading findings, opinions, or conclusions, deliberately offered in order to secure an unfair or unlawful gain. Such misconduct has an undeniably devastating impact: it destroys the reputations of the forensic examiners involved, if not their careers; it erodes public confidence in the institutions where they are employed; it can result in overturned convictions, individual and institutional liability, and costly civil judgments; and it is corrosive to the collective faith in the justice system as a whole. However, owing to a lack of research into the phenomenon of forensic fraud that is exacerbated by the constraints on would-be whistleblowers, in tandem with the denials of forensic science stakeholders, there is a general perception that forensic fraud is primarily the result of a few “bad apples” rather than being cultural or systemic in origin. This dissertation examines the problem of forensic fraud both theoretically and empirically, to assess the relationships between examiner, workplace, evidentiary, and impact variables. The present research shows that the majority of forensic examiners work for law enforcement or government agencies, and almost exclusively for the police and prosecution. Law enforcement culture is often defined by traits that afford the motivations and rationalizations for a deviant internal subculture, actively cultivating fraud within its ranks.
    [Show full text]