Identity Theft and Its Symptoms and Warning Signs Discussion

User Generated

Fgrin

Business Finance

Description

Discussion 8 - Consumer, Bankruptcy, Tax, and E-Commerce Fraud

The three chapters near the end of our textbook book discuss various fraud schemes that, unfortunately, we are all too likely to experience personally, if we have not already.  Far too many of these fraud schemes permeate our society and daily experiences.  Most of you, your families, or loved ones will be touched in some way by one or more of the fraud schemes covered in these chapters.  We certainly can't stop this fraud, but we can educate ourselves and those around us on these schemes, their signs and symptoms, and means of prevention and protection.

In this light, this week's discussion will create an open discussion of many of these schemes, helping to educate all of us and raise our level of awareness.  In this way, we are better prepared to avoid these situations, educate others, and help to protect ourselves and those we care about.

For this discussion, choose a fraud scheme from Chapters 15, 16, or 17.  Educate yourself on your particular selected scheme, including some outside research to broaden your understanding.  Post a 3 to 4 paragraph summary of the following:

  • Summary description of the fraud scheme (make sure it is a specific scheme and not a category)
  • Educate us regarding the symptoms and warning signs of the particular scheme
  • Summarize a case study example of the fraud scheme, either from research or from personal experience, of the fraud in your life or that of someone close to you 
  • Discuss methods of prevention for your selected fraud scheme, including how you can educate others in your life to help protect them

