53
8/10/2019 Id Theft 11_508 Final http://slidepdf.com/reader/full/id-theft-11508-final 1/53

Id Theft 11_508 Final

Embed Size (px)

Citation preview

Page 1: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 1/53

Page 2: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 2/53

iIdentity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Identity The Trends, Pa erns, and Typologies

Based on Suspicious Activity Reports

Filed by the Securities and Futures Industries January 1, 2005 – December 31, 2010

September 2011

Page 3: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 3/53

iiIdentity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Table of ContentsINTRODUCTION 1

EXECUTIVE SUMMARY 2METHODOLOGY 4

GENERAL STATISTICS 5

ACTORS 6

Filers 6

Incidence 6

Geography 6

Business Activities 7

Subjects 9

Incidence & Geography 9

Subject Intent and Relationship to Victim 13

Victims 13

TYPOLOGIES, TRENDS, AND PATTERNS 14

Co-Reported Characterizations of Suspicious Activity 14

ACH Fraud 15

Computer Intrusion 15

Check Fraud 15

Debit Card Fraud 16

Other Characterizations of Suspicious Activity 16

Account Abuse Scenarios 17

Investment Account Abuse 18

Direct The of Funds 18

Securities Trades 20

Market Manipulation 22

Instruments 25

Speci c Types of Investment Accounts 26

Page 4: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 4/53

iiiIdentity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Depository Account Abuse 28

Account Status Preference 28

Identity The Facilitation 29

Means of Contact 29

Means of Computer Intrusion 30

Unauthorized Alteration of Account Information 30

Relationships 31

Internet Work Scams & Unwi ing Participants 31

Di erent Victims, Same Thieves 32

Identity The /Financial Fraud Rings 32

Customer and Employee Database Breaches 33

Discovery 34Mitigation 34

Time Elapsed Between Last Identi ed Suspicious Activity and Discovery 35

Identity The Red Flags 36

Reported Cooperation between the Filer andOther A ected Financial Institutions 38

Filings of Special Note 38

A empts to Keep Fraud Hidden 38

Corporate Identity The 39

Insider Identity Thieves 39

Mail The 40

Database Breaches 40

Stolen or Forged Documents 41

Computer Intrusion 41

Prepaid Cards 42

Tax Evasion & Money Laundering 42Market Manipulation 43

Abuse of Promotional Account Features 43

Other 44

Page 5: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 5/53

ivIdentity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

BEST PRACTICES 45

Filer Treatment of New Accounts 45

Ongoing Filer Assurance of Customer Account Security 45

Addressing Speci c Risks 46

NEXT STEPS 47

Page 6: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 6/53

1Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

This report focuses on identity the in the securities and futures industries. Based on

Suspicious Activity Report by the Securities and Futures Industries (SAR-SF) lings,it describes recent pa erns and trends of SAR-SF reporting and identi es methods by which identity thieves may access and abuse investment, retirement, and trustaccounts to defraud individual account holders and/or securities rms.

FinCEN added identity the as a characterization of suspicious activity on the SAR-SF form in May 2004 following an increase in the reporting of this type of activity.This study is based on SAR-SF lings made between 2005 and 2010. It complementsan October 2010 FinCEN report that described, in part, ways that identity thievesreportedly defraud individuals and depository institutions by gaining unauthorized

access to credit cards, loans, and depository accounts.1

See1. Identity The –Trends, Pa erns, and Typologies Reported in Suspicious Activity Reports Filed byDepository Institutions, October 2010 , available ath p://www. ncen.gov/news_room/rp/reports/pdf/ID%20The .pdf .

INTRODUCTION

Page 7: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 7/53

2Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

EXECUTIVE SUMMARY • The number of SAR-SFs reporting identity the grew by 89 percent from 2005

to 2010, and nearly 13 percent of all SAR-SF lings over the 6-year period inpart characterized the reported activity as identity the . 2 However, because thenumber of all SAR-SF lings grew by over 170 percent during the same period,the proportion of all SAR-SFs referencing identity the declined from about 15percent in 2005 to somewhat less than 10.5 percent in 2010.

• Over 86 percent of SAR-SF lings that either characterized identity the ormentioned identity the in the narrative section described apparent identitythe . Most of the remainder of sample lings described possible identity the , but absent contact with the apparent victim could not be considered as such. 3

• Wire fraud, virtually always described as Automated Clearing House (ACH)fraud, was the suspicious activity characterization most frequently co-reportedwith identity the , appearing in nearly 53 percent of the relevant sample lings. 4 Over 31 percent of lings reported that unauthorized ACH transfers were usedto shi funds from victim investment accounts to depository accounts controlled by thieves. Just over 24 percent of lings reported thieves used unauthorizedACH transfers to move money from victim depository accounts to unauthorizednew investment accounts the thieves set up using stolen identi ers.

• Identity thieves reportedly employed computer intrusion in over 39 percentof sample lings to both facilitate collection of victim identi ers and to initiateunauthorized transactions. However, reporting of computer intrusion declinedsteeply a er the second quarter of 2008.

• Although the general public’s use of checks is declining, identity thieves usedchecks to promote nancial fraud in nearly 16 percent of sample lings, and thetrend in reports of thieves’ check use increased modestly. Just over 6 percent oflings reported identity thieves used debit cards to steal funds, and both debitcard usage and dollar loss trends moved strongly up.

FinCEN read a random sample of identity the associated SAR-SF lings submi ed between January2.1, 2005, and December 31, 2010.

This report uses the term “victim” to describe an individual whose identity was stolen, whether or3.not the thief ultimately bene ed from using the identi ers. “Victims” and their nancial institutionsmay both su er losses from nancial fraud facilitated by the stolen identi ers.

Each SAR-SF ling may report multiple suspicious activity characterizations.4.

Page 8: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 8/53

3Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

• The main thrust of nancial fraud associated with investment accounts was thedirect the of funds from victim accounts. Nonetheless, between the fourthquarter of 2006 and the rst quarter of 2008, 20-40 percent of quarterly lingsreported thieves a empting to manipulate the share values of thinly-tradedsecurities with funds stolen from the investment and/or depository accounts ofidentity the victims.

• Quarterly sample data highlights the thieves’ growing success rate in the directthe of funds from victim accounts; data associated with unauthorized tradingin victim investment accounts indicates generally successful outcomes over thewhole study period.

• About 90 percent of study lings reported the abuse of an existing legitimateinvestment account or the unauthorized set up of a new investment accountusing stolen identi ers. Most a ected investment accounts referenced in the

sample were standard individual accounts. However, over 16 percent of lingsreported one or more a ected retirement accounts, and over 2 percent reporteda ected individual or family trust accounts. Reporting trends associated with both retirement and trust accounts were up markedly.

• During most of the 2005-2010 study period, identity thieves reportedly showeda preference for taking over existing legitimate investment accounts rather thanse ing up new unauthorized accounts using stolen identi ers. This preferenceappears to relate to the greater level of scrutiny investment rms place on newaccounts compared to the level they place on existing accounts.

• Study ndings identi ed novel typologies thieves use to commit fraud. Theseinclude use of Voice-over-Internet-Protocol phone numbers and telephone relayservices to mask their identities; use of stolen credit card numbers to temporarilyfund day trading and quick re-crediting of the charge account with a portionof the trading pro ts to hide the original the ; abuse of legitimate corporationnames to set up and drain unauthorized accounts funded with legitimate checksstolen from the mail; hacking of state sex o ender registries and use of o enders’identi ers to set up unauthorized accounts; use of university student identi ersto open investment accounts to evade taxes on investment earnings; use of

hundreds of sets of stolen identi ers to abuse investment company promotionalaccount features such as ATM fee refunds and cash bonuses for opening newaccounts; and feigning identity the to defraud nancial institutions that madetheir accounts whole following purportedly unauthorized transactions theaccount holders actually initiated themselves.

Page 9: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 9/53

4Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

METHODOLOGY For this study, FinCEN de ned identity the as using identifying information unique

to the rightful owner without the rightful owner’s permission. Unique identifyinginformation includes nancial account numbers, such as those used for depositoryaccounts, investments, loans, credit cards, or online payment accounts; o cially-issued federal or state identifying documents; and biometric information. Anindividual’s use of another person’s Social Security Number (SSN) or Individual TaxIdenti cation Number (ITIN) was considered identity the regardless of whetherthe individual knew whether, or to whom, the number was issued. Additionally,impersonation of an actual person without consent was considered identity theregardless of whether the impersonation occurred in person or through any othermedium, electronic or otherwise.

In identifying potential trends, FinCEN reached out to representatives of the BankSecrecy Act Advisory Group (BSAAG) 5 Securities and Futures Subcommi ee for inputas to the types of information industry would nd most useful in this report.

