SlideShare une entreprise Scribd logo
1  sur  44
Welcome to the Financial Management Institute 
WednesWdaye, Fbeibnruaarry 12, 2014 1:00pm EST 
I.D. Theft: Fallout, 
Investigation, and 
Prevention
Panel: 
• Jennifer Fiddian-Green, CPA, CA-IFA, 
CMA, CFI, CFE, CAMS, Forensic 
Accounting, Investigations and Anti-Money 
Laundering, Grant Thornton LLP Canada 
• Dt. Ian Nichol, Detective at Toronto Police 
Service Financial Crimes Unit 
Moderator: 
• Lori Glen, FBMC Executive Coordinator at 
Ministry of Finance, Government of Ontario
Who’s Collecting Your Data? 
Do you Trust them? 
Jennifer Fiddian- 
Green 
Partner, Grant Thornton
Identity Theft and Mortgage Fraud 
• Received call from mortgage 
company collector: 'late on payments 
and where was the money?' 
• Two properties, each with a 
mortgage, located in Brantford, 
Ontario 
• Together likely worth about $360,000; 
registered mortgages totaled 
$494,060
Identity Theft and Mortgage Fraud 
• Two different financing companies lent 
money to organized group using my name 
and SIN number. 
• No actual interaction with the ‘customer’- 
transaction completed through phone call, 
fax, and mortgage broker. 
• Other than name and SIN, all other 
information on file was false.
Equifax and TransUnion 
• Obtained reports electronically from 
websites… 
• Concern immediately was the number of 
organizations who had accessed credit 
information (as opposed to there being a 
lot of credit accounts that I was not familiar 
with)
Attempts Made to Obtain Financing 
Interestingly… I identified 12 attempts to 
use my credit to obtain financing, only 2 
attempts were successful. What happened 
in the other 10 cases? 
Fraudsters learned with each attempt made (but the 
last two were not the successful two). The application 
did get better and better. In the beginning the 
‘FiddianGreen’ application was likely not that 
sophisticated
How can you be aware of the damage 
 Any number of things can have already 
occurred: 
• Money is withdrawn or transferred 
• New accounts or loans have been created 
• Credit cards or any goods & services ordered. 
• Retail purchases 
 Damage to credit records and 
other negative impact can 
be irreversible
Signs of being victimized 
 Creditors mentioning and requesting funds for 
unknown loans 
 Notices of denied applications or other letters 
hinting at unknown activities 
 Bills for goods and services 
 Missing statements or mail indicating that 
correspondence is being diverted 
 Banks contacting by email or telephone, 
indicating to go to branch and get a new card
How Easy is it to Obtain the Personal 
Information… 
• Theft of mail/mail diversion 
– Completing a change of address form 
– New cheques, bank and credit card statements, promotional offers 
– Tax information/forms 
• Organizations, government, businesses and institutions 
– Stealing/hacking information from employer: data on servers, screen shots, 
photos 
– Thieves infiltrate as employees 
– Bribing targeted employees who have access to records 
– Social engineering - “conning” information out of employees 
– "Lost" data as it is couriered, transported between locations 
• Theft of credit or debit card numbers 
– “skimming” - capturing cardholder information in a data storage device
How Easy is it to Obtain the Personal 
Information… 
• Courier carriers- lost data after pick up 
• Credit reports 
– abusing their authorized access from their employer 
– posing as a landlord, employer, or someone else who may have a legal right to 
access your report 
• “Dumpster diving” 
– rummaging through trash and dumps 
• Physical theft of wallets, purses, electronic 
storage devices, house break-ins
…the Data is Accessible, So Many 
Sources… 
• IT servers, where are these today? 
Outsourced operations, CLOUD computing 
• Garbage, recycling, 'secure' document 
destruction 
• “Phishing” and “pretexting” 
– Theft of personal information by posing as legitimate companies claiming 
that you have a problem with your account. Telephone and 
computer/email 
• Keystroke logging, data copiers
The Bigger Picture 
• The integrity and credibility of our 
systems is essential, foundational. We 
need to be diligent 
• Protection of personal information is 
paramount: Organizations, credit 
bureaus. businesses, government need to 
be vigilant! 
• Lending organizations need to be 
proactive in work undertaken to know 
their customer 
• Managing fraud risk costs money. Where
Visiting the Two Mortgage Companies 
• CIBC issued the mortgage using their 
‘Firstline’ branding, I was a legitimate 
customer at the time 
• Other company- non-conforming mortgage 
company, they called me looking for 
payment, same broker had 2 other deals 
that resulted in ID theft, appears she was 
targeted by fraudsters 
• Understand that both of these companies 
are victims.. But also unwitting enablers!
Calling the Seller! 
• Within about three days I had reached a 
point where I knew (or thought!) the next 
step was to contact the seller of the 
properties 