Unformatted Attachment Preview

CHAPTER Consumer Fraud Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. After studying this chapter, you should be able to:  Define what consumer fraud is and understand its seriousness.  Understand identity theft.  Classify the various types of investment and consumer frauds. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 2  Consumer fraud  Any fraud that targets individuals as victims  Examples  Telephone fraud  Magazine fraud  Sweepstakes fraud  Foreign money offers  Counterfeit drugs  Internet auctions  Identity theft  Bogus multilevel marketing schemes Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 3  Federal Trade Commission survey results  Estimated that more than 25 million adults—10.8 percent of the adult population—were victims of fraud during 2011  Identified characteristics of victims of consumer fraud  Ranked top-five most frequently reported types of consumer fraud 1. Weight-loss products (estimated 5.1 million victims) 2. Prize promotions (estimated 2.4 million victims) 3. Unauthorized billing—buyers’ club memberships (estimated 1.9 million victims) 4. Unauthorized billing—Internet services (estimated 1.9 million victims) 5. Work-at-home programs (estimated 1.8 million victims) Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 4  Identity theft is used to describe those circumstances when someone uses another person’s name, address, Social Security number (SSN), bank or credit card account number, or other identifying information to commit fraud or other crimes.  The most detrimental consequence of identity theft isn’t the actual loss of money, but rather the loss of credit and reputation along with introduction of erroneous information that is extremely difficult to restore or fix. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 5  Perpetrators of identity theft follow a common pattern after they have stolen a victim’s identity.  Although some fraudsters perpetrate their frauds in slightly different ways, most generally follow the stages in the cycle shown in Figure 15.1. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 6 Stage 1. Discovery 1. Perpetrators gain information. 2. Perpetrators verify information. Stage 2. Action 1. Perpetrators accumulate documentation. 2. Perpetrators conceive cover-up or concealment actions. Stage 3. Trial 1. First dimensional actions— Small thefts to test the stolen information. 2. Second dimensional actions— Larger thefts, often involving personal interaction, without much chance of getting caught. 3. Third dimensional actions— Largest thefts committed after perpetrators have confidence that their schemes are working. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 7  Buying large-ticket items  Taking out car, home, or other loans  Establishing phone or wireless service in victim’s name  Using counterfeit checks or debit cards  Opening a new bank account  Filing for bankruptcy under the victim’s name  Reporting a victim’s name to police in lieu of their own  Opening new credit card accounts  Changing victim’s mailing address Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 8  Common ways to steal someone’s identity  Posing as a legitimate employee, government official, or representative of an organization with which the victim conducts business  Shoulder surfing—watching or listening as a victim enters a credit card number  Dumpster diving—rummaging through consumers’ trash to gain access to preapproved credit card applications, tax information, receipts containing credit card numbers, social security receipts, or financial records  Skimming—using a storage device to gain access to valuable information when a credit card is processed Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 9  Skimming is predominantly used to commit credit card fraud but it is gaining in popularity among identity thieves.  Skimming devices are small and easy to hide  Skimming occurs during transactions at common locations including:  Restaurants  ATM machines  Gas pumps  Stores Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 10  Gathering information from businesses  Stealing wallets or purses  Breaking into victims’ homes  Stealing mail  Completing “change of address” forms  Shoulder surfing  Phishing Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 11  Guard your mail from theft  Opt out of preapproved credit cards  Check your personal credit information (credit report) at least annually  Protect SSNs  Safeguard personal information  Guard trash from theft  Protect wallet and other valuables  Use strong passwords  Protect your home  Protect your computer  Opt out of information sharing Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 12  When people commit identity theft, they can face criminal charges, civil actions, or both.  Every state, as well as the federal government, has statutes prohibiting identity theft in its various forms.  Table 15.1 lists some of the more common identity fraud federal statutes that every fraud examiner should know about. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 13 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 14  Contact the Federal Trade Commission (FTC).  Contact financial institutions where your identity might have been used to establish a fraudulent account.  Consider changing personal identification numbers (PINs), bank account cards, checks, and other personal identifying data. Organizations and agencies that provide assistance to victims of identity theft  Federal Trade Commission (FTC)  Federal Bureau of Investigation (FBI)  U.S. Secret Service  U.S. Postal Inspection Service  Internal Revenue Service  Social Security Administration  Credit reporting agencies  Check verification companies Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 15 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 16  Identity theft is not the only type of consumer fraud.  Other types of scams target consumers.  These scams fall into five categories:  Foreign advance-fee scams  Work-at-home schemes  Bogus mystery shopping scams  Telemarketing fraud  Investment scams Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 17  Nigerian money offers  Other foreign-advance fee scams  Clearinghouse scam  Purchase of real estate scam  Sale of crude oil at below market price  Disbursement of money from wills Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 18 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 19  Multilevel marketing  Fraudulent multilevel marketing organization (pyramid or Ponzi scheme)      Headhunter fees Front loading Opportunity meetings Snake oil plans Ground floor opportunity  International multilevel marketing schemes  Chain letters  Mail stuffing  Product testing  Craft assembly Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 20 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 21  Perpetrators promise victims a job that involves strolling through stores, shopping for merchandise, and then filing reports on their experiences.  