FinCEN analysts conducted database research to identify SAR-SF lings made between January 1, 2005 and December 31, 2010, in which lers checked the boxspecifying identity the as a characterization of suspicious activity. Analysts addeda small number of lings to the study population that speci cally mentioned identitythe in the SAR-SF narrative but did not characterize the activity as identity the by

inclusion of a check mark on the form.Unless otherwise noted, ndings were based upon the weighted combination ofdata results from two studies−the rst analyzing a random sample of lings received between January 1, 2005 and September 30, 2008, and the second analyzing a randomsample of lings received between October 1, 2008 and December 31, 2010. 6 Referencesthroughout the report to “relevant sample lings” refer to the approximately 86 percentof the sample lings that analysis determined describe apparent identity the .

The Annunzio-Wylie Anti-Money Laundering Act of 1992 required the Secretary of the Treasury5.

to establish the Bank Secrecy Act Advisory Group (“BSAAG”) as a forum for the nancial servicesindustry, law enforcement and regulators to advise the Secretary on ways to enhance the usefulnessof Bank Secrecy Act (“BSA”) reporting. Since 1994, the BSAAG has served as a forum for thesegroups to discuss the uses of Suspicious Activity Reports, Currency Transaction Reports, and otherBSA reports, and how recordkeeping and reporting requirements can be improved. The BSAAGutilizes a variety of permanent and ad hoc subcommi ees to identify and analyze relevant issues.

Weighting was determined based on the percentage of the whole identity the -characterized ling6.population each study sample represented.

Page 10: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 10/53

5Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

GENERAL STATISTICS

Graph 1 demonstrates that though the number of identity the -characterized SAR-SFlings grew signi cantly from 2005-2007, the numbers of such lings have remainedgenerally stable since. Conversely, the overall number of SAR-SF lings grewmarkedly during 2005-2009, and then modestly from 2009-2010. Consequently, SAR-SF lings characterizing identity the represented about 15 percent of all SAR-SFlings in 2005, but just less than 10.5 percent in 2010.

GRAPH 1

FinCEN determined that approximately 86 percent of sample lings describedidentity the . Most of the rest of the lings may also have described identity the ,though absent contact with the apparent victim, the ler could not determine whetherthe reported activities signaled identity the or customer a empts to commit fraud.

0 5,000 10,000 15,000 20,000

1,043

1,139

2,081

1,947

2,097

1,952

6,936

8,130

12,871

15,104

18,382

18,758

General SAR-SF Filings ID Theft SAR-SF Filings

2010

2009

2008

2007

2006

2005

Total SAR-SF Filings vs.Total Identity Theft-Characterized SAR-SF Filings

Page 11: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 11/53

6Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

ACTORSFilers

Incidence

The 1,395 sample lings that described identity the were submi ed by 160 distinctlers. The ve most proli c lers accounted for approximately 58.5 percent of theselings, while the top 10 lers accounted for nearly 70.5 percent.

Geography

Filer addresses spanned 27 states. Chart 1 provides a breakdown showing the

approximate percentage of the 160 distinct lers by state.7

CHART 1

Chart 2 indicates that together ler branch locations in California, Massachuse s,Nebraska, Virginia, Washington, and New Jersey submi ed about 77 percent of therelevant sample lings.

Chart 1 is based on the headquarters address of each distinct ler represented in the study sample.7.

Page 12: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 12/53

7Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

CHART 2

Business Activities

Table 1 displays how the 160 distinct lers identi ed their institution type(s). 8 As thetable shows, introducing brokers made up the highest proportion of lers.

TABLE 1

INSTITUTION TYPE

INCIDENCE OFDISTINCT FILERS

REPORTING

PERCENTAGE OFTOTAL DISTINCT

FILERS

Securities Broker - Introducing 67 41.88%Securities Broker - Clearing 35 21.88%Securities Dealer 31 19.38%Investment Company – Mutual Fund 26 16.25%Other 19 11.88%

Af liate of Bank Holding Company 15 9.38%Investment Adviser 11 6.88%Subsidiary of Bank 8 5.00%Futures Commission Merchant 7 4.38%LEFT BLANK 7 4.38%Market Maker 7 4.38%

Percentage of Total Sample Filings by Filer Branch State Location

CA30%

All Others

23%

MA

21%

NE

8%

VA

8%

WA

6%

NJ

4%

Most lers chose multiple institution types to describe their various business activities.8.

Page 13: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 13/53

8Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

INSTITUTION TYPE

INCIDENCE OFDISTINCT FILERS

REPORTING

PERCENTAGE OFTOTAL DISTINCT

FILERS

Securities Options Broker-Dealer 4 2.50%Municipal Securities Dealer 3 1.88%

Agricultural Trade Option Merchant 2 1.25%Securities Floor Broker 2 1.25%U.S. Government Broker-Dealer 2 1.25%Direct Participation Program 1 <1%Introducing Broker - Commodities 1 <1%

Table 2 ranks these institution types based upon the number of relevant sample lingsreporting them.

TABLE 2

INSTITUTION TYPE

INCIDENCEOF SAMPLE

FILINGS

PERCENTAGE OFTOTAL SAMPLE

FILINGS

Securities Broker - Clearing 661 47.38%Securities Broker - Introducing 531 38.06%Other 448 32.11%

Af liate of Bank Holding Company 376 26.95%Investment Company – Mutual Fund 263 18.85%Securities Dealer 243 17.42%Investment Adviser 157 11.25%Market Maker 145 10.39%Subsidiary of Bank 71 5.09%LEFT BLANK 24 1.72%Futures Commission Merchant 17 1.22%Securities Options Broker-Dealer 15 1.08%Municipal Securities Dealer 8 <1%

Agricultural Trade Option Merchant 5 <1%Introducing Broker – Commodities 5 <1%Securities Floor Broker 3 <1%U.S. Government Broker-Dealer 3 <1%Direct Participation Program 1 <1%

Page 14: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 14/53

9Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Subjects

Incidence & Geography

Graph 2 highlights the paucity of subjects reported within the whole population ofSAR-SF lings submi ed between 2005 and 2010 that characterize identity the .

GRAPH 2

To place these numbers in context, depository institution SAR lers reported anaverage of nearly one subject per SAR ling in the aforementioned October 2010study. The average for SAR-SF lers is almost certainly much lower becausemost investment transactions, whether legitimate or otherwise, are initiated andcompleted online or by phone, fax, or mail and rarely involve face-to-face contact withinvestment industry employees. In contrast, depository institution branch personnelare more likely to experience periodic face-to-face contact with the majority of their branch customers and other individuals intending to complete nancial transactions. 9

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

2005 2006 2007 2008 2009 2010

Average Subjects Reported perIdentity Theft-Characterized SAR-SF Filing by Year

The shape of the line in Graph 2 also appears to correlate with data presented later in the report9.

comparing the e ects of the apparently shi ing focus of thieves from the direct the of funds inthe earliest data, toward market manipulation in the mid study years, and back toward direct thein the newest data. Logically, a greater proportion of lings reporting market manipulation wouldcontribute to a lower number of identi able subjects since the thief who is a empting marketmanipulation is not generally moving money into or out of victimized accounts, and is thus notproviding any identi er such as account number or physical address to which stolen funds are to

be sent.

Page 15: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 15/53

10Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Analysis of the whole population of identity the characterized SAR-SF lingssubmi ed between 2005 and 2010 identi ed 3,506 individual and 55 business subjects.Though most of these were unique, lers reported about 2.5 percent of the individualsubjects in multiple lings. 10 Multiple institutions submi ed lings on the majority ofthese individuals.

Graph 3 highlights the continued predominance of California as the most frequentlyreported state of subject residence. Florida, New York, and Texas have traded placesfor ranks 2 through 4 over the course of the study period.

GRAPH 3

With respect to the most recent data, analysis of the whole population of 2010 SAR-SFlings bearing the identity the characterization (1,952 lings) identi ed 813 distinctsubjects with residences in the United States. Of these subjects, 32 were businesses. 11

0%

5%

10%

15%

20%

25%

CA FL NY TX

2005 2006 2007 2008 2009 2010

Most Frequently Reported Subject Residence States as an AnnualPercentage of All Identity Theft-Characterized SAR-SF Filings

Filers reported most of these recurring subjects in di erent years at the same or similar address.10.Filers reported about 15 percent of this subject subset resident in multiple and sometimesgeographically dispersed states.

FinCEN included the 50 states, plus the District of Columbia, Puerto Rico, and the Virgin Islands as11.the covered jurisdictions in the total subject and total population calculations. Data displayed in thetables was limited to the 50 states. Of the total 1,952 lings analyzed, 880 reported no subject namesat all, while another 374 reported characters in the subject name elds intended to convey no subjectnames were known. Consequently, only 698 (just under 36 percent) of the 1,952 lings reported anyvalid subject names.

SAR-SF Filings

Page 16: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 16/53

11Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Table 3 displays the top 10 subject residence states. As would be expected, themajority of reported subjects resided in the more populous states.

TABLE 3

STATE NUMBER OF DISTINCT ID THEFTSUBJECTS BY ZIP CODE

PERCENT OFTOTAL SUBJECTS

California 145 17.84%New York 94 11.56%Texas 76 9.35%Florida 64 7.87%Michigan 34 4.18%Illinois 30 3.69%New Jersey 26 3.20%Virginia 23 2.83%Georgia 22 2.71%Massachusetts 21 2.58%TOTAL 535 65.81%

Table 4 displays the top 10 states with the highest number of reported identity thesubjects per million state residents.

