IDENTITY THEFT and FRAUD VICTIMIZATION: What We Know About Identity Theft and Fraud Victims from Research- and Practice- Based Evidence

Total Page:16

File Type:pdf, Size:1020Kb

Load more

CENTER for Research Report VICTIM RESEARCH IDENTITY THEFT AND FRAUD VICTIMIZATION: What We Know about Identity Theft and Fraud Victims from Research- and Practice- Based Evidence August 2019 Robert Buchanan Taylor/Shutterstock TABLE OF CONTENTS Executive Summary 1 About the Center for Victim Research 2 Defining Identity Theft and Fraud Victimization 3 Prevalence and Detection of Victims 4 Risk and Protective Factors 9 Harms and Consequences 13 Prevention, Intervention, and Victim Services 18 Implications for Research, Policy, and Practice 25 References 27 Appendix 33 Center for Victim Research: Identity Theft and Fraud Victimization | i EXECUTIVE SUMMARY Millions of people in • The most common types of identity fraud are Fraud includes a range of the United States fall credit card fraud, employment/tax fraud, and crimes that use deceptive or false acts for the personal, victim to identity theft, utilities fraud (FTC 2017a). The same year, the most usually financial, gain of identity fraud, and common non-identity frauds were imposter scams; the perpetrator. Identity other types of fraud telephone frauds; and prize, sweepstakes, and fraud is a subcategory in each year, knowingly or lottery scams. which individuals’ personally 1 unknowingly. • While identity fraud and other fraud can impact identifying information is used without authorization to Victims of fraud can people of all backgrounds and circumstances, commit fraud. experience more certain traits are associated with vulnerability to than severe financial subtypes of fraud. Income, age, language, and ability consequences; their victimization experiences can include status are some of the characteristics that can make legal complications, damaged relationships, physical health certain groups more vulnerable to certain types of problems, and trauma responses similar to those of victims fraud. of violent crime. Further, fraud often overlaps with other • Many victims lose money to fraud; while some victimization experiences—including child exploitation and victims experience minimal losses that are resolved domestic violence—making the understanding of these quickly, others experience extensive losses that may crimes important to victims and service providers of all never be recovered. types. Understanding the varied needs of fraud victims is an important step in improving practitioners’ responses to • The harms of identity fraud and other fraud extend them. beyond direct financial losses. Victims of identity fraud can have indirect financial losses from Despite the multitude of negative harms that fraud can lowered credit, legal fees, and lost employment cause, evidence on how best to serve identity fraud and opportunities. Non-financial harms, such as other fraud victims is limited, as few research studies emotional and physical health problems, can affect have examined which responses are most effective all fraud victims. Yet, the evidence on the extent and in remediating harms and preventing revictimization. distribution of fraud consequences is limited. However, the field’s knowledge of and ability to respond to victims of fraud is growing. • Educational programs are the interventions most supported by research evidence in preventing This report by the Center for Victim Research summarizes identity fraud and other fraud victimization. existing evidence from research and practice to identify Other services to fraud victims include reporting what we know and where the field needs to grow to and assistance hotlines, support groups, and legal improve our nation’s response to identity fraud and other services. Common responses to identity fraud fraud victimization. victims include credit and identity monitoring, insurance, and identity restoration. Fast Facts • The field needs more specialized services to • Millions of Americans fall victim to identity fraud address identity fraud and other fraud victims’ and other fraud each year. According to the 2016 needs—including help navigating indirect financial National Crime Victimization Survey, 25.9 million harms and non-financial harms of victimization. people in the U.S. aged 16 and older reported More program evaluations are also needed to identity fraud (or attempted identity fraud) in the determine which responses to fraud victims are previous year (Harrell 2019). most effective. 