• Same name in each case- ‘the husband’
How Could This Happen? 
• Financing/lending companies 
• Appraisers 
• Lawyers 
• Mortgage Brokers 
• Real Estate Brokers 
• Credit Agencies 
• Land Registry Offices 
• Hot real estate market, increasing prices
So it’s about information 
Minimum amount of information to impersonate someone 
is simply a name but access to the following can cause 
real damage 
 Full name 
 Date of birth 
 Social Insurance Numbers 
 Full address 
 Mother’s maiden name 
 Username/password for 
Web sites
Observations on Identity 
Theft 
Detective Ian Nichol 
Toronto Police 
Service 
Financial Crimes Unit
Identity Theft Provision: Bill S-4 
• Enacted January 8, 2010 
• Recognized identity theft was not 
sufficiently addressed in Criminal Code 
• Created new offences for acts that were 
related to fraud/personation, but not 
specifically illegal. 
• Electronic interception now authorized for 
offences related to forgery, identity 
documents, and personation
New Offences Created 
• Identity theft & Trafficking of Identity 
Information 
• Personation to avoid arrest, prosecution, or 
obstruct justice 
• Possession & trafficking of forged documents 
• Make, repair, trafficking of forgery 
instruments, credit card forgery devices 
• Possession Canada Post mailbox key 
• Fraudulent re-direction of mail
Toronto Police Service & Identity Theft 
• Individual offences investigated at Divisional 
level 
• Criminal organizations dedicated to identity 
theft investigated by Financial Crimes Unit, 
Organized Crime Section 
• Charge of Participation in Criminal 
Organization seldom laid 
• Most identity theft investigations relate to 
Criminal Organizations, but not investigated 
as such
Typical Investigations by FCU/OC 
• True name identity theft 
• Complicit identity theft 
• Payment card cloning 
• Profile creation. (Not identity theft, but 
identity creation)
True Name Identity Theft 
• Account take-overs 
• True-name false account applications 
• “Creations” from true identity 
• Fraudulent advance tax returns 
• Title theft 
• Vehicle lease/theft 
• Immigration fraud 
• Warrant avoidance 
• Avoidance of travel restrictions 
• Laundering proceeds of crime
Complicit Identity Theft 
• Ex-patriots returning home, sell identity for 
exploitation 
• Allow account take-over & feign being 
“victim”
Payment Card Cloning 
• Identity information (card data/PIN’s) 
unlawfully obtained through ATM/POS 
tampering, server breach, hacking 
• Forged payment cards produced and 
utilized. (Victim’s inconvenienced, but 
usually assume no losses) 
• “Identity Theft Light”
Identity theft is usually a group effort
Connectors & Brokers 
• Middlemen with connections to persons with 
access to identity information, provide 
“players” with info sought 
• Continuously developing new contacts within 
financial community, other private sector, and 
government. (wine + dine/pay per “profile”) 
• Treat Identity information as a commodity. 
• May do so in person, or via web 
• Generally ID info is sold in “bulk”
Persons with access to Identity 
Information 
• Bank employees 
• Other corporate employees 
• Government employees 
• Other persons with access (Doctors office, 
insurance companies, etc.)
C-phone on bank call-taker when 
arrested
Crew leaders directing “runners”
Forgers are required
Organized crime versus networks in GTA 
• Some operate within loose networks who 
maintain connections, but not aligned with 
any particular group 
• Others clearly operating within criminal 
organizations, many of which are based 
outside of Canada
Web enabled criminality 
• Players rely heavily on underground web 
for ID information 
• Ability to network greatly enhanced 
• Players operate internationally 
• Multi-national investigations pose 
problems for law enforcement
• Ability to operate enhanced by web based 
applications that allow call spoofing, I.P. 
spoofing, ID shopping 
• Ability to operate internationally 
• Web utilized for money laundering
Hamond JINADU’s “research”
Money laundering sites 
Closed by US Secret Service
Call spoofing site
I.P. Spoofing Site
Skype Message to accused in 
Toronto, from runner in Chile
About Prevention of Identity Theft 
• Tolerance of identity theft is incentivized 
• Those in a position to counter identity theft 
actually realize financial benefit if they 
allow it. (Retailers, used car dealers, 
jewellers 
• If approval for suspect transaction is 
obtained, they get paid. No incentive to 
exists detect or deter fraud
Social Attitudes 
• “No blood, no foul” 
• Non-violent, therefore, not important 
• High level of tolerance towards fraud. 
Banks perceived as enemies. “Victims will 
get their money back”
Recent Identity Theft Investigations 
(Crim. Org Laid) 
• R v MARINOV et al (Project Holiday) 
• R v JINADU (Project Easy) 
• R v RAMASAMY (Project Rocket)
Questions and 
Answers 
Be sure to tune in to next month’s webinar! 
• “Reflections from an International Financial Management 
Professional” 
• Presenter: Kevin Ross 
• Tuesday, March 4th, 2014