TABLE 4

RANK STATE 2010 SAR-SF IDENTITY THEFT SUBJECTSREPORTED PER MILLION RESIDENTS

1 New York 4.842 Nevada 4.433 Nebraska 4.374 Mississippi 4.365 California 3.887 Michigan 3.436 Florida 3.399 Delaware 3.338 Massachusetts 3.20

10 Wisconsin 3.16

Page 17: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 17/53

12Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Map 1 displays the incidence of identity the subjects in 2010 per million stateresidents. 12

MAP 1

Analysis identi ed an additional 68 subjects, including 7 businesses, located outsidethe United States. Prominent subject residence countries included the UnitedKingdom (16), Nigeria (9), Venezuela (8), Uganda (5), and South Africa (5).

Analysis of the lings for Nebraska and Mississippi indicated that there were relatively few12.lings, but that each uncharacteristically reported between 3 to 5 subjects. This explains the largeproportional numbers reported for two states with comparatively small populations.

Page 18: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 18/53

13Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Subject Intent and Relationship to Victim

Analysis of the overall sample indicated nearly 94 percent of lings described activitywhere the subject clearly intended to defraud either the identity the victim or theler. Somewhat less than 5 percent of the sample described subjects who apparently

used stolen identi ers to secure employment. The remaining approximate 1.5 percentof lings did not describe any clear motive for use of the victim’s identi ers.

According to almost 7 percent of relevant sample lings, the victim reportedly knewthe presumed identity thief. The reporting trend showed a marked increase fromabout 5 percent in 2005-2008 to over 8 percent of lings in 2009-2010.

FinCEN located few sample lings reporting criminal involvement of current orformer ler employees. Overall, about one half percent of lings reported suchactivity. Filers did report an upswing in the number of instances in which individualsimpersonated ler employees (just over one half percent of lings) with all but onesuch report appearing in the 2009-2010 sample.

Victims

Because Bank Secrecy Act (BSA) form instructions do not require the ler toprovide speci c information on victims, victims are o en not a focus of such lings.Consequently, the sample SAR-SF lings provide only fragmentary information aboutvictims. In some cases, the ler was unable to contact the apparent victim and wasthus unable to determine whether that individual was actually a victim or was instead

involved in an a empt to defraud the ler.Nonetheless, analysis indicated that about 2.5 percent of sample lings reportedthat the target of identity the was deceased at the time the identity the occurred.Somewhat over 1.5 percent reported that the thief engaged in elder nancialexploitation as part of the alleged crime. 13

See13. h p://www. ncen.gov/statutes_regs/guidance/html/ n-2011-a003.html .

Page 19: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 19/53

14Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

TYPOLOGIES, TRENDS, ANDPATTERNSCo-Reported Characterizations of Suspicious Activity

Identity thieves steal victim information by various methods and for a variety ofreasons, primarily to facilitate various types of nancial fraud. Graph 4 displays thequarterly percentages of sample lings also reporting ACH fraud, computer intrusion,check fraud, and debit card fraud, the characterizations of suspicious activity mostfrequently co-reported with identity the . 14

GRAPH 4

0%10%20%30%

40%50%60%70%80%90%

Check Fraud Computer IntrusionDebit Card Fraud ACH Fraud

Percentage of Quarterly Sample SAR-SF Filings Co-Reporting theNoted Characterizations of Suspicious Activity with Identity Theft

The analyst derived this data through narrative analysis and reported the noted characterizations14.regardless of whether the a empted activity proved successful or not. Many sample lings describedthe identity thief’s use of multiple payment vehicles to facilitate the the of victim funds.

Page 20: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 20/53

15Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

ACH Fraud

ACH fraud was the identity thief’s preferred method to transfer and aggregate stolenfunds over the entire study period. 15 The median a empted amount of ACH fraudincreased from $20,950 in 2005-2008 to $26,500 in 2009-2010. However, the median

loss amount associated with these a empts changed very li le: median reportedloss was $13,998 in 2005-2008 and $14,060 in 2009-2010. Overall, about 24 percentof sample lings reported identity thieves illicitly drawing funds from depositoryaccounts using ACH to fund existing investment accounts they had taken over ornew accounts they had set up. The trend line for this type of activity was moderatelyup. Somewhat more than 30.5 percent of lings reported thieves using ACH to movefunds out of victimized investment accounts and into thief-controlled depositoryaccounts, with the trend line for this activity increasing more steeply. Thievesreportedly also used ACH to move funds from one investment account to another in5.5 percent of lings, with the trend up steeply.

Computer Intrusion

From the rst quarter of 2006 through the second quarter of 2008, computer intrusion became a primary reported means by which identity thieves gathered victimidenti ers and nancial account information. Suspected thieves reportedly used thisinformation to initiate unauthorized nancial transactions both within legitimateexisting victim accounts and within unauthorized accounts they set up using stolenidenti ers. Though the sharp drop o in reported computer intrusion therea er may

suggest that lers and their customers have had some success in fending o computerintrusion using various cyber countermeasures, some of the drop o may also suggestthat identity thieves are employing more sophisticated forms of computer intrusion,less likely to be detected and reported as the means of identity the . 16

Check Fraud

Although 2010 Federal Reserve Payments Study data report the public’s usage ofchecks declining in comparison to most other payment methods, identity thievescontinue to nd checks a useful vehicle to facilitate nancial fraud. 17 The median

Virtually every sample SAR-SF that co-reported the characterization “wire fraud” involved ACH15.rather than traditional wire transfers.

One countermeasure that appears to have provided signi cant protection is ler provision of tokens16.to their clients that generate new random account passwords each minute.

See17. h p://www.frbservices.org/ les/communications/pdf/research/2010_payments_study.pdf , page 11.

Page 21: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 21/53

16Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

amount of a empted check fraud-related activity was $12,900 in 2005-2008, but jumped to $33,865 in 2009-2010. The median loss amount jumped as well, from $9,065in the earlier period to $21,000 in 2009-2010. In somewhat more than 3.5 percent ofsample lings, thieves reportedly used second party checks drawn on depositoryaccounts without authorization to fund investment accounts (trend was moderatelyincreasing), and third party checks in just over 2 percent of sample lings (trend wasmoderately up).

Thieves frequently used checks to drain investment accounts. They reportedly usedchecks drawn directly upon victim investment accounts or upon linked demandaccounts in about 5 percent of lings (trend was sharply up), or requested checksdrawn on the investment rm’s o cial disbursement account in almost 7 percent oflings (trend was modestly down).

Debit Card Fraud

Identity thieves have increased their use of debit cards to steal victim funds. Thoughoverall a empted debit card fraud and loss amounts were lower than those associatedwith ACH fraud or check fraud, lers generally lost the full amount of unauthorizeddebit card transactions. On the other hand, lers could o en stop unauthorized checkor ACH transactions, resulting in a full or partial recovery of funds. Study ndingsindicated that median unauthorized debit card transactions a empted and resultinglosses were both $6,309 in 2005-2008 and increased to $13,408 in 2009-2010 (trend wasup sharply).

Other Characterizations of Suspicious Activity

Filers characterized identity-the related activities as securities fraud in nearly 25.5percent of the relevant sample lings. Most lings appear to have characterizedsecurities fraud based upon reported a empts to engage in market manipulationthrough the purchase or sale of large blocks of thinly-traded securities. 18 Sincesecurities fraud can be de ned broadly, FinCEN chose to speci cally address the typesof activities most frequently reported in SAR-SFs that comprise securities fraud ratherthan to generally characterize them as securities fraud.

See the Federal Bureau of Investigation’s de nition of securities fraud at18.h p://www2. i.gov/publications/fraud/securities_fraud.htm . See also the U.S. Securities andExchange Commission’s Guide to Identifying and Avoiding Securities Fraud ath p://www.sec.gov/investor/pubs/identavoidfraud.htm .

Page 22: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 22/53

17Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Filers reported other characterizations of suspicious activity in much lower numbers.In virtually all instances, FinCEN narrative analysis located larger numbers of lingscharacterizing any given activity captured on the SAR-SF than the lers recorded.One exception was structuring/money laundering, which lers characterized innearly 3 percent of the overall sample. FinCEN characterized structuring/moneylaundering only when it appeared to be an intentional part of the reported activitiesand estimated it on that basis at somewhat less than 1.5 percent of the lings.

Account Abuse Scenarios

Filers recounted several common account abuse scenarios in the study sample. Themost common scenario involved the abuse of one or more existing victim accounts.The thief generally used account access information collected through a variety ofmethods including computer intrusion, physical the from the victim’s home or

vehicle, the of the victim’s mail or trash, phishing, and vishing.19

The thief generallyaccessed accounts through online banking or investment services and frequentlyalso communicated by means of phone or fax. A er accessing the account, the thiefwould o en change contact information such as physical and email addresses, phonenumbers, and online access passwords. In many instances, the thief directed that cash balances in an investment account be sent by ACH to another account controlled bythe thief or mailed by check to the new address the thief placed on the account. Ininstances where the thief found the account balances in the form of securities, thethief would o en order that these positions be liquidated and the proceeds sent byACH to his account or by check to his address. In some instances where the thief

knew the target had an account at the ling institution, but did not have su cientaccess information to enter the account, the thief a empted to use social engineering(vishing) to persuade a ler employee or the target to provide the missing accountaccess information.