1 Although the terms identity theft and identity fraud are often used interchangeably, not all theft of personally identifying information results in fraud, at least not immediately. This report focuses on identity theft coinciding with fraud (identity fraud), as well as other types of fraud victimizations. Center for Victim Research: Identity Theft and Fraud Victimization | 1 ABOUT THE CENTER FOR VICTIM RESEARCH The Center for Victim Research (CVR) is aVision 21 CVR developed its evidence synthesis framework resource center funded by the Office for Victims of Crime following the Centers for Disease Control and Prevention’s (OVC) with the vision of routine collaboration between (CDC) evidence project, which recognizes the importance victim service providers and researchers to improve of integrating knowledge from the best available research practice through the effective use of research and data. and experiential knowledge from practice (referred CVR’s mission is to serve as a one-stop resource for service hereinafter as “practice evidence”), along with contextual providers and researchers to connect and share knowledge evidence regarding what we know for each victimization to increase: 1) access to victim research and data, and 2) topic. The primary focus of CVR’s evidence syntheses has the utility of research and data collection to crime victim been reviewing materials available in the United States services nationwide. CVR is a collaborative partnership of from the years 2000 to present, including journal articles, researchers and practitioners from three organizations: the reports, fact sheets, briefs, and videos found in research Justice Research and Statistics Association, the National databases and on topic-relevant organizations’ websites. Center for Victims of Crime, and the Urban Institute. Each synthesis summarizes knowledge on the: 1) prevalence and detection of victims, 2) risk and CVR’s Evidence Syntheses protective factors, 3) harms and consequences, 4) The purpose of CVR’s syntheses of knowledge is to preventions, interventions, and services, and 5) policy, assess the state of the field in crime victimization and practice, and research implications. More details on the victim response to help researchers, service providers, methods CVR followed in building an evidence base and policymakers understand and prioritize what the field for fraud and identity theft victimization and other needs to improve victim services nationwide. To develop victimization areas and research products on these its syntheses, CVR staff focus on addressing a core set of victimization topics are provided on CVR’swebsite . questions, as follows: For this synthesis on fraud, CVR researchers initially 1. Prevalence and detection of victims—How big is each identified 1,845 potential source documents through crime victimization problem and how can we identify all database searches and websites of leading victimization crime victims who need help? organizations. Ultimately, 152 research sources and 278 practice sources met CVR’s inclusion criteria and were 2. Risk and protective factors—What puts people at risk reviewed for this synthesis (see References for details). of each crime victimization and what, if anything, can protect against victimization experiences? 3. Harms and consequences—What harms and negative consequences of the crime experience do victims have to navigate? 4. Preventions, interventions, and victim services—How can we help victims recover and mitigate the negative consequences of crime experiences? Are there ways to help individuals become resilient to victimization in the first place? 5. Policy, practice, and research implications—With what we learn through these syntheses about reaching and serving crime survivors, how can victim researchers, policymakers, and service providers move the field forward to improve the response to crime victimization? Center for Victim Research: Identity Theft and Fraud Victimization | 2 DEFINING IDENTITY THEFT AND FRAUD VICTIMIZATION This CVR synthesis discusses victimization from a EXAMPLES OF IDENTITY THEFT AND FRAUD range of identity-related and non-identity related frauds (see Appendix for examples of fraud subtypes). FRAUD WITHOUT Much of the fraud research to date focuses on fraud IDENTITY THEFT IDENTITY FRAUD IDENTITY THEFT WITHOUT FRAUD against governments and organizations. This emphasis Account/Credit Card Fraud Advance Fee Scams Data Breaches Criminal ID Theft Loan Scans and the lack of a clear definition has allowed fraud Physical Theft of Medical/Insurance ID Theft against individuals to remain relatively understudied Personally Identifiable Merchandise Scams Information SSN-related ID Theft Ponzi/Pyramid Schemes (Beals, DeLiema, & Deevy 2015). In this evidence Synthetic ID Theft Prize/Lottery Scams review, fraud refers to crimes in which deceptive Romance Scams or false acts are committed for personal, typically financial, gain through misrepresentation of self and/ field to differentiate the two. According to U.S. federal or promises of goods, services, or financial benefits that legislation, identity theft is the knowing transfer or use, do not exist, were never intended to be provided, or
Recommended publications
  • Identity Theft Literature Review

