Fraud Examination Fifth Edition Chapter 15 Consumer Fraud

  • Slides: 25
Download presentation
Fraud Examination Fifth Edition Chapter 15 Consumer Fraud © 2019 Cengage. All rights reserved.

Fraud Examination Fifth Edition Chapter 15 Consumer Fraud © 2019 Cengage. All rights reserved.

Learning Objectives 1. Define what consumer fraud is and understand its seriousness. 2. Understand

Learning Objectives 1. Define what consumer fraud is and understand its seriousness. 2. Understand identity theft. 3. Classify the various types of investment and consumer frauds. © 2019 Cengage. All rights reserved.

Consumer Fraud (1 of 6) Definition – Any fraud that targets individuals as victims.

Consumer Fraud (1 of 6) Definition – Any fraud that targets individuals as victims. © 2019 Cengage. All rights reserved.

Consumer Fraud (2 of 6) Two Primary Types of Consumer Fraud 1. Identity Theft

Consumer Fraud (2 of 6) Two Primary Types of Consumer Fraud 1. Identity Theft – most common type of consumer fraud, affecting thousands of people everyday. 2. Consumer Scams – fraudsters use various schemes to earn consumer’s confidence and then use that confidence to get the consumer to pay or invest money or provide personal information. © 2019 Cengage. All rights reserved.

Consumer Fraud (3 of 6) Seriousness of the Problem The US Federal Trade Commission

Consumer Fraud (3 of 6) Seriousness of the Problem The US Federal Trade Commission released a statistical survey in April 2013 with the following findings: • • Nearly 25 million adults— 10. 8% of the adult population— were victims of fraud during 2011. 17% of African Americans were victims 13. 4% of Hispanics were victims 9% of non-Hispanic whites were victims © 2019 Cengage. All rights reserved.

Consumer Fraud (4 of 6) Numbers of Victims in the Top 5 Frauds 1.

Consumer Fraud (4 of 6) Numbers of Victims in the Top 5 Frauds 1. Fraudulent weight-loss products – 5. 1 million 2. Prize promotions – 2. 4 million 3. Unauthorized billing-buyers’ clubs – 1. 9 million 4. Unauthorized billing-Internet services – 1. 9 million 5. Work-at-home programs – 1. 8 million © 2019 Cengage. All rights reserved.

Consumer Fraud (5 of 6) © 2019 Cengage. All rights reserved.

Consumer Fraud (5 of 6) © 2019 Cengage. All rights reserved.

Consumer Fraud (6 of 6) US FTC’s Response to Consumer Fraud Consumer Sentinel –

Consumer Fraud (6 of 6) US FTC’s Response to Consumer Fraud Consumer Sentinel – a complaint database developed by the US Federal Trade Commission that tracks information about consumer fraud and identity theft and makes it available to law enforcement partners across the US and Canada. www. sentinel. gov © 2019 Cengage. All rights reserved.

Identity Theft (1 of 9) • Identity theft is used describe those circumstances when

Identity Theft (1 of 9) • Identity theft is used describe those circumstances when someone uses another person’s name, address, Social Security number (SSN), bank or credit card account number, or other identifying information to commit fraud or other crimes. • 25% of the frauds reported to the FTC over the last few years have involved some type of identity theft. © 2019 Cengage. All rights reserved.

Identity Theft Cycle © 2019 Cengage. All rights reserved.

Identity Theft Cycle © 2019 Cengage. All rights reserved.

Identity Theft (2 of 9) How Identity Theft Occurs Stage 1: Discovery Gaining Information

Identity Theft (2 of 9) How Identity Theft Occurs Stage 1: Discovery Gaining Information Phase: • • Searching trash Stealing mail Phishing Scanning credit card information Information Verification Phase: • • Telephone scams (Pretexting) Trash searches © 2019 Cengage. All rights reserved.

Identity Theft (3 of 9) Stage 2: Action Accumulating Documentation Phase: – Perpetrator gets

Identity Theft (3 of 9) Stage 2: Action Accumulating Documentation Phase: – Perpetrator gets the tools to commit the fraud (applying for credit cards, a driver’s license, or fake check in the victim’s name) Cover-up or Concealment Actions Phase: – Perpetrator takes steps to hide or cover the financial footprints left throughout the identity theft process. – Example: Changing the billing address on a credit card so that the statements go to the fraudster’s address. © 2019 Cengage. All rights reserved.

Identity Theft (4 of 9) Stage 3: Trial 1 st Dimensional Actions Phase: –

Identity Theft (4 of 9) Stage 3: Trial 1 st Dimensional Actions Phase: – First attempts to test the stolen information. – If the test works, the fraudster attempts more 2 nd Dimensional Actions Phase: – Actions taken after the tests are successful – The fraudster usually attempts face-to-face transactions 3 rd Dimensional Actions Phase: – Fraudster opens bank accounts, establishes phone accounts, secures auto loans, and so on © 2019 Cengage. All rights reserved.