Phishing and vishing both involve social engineering but rely on di erent technology. In vishing,19.the thief contacts the target by phone, usually by Voice-over-Internet Protocol (VoIP) so that the call

can’t be traced, and misrepresents himself as someone entitled to gather personal identi ers, suchas a nancial institution employee, a law enforcement or tax authority representative, or a medicalservices provider employee. Within the study sample, those employing vishing generally identi edthemselves as employees of a nancial institution where the target maintained one or more accounts.Phishing is accomplished online rather than by phone. Like vishers, phishers frequently pose asrepresentatives of the target’s nancial institution, employing email and links to a spoofed nancialinstitution Web site in a empts to gather personal information.

Page 23: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 23/53

18Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Another common scenario involved thieves who did not have account accessinformation, but did have stolen identi ers. Identity thieves o en used thisinformation to open one or more new unauthorized accounts in the victim’s name. Thethief most frequently used the new account to receive unauthorized ACH transfersor fraudulent/counterfeit checks from other investment accounts or from depositoryaccounts. As soon as these funds hit the new account, the thief generally a emptedto move the money out of the account to other accounts the thief controlled. Thethief most frequently moved funds using unauthorized ACH transfers, but also wrotechecks against the account or used the ATM/debit card issued at account opening todrain cash or make online or point-of-sale purchases before the nancial institutionreceived notice that the funding ACH or check was unauthorized or fraudulent.

Less commonly, the thief opened an account, funded it as noted and immediatelya empted to use the funds to purchase securities, quickly selling these and movingthe money out of the account as above. In most instances the purchase of securitieswas designed to make the investment account appear legitimate. In other cases, thethief may have hoped to pro t further from the purchase and sale of these securities.

In a fourth scenario, the thief used existing victim account balances or fundsfraudulently deposited into a new unauthorized account for the clear purpose ofmarket manipulation. In this scenario, the thief used account balances to purchaselarge blocks of thinly-traded securities in order to drive up the share value.Immediately a er these purchases, the thief sold large blocks of the same security heheld in other accounts, thus reaping a quick pro t.

Though the sample lings generally described the abuse of investment accounts,many lers were not able to establish whether a new or existing customer accountwas being abused by an identity thief or, alternately, by the actual customer engagingin nancial fraud. O en, the ler could establish identity the only by verifying thatthe owner of the account used to fund a new or existing investment account did notauthorize the ACH debit or check drawn against the funding account.

Investment Account Abuse

Direct Theft of FundsAbout 90 percent of study lings reported the abuse of an existing legitimateinvestment account or the unauthorized set up of a new investment account usingstolen identi ers. The trend in investment account abuse reporting was slightly downover the period of the study.

Page 24: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 24/53

Page 25: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 25/53

20Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Table 5 displays average and median dollar amounts of ler-reported nancial fraudand the associated losses that did not involve trading activity, mainly involving ACHfraud, check fraud, and/or debit card fraud.

TABLE 5

2005-2008 Activity Amount

2005-2008 Associated Loss

2009-2010 Activity Amount

2009-2010 Associated Loss

Average $486,810 $41,740 $118,105 $102,661Median $24,664 $12,511 $23,315 $12,491

The average reported activity and associated loss amounts were extremely divergent between the earlier and later studies, showing a very large decrease in the averageactivity amount but a very large increase in the average associated loss amount.Conversely, the median activity and loss amounts reported in the two studies werenotably similar.

Securities Trades

Generally, many investment accounts do not maintain signi cant cash balances, butfrequently instead hold securities. Consequently, the thief who gains access to anexisting investment account will o en nd the majority of account assets in a formother than cash. In these cases, the thief may initiate unauthorized sales of securitiesto liquidate the assets and make them easily transferrable to a depository account orto another investment account the identity thief controls.

Page 26: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 26/53

21Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Graph 6 provides study ndings concerning the quarterly percentages of samplelings reporting successful and unsuccessful unauthorized purchases or sales ofestablished securities.

GRAPH 6

Graph 6 clearly indicates that within the sample, identity thieves were generallysuccessful in liquidating victim assets throughout the study period.

Some lings reported that rather than liquidate the victim’s holdings, the thieftransferred or a empted to transfer the victim’s account intact employing theAutomated Customer Account Transfer Service (ACATS) into an account the thiefcontrolled at another brokerage or bank. 21 Just over 1 percent of sample lingsreported the thief’s a empted or successful use of ACATS. Though the majority ofa empts were successful, the most recently reported a empts were not.

ACATS is a system that automates and standardizes procedures for the transfer of assets in a21.customer account from one brokerage rm and/or bank to another. The National Securities ClearingCorporation (NSCC), a subsidiary of the Depository Trust and Clearing Corporation (DTCC),developed the ACATS system. See h p://www.dtcc.com/products/cs/equities_clearance/acats.php .

Page 27: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 27/53

22Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Market Manipulation

As noted previously, investment accounts provide the identity thief opportunities todefraud both account holders and the institutions that maintain investment accounts inways not available to thieves targeting accounts maintained at depository institutions.

More sophisticated or enterprising identity thieves may use victim investmentaccounts to manipulate the market in thinly-traded securities. In these cases, thievesmay never actually steal money from a victim’s account. Instead, thieves may use cash balances or liquidate securities holdings in an account to purchase shares in illiquidsecurities of companies that have very low market capitalizations, which may be moreeasily subject to market manipulation than other securities. Identity thieves generallyalready hold large positions in these securities in other investment accounts. Assoon as they make large purchases in one or more victim account(s) to drive up theshare price, they sell a large block of the same security held in other account(s) theycontrol. In virtually all such cases, the victimized account holder is le with securitiesworth much less than the cash or more liquid securities held in the account priorto the fraudulent activity. Study ndings recorded signi cant amounts of this typeof activity. Graph 7 indicates the percentage of sample lings by quarter reportingsuccessful and unsuccessful market manipulation. 22

Successful market manipulation is de ned for purposes of this study as thief-initiated trades in22.thinly-traded securities that lers fully or partially executed whether or not the e ects of these tradesmoved share prices signi cantly.

Page 28: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 28/53

23Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

GRAPH 7

Graph 7 indicates that within the study sample, the relative incidence of identitythieves’ employment of market manipulation within victim accounts has droppedsigni cantly since the highs reached from Quarter 4, 2006 through Quarter 1, 2008.Together, Graphs 5 and 7 show that the focus has shi ed decisively back toward the

direct the of funds from victim accounts. This shi may have been at least partlyassociated with the instability seen in the markets following the banking crisis that began in September 2008.

A comparison of Graph 7 with Graph 4 also suggests a positive relationship betweencomputer intrusion and market manipulation. The pa erns and timeframes of bothactivities appear similar.

Page 29: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 29/53

24Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Since it is generally the policy of lers to make victimized customers whole, lerssu ered signi cant losses restoring victimized investment accounts to their pre-fraudpositions. Table 6 provides data concerning the average and median unauthorizedtrading amounts and associated ler losses reported in the study sample. 23

TABLE 6

2005-2008Trading Amount

2005-2008 LossIncurred Restoring

Victimized Account(s)

2009-2010Trading

Amount

2009-2010 LossIncurred Restoring

Victimized Account(s)

Average $157,001 $25,032 $438,013 $7,153Median $33,261 $2,000 $43,963 $674

Though average and median trading amounts increased signi cantly over the6-year study period, reported associated average and median losses declined just assigni cantly.

Filers did not separately report their losses resulting from their liquidation of thinly-traded securities23.the thief purchased or related to their re-purchase of established securities the thief sold fromvictimized accounts. Loss amounts reported in Table 5 can be equated with the amount an identitythief was able to steal from the ler or another institution holding a ected victim accounts. However,a thief ‘s enrichment cannot be gauged by the loss amounts reported in Table 6, which represent theamounts lers lost when they restored victimized customer accounts to their pre-fraud prevailing

positions. Whether or to what extent the identity thief pro ted from the purchase or sale of securitiesin victim accounts depends upon whether a empts to manipulate the market in a given thinly-tradedsecurity in the victim’s account succeeded; and whether the thief’s sale of victim securities positionsin established securities was followed by successful withdrawal of these liquidated funds throughcheck or debit card transactions, or through a funds transfer to another account. Many lingsreported the thief’s successful sale of established securities in a victim account, but his failure to movethese funds out of the victim’s account prior to detection.

Page 30: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 30/53

25Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Instruments

Table 7 displays a breakdown of the identi able instrument types reported in all 488lings referencing successful or unsuccessful unauthorized trading.