    Identity Theft Literature Review

    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Identity Theft Literature Review Author(s): Graeme R. Newman, Megan M. McNally Document No.: 210459 Date Received: July 2005 Award Number: 2005-TO-008 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. IDENTITY THEFT LITERATURE REVIEW Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement January 27-28, 2005 Graeme R. Newman School of Criminal Justice, University at Albany Megan M. McNally School of Criminal Justice, Rutgers University, Newark This project was supported by Contract #2005-TO-008 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S.
  • The Relationship Between Debt and Crime: a Systematic and Scoping

    The Relationship Between Debt and Crime: a Systematic and Scoping

    EJP0010.1177/2066220320964896European Journal of Probationvan Beek et al. 9648962020 Original Article European Journal of Probation 1 –31 The relationship between debt © The Author(s) 2020 Article reuse guidelines: and crime: A systematic and sagepub.com/journals-permissions https://doi.org/10.1177/2066220320964896DOI: 10.1177/2066220320964896 scoping review journals.sagepub.com/home/ejp Gercoline van Beek Vivienne de Vogel University of Applied Sciences of Utrecht, The Netherlands Dike van de Mheen Tranzo, Tilburg University, The Netherlands Abstract Compared to macroeconomic factors, the financial situation of the individual may provide better insight into the relationship between debt and crime. However, the relationship between debt and crime is still unclear and little is known about the causality of this relationship and the factors that influence it. To obtain more insight into this relationship, a systematic and scoping literature review was conducted. Five articles were analyzed in the systematic review, and 24 articles in the scoping review. The results of the systematic review show a strong association between debt and crime whereby debt is a risk factor for crime, especially for recidivism and regardless of the type of crime, and crime is a risk factor for debt. The scoping review provided additional and in-depth insight, and placed the results of the systematic review in a broader perspective. Moreover, it emphasized the prevalence of debt among offenders, regardless of age, and identified the factors that influence the relationship between debt and crime. Keywords Crime, criminal behavior, debt, debts, financial problems Introduction The relationship between socioeconomic factors and crime is a classic theme in crimino- logical literature (Dunaway et al., 2000; Ellis and McDonald, 2000; Tittle et al., 1978).
  • Office of the Attorney -General

    Office of the Attorney -General

    OFFICE- OF THE,, ATTORNEY- - ---- -GENERAL I -- ' . Department of Law , . - I - Fi~cal ,Year 1993 Annual Report Grant Woods - -A!torney Genera_} Grant Woods Attorney General Robert B. Carey J.M. Howard First Assistant Attorney General Special Counsel Civil Division · Criminal Division H. Leslie Hall Michael C. Cudahy Chief Counsel Chief Counsel Human Services Division Management Services Cecil B. Patterson Thomas G. Augherton Chief Counsel Chief of Administration TRANSMITTAL LETTER STATE OF ARIZONA OFFICE OF THE ATTORNEY GENERAL GRANT WOODS MAIN PHONE: 542-5025 ATTORNEY GENERAL 1275 WEST WASHINGTON, PHOENIX 85007-2926 TELECOPIER : 542-4085 November 5, 1993 The Honorable J. Fife Symington Governor of Arizona State Capitol, Executive Tower 1700 W. Washington Phoenix, Arizona 85007 Dear Governor Symington: I am pleased to submit to you the annual report of the Office of the Attorney General, as required by ARS § 41-194(B). During the past fiscal . year, this administration continued its focus of protecting Arizona's citizens through aggressive enforcement of state laws and providing quality legal representation to state agencies. We have vigorously defended Arizona's environment by prosecuting those that destroy our natural resources, pursued dozens of companies and individuals who prey on unsuspecting consumers, and convicted many notorious criminals for the heinous crimes they perpetrated. We concentrated our administrative efforts into implementing cost-saving measures that allow us to prioritize our resources into retaining and compensating top-quality \egal staff. Loss of well-trained, experienced attorneys from the Attorney General's Office to higher paying private and public sector positions continues to be a problem that requires close scrutiny by the Legislature.
  • Enrolling in Medicare Part a and Part B

    Enrolling in Medicare Part a and Part B

    CENTERS for MEDICARE & MEDICAID SERVICES Enrolling in Medicare Part A & Part B The information in this booklet describes the Medicare Program at the time this booklet was printed. Changes may occur after printing. Visit edicare.govM or call 1-800-MEDICARE (1-800-633-4227) to get the most current information. TTY users can call 1-877-486-2048. “Enrolling in Medicare Part A & Part B” isn’t a legal document. Official Medicare Program legal guidance is contained in the relevant statutes, regulations, and rulings. 3 Contents 5 Section 1—The Medicare Program 5 What’s Medicare? 5 Medicare has different parts 5 Medicare Part A (Hospital Insurance) 6 Medicare Part B (Medical Insurance) 9 Can I get Part B if I don’t have Part A? 9 How do I know if I have Part A or Part B? 10 Medicare Part C (also known as Medicare Advantage) 10 Medicare Part D (prescription drug coverage) 10 For more information 11 Section 2—Part A & Part B Enrollment 11 When can I sign up? 13 Getting Part A and Part B automatically 17 Signing up for Part A and Part B 19 Turning 65 and you or your spouse is still working 21 Medicare and End-Stage Renal Disease (ESRD) 24 Retiree coverage 24 Can I still get Medicare at 65? 26 Veterans’ benefits 26 I have Health Insurance Marketplace coverage 27 I have coverage through a health savings account (HSA) 28 Living outside the U. S. 29 Section 3—For More Information 29 Where to get more information 29 Medicare publications 31 Section 4—Definitions 4 5 Section 1—The Medicare Program What’s Medicare? Medicare is health insurance for: ■ People 65 or older ■ Under 65 with certain disabilities ■ People of any age with End-Stage Renal Disease (ESRD) (permanent kidney failure requiring dialysis or a kidney transplant) Medicare has different parts Medicare Part A (Hospital Insurance) Words in Part A helps cover your inpatient care in hospitals.
  • 2020 Identity Theft Statistics | Consumeraffairs