Contenu connexe

Tendances

Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 

Tendances (20)

Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 

Similaire à Financial Management Institute Webinar on ID Theft Prevention

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...Steven Wardell
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Management Insights LLC
 
Payroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic AccountantPayroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic AccountantRushmore Forensic
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 

Similaire à Financial Management Institute Webinar on ID Theft Prevention (20)

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 
Payroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic AccountantPayroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic Accountant
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 

Plus de fmi_igf

''Lean'' for Internal Audit
''Lean'' for Internal Audit''Lean'' for Internal Audit
''Lean'' for Internal Auditfmi_igf
 
PPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning EventPPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning Eventfmi_igf
 
Costing Centre of Expertise
Costing Centre of ExpertiseCosting Centre of Expertise
Costing Centre of Expertisefmi_igf
 
Operational Capacity Analysis
Operational Capacity AnalysisOperational Capacity Analysis
Operational Capacity Analysisfmi_igf
 
Operational Costing and Capacity Management
Operational Costing and Capacity ManagementOperational Costing and Capacity Management
Operational Costing and Capacity Managementfmi_igf
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Big data roundtabe intro - canada
Big data roundtabe intro - canadaBig data roundtabe intro - canada
Big data roundtabe intro - canadafmi_igf
 
Communication pendant un conflit
Communication pendant un conflitCommunication pendant un conflit
Communication pendant un conflitfmi_igf
 
Communication durant
Communication durant Communication durant
Communication durant fmi_igf
 
Full Slide Deck
Full Slide DeckFull Slide Deck
Full Slide Deckfmi_igf
 
Webinar slides 2014-12-11
Webinar slides 2014-12-11Webinar slides 2014-12-11
Webinar slides 2014-12-11fmi_igf
 
New Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance ExcellenceNew Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance Excellencefmi_igf
 
Performance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational GoalsPerformance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational Goalsfmi_igf
 
Gestion Du Changement
Gestion Du ChangementGestion Du Changement
Gestion Du Changementfmi_igf
 
L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances fmi_igf
 
Reflections from an International Financial Management Professional
Reflections from an International Financial Management ProfessionalReflections from an International Financial Management Professional
Reflections from an International Financial Management Professionalfmi_igf
 
Chief Financial Officer Attestation
Chief Financial Officer AttestationChief Financial Officer Attestation
Chief Financial Officer Attestationfmi_igf
 
Change Management
Change ManagementChange Management
Change Managementfmi_igf
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sectorfmi_igf
 
2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shiftfmi_igf
 

Plus de fmi_igf (20)

''Lean'' for Internal Audit
''Lean'' for Internal Audit''Lean'' for Internal Audit
''Lean'' for Internal Audit
 
PPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning EventPPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning Event
 
Costing Centre of Expertise
Costing Centre of ExpertiseCosting Centre of Expertise
Costing Centre of Expertise
 
Operational Capacity Analysis
Operational Capacity AnalysisOperational Capacity Analysis
Operational Capacity Analysis
 
Operational Costing and Capacity Management
Operational Costing and Capacity ManagementOperational Costing and Capacity Management
Operational Costing and Capacity Management
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Big data roundtabe intro - canada
Big data roundtabe intro - canadaBig data roundtabe intro - canada
Big data roundtabe intro - canada
 
Communication pendant un conflit
Communication pendant un conflitCommunication pendant un conflit
Communication pendant un conflit
 
Communication durant
Communication durant Communication durant
Communication durant
 
Full Slide Deck
Full Slide DeckFull Slide Deck
Full Slide Deck
 
Webinar slides 2014-12-11
Webinar slides 2014-12-11Webinar slides 2014-12-11
Webinar slides 2014-12-11
 
New Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance ExcellenceNew Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance Excellence
 
Performance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational GoalsPerformance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational Goals
 
Gestion Du Changement
Gestion Du ChangementGestion Du Changement
Gestion Du Changement
 
L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances
 
Reflections from an International Financial Management Professional
Reflections from an International Financial Management ProfessionalReflections from an International Financial Management Professional
Reflections from an International Financial Management Professional
 