TABLE 7

INSTRUMENT INCIDENCE PERCENTAGE OF TOTALIDENTIFIABLE INSTRUMENTS

Stocks 385 63.64%Cash or Equivalent 161 26.61%Mutual Fund 43 7.11%Bonds/Notes 5 <1%Money Market 4 <1%Other Securities 3 <1%

Warrants 2 <1%Commodity Type 1 <1%Security Futures Product 1 <1%TOTAL 605 100.00%

Graph 8 shows the relative incidence of reported successful and unsuccessful theof funds, purchase/sale of established securities, and purchase/sale of thinly-tradedsecurities by identity thieves.

GRAPH 8

Page 31: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 31/53

26Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Graph 8 demonstrates that over the period of the rst and second studies, identitythieves continued to favor the direct the of funds from victim accounts. However,from the fourth quarter of 2006 through the second quarter of 2008, their focusshi ed towards unauthorized trading in victim accounts. The level of thieves’ marketmanipulation reached a point of parity with the of funds at the very beginning ofthis period. During the next year, identity thieves appear to have shi ed a entionto mainly sales of established securities from victim investment accounts, causingthe the of funds line to trend up as well. Following the second quarter of 2008, thefocus shi ed decisively back towards the direct the of funds. The drop in reportedunauthorized securities transactions in victim accounts suggests that thieves favoredvictim accounts holding signi cant cash balances. This data appears to correlate withthe upswing in retirement account abuse shown in Graph 9.

Speci c Types of Investment Accounts

The majority of relevant sample lings reported the abuse of individual investmentaccounts. Financial institutions speci ed the abuse of retirement accounts in nearly16.5 percent of lings and abuse of individual or family trust accounts in over 2.5percent. The trend in abuse of both retirement and trust accounts was up strongly asnoted in Graph 9.

GRAPH 9

0%

5%

10%

15%

20%

25%

30%

Trust Account Retirement Account

Percentage of Quarterly Sample Filings Reporting Abuse of the Noted Investment Account Types

Page 32: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 32/53

27Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Holders of retirement accounts may either be incapacitated or, in some instances,deceased. Such circumstances might allow identity thieves, especially relatives orcaregivers, the opportunity to abuse the accounts without immediate detection. 24 Ananalysis of elapsed times between last identi ed suspicious activity and detectionindicates that average detection times associated with retirement account abuseare somewhat longer than for fraudulent activity targeting other account types.Additionally, many retirement accounts, especially those held by individuals who arealready retired, are more likely to hold a higher percentage of assets in safer, moreliquid, and easier to transfer holdings such as money market accounts, making thempotentially more a ractive to thieves.

Nearly 65 percent of the retirement account-related sample subset reported thetakeover of an existing victim retirement account (trend modestly declining). Justunder 9 percent of the subset reported the thieves’ set up of an unauthorizedretirement account using stolen identi ers with the apparent intent to defraud (trendwas modestly down). About 30.5 percent described retirement accounts set up byemployers on behalf of employees who apparently stole the SSNs of identity thevictims to secure employment, rather than to directly defraud the victims or the ler(trend was modestly down). 25

More than 4 percent of the subset reported thieves’ a empts to rollover funds fromexisting victim retirement accounts to new unauthorized retirement accounts, with all but one ling submi ed in 2009-2010.

Just over 1 percent of lings reported the thief ’s unauthorized set up of accounts

titled as corporate investment accounts. The thief used the identifying informationof legitimate established companies and generally funded the account with one ormore checks payable to the victimized company that the thief had stolen from themail. These checks generally cleared the banking system without di culty, allowingthe thief to drain the account before the the was discovered (the reporting trend wasmoderately down).

Relatives and other acquaintances were the identi ed or suspected identity thieves reported in more24.than 17.5 percent of the retirement account-related sample subset; a percentage proportionally morethan three times that reported in the overall sample. The reporting trend was up sharply.

Some lers reported both account takeovers and unauthorized new account set ups on the same SAR-25.SF.

Page 33: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 33/53

28Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Depository Account Abuse

As expected in a sample of SAR-SF lings, investment accounts were the mostfrequently referenced account type. Nevertheless, depository accounts guredprominently in reporting as well. Overall, somewhat less than 25 percent of sample

lings reported the abuse of one or more existing legitimate depository account(s)and/or the unauthorized set up of one or more new depository account(s) using stolenidenti ers. The trend in reporting of depository account abuse was slightly up.

The great majority of a ected depository accounts were individual accounts.Nonetheless, nearly 3 percent of the accounts were corporate accounts (the reportingtrend was moderately up).

Account Status Preference

Graph 10 indicates the quarterly percentages of sample lings reporting the identitythief’s abuse of one or more existing legitimate victim accounts versus the unauthorizedset up of one or more new accounts using stolen identifying information. 26

GRAPH 10

Many lings report the thief’s abuse of more than one account. Some reports describe both legitimate26.existing and new unauthorized accounts or both investment and depository accounts. Graph 10compares percentages of sample lings exclusively describing the abuse of existing legitimate victimaccounts versus the percentages of sample lings including a report of the set up of one or moreunauthorized accounts using stolen identi ers.

0%10%20%30%40%50%

60%70%80%

Account Takeover Set up of New Unauthorized Account

Percentage of Quarterly Sample Filings Exclusively Reporting AccountTakeovers vs. Those Including Report of New Unauthorized Accounts Set Up

Page 34: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 34/53

29Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

The identity thief’s apparent preference during most quarters for taking overlegitimate existing victim accounts versus se ing up one or more new account(s)using victim identi ers likely correlates with the thief’s relative success and ease instealing funds. Analysis of sample narratives indicated that lers generally placednew accounts under closer scrutiny and o en restricted the volume and value ofactivity that could occur in new accounts for some period of time.

Additionally, customers’ ability to view their prior account activity online could allow theidentity thief to both note typical customer activity on the account and possibly gauge thefrequency of customer account monitoring. Consequently, an identity thief who is able totake over an established account may be able to closely mimic prior account activity whilealso draining funds from the account, thus escaping detection for some time. Accountholders who view their account activity infrequently may put their accounts at greater risk.

Identity Theft FacilitationMeans of Contact

The sample data highlight the great value of the computer to identity thieves, but alsodemonstrate the continued value of the phone, fax, and even the standard le er tofacilitate both identity the and the resulting nancial fraud. Graph 11 displays thequarterly percentages of sample lings reporting the identity thief’s reported meansof contact with the ler.

GRAPH 11

0%10%20%30%40%50%60%70%80%90%

100%

Computer Contact Phone, Fax, Mail, or In-Person Contact

Percentage of Sample Filings Clearly ReportingManner of Identity Thief Contact with Filer

Page 35: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 35/53

30Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

In many instances, the thief used both computer and non-computer communicationsto misrepresent his or her identity and steal funds.

Overall, nearly 19.5 percent of sample lings reported the thief’s use of the phone tofacilitate identity the or commit nancial fraud. Since the phone was the primary

means of non-computer identity thief contact reported in the sample, the phone wasmainly responsible for the ascending trend line seen in Graph 9. About 2 percent oflings a er 2008 reported the use of Voice-over-Internet Protocol (VoIP) phone lines toadvance these ends. Since VoIP numbers are trunk lines not a ributable to any givencomputer device, it is likely the thief used them to avoid detection. Nearly another 1.5percent of lings a er 2008 reported the thief’s use of phone relay services, generallyintended for use by the deaf. Thieves may have used relay services to avoid providingthe ler a voice print, as most lers retain voice recordings of customer calls.

Likewise, about 5.5 percent of lings described the thief‘s use of a facsimile machine,

and somewhat more than 4 percent noted use of the U.S. mail or a private carrier forthe same purposes. In a few instances (somewhat less than 1 percent of lings), theidentity thief contacted the ler in person. Trends in reported fax and mail contactwere slightly down, whereas personal contact, though still rare, was trending up.

Means of Computer Intrusion

Overall, 16.5 percent of sample lings reported the means by which the identity thiefwas able to gain access to the victim’s computer. In somewhat more than 15 percent oflings, malware was found on the victim’s computer. In almost 1.5 percent of lings,

the victim admi ed to being duped by a phishing email that led to a spoofed Web site.This group also included the more than one half percent of lings in which victimsadmi ed accessing their nancial accounts from public computers, including publiccomputers located in third world countries. One ler reported that a contract employeeadmi ed to accessing customer information from a public computer, resulting in theexposure of several thousand customer records. Identity thieves were shown to havehacked into personal or corporate computers in about one half percent of lings.

Unauthorized Alteration of Account Information

Identity thieves who gained access to a victim’s existing account(s) o en added orchanged account information. The most signi cant changes included the linking ofone or more accounts to an investment account. Overall, somewhat more than 8.5percent of lings reported a thief’s addition of one or more linked account(s) to thevictim’s investment account(s). The linked accounts, virtually always depository

Page 36: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 36/53

31Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

accounts, were intended to receive funds drained from the investment accounts. 27 Thetrend noted for this facilitator was signi cantly up, with proportionally almost twice asmany lings reporting this activity in the second study period as in the rst. Much lessfrequently (about 1 percent of lings), thieves added a bill pay feature to the account(s)and used this feature to order payments either to themselves or to apparent creditors.