    2020 Identity Theft Statistics | Consumeraffairs

    2020 Identity Theft Statistics | ConsumerAffairs Trending Home / Finance / Identity Theft Protection / Identity theft statistics Buyers Guides Last Updated 01/16/2020 News Write a review 2020Write a review Identity theft statistics Trends and statistics about identity theft Learn about identity theft protection by Rob Douglas Identity Theft Protection Contributing Editor In 2018, the Federal Trade Commission processed 1.4 million fraud reports totaling $1.48 billion in losses. According to the FTC’s “Consumer Sentinel Network Data Book,” the most common categories for fraud complaints were imposter scams, debt collection and identity theft. Credit card fraud was most prevalent in identity theft cases — more than 167,000 people reported a fraudulent credit card account was opened with their information. Identity theft trends in 2019 In the next year, the Identity Theft Resource Center (ITRC) predicts identity theft protection services will primarily focus on data breaches, data abuse and data privacy. ITRC also predicts that https://www.consumeraffairs.com/finance/identity-theft-statistics.html 2020 Identity Theft Statistics | ConsumerAffairs consumers will become more knowledgeable about how data breaches work and expect companies to provide more information about the specific types of data breached and demand more transparency in general in data breach reports. Cyber attacks are more ambitious According to a 2019 Internet Security Threat Report by Symantec, cybercriminals are diversifying their targets and using stealthier methods to commit identity theft and fraud. Cybercrime groups like Mealybug, Gallmaker and Necurs are opting for off-the-shelf tools and operating system features such as PowerShell to attack targets. Supply chain attacks are up 78% Malicious PowerShell scripts have increased by 1,000% Microsoft Office files make up 48% of malicious email attachments Internet of Things threats on the rise Cybercriminals attack IoT devices an average of 5,233 times per month.
  • 4R's for Fighting Medicare Fraud

    4R's for Fighting Medicare Fraud

    Record s Review R 4 for Fighting Medicare Fraud Report You're the first line of defense against Medicare fraud Remember and abuse. CENTERS FOR MEDICARE & MEDICAID SER VICES CMS Product No. 11610 Revised December 2020 Follow the "4 Rs" to protect your loved ones, yourself, and Medicare from fraud: 1. Record 3. Report • Record the dates of your doctor appointments on a calendar. Note the • Report suspected Medicare fraud by calling 1-800-MEDICARE. tests and services you get, and save the receipts and statements from Have your Medicare card or Number and the claim or MSN ready. your providers. If you need help recording the dates and services, ask a • You can also report fraud to the Office of the Inspector General by visiting friend or family member. tips.oig.hhs.gov or by calling 1-800-HHS-TIPS (1-800-447-8477). TTY • Contact your local Senior Medicare Patrol (SMP) program to get a free users can call 1-800-377-4950. Personal Health Care Journal. Use the SMP locator at smpresource.org • If you identify errors or suspect fraud, the SMP program can also help you or call 1-877-808-2468 to find the SMP program in your area. make a report to Medicare. 2. Review 4. Remember • Compare the dates and services on your calendar with the statements • Protect your Medicare Number. Don’t give it out, except to people you know you get from Medicare or your Medicare plan to make sure you got each should have it, like your doctor or other health care provider.
  • Revealing the True Cost of Financial Crime What’S Hiding in the Shadows?

    Revealing the True Cost of Financial Crime What’S Hiding in the Shadows?