Consumers are asked to pay an “application charge” and they are promised supplies with a list of places and companies that may hire mystery shoppers.  This list is a simple collection of department store addresses and contact information.  Other scams require that consumers buy merchandise from a particular Web site.  Although some mystery shoppers’ advertisements are legitimate, the majority are not. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 22 2  Figure 15.4 provides an example of three mystery shopping letters. 1 3 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 23  Basics  Boiler rooms  Target lists  Scripts  Promises  Scams that prey on the elderly  Safeguards against telemarketing fraud  Avoid sales calls  Telemarketing fraud involves large and small transactions Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 24  Investment fraud is any fraud that is related to stocks, bonds, commodities, limited partnerships, real estate, or other types of investments.  In investment fraud, perpetrators usually make fraudulent promises or misstatements of fact to induce people to make investments.  Investment frauds are often set up as Ponzi schemes.  Investments frauds can occur within or outside business organizations. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 25  Mortgage fraud involves falsifying or omitting information when obtaining a mortgage loan.  The goal is to obtain a higher loan than would be provided if the truth was disclosed. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 26  During the subprime mortgage crisis, banks and mortgage brokers were encouraging and even, in some cases, creating fictitious information.  This is an unusual form of consumer fraud in that consumers can play both roles as perpetrator and victim.  In many cases, consumers were encouraged to commit fraud for the purpose of getting a loan on a home that they could not afford.  In the end, they become victims of the lender who gained fees to originate their loan.  The ensuing subprime mortgage crisis, which was arguably the result of multiple frauds, led to massive worldwide economic consequences of epic proportions. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 15 27 CHAPTER Bankruptcy, Divorce, and Tax Fraud Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. After studying this chapter, you should be able to:  Explain why fraud is so prevalent in bankruptcy, tax, and divorce cases.  Describe the nature of bankruptcy and be familiar with bankruptcy codes.  Understand civil and criminal bankruptcy fraud statutes.  Identify the participants involved in the bankruptcy process.  Recognize different bankruptcy and divorce fraud schemes.  Understand how perpetrators fraudulently conceal and transfer assets and income in bankruptcies and divorces.  Define tax fraud and be familiar with common tax fraud schemes.  Understand how money laundering is used to commit fraud. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 2  Fraud is common in bankruptcies, divorces, and tax payments because, in all three situations, assets are being taken away from someone or some organization and given to someone else.  In bankruptcy cases, assets are given to creditors.  In divorces, assets are given to spouses and attorneys representing spouses.  In tax cases, assets are claimed by the government.  To keep assets from being taken, individuals often attempt to fraudulently hide or transfer assets so that those assets remain unknown or cannot be discovered.  Transfers of assets to offshore bank accounts, relatives, friends, and other hiding places are all too common in bankruptcy, divorce, and tax fraud.  Both bankruptcy and divorce fraud can be criminal or civil matters.  Tax fraud cases are usually criminal matters. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 3  CPAs and other fraud examiners can play an important role in both investigating and testifying in bankruptcy and divorce fraud cases and in testifying in tax fraud cases.  The arm of the IRS that investigates tax fraud is known as Criminal Investigation (CI). Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 4  Roles that fraud examiners can assume in divorce and bankruptcy cases include the following:  Serve as an examiner or a trustee in bankruptcy cases  Serve on creditors’ committees or represent creditors’ committees by investigating the debtor’s financial affairs and preparing investigation reports in bankruptcy cases  Assist the U.S. Department of Justice, the Office of the United States Trustee, panel trustees, and others by preparing detailed reports of investigation findings in bankruptcy cases  Assist in recovering assets for creditors in both divorce and bankruptcy cases  Serve as private investigators to find hidden assets or examine lifestyles of divorce or bankruptcy participants Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 5  Several different types of bankruptcy and divorce frauds are noteworthy:  Bankruptcy or divorce resulting from fraud  Bankruptcy and divorce used to perpetrate fraud  Bankruptcy and divorce used to conceal fraud Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 6  Tax fraud can be committed against any organization that collects taxes, including the federal government, state governments, local governments, or other taxing authorities.  If the IRS suspects that an individual or entity is underpaying its taxes, the individual’s or entity’s tax return will be audited by an IRS tax compliance auditor.  If the audit reveals that taxes were underpaid, the auditor can either assess civil fines and penalties or, worse, refer the case to the IRS’s Criminal Investigation division. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 7  The IRS’s CI division is directed at the taxpayers who willfully and intentionally violate their known legal duty of voluntarily filing income tax returns or paying the correct amount of income, employment, or excise taxes.  CI’s fraud work  Encompasses a wide variety of cases involving tax and money laundering crimes  CI investigations  Involve a broad spectrum of individuals and industries from all facets of the economy, including small business owners, selfemployed individuals, and large corporations Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 8 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 9 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 10 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 11 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 12  The party attempting to prove divorce fraud must prove all three of the following:  A false representation, usually one of fact, was made by the other party.  