Some thieves reportedly changed other account information as well, apparently totemporarily delay the victim’s discovery of the s from accounts and/or to facilitatereceipt of stolen funds. Thieves changed the victim’s mailing address in almost 4.5percent of lings, the email address in somewhat more than 3 percent, the phonenumber in about 3 percent, and the account password in close to 1.5 percent oflings. 28 In a few lings, thieves reportedly forwarded the victim’s phone calls tophones they controlled during the period they actively stole funds from the victimaccount(s). Several recent lings reported a variation on this theme, with the thiefinundating the victim’s phone with spam calls while conducting fraudulent activitieswithin the victim’s account.

Relationships

Another signi cant facilitator concerned the thief’s ties to the victim through family,friendship, employment, or business relationships. Overall, close to 5.5 percentof lings reported a relationship that likely provided the thief unfe ered accessto the victim’s personal identi ers. The reporting trend for this facilitator was upmoderately over the course of the two studies.

Internet Work Scams & Unwitting Participants

Though reported in relatively small numbers, sample lings did highlight a steeplyincreasing trend in reporting concerning individuals who are conned into becomingunwi ing participants in identity the and nancial fraud through Internet workscams. About 1.5 percent of the overall sample reported this activity, but the relativeincidence reported in 2009-2010 was three times that reported in 2005-2008. Ingeneral, these lings reported that the identity thief initiated the unauthorized

Several lings did report other investment accounts, online payment accounts, or prepaid card27.accounts as the linked accounts.

Thieves frequently made nearly imperceptible changes to victim email addresses such as adding28.or deleting one le er or punctuation mark, apparently in hopes that the ler would not notice thechange. In some lings, thieves reportedly changed physical addresses by altering apartmentnumbers or by transposing street numbers with the same intent.

Page 37: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 37/53

32Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

transfers of funds from victim accounts to the personal accounts of the thief’sunwi ing “employees.” The duped individual then generally sent the money on tothe thief minus an agreed “fee.”

Different Victims, Same Thieves

Filers frequently reported more than one victim per ling. In many cases the ler didso because the identity thief used the same bank account number, phone number, IPaddress, media access control (MAC) address, physical address, and/or email addressto facilitate the from multiple victims. Overall, nearly 8 percent of lings reported athief associated with the same IP address a acking the accounts of multiple victims.Several of the most recent lings reported the same MAC address used to defraudmultiple victims, meaning that the same access device was used in multiple the s. 29 Filers reported same bank account numbers in about 2.5 percent of lings, identicalphone numbers in somewhat more than 2 percent, like physical addresses in justover 2 percent, same email addresses in somewhat more than 1 percent, and othertypes of links in something over 1 percent of lings. Given that many lers maintainrecordings of customer phone calls, around one half percent of lings even linked thesame individual to multiple victims through the alleged thief’s voice print.

Identity Theft/Financial Fraud Rings

Overall, about 1.5 percent of lings a ributed reported activities to groups ofindividuals conspiring in identity the / nancial fraud rings.

In an evaluation of the overall population of identity the -characterized SAR-SFlings submi ed between 2005 and 2010, FinCEN identi ed 109 lings out of 10,259that included “ring” in the SAR-SF narrative in context. The majority of the earlierlings (77 submi ed between 2005 and the third quarter of 2008) were recurringreports on the operations of the same rings. Prominent (35 lings) among these werereports describing the operations of a ring apparently based in Central Europe. Thisring engaged in the direct the of funds from investment and depository accountsand employed ACH to move stolen funds into corporate accounts it controlled. Muchof this activity also appeared to involve unwi ing “employees” of the ring members

who responded to Internet work scam emails and provided their personal bankaccounts as intermediary collection accounts for this activity.

A media access control address is a unique machine identi er hardwired into the network card29.contained within the computer or hand-held device. Seeh p://www.techterms.com/de nition/macaddress .

Page 38: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 38/53

33Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

A group of 11 lings concerned a ring that conducted unauthorized trading invictimized investment accounts and then drained funds using ACH. Another groupof 5 lings described the operations of a ring apparently based in West Africa.

Overall, at least 44 of 77 lings reported the operations of rings apparently based

outside the United States, including 3 describing the operations of a ring likely basedin South America. Of the remaining 33 lings, 7 speci cally identi ed U.S. cities inwhich rings appeared to be based, while 5 described rings operating throughout theU.S. or within speci c geographic regions.

Research located an additional 32 lings made between the fourth quarter of 2008 andthe end of 2010. Of these, 8 lings described the operations of a ring draining fundsfrom multiple depository accounts at the same institution, and transferring thesefunds to accounts at the same investment rm.

Another 5 lings described the operations of a ring that took advantage of an inadvertentonline breach to steal money from corporate accounts. This particular breach occurredwhen bankruptcy lings posted online for a speci c company accidentally included thecorporate bank account numbers of all of the company’s creditors.

Though just 1 ling among the 32 identi ed a ring apparently based outside the U.S.(in Asia), sample study data taken from the same period did describe the operationsof a ring whose members were all apparently university students from the sameCentral European country.

Another 7 of the 32 lings described rings based in speci c U.S. cities. A ring

described in 1 ling garnered its illicit funds through student loan fraud, whileanother ring referenced in 1 ling pro ted from auto and mortgage loan fraud.

Customer and Employee Database Breaches

Though the number of total lings remained low, an increasing number of lingsreported the nancial results of identity the facilitated through customer oremployee database breaches. Overall, somewhat over one half percent of samplelings reported breaches in which personal identifying information on thousands ofindividuals was inadvertently or intentionally exposed to potential abuse.

Page 39: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 39/53

34Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Discovery

Identity the was o en uncovered through multiple, o en complimentary, means.Filers most frequently discovered identity the through their normal accountmonitoring procedures (about 53 percent of sample lings). In about 51.5 percent

of lings, the person whose identity was stolen con rmed ler suspicions that he orshe had su ered identity the or noti ed the ler of the the . Filers credited publicdatabase searches for revealing identity the in about 9 percent of lings. Otherreported means of discovery included questionable documents (nearly 2 percent oflings), and contact with the identi ed perpetrator (over 1.5 percent of lings). A lawenforcement agency or a tax authority noti ed the ler of identity the in close to 1.5percent of lings each.

Mitigation

Filers and identity the victims mitigated the e ects of identity the -facilitatednancial fraud by rejecting proposed account applications or transactions, completelyor partially stopping payment on transactions that had already been executed, and/or by contacting authorities and increasing account security measures a er the a emptedor successful nancial fraud occurred. Table 8 lists the most frequently reportedpreemptive, proactive, and post-event mitigators employed by lers or victims.

TABLE 8

FILINGS REPORTING 2005-2008 2009-2010

Account Restricted 27.70% 30.62%Transaction Successfully Recalled/Stopped

After Execution17.20% 24.39%

Transaction Rejected Prior to Execution 20.09% 17.21% Account Closed 18.87% 13.41%Computer Checked/Cleaned for Malware 9.44% 8.13%Law Enforcement Contacted 8.37% 7.32%Victim Af davit of Forgery Completed 5.33% 5.33%

Recent sample lings reported that some lers issue random password generatingtokens to their clients. The client logs on with the temporary password numbergenerated by the token. Because the token issues a new temporary password numbereach minute, key logging malware or other similar viruses maliciously installed on aclient’s computer collect information that is almost immediately useless to the identity

Page 40: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 40/53

35Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

thief. Somewhat more than 2.5 percent of the second study lings referenced issuanceof these tokens to customers. Nearly 1 percent of sample lings from 2009-2010referenced the issuance of spoken passwords that customers would presumably notrecord on their computers.

Time Elapsed Between Last Identifed Suspicious Activityand Discovery

Graph 12 displays the percentage of lings made during di erent time periodsfollowing the last identi ed suspicious activity.

GRAPH 12

As the graph shows, in about 76 percent of relevant sample reports, the ler discoveredthe suspicious activity within 4 weeks of the last identi ed suspicious activity. 30

0%

5%

10%

15%

20%

25%

30%

35%

40%

12.33%

23.78%

39.90%

15.89%

3.80%

1.65% 2.65%

Time Elapsed Between Last Identified Suspicious Activity and Discovery

Estimates were made based upon reported dates of discovery and last identi ed activity rather than30.upon SAR-SF ling dates.