Chief Financial Officer Attestation
Chief Financial Officer AttestationChief Financial Officer Attestation
Chief Financial Officer Attestation
 
Change Management
Change ManagementChange Management
Change Management
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
 
2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift
 

Dernier

Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...tanu pandey
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...tanu pandey
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Dernier (20)

Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 

Financial Management Institute Webinar on ID Theft Prevention

  • 1. Welcome to the Financial Management Institute WednesWdaye, Fbeibnruaarry 12, 2014 1:00pm EST I.D. Theft: Fallout, Investigation, and Prevention
  • 2. Panel: • Jennifer Fiddian-Green, CPA, CA-IFA, CMA, CFI, CFE, CAMS, Forensic Accounting, Investigations and Anti-Money Laundering, Grant Thornton LLP Canada • Dt. Ian Nichol, Detective at Toronto Police Service Financial Crimes Unit Moderator: • Lori Glen, FBMC Executive Coordinator at Ministry of Finance, Government of Ontario
  • 3. Who’s Collecting Your Data? Do you Trust them? Jennifer Fiddian- Green Partner, Grant Thornton
  • 4. Identity Theft and Mortgage Fraud • Received call from mortgage company collector: 'late on payments and where was the money?' • Two properties, each with a mortgage, located in Brantford, Ontario • Together likely worth about $360,000; registered mortgages totaled $494,060
  • 5. Identity Theft and Mortgage Fraud • Two different financing companies lent money to organized group using my name and SIN number. • No actual interaction with the ‘customer’- transaction completed through phone call, fax, and mortgage broker. • Other than name and SIN, all other information on file was false.
  • 6. Equifax and TransUnion • Obtained reports electronically from websites… • Concern immediately was the number of organizations who had accessed credit information (as opposed to there being a lot of credit accounts that I was not familiar with)
  • 7. Attempts Made to Obtain Financing Interestingly… I identified 12 attempts to use my credit to obtain financing, only 2 attempts were successful. What happened in the other 10 cases? Fraudsters learned with each attempt made (but the last two were not the successful two). The application did get better and better. In the beginning the ‘FiddianGreen’ application was likely not that sophisticated
  • 8. How can you be aware of the damage  Any number of things can have already occurred: • Money is withdrawn or transferred • New accounts or loans have been created • Credit cards or any goods & services ordered. • Retail purchases  Damage to credit records and other negative impact can be irreversible
  • 9. Signs of being victimized  Creditors mentioning and requesting funds for unknown loans  Notices of denied applications or other letters hinting at unknown activities  Bills for goods and services  Missing statements or mail indicating that correspondence is being diverted  Banks contacting by email or telephone, indicating to go to branch and get a new card
  • 10. How Easy is it to Obtain the Personal Information… • Theft of mail/mail diversion – Completing a change of address form – New cheques, bank and credit card statements, promotional offers – Tax information/forms • Organizations, government, businesses and institutions – Stealing/hacking information from employer: data on servers, screen shots, photos – Thieves infiltrate as employees – Bribing targeted employees who have access to records – Social engineering - “conning” information out of employees – "Lost" data as it is couriered, transported between locations • Theft of credit or debit card numbers – “skimming” - capturing cardholder information in a data storage device
  • 11. How Easy is it to Obtain the Personal Information… • Courier carriers- lost data after pick up • Credit reports – abusing their authorized access from their employer – posing as a landlord, employer, or someone else who may have a legal right to access your report • “Dumpster diving” – rummaging through trash and dumps • Physical theft of wallets, purses, electronic storage devices, house break-ins
  • 12. …the Data is Accessible, So Many Sources… • IT servers, where are these today? Outsourced operations, CLOUD computing • Garbage, recycling, 'secure' document destruction • “Phishing” and “pretexting” – Theft of personal information by posing as legitimate companies claiming that you have a problem with your account. Telephone and computer/email • Keystroke logging, data copiers
  • 13. The Bigger Picture • The integrity and credibility of our systems is essential, foundational. We need to be diligent • Protection of personal information is paramount: Organizations, credit bureaus. businesses, government need to be vigilant! • Lending organizations need to be proactive in work undertaken to know their customer • Managing fraud risk costs money. Where
  • 14. Visiting the Two Mortgage Companies • CIBC issued the mortgage using their ‘Firstline’ branding, I was a legitimate customer at the time • Other company- non-conforming mortgage company, they called me looking for payment, same broker had 2 other deals that resulted in ID theft, appears she was targeted by fraudsters • Understand that both of these companies are victims.. But also unwitting enablers!