    Revealing the true cost of financial crime What’s hiding in the shadows? Focus on Latin America and the Caribbean Refinitiv | Revealing the true cost of financial crime In March 2018, Refinitiv commissioned a global survey to better understand the true cost of financial crime and to raise awareness of its wider impact on business, individuals and society as a whole. In total, over 2,300 senior managers from large organizations across 19 countries participated. We also supplemented the survey findings by conducting in-depth research and holding interviews with leading NGOs (Education Endowment Foundation, Transparency International UK and Walk Free Foundation) and the European Union’s law enforcement agency to gain perspective on the human cost of financial crime. This report specifically examines the findings in Latin America and the Caribbean. 2 Refinitiv | Revealing the true cost of financial crime About the survey For purposes of this report we have based on first-hand experience and used a wide definition of financial knowledge. This report focuses on Latin crime, one that goes beyond the scope America and the Caribbean. with which Refinitiv is traditionally The survey sought feedback from both associated. In order to provide as publicly listed and privately owned complete a picture as possible on the organizations. social and financial impact of financial 2,373RESPONDENTS crime, we have included bribery and A range of industries was consulted, corruption; money laundering; fraud; including agriculture; mining; theft; cybercrime; and slave labor/ construction; retail; manufacturing human trafficking. and financial. that the standard A total of 2,373 C-suite/senior Please note 19COUNTRIES management in large organizations convention of rounding has been across 19 countries1 completed applied and consequently some totals the survey.
  • Play Minecraft for Free

    Play Minecraft for Free

    Play Minecraft For Free Play Minecraft For Free CLICK HERE TO ACCESS MINECRAFT GENERATOR Every Minecraft server listed here is completely free to join & play. Each of these Minecraft servers include 1.16 elements of some sort, all in varying ways On the Purple Prison server, players begin as a 'New Inmate' and will work their way up through the prison ranks by mining and fighting their way to... download minecraft pc latest version free free minecraft server mods how to open minecraft cheat window minecraft pocket edition maze cheat code minecraft 1.7 2 hacked with optifine are minecraft texture packs free Minecraft Windows 10 Edition is an adaptation of the Pocket Edition, with some new capabilities such as a 7-player multiplayer using Xbox Live and Players who have purchased Minecraft: Java Edition before October 19th, 2018 can get Minecraft for Windows 10 for free by visiting their Mojang account. Free Minecraft Servers - minefort.com. How. Details: You have full access to the files of your Minecraft server. You can easily browse your server Details: No server list for Minecraft would be complete without the inclusion of these servers! Upon joining a Skyblock mode server, players get... free coding websites for kids minecraft Minecraft Server List - Minecraft Private Server List EU - Legal Minecraft ENG Servers List - Find your favorite Minecraft Server! Minecraft Servers in the golden spotlight Ad. Join ExtremeCraft.net for new and classic entertaining game modes.rnrnWebsite&forums: www.extremecraft.netrnrnServers... Astral Client is the leading client-resource pack available for Minecraft Bedrock Edition. It simply modifies your MC:BE to look more like a Java Edition client, while optimizing multiple aspects of the game to make the user experience a lot better and smoother.
  • A National Strategy to Combat Identity Theft Describes the Needs Associated with Each Component, Recommends Action, and Describes Common Practices

    A National Strategy to Combat Identity Theft Describes the Needs Associated with Each Component, Recommends Action, and Describes Common Practices

    U.S. Department of Justice 10000100020300409020Office of Community Oriented Policing Services 01090090109000100020 A NATIONAL STRATEGY TO 30000111101001010100COMBAT IDENTIT Y THEFT 10101010101000101010 10100010101010100101 01001010100100101010 01001001010100100100 101010111101 01001101 01001010100101110000 01000101101010001010 COPS COMMUNITY ORIENTED POLICING SERVICES 10100010101001010101U.S. DEPARTMENT OF JUSTICE This project was supported by cooperative agreement #2003CKWX0343 by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position of the U.S. Department of Justice. References to specific companies, products, or services should not be considered an endorsement of the product by the author(s) or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. www.cops.usdoj.gov ISBN: 1-932582-64-9 May 2006 10000100020300409020 01090090109000100020 30000111101001010100 A NATIONAL STRATEGY TO 101010101010001010COMBAT IDENTIT Y THEFT 10 10100010101010100101 01001010100100101010 01001001010100100100 101010111101 01001101 01001010100101110000 01000101101010001010 10100010101001010101 10000100020300409020Foreword 01090090109000100020 The crime of identity theft is relatively new to American law enforcement and is rapidly increasing in frequency. In 2003, Chief Darrel Stephens, Charlotte-Mecklenburg (North Carolina) Police Department, surveyed members of the
  • Pizzagate / Pedogate, a No-Nonsense Fact-Filled Reader