Page 41: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 41/53

Page 42: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 42/53

37Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

is accessed from an IP address or device number not consistent with establishedpa erns of access” (nearly 6 percent of lings with trend moderately up); 38 “The SocialSecurity Number provided is determined to be unissued or assigned to an individualreported as deceased” (about 4 percent of lings with trend moderately up). 39

Less frequently, lers described the following identity the red ags: “The nancialaccount linked to a new account application is the same as that associated with priorunauthorized account activity” (2.5 percent of lings with trend sharply up); 40 “ Fornancial institutions and creditors that use challenge questions, the person openingthe covered account or the customer cannot provide authenticating information beyond that which generally would be available from a wallet or consumer report”(2.5 percent of lings with trend moderately up); 41 “The phone number linked toa new account application is the same as that associated with prior unauthorizedaccount activity” (somewhat more than 2 percent of lings with trend sharply up); 42 “The address linked to a new account application is the same as that associatedwith prior unauthorized account activity” (a bit over 2 percent of lings with trendsharply up); 43 “The person opening a covered account or the customer fails to provideall required personal identifying information on the application or in response tonoti cation that the application is incomplete” (just over 2 percent with trend sharplydown); 44 “A fraud or active duty alert is included with a consumer report” (about 2percent of lings with trend strongly up); 45 “Mail sent to the customer is returnedrepeatedly as undeliverable although transactions continue to be conducted inconnection with the customer’s covered account” (1.5 percent with trend moderatelydown); 46 “The email address linked to a new account application is the same as that

associated with prior unauthorized account activity” (somewhat over 1 percent oflings with trend moderately up). 47

Filers reported all other identity the red ags in less than 1 percent of lings.

Analysts derived this red ag during this study.38.

Red ag 10b in Supplement A to Appendix A in 16 CFR Part 681.39.

Analysts derived this red ag during this study.40.

Red ag 18 in Supplement A to Appendix A in 16 CFR Part 681.41.

Red ag 12b in Supplement A to Appendix A in 16 CFR Part 681.42.

Red ag 12a in Supplement A to Appendix A in 16 CFR Part 681.43.Red ag 16 in Supplement A to Appendix A in 16 CFR Part 681.44.

Red ag 1 in Supplement A to Appendix A in 16 CFR Part 681.45.

Red ag 23 in Supplement A to Appendix A in 16 CFR Part 681.46.

Analysts derived this red ag during this study.47.

Page 43: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 43/53

38Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Reported Cooperation between the Filer and Other AffectedFinancial Institutions

Filers reported their ling of a notice with FinCEN under section 314(B) of theUSA PATRIOT Act in just under 1 percent of lings, with reporting trending upmoderately. However, the level of uno cial cooperation described in sample lings between nancial institutions a ected by identity the -facilitated nancial fraudwas signi cant, and was generally limited only by wri en ler policies intendedto safeguard customer privacy. Analysis of sample lings indicated that lers whofelt active contact with another nancial institution was warranted (over 15 percentof lings) received su cient information from the contacted nancial institutionto establish whether identity the had occurred in nearly 96 percent of reportedcontacts. The level of e ective cooperation reported remained steady from 2005through 2010. 48

Filings of Special Note

During this study, FinCEN noted many uncommon and novel schemes and tacticsidentity thieves employed to further their e orts. Filer reports of these activities,especially those that resulted in successful nancial fraud, may point to future trends.The summaries below illustrate the variety of activities that lers reported.

Attempts to Keep Fraud Hidden

• A phone caller apparently used a voice altering device while employing socialengineering tactics in a empts to gather customer account information from aler employee (vishing).

• A ler’s voice log tied the same caller to fraudulent activity conducted innumerous customer accounts.

• A fraud ring invested in securities using funds stolen from credit cards. Thering members invariably made pro table trades with the funds and immediatelyre-credited the credit cards from which they had stolen funds with the exact

Of the total 1,395 relevant sample lings encompassed in the earlier and later study data, 21248.described active contact between the ler and one or more other a ected nancial institutions. Activecontact was de ned as any contact beyond the passive contact generally associated with rejecteditems processing.

Page 44: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 44/53

39Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

amounts of the original charges, thus frequently hiding the original unauthorizedcharges. Ring members then sent the pro ts by ACH to business accounts locatedin the same states where the legitimate credit card holders resided.

• Another ring of identity thieves traded in foreign exchange markets and then

moved pro ts to multiple personal accounts located throughout the United States.• An identity thief took over multiple customer accounts. The thief apparently

used account balances to manipulate share values in thinly-traded securities.The thief also purchased and sold shares of established securities the legitimateaccount holders had previously traded, thus apparently a empting to maketransactions in the accounts appear legitimate.

Corporate Identity Theft

• A work-from-home scam operation based o shore used the name of a legitimatecompany in its contact with individuals. A er interested persons completedan online questionnaire, they were tricked into collecting stolen funds for theoperation.

• A fraud ring abused a bank’s name to sell fraudulent certi cates of deposit.

Insider Identity Thieves

• An employee of an insurance ler issued annuity contracts totaling severalmillion dollars to individuals unrelated to the annuitants. Filer investigationdetermined that the named annuitants were under hospice care and that theemployee had either forged their signatures on the annuities or tricked them intosigning the annuity contracts without their informed consent by misrepresentingthe purpose of the forms. The ler terminated the employee. 49

• A former employee of an insurance rm stole hundreds of thousands of dollarsfrom customer accounts, representing withdrawals as partial refunds of prepaidannual premiums or as partial surrenders of policy cash values. The thiefpersuaded a friend to launder the funds through the purchase of gi cards,claiming the funds came from the thief’s gaming winnings that the thief wastrying to hide from the spouse.

See similar activities described at49.h p://dockets.justia.com/docket/rhode-island/ridce/1:2009cv00471/26958/ .

Page 45: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 45/53

40Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

• Several lings recounted the operations of investment con men. Theseindividuals generally had prior legitimate positions with recognized investmentcompanies and were thus able to persuade victims to allow them to invest theirfunds. Once these individuals had secured victim funds, they made highlyspeculative trades without their investors’ consent and denied the investorscontrol over their own funds.

• A ler’s employee listed an account holder’s identi ers on a loan applicationfor the employee’s relative, making the account holder a co-signer on the loanwithout the account holder’s permission. Investigation indicated that theemployee had likely defrauded other account holders.

• Relatives of a deceased former annuitant continued to collect annuity paymentsfollowing the annuitant’s death. The annuitant’s insurance agent was complicitin the fraud.

Mail Theft

• An identity thief stole a client’s tax return documents from the mail. The thiefsubmi ed the documents to the Internal Revenue Service (IRS) a er substitutinghis own address as the return address, thus garnering a tax refund based uponinvestment losses claimed by the victim.

• A multi-million dollar identity the /fraud ring stole bank statements from themail stream in a Latin American country. The ring used the account information

to drain money from depository accounts, which it then used to open investmentaccounts. Once funded, the ring liquidated the investment accounts and had themoney sent to a mail drop. The mail was then forwarded to a foreign address.

• A ler received multiple unauthorized online change-of-address requestsdirecting that addresses be changed from U.S. addresses to addresses in Russiaand the Baltic states. The a ected accounts belonged to nursing home residents.

Database Breaches

• An identity thief apparently hacked into a state’s sex o ender registry to retrievethe personal identi ers of the registrants. The thief then used the identi ers toset up unauthorized investment accounts. The ler discovered the scheme bysearching victim names on the Internet.

Page 46: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 46/53

41Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

• A ler’s former employee sold several dozen sets of account holder identi ers toidentity thieves.

Stolen or Forged Documents

• A mortgage company contacted a brokerage to verify customer investment balances. The brokerage determined that the mortgage applicant had obtaineda customer’s account statement and was representing himself as the customerin order to secure a mortgage based on the victimized customer’s investmentaccount balance, and presumably also intending to secure the mortgage in thecustomer’s name.

• An identity thief apparently impersonated an account holder and used one of theaccount holder’s statements to secure nancing to purchase a large life insurancepolicy.

• A ring used fake IRS noti cation le ers and forms to gather sensitive identi ersfrom non-resident aliens. The thieves used bank information provided to clonevictim debit cards and drain depository accounts.

• A company insider forged the signatures of company o cers authorizedto disburse large amounts of company funds. The forgery resulted in anunauthorized ler transfer of hundreds of thousands of dollars to an individualknown to be involved in nancial fraud located in a third-world country.

• A law enforcement investigation turned up a power of a orney and a fake deathcerti cate associated with an identity the victim. Investigators determined thata corrupt notary created the documents.

• An applicant for a new account submi ed a phony driver’s license photographcopied from an o cial publication on identity document evaluation.

Computer Intrusion

• An account holder travelled throughout the country installing key logger viruseson public computers available to guests in high-end hotels to gather bank and

investment account information, which he used to drain their accounts. Theler submi ed a SAR to report that the account holder was arrested for a multi-million dollar identity the nancial fraud spree.

Page 47: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 47/53

42Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

• An identity thief hacked into a customer’s email account. The thief then posed asa person to whom the victim was contracting work in the victim’s home, and hadthe down payment for the work re-directed to the identity thief.

Prepaid Cards

• An identity thief opened new investment accounts funded with unauthorizedACH debits he initiated against depository accounts. As soon as the money wastransferred to the investment accounts, the thief transferred it to other apparentdepository accounts, later determined to actually correspond to prepaid cardnumbers.

• An identity thief submi ed a loan application against a client’s account. Theaccount number on the voided check a ached to the application to allow theler to set up an ACH transfer to the purported checking account of its customer

proved to be a prepaid card number instead. The check was counterfeit.

