Professional Documents
Culture Documents
Fraud, Authorizations,
Lost and Stolen
1
FRAUD
• Fraud is defined to be “an intentional perversion of truth” or a “false
misrepresentation of a matter of fact which induces another person
to part with some valuable thing belonging to him or to surrender a
legal right”
• Fraud is a deliberate misrepresentation which causes another
person to suffer damages, usually monetary losses.
• Most people consider the act of lying to be fraud, but in a legal
sense lying is only one small part of actual fraud.
• A sales man may lie about his name, eye color, place of birth and
family, but as long as he remains truth about the product he sells,
he will not be found guilty of fraud.
• There must be a deliberate misrepresentation of the product’s
condition and actual monetary damages occur.
2
FRAUD
Commonwealth Fraud Control Guidelines :
Fraud is defined as dishonesty obtaining a benefit by deception or
other means.
The definition includes:
• Theft;
• Obtaining property, a financial advantage or any other benefit
by deception;
• Causing a loss, or avoiding or creating a liability by deception;
• Providing false or misleading information to another party, or
failing to provide information where there is an obligation to do
so;
• Making, using or possessing forged or falsified documents
• Bribery, corruption or abuse of office;
• Relevant bankruptcy offences; and any offences of a like
nature to those listed above.
3
TYPES OF FRAUD
(INVOLVING HOUSING LOANS)
Home improvement contracts:
• Initiated by some contractors who also arrange financing
for their work through a home loan.
• There may be no "improvement" at all.
• The work is substandard or left incomplete.
• The homeowner generally ends up deeply in debt and in
grave danger of foreclosure after contractors (frequently
unlicensed) charge very inflated prices for earthquake
repairs, interior or exterior remodeling, floor coverings,
siding or other similar products
4
TYPES OF FRAUD
(INVOLVING HOUSING LOANS)
Foreclosure Rescue
• When homeowners fall behind in their mortgage payments --
even one day late -- lenders may file notices of default against
them and start the foreclosure process.
• Mortgage brokers and hard money lenders scan these notices
of default, which are public record, and use them to target
people for refinance loans which the already strapped borrower
cannot afford to pay back.
• The loan may be presented to the consumer as a "bailout" but
often ends up draining the remaining equity out of a home while
offering little more than postponing the inevitable
5
TYPES OF FRAUD
(INVOLVING CREDIT CARDS)
• Lost or stolen - Credit cards that have been reported as lost or
stolen
• Mail non-receipt - Cards stolen in transit-after card companies
send them out and before the genuine cardholders receive them
• Counterfeit - A counterfeit, cloned or skimmed card is one that has
been printed, embossed or encoded without permission from the
card company or one that has been validly issued and then altered
or recoded. Also covers computer generated card numbers,
collusion, wire tapping
• Card not present - Usually the theft of genuine card details that are
then used to make a purchase through a remote channel such as
the phone, Internet, fax or mail order
• Identity fraud - A criminal uses fraudulently obtained personal
information to open or access card accounts in someone else's
name. Perpetrated through Application fraud and Account takeover
6
Some Definitions
7
How Can Identity Theft Happen?
a. Your home or vehicle is burgled and your personal information and documents
may be taken.
b. Your personal information may be stolen and used or sold by employees of
legitimate business.
c. Information found in the trash bin.
d. Many important documents are posted to you and can be stolen from your
mailbox.
e. Criminals could request for a “change of address” and have your mail diverted
to another address.
f. Your wallet contains personal information such as your licence, credit and ATM
cards and other personal documents, that may be stolen.
g. You may be the victim of a scam and be conned into providing personal
information over the telephone by an impersonator.
h. Shoulder surfing in public place.
i. Your personal computer could be the weakest link, as it is vulnerable to threats
posed by hacking, phishing and malware.
j. Your identity stolen and used by someone you know and trust - friend, relative or
colleague.
8
Misuse of Lost / Stolen Identities
9
Identify fraud - Warning Signs
(as consumer)
You (as consumer) receive bills, invoices or receipts for goods which
you have not ordered.
You receive letters or calls from debt collectors relating to debts that
aren’t yours.
You receive bank statements for accounts in your name which you
have not applied for or opened.
There are transactions on your account statements that you don’t
recognize.
Important identification documents are missing.
You stop receiving regular mails.
You did not receive any mail at all.
New accounts on your credit report.
Searches on your credit bureau report that don’t relate to any
application made by you.