    Pizzagate / Pedogate, a No-Nonsense Fact-Filled Reader

    Pizzagate / Pedogate A No-nonsense Fact-filled reader Preface I therefore determine that serious human rights abuse and corruption around the world constitute an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States, and I hereby declare a national emergency to deal with that threat. —Trump Executive Order 13818, Dec. 20, 2017 Pizzagate means many things to many people, the angle of the lens may be different, but the focus zeros in on a common body of incontestable facts. The fruit of top researchers collected in this reader allows you to compare, correlate and derive a flexible synthesis to suit your needs. An era of wild contradiction is upon us in the press. The psychopathic rumblings that pass for political discourse bring the artform of infotainment to a golden blossoming. A bookstore display table featuring The Fixers; The Bottom-Feeders, Crooked Lawyers, Gossipmongers, and Porn Stars Who Created the 45th President versus Witch Hunt; The Story of the Greatest Mass Delusion in American Political History are both talking about the same man, someone who paid for his campaign out of his own pocket. There were no big donors from China and the traditional bank of puppeteers. This created a HUGE problem, one whose solution threatened the money holders and influence peddlers. New leadership and a presidential order that threw down the gauntlet, a state of emergency, seeded the storm clouds. The starting gun was fired, all systems were go, the race had begun. FISAs and covert operations sprang into action. The envelopes are being delivered, the career decisions are being made, should I move on or stay the course.
  • Understanding Victims of Financial Crime a Qualitative Study with People Affected by Investment Fraud

    Understanding Victims of Financial Crime a Qualitative Study with People Affected by Investment Fraud

    Understanding victims of financial crime A qualitative study with people affected by investment fraud Authors: Shannon Harvey, Jane Kerr, Jasmin Keeble and Carol McNaughton Nicholls Date: 03/03/2014 Prepared for: Financial Conduct Authority Summary Financial crime affects thousands of people in Britain every year, yet very little is known about the experiences, behaviours and decision-making of victims of these crimes. This qualitative study involved in-depth, face-to-face interviews with 31 victims of investment fraud, including boiler room share fraud, land banking, and frauds involving the sale of carbon credits, diamonds, wine, rare metals, gold and foreign exchange. Interviewees also included those who had been victims of recovery room fraud. People affected by investment fraud are not simply passive victims. Their accounts highlight their agency, and their attempts to prevent their own victimisation. Victims’ narratives illustrate the numerous ways that they seek to verify the authenticity of the supposed investment opportunity, including challenging the fraudster, conducting independent research, contacting the FCA and other professionals, and talking to family, friends and colleagues. However, victims described experiences where, despite this opportunity for intervention and to disrupt the fraud, the ambiguous information they received in fact further supported the fraud. Fraudsters do not simply mislead victims, they actively groom them into a relationship where they become emotionally attached to the fraud(ster). Fraudsters mislead victims through veneers of professionalism, such as high quality documentation, a professional business set-up and well-presented sales people. This is extended through deliberate deception, circumventing regulatory regimes and obscuring their identity. However, veneers of professionalism and deception tactics alone are insufficient to perpetrate an investment fraud.
  • Tracking Fraudulent Activities in Real Estate Transactions

    Tracking Fraudulent Activities in Real Estate Transactions

    Tracking Fraudulent Activities in Real Estate Transactions Thaer SHUNNAR, Palestine and Michael BARRY, Canada Key words: ABC-Construction, Oklahoma Flip, Outlier Detection, Data Mining, Mortgage Fraud, Fraud in Real Estate, Classification, Quadratic Discriminant analysis. SUMMARY Land transaction fraud is a serious problem in many parts of the world, and it occurs under different land administration systems. In general, property transaction fraud falls into two categories; fraud by forgery and fraud by impersonation. Racketeers have three general motives to engage in real estate fraud: (1) to further other criminal activities, (2) for direct profit, and (3) to shelter money derived from other criminal activities. This paper discusses fraud specific to real estate. Many attributes of the real estate sector make it prone to criminal investment. Real estate is a high value, sizeable economic sector. However, it lacks transparency; each real estate object is unique, it provides a safe investing environment, and speculation in real estate is a tradition. Fraud in real estate is widespread in developed and developing countries, and in the former many of the fraudulent schemes are enabled by technology. The paper describes some of the schemes used to commit property frauds and the patterns that might be identified in a land registry database. Several indicators are used to identify a fraud case. These indicators may be related to the real estate object, the owner, the financier, the financing method or the purchase sum. The testing of a classification model using Quadratic Discriminant Analysis to identify real estate objects that might have been a target of an ABC-Construction scheme is described.