Identity Theft (5 of 9) Personal Information Financial Gain The perpetrator may… • •

Identity Theft (5 of 9) Personal Information Financial Gain The perpetrator may… • • • Buy large-ticket items Take out car, home, or other loans Establish phone or wireless services Use counterfeit checks or debit cards Open new bank accounts File for bankruptcy Report victim’s name to police Open new credit card accounts Change victim’s mailing address © 2019 Cengage. All rights reserved.

Identity Theft (6 of 9) Stealing a Victim’s Identity • Shoulder Surfing • Dumpster

Identity Theft (6 of 9) Stealing a Victim’s Identity • Shoulder Surfing • Dumpster diving • Skimming • Gathering information from businesses • Stealing wallets/purses • Sneak into a victim’s home and steal information • Steal mail • Phishing © 2019 Cengage. All rights reserved.

Identity Theft (7 of 9) Minimizing the Risk • Guard your mail from theft

Identity Theft (7 of 9) Minimizing the Risk • Guard your mail from theft • Opt out of preapproved credit cards • Check you personal credit information at least annually • Protect Social Security card and number • Safeguard all personal information • Guard trash from theft • Protect wallet and other valuables • Protect the home, computer, passwords © 2019 Cengage. All rights reserved.

Identity Theft (8 of 9) • Prosecution of Identity Theft – When identity theft

Identity Theft (8 of 9) • Prosecution of Identity Theft – When identity theft is committed, the perpetrator can be prosecuted criminally and/or civilly. – For prosecution, it is necessary to show the perpetrator acted with intent to defraud—usually easy to prove if evidence of the fake identity used to purchase an item, open an account, or obtain a credit card is collected. © 2019 Cengage. All rights reserved.

Identity Theft (9 of 9) Once Identity Theft Occurs Victims should… – – –

Identity Theft (9 of 9) Once Identity Theft Occurs Victims should… – – – – Contact the Federal Trade Commission Contact local FBI and/or US Secret Service agencies Contact the local Postal Inspection Service Contact the Internal Revenue Service Contact the Social Security Administration Contact the credit reporting agencies Contact personal financial institutions Change personal identification information © 2019 Cengage. All rights reserved.

Consumer &Investment Scams (1 of 6) Foreign Advance-Fee Scams • Nigerian money offers •

Consumer &Investment Scams (1 of 6) Foreign Advance-Fee Scams • Nigerian money offers • Clearinghouse scam • Purchase of real estate scam • Sale of crude oil at below market price • Disbursement of money from wills © 2019 Cengage. All rights reserved.

Consumer &Investment Scams (2 of 6) © 2019 Cengage. All rights reserved.

Consumer &Investment Scams (2 of 6) © 2019 Cengage. All rights reserved.

Consumer &Investment Scams (3 of 6) Work-at-Home Schemes • Multilevel Marketing • Pyramid Scheme

Consumer &Investment Scams (3 of 6) Work-at-Home Schemes • Multilevel Marketing • Pyramid Scheme • Chain Letter, Mail Stuffing, Product Testing, and Craft Assembly © 2019 Cengage. All rights reserved.

Consumer &Investment Scams (4 of 6) Bogus Mystery Shopping Scams • Perpetrators promise victims

Consumer &Investment Scams (4 of 6) Bogus Mystery Shopping Scams • Perpetrators promise victims a job to stroll through stores, enjoy the displays, shop for merchandise, and file reports about their experiences. • Fraudsters promise victims compensation ranging from $10–$40 an hour, plus the opportunity to keep all products evaluated. • Although some mystery shoppers’ advertisements are legitimate, the majority are not. Usually victims are conned out of “application charge. ” © 2019 Cengage. All rights reserved.

Consumer &Investment Scams (5 of 6) Telemarketing Frauds • Fraudsters set up giant rooms

Consumer &Investment Scams (5 of 6) Telemarketing Frauds • Fraudsters set up giant rooms (referred to as boiler rooms) in rented offices where they train salespeople to find and defraud victims • Move from city to city using different names • Unwary investors lose about $1 million every hour to investment fraud promoted over the telephone • Elderly are more susceptible to telemarketing fraud than almost and other type of fraud. © 2019 Cengage. All rights reserved.

Consumer &Investment Scams (6 of 6) • Safeguards Against Telemarketing Frauds – Never give

Consumer &Investment Scams (6 of 6) • Safeguards Against Telemarketing Frauds – Never give a Social Security, credit card, or other information over the phone unless you initiate the call. – Put your information on the “do not call” registry © 2019 Cengage. All rights reserved.

Investment/Consumer Scams Investment Scams • Unreasonably high or guaranteed rates of return • Investments

Investment/Consumer Scams Investment Scams • Unreasonably high or guaranteed rates of return • Investments that do not make sound business sense • Pressure to get in early on the investment • Use of a special tax loophole or a tax avoidance scheme • A business with a history of bankruptcy or scandals © 2019 Cengage. All rights reserved.