10
TECHNIQUES IN SPOTTING
POTENTIAL FRAUD
Some red flags to look for the identification of potential fraud:
• The same address used for home and office addresses (unless it is a
home-operated business);
• Variations in telephone number;
• Telephone calls are left unanswered;
• Addresses inconsistent with local street patterns;
• Home and office addresses which are post office boxes;
• Home of office address is a hotel;
• References of questionable nature;
• Fraudulent identity cards. Over the years, many stolen identity cards
have been used for hire-purchase application;
• Tampered income documents like pay-slips. The age and occupation
do not relate with the income receive; and
• Tampered photocopies of bank statements.
11
FRAUD IDENTIFICATION AND PREVENTION
(BY BANKS)
• Verification and validation
• The card is genuine
• The cardholder is the rightful owner
• Chip and PIN
• A chip (‘smart’) card holds encrypted details on a secure microchip that
can store and process information. The PIN replaces the signature for
card present transactions
• Biometrics
• Methods of identification by measuring unique human characteristics as
a way to confirm identity. Examples are finger or iris scanning or
dynamic signature verification
• Card Security Code (CSC)
• The last three or four digits of a number printed on or just below the
signature panel on payment cards. It can be requested for transactions
in addition to card expiry date etc.
12
FRAUD IDENTIFICATION AND PREVENTION
(BY BANKS)
• Domain names system (DNS)
• Internet security
• Check of number of active domain names registered in “.com” and
“.net”
• Domain names must be checked for authenticity
• DNS queries cover the Top-Level domains and the Root domains,
and IP addresses
• Address verification service (AVS)
• Matches the customer’s billing street address and post code against
the data on file with the issuing bank.
• Other features
• Holograms, UV, unique fonts
13
FRAUD SCORING
• Fraud scoring introduced as a means of numerical scores that look at
many different variables to verify an individual’s identity and determine
fraud risk
• Scoring models typically assign a numeric value that indicates the
likeliness of an individual transaction being fraudulent
• The most efficient scoring models use predictive software techniques to
capture relationships and patterns of fraudulent activity, and to
differentiate these patterns from legitimate purchasing activity.
• Traditional methods of identity checks:
• Manual credit checks
• Use external data services
• Problems:
• Take too long
• Can lose good customers because of bad / incomplete data in databases
searched
14
CREDIT CARD
• A plastic card having a magnetic strip, issued by a bank or
business authorizing the holder to buy goods or services on
credit (usually to a specified limit), payable on specified
terms..
• A card allowing someone to make a purchase on borrowed
money.
• Credit cards are one of the most popular forms of payment
for consumer goods and services today.
• Credit cards have higher interest rates than most consumer
loans or lines of credit.
• A credit card is different from a debit card in that the credit
card issuer lends the consumer money rather than having
the money removed from an account.
15
CREDIT CARD
• Credit card processing involves:
– Authorization - verifying the cardholder's account and credit limit
– Settlement - movement of the funds to the agency
– Reconciliation - verifying receipt of settlement funds
16
CREDIT CARD SYSTEM
• A credit card system should comprise at least three major
components, namely:
• credit application approval
• credit authorization
• posting of customer payment
18
SIX STEPS IN
CREDIT CARD TRANSACTION
Six steps in credit card transaction:
1 – Credit card swiped in terminal
2 – Cardholder and transaction details transferred to merchant’s
institution
3 – If card issued by different institution, details routed to card-
issuing firm
4 – Acceptance/Decline notification transferred to merchant’s
institution
5 – Acceptance/Decline sent to merchant
6 – Merchant verifies credit card signature
19
AUTHORIZATION AND
TRANSACTION FLOW
20
FACTORS AFFECTING THE
AUTHORIZATION PROCESS
Three major factors :
(1) Transaction volume
(2) Automatic authorization procedure
(3) The authorizers
21
LOST AND STOLEN
• Steps to follow to replace a lost or stolen credit card:
• Notify the bank / issuer immediately
• Destroy other cards on the account and all cash advance checks.
• Notify merchants who auto bill the account that your account
number will be changing
22
MEASURES TO
MITIGATE FRAUD RISKS
Some of the measures that financial institutions can take to minimize fraud
risks:
• Insist on direct and indirect sources to verify key information and data
• Zealously cross-verify the information and data given against a variety of
reliable sources
• Communicate constantly with application in their place of work or residence
• Ensure client has a good credit history with existing bankers by obtaining
documentary evidence such as original bank statements (not photostated
copies)
• Obtain personal references from reliable referees
• Obtain bankers’ reports
• Obtain income tax returns, i.e. EA forms and self assessment submissions
• Obtain relevant documents to verify the purpose of the loan
23