Tax Evasion & Money Laundering

• Relatives of a deceased individual set up an account in the deceased’s name yearsa er his death to deposit stock certi cates payable to the deceased. Motives mayhave included tax evasion and/or a empts to avoid probate of the assets.

• A ler identi ed a sophisticated tax evasion scheme engineered by a wealthy,highly-experienced investor. The investor invited college students to open

investment accounts, which the wealthy investor funded completely with hisfunds. A er one year, the investor split any pro ts made in the account with thestudent. All pro ts were recorded against the student’s identi ers as the accountholder. At the end of the year, the investor led the college student to believethat the account was closed. In many instances, the investor le the accountsopen and continued to use the accounts for investments. Since the accountswere titled to the students, trading pro ts were recorded against the student’sidenti ers, but taken by the investor. Though not reported, it is presumed thatthe investor did eventually close the accounts before the students graduated and began making signi cant amounts of reportable income.

• An identity thief used stolen identi ers to open both investment and depositoryaccounts. The fraudster used these accounts over a multi-year period, makinglarge trades in thinly-traded securities. The ler found no indication that thefunds were stolen, raising the possibility that the fraudster used the accounts tolaunder funds and/or evade taxes on trading gains.

Page 48: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 48/53

43Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

• An individual opened an investment account in his mother’s name. The lerdetermined that the individual had sizable state and federal tax liens, suggestinghe used his mother’s identi ers to evade taxes or payment of the liens from anypro ts arising from account transactions.

• Several individuals deposited counterfeit physical share certi cates of alegitimate company to multiple ler accounts. Subsequently, other individuals bought these counterfeit shares. The described activity appears to indicate thatthe corporate identity thieves used ler accounts to launder signi cant amountsof money by making the movement of funds from one investor to another appearto be legitimate investment activity.

Market Manipulation

• A company located in a Baltic country apparently took over client investment

accounts and used account balances to manipulate the market in certain thinly-traded securities.

• A clearing broker reported that multiple rms that clear their trades through theler reported that identity thieves compromised credentials belonging to their

brokerage employees. In each reported instance, the identity thieves used thecredentials to purchase the same thinly-traded security, presumably to drive upthe share price to make their sales of the same security held in other accountspro table.

• An individual opened unauthorized investment accounts using stolen identi ers.The fraudster then used the accounts to manipulate share values of thinly-tradedsecurities, reaping half a million dollars in illicit pro ts.

Abuse of Promotional Account Features

• A few lings recounted use of stolen identi ers to set up unauthorized accountsand then take advantage of a ler’s promotional account features. A er se ingup each account, the thief used the supplied ATM card to make hundreds ofsmall withdrawals of about $10 each. One of the ler’s selling points was that it

refunds all customer ATM fees on accounts. The thief made all of the withdrawalsfrom the same independently-owned ATM, one that charged a $20 fee for eachtransaction. The ler lost thousands of dollars refunding the thief’s ATM fees.The ler did not indicate whether the thief either owned the ATM or had struck adeal with the owner of the machine to share the exorbitant fees charged.

Page 49: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 49/53

44Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

• Another identity thief set up hundreds of unauthorized accounts using stolenidenti ers to take advantage of a promotional cash credit the ler o ered on newaccounts.

Other

• An identity thief used account holder identi ers to obtain prescription drugs.

• A probable con man claiming to be a member of a family known to have a multi- billion dollar fortune came to the ler with a potential business proposition. Theindividual directed the ler employee to a Web site that the individual purportedwould establish his claims. The ler employee noted that other than therecently-created Web site, he could nd no information referencing the alleged billionaire.

• Several lings noted similar scenarios in which the ler received telephonicor fax requests, ostensibly from account holders living in a particular LatinAmerican country. The requests directed that the ler debit funds fromaccount holder investment accounts and wire transfer the funds to accounts atdepository institutions in Latin America. Filers reported that they veri ed thereceived instructions through direct phone contact with the account holder atthe phone number received in the original account application. Nonetheless, theaccount holder contacted the ler a week or two later claiming the withdrawalswere unauthorized, raising the possibility that a ring whose members feignedvictimization from identity thieves was operating to defraud lers.

Page 50: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 50/53

45Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

BEST PRACTICESA large number of ler practices noted in the study sample may ameliorate both the

e ectiveness and the e ects of identity the .

Filer Treatment of New Accounts

Based on analysis of the sample lings, it appears that most lers conduct publicdatabase checks of the information provided on new account applications priorto allowing an applicant to begin using the account. If the applicant’s identifyinginformation, such as Social Security Number, address, or date of birth, does not matchpublic database information, the ler usually sends the application to its securityo ce for further review.

A er approving an application, many lers note the funding method employed by thenew account holder. Generally, the ler will immediately restrict any new account ifthe initial funding instrument is rejected or returned by the paying institution.

Ongoing Filer Assurance of Customer Account Security

Many lings in the sample described measures lers employ on an ongoing basis tohelp ensure that their customer accounts are protected from unauthorized access,manipulation, or the . Since a large percentage of all customer transactions now

occur online, lers have devised means of verifying that the legitimate account holderinitiated requested transactions. Online account access requires electronic passwordsas a ma er of course. Since passwords can be stolen through computer intrusion,many lers have resorted to issuing random temporary password generating tokensto their customers. As previously mentioned, these tokens generate new temporaryaccount passwords that are only usable for a very short period, generally 60 seconds.Consequently, any key logging so ware surreptitiously installed on customercomputers is of virtually no use to the identity thief since captured passwords areinvalid by the time the thief receives them. It should be noted that this technology isnot invincible to hackers. 50

See50. h p://gadgetwise.blogs.nytimes.com/2011/03/18/rsas-secure-ids-hacked-what-to-do/ .

Page 51: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 51/53

46Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

Another potentially valuable security measure is the employment of challengequestions. Overall, 2.5 percent of sample lings reported that a ler rejected requestedtransactions a er receiving unsatisfactory responses to challenge questions. Though itis possible for legitimate customers to forget the answers to some challenge questions,the failure by the alleged customer described in one sample ling to remember the dayor even the month of his wife’s birthday could indicate identity the .

Filers have also begun employing spoken passwords for account access. Thecustomer calls the ler and provides this password to complete a transaction orreceive account information. Since the password is not recorded on the customer’scomputer, it is not available to be hacked.

Many lers routinely telephone customers who request transactions online, by fax, or by le er whenever the request exceeds a dollar amount threshold. Filer employeesare generally directed to contact the customer at the phone number provided at

account opening to ensure that the employee is not calling a number recently addedto an account by an imposter.

Many lers also insist that customers who have been victims of identity the associatedwith computer intrusion have their computers professionally cleaned of any maliciousso ware before allowing the customers to resume online access to investment accounts.

Filers also frequently verify with the paying institution that large ACH or negotiableinstrument deposits to customer accounts are actually authorized by the accountholder at the paying institution and that the paying account has su cient funds tocover the transfer.

Addressing Speci c Risks

Study ndings noted the steeply increasing trends related to both the abuse ofdebit cards tied to investment accounts and the associated losses resulting from thisabuse. Much of this activity is not initiated by the actual account holder, but involvesdebit cards stolen or cloned from legitimate customers. Possible mitigators includerestrictions on debit card use by new customers and automated monitoring systemsthat temporarily restrict accounts exceeding set parameters to allow time for manual

review of suspect transactions.The study also noted the abuse of promotional account features, such asreimbursement for ATM charges. These abuses appear most likely when clear limitsare not set on volume of transactions, aggregate dollar amounts, and/or maximumamount of ATM fee.

Page 52: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 52/53

47Identity The — Trends, Pa erns, and TypologiesBased on Securities and Futures Industries Suspicious Activity Reports

Financial Crimes Enforcement Network

NEXT STEPSIdentity the continues to plague the nation’s consumers. The Identity The Resource

Center (ITRC) recorded 662 data breaches in the United States in 2010, a nearly 33percent increase from 2009. 51 The ITRC also reported in a June 2010 study that 87percent of survey respondents were at least somewhat concerned about the threat ofidentity the as they conducted online nancial transactions. 52

FinCEN will continue to monitor BSA lings related to identity the and expects to issueadditional reports on SAR reporting of identity the within speci c nancial sectors.

See51. h p://www.idthe center.org/ITRC%20Breach%20Report%202010.pdf . Reference in this report toany speci c commercial product, service, process, or enterprise, or the use of any commercial productor enterprise, trade, rm, or corporation name is for the information and convenience of the public,and does not constitute endorsement or recommendation by the Financial Crimes EnforcementNetwork. With respect to materials generated by entities outside of the Financial Crimes EnforcementNetwork, permission to use these materials, if necessary, must be obtained from the original source.The Financial Crimes Enforcement Network assumes no responsibility for the content or operation ofother Web sites.

See52. h p://www.idthe center.org/artman2/publish/m_press/2010_Consumer_Survey.shtml .

Page 53: Id Theft 11_508 Final

8/10/2019 Id Theft 11_508 Final

http://slidepdf.com/reader/full/id-theft-11508-final 53/53

Financial Crimes Enforcement Network