  • 15. Calling the Seller! • Within about three days I had reached a point where I knew (or thought!) the next step was to contact the seller of the properties • Same name in each case- ‘the husband’
  • 16. How Could This Happen? • Financing/lending companies • Appraisers • Lawyers • Mortgage Brokers • Real Estate Brokers • Credit Agencies • Land Registry Offices • Hot real estate market, increasing prices
  • 17. So it’s about information Minimum amount of information to impersonate someone is simply a name but access to the following can cause real damage  Full name  Date of birth  Social Insurance Numbers  Full address  Mother’s maiden name  Username/password for Web sites
  • 18. Observations on Identity Theft Detective Ian Nichol Toronto Police Service Financial Crimes Unit
  • 19. Identity Theft Provision: Bill S-4 • Enacted January 8, 2010 • Recognized identity theft was not sufficiently addressed in Criminal Code • Created new offences for acts that were related to fraud/personation, but not specifically illegal. • Electronic interception now authorized for offences related to forgery, identity documents, and personation
  • 20. New Offences Created • Identity theft & Trafficking of Identity Information • Personation to avoid arrest, prosecution, or obstruct justice • Possession & trafficking of forged documents • Make, repair, trafficking of forgery instruments, credit card forgery devices • Possession Canada Post mailbox key • Fraudulent re-direction of mail
  • 21. Toronto Police Service & Identity Theft • Individual offences investigated at Divisional level • Criminal organizations dedicated to identity theft investigated by Financial Crimes Unit, Organized Crime Section • Charge of Participation in Criminal Organization seldom laid • Most identity theft investigations relate to Criminal Organizations, but not investigated as such
  • 22. Typical Investigations by FCU/OC • True name identity theft • Complicit identity theft • Payment card cloning • Profile creation. (Not identity theft, but identity creation)
  • 23. True Name Identity Theft • Account take-overs • True-name false account applications • “Creations” from true identity • Fraudulent advance tax returns • Title theft • Vehicle lease/theft • Immigration fraud • Warrant avoidance • Avoidance of travel restrictions • Laundering proceeds of crime
  • 24. Complicit Identity Theft • Ex-patriots returning home, sell identity for exploitation • Allow account take-over & feign being “victim”
  • 25. Payment Card Cloning • Identity information (card data/PIN’s) unlawfully obtained through ATM/POS tampering, server breach, hacking • Forged payment cards produced and utilized. (Victim’s inconvenienced, but usually assume no losses) • “Identity Theft Light”
  • 26. Identity theft is usually a group effort
  • 27. Connectors & Brokers • Middlemen with connections to persons with access to identity information, provide “players” with info sought • Continuously developing new contacts within financial community, other private sector, and government. (wine + dine/pay per “profile”) • Treat Identity information as a commodity. • May do so in person, or via web • Generally ID info is sold in “bulk”
  • 28. Persons with access to Identity Information • Bank employees • Other corporate employees • Government employees • Other persons with access (Doctors office, insurance companies, etc.)
  • 29.
  • 30. C-phone on bank call-taker when arrested
  • 31. Crew leaders directing “runners”
  • 33. Organized crime versus networks in GTA • Some operate within loose networks who maintain connections, but not aligned with any particular group • Others clearly operating within criminal organizations, many of which are based outside of Canada
  • 34. Web enabled criminality • Players rely heavily on underground web for ID information • Ability to network greatly enhanced • Players operate internationally • Multi-national investigations pose problems for law enforcement
  • 35. • Ability to operate enhanced by web based applications that allow call spoofing, I.P. spoofing, ID shopping • Ability to operate internationally • Web utilized for money laundering
  • 37. Money laundering sites Closed by US Secret Service
  • 40. Skype Message to accused in Toronto, from runner in Chile
  • 41. About Prevention of Identity Theft • Tolerance of identity theft is incentivized • Those in a position to counter identity theft actually realize financial benefit if they allow it. (Retailers, used car dealers, jewellers • If approval for suspect transaction is obtained, they get paid. No incentive to exists detect or deter fraud
  • 42. Social Attitudes • “No blood, no foul” • Non-violent, therefore, not important • High level of tolerance towards fraud. Banks perceived as enemies. “Victims will get their money back”
  • 43. Recent Identity Theft Investigations (Crim. Org Laid) • R v MARINOV et al (Project Holiday) • R v JINADU (Project Easy) • R v RAMASAMY (Project Rocket)
  • 44. Questions and Answers Be sure to tune in to next month’s webinar! • “Reflections from an International Financial Management Professional” • Presenter: Kevin Ross • Tuesday, March 4th, 2014