The defendant had knowledge or belief that the representation was false or made the representation with reckless indifference to the truth.  The defendant had intent to induce the plaintiff to act or refrain from acting in a certain way.  Most divorce fraud litigation results from one of two allegations:  The plaintiff spouse claims that the defendant hid assets so they would not have to be shared or taken away.  The values assigned to assets were unrealistically low, thus resulting in an unfair divorce settlement. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 13  The usual parties involved in a divorce include:  The marital partners  Attorneys for both sides  A divorce court Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 14  When allegations of fraud, such as hiding or illegally transferring assets arise, the attorney for the party alleging fraud usually hires investigators to try to locate such hidden assets.  Investigative techniques such as surveillance, public records searches, and even subpoenas of private records are often used.  Any evidence that is discovered by the investigators will be presented by the attorney to the divorce court in order to obtain the most favorable divorce settlement possible.  Most divorce fraud cases are civil cases, but where evidence of egregious fraudulent acts by one marital partner has been shown, law enforcement officials are often involved and criminal charges can be filed. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 15  The most common fraud scheme utilized in fraudulent bankruptcy filings, like divorce, involves the concealment of a debtor’s assets.  Concealment prevents these assets from being liquidated and transferred to creditors to extinguish debts.  Examples  Individual not listing assets  Business owner transferring assets to family members or outside business interest controlled by owner Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 16  Bankruptcy fraud also involves schemes including:  Petition mills  Multiple filings  Filing for bankruptcy in different states by utilizing true personal identifiers  Using false names or SSNs to file in the same or different states  False statements  Trustee fraud  Attorney fraud  Forged filings  Embezzlement  Credit card fraud  Bust-outs Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 17  Title 11 of the U.S. Code is a federal statute that governs the bankruptcy process.  The code provides for several types of bankruptcy.  Chapters 1, 3, and 5 of Title 11  Contain general provisions that apply to all bankruptcies.  Chapters 7, 11, and 13 bankruptcies  Apply to specific types of bankruptcy Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 18  Chapters 7 and 11 bankruptcies may be used by corporations or individuals.  Under Chapter 7 bankruptcy, the bankruptcy involves a complete sale or liquidation of all assets and the proceeds are used to pay creditors, usually at some percentage of the debts owed.  Under Chapter 11 bankruptcy, the creditors are told to give the bankrupt entity some time until it can reorganize its operations and finances so as to settle its debts and continue to operate in a reorganized fashion.  If reorganization does not work in Chapter 11 bankruptcy, judges often order a Chapter 7 bankruptcy. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 19  Chapter 13 bankruptcies are reorganizations (similar to Chapter 11) that can be used by individuals with regular income and debts of $1 million or less.  Debtors make regular payments to creditors over a specified number of years under Chapter 13.  If reorganization does not work in 13 bankruptcies, judges often order a Chapter 7 bankruptcy. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 20  Some of the more relevant sections of the Bankruptcy Code relating to criminal fraud include:  Concealment of Assets, False Oaths and Claims, and Bribery (18 USC § 152)  Embezzlement against the Debtor’s Estate (18 USC § 153)  Adverse Interest and Conduct of Officers (18 USC § 154)  Bankruptcy Fraud Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 21  Some of the most pertinent sections of the Bankruptcy Code that provide civil remedies for bankruptcy fraud:  Offenses Leading to Revocation of Debt Discharge in Chapters 11 and 13 Cases  Fraudulent Transfers Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 22  Bankruptcy court  U.S. Trustee  Court-appointed or panel trustee  Examiners  Debtors  Creditors  Adjusters (operations or field agents) Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 23  Section 327(a) of the Bankruptcy Code allows trustees to employ, with the court’s approval, attorneys, accountants, or other professionals to represent or assist the trustee.  Also, Code Section 1103 allows a creditors’ committee to employ, with the court’s approval, attorneys, accountants, or their agents to perform services for the committee.  Although the code does not specifically authorize it, bankruptcy courts have typically allowed examiners to employ CFEs, CPAs, and other professionals.  Fraud examiners may be used to conduct fraud investigations as well as provide consulting and other financial services. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 24  The two most common bankruptcy fraud schemes are:  The planned bankruptcy, or bust-out  The fraudulent concealment of assets during, or in contemplation of, a bankruptcy  This latter scheme is also the most common type of fraud in divorce cases. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 25  A bust-out may take several forms, but essentially involves intentionally obtaining loans or purchasing inventory on a credit basis and concealing, or absconding with, the proceeds from the loan or sale of the inventory or with the inventory itself before creditors are paid.  Insolvency is declared and bankruptcy is filed, but the creditors find no assets left from which they can be paid.  If the scam works, the perpetrators retain the cash proceeds (from the loan or sales or the inventory) but escape liability for the unpaid debt. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 26  A bust-out may involve setting up a new company or using an established company.  In the first type of bust-out, the fraud perpetrators set up a new company and operate it legitimately for a while in order to establish credibility (a reputation for honesty) and credit with banks (that provide loans) or suppliers (who sell goods on credit).  In the second type of bust-out, the perpetrators quietly buy an established company that already has a good reputation and credit rating and take over its management. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 27  A company’s only listed address and phone number are a post office box and an answering service.  A new company is owned and managed by persons from another state or is vague about its ownership or type of business.  A sudden change is made in a company’s management, especially if the change is made without public notice.  Credit references either cannot be verified or seem too eager to provide favorable references.  The size of orders placed on credit and the credit balances with suppliers suddenly and dramatically increase.  The inventory is suddenly deleted, without explanation.  “Customers” have a history of buying goods at unreasonable discounts. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 28  Although bust-outs are unique to bankruptcy, fraudulent concealment of assets or income is a common type of fraud in both bankruptcy and divorce. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 29  When a company or an individual (including an individual who owns an unincorporated business) files for bankruptcy or an individual files or is involved in a divorce, an estate is created.  This estate consists of the property (or income, in some cases) of the debtor or divorcee, which will be divided among claimants and over which the bankruptcy or divorce court has control.  Handling of estate assets  In a Chapter 7 bankruptcy  All estate assets are liquidated and the proceeds are used to settle debts.  In Chapter 11 bankruptcies or Chapter 13 bankruptcies  These bankruptcy types allow the individual or organization to retain assets and to settle debts from future income.  Some estate assets may be liquidated or turned over to creditors in settlement of debt, but most are not.  In a divorce case  Estate assets of the married couple are usually divided between the two marital partners after the debts of the couple are paid. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 30  Title 18, Section 152, of the U.S. Code makes it a crime to knowingly and fraudulently conceal property of a debtor’s estate or falsify any documents, records, or statements during, or in contemplation of, a bankruptcy.  The Bankruptcy Code provides for revocation of debt forgiveness or discharge obtained through fraud, including concealment of assets or intentional misstatement of records or statements filed in the case.  Even if the debtor is not convicted of criminal or civil fraud, any concealed assets or income that are located can be brought back into the estate to be used to settle debts. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 31  Cash received in payment of receivables may be diverted to another entity, usually a related party.  Inventory may be shipped to an off-site location or sold to a related party or co-conspirator at a steeply discounted price.  Assets or income may be shifted to another entity controlled by the debtor or the divorced party.  Sales may not be reported in the debtor company’s books.  Payments may be made to fictitious individuals or vendors and the amounts diverted to the debtor or to a divorced party.  Income from controlled organizations may be intentionally understated by overstating expenses.  The debtor’s personal expenses may be paid by the company and mischaracterized as business expenses.  The debtor’s or divorced partner’s books and records or other financial information may be damaged or hidden.  Interests in partnerships, corporations, lawsuit proceeds, or other assets may not be disclosed. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 32  Some indicators of possible asset or income concealment:  Transfers of property or large payments to related parties or individuals, such as insiders, shareholders, or relatives  Frequent and unusual transfers between bank accounts, particularly between business and personal accounts  Numerous transactions made in cash that normally are made on account (sales, purchases, etc.)  Unusually large and unexplainable payments to vendors  Unusual or rapid reductions in assets  Increases in operating losses that are not explained by economic factors  Inconsistencies between financial statements or tax returns and the official forms filed for the bankruptcy or records filed in divorce cases  Travel to offshore tax havens or locations that allow secret bank accounts  Missing, inaccurate, or damaged records Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 33 Section 548 of the Bankruptcy Code defines a fraudulent transfer as a transfer made, or obligation incurred, within one year before the bankruptcy petition’s filing date that was 1. made with the actual intent to hinder, delay, or defraud creditors, for example, by giving debtor property to relatives with the intent of placing it beyond the reach of creditors, or 2. made for less than the reasonably equivalent value if a. the debtor was insolvent or became insolvent as a result of the transfer (insolvency for this purpose is defined beginning in Paragraph 906.5), or b. the debtor’s capital remaining after the transfer was unreasonably small (for instance, the debtor was constantly behind in paying bills after the transfer), or c. the debtor intended to, or believed it would, incur debts it would be unable to repay when they matured. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 34  Fraud investigators should always have evidence supporting claims of alleged fraud.  Without supporting evidence, charges of false accusations could result in civil liability against a fraud investigator.  This is especially true in cases involving bankruptcy and divorce fraud. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 35  Money laundering involves engaging in financial transactions so as to conceal the source, identity, or destination of funds.  The U.S. Department of Justice defines money laundering as “the process by which one conceals the existence, illegal source, or illegal application of income and then disguises that income to make it appear legitimate.”  The phrase “money laundering” implies that money that is “dirty” because it was generated illegally is “laundered,” or made to appear that it came from legitimate sources. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 36  Financial institutions and other organizations are required to use CRTs and SARs to report large cash transactions that could be money laundering.  Currency Transaction Reports (CTRs) are used for amounts over $10,000.  With CTRs it is the amount that triggers the filing.  Suspicious Activity Reports (SARs) are used for amounts that are suspicious but are under $10,000.  With SARs it is the suspicious activity or the pattern of deposits or the expenditures that trigger the filing. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 37  Banks  Automobile dealers  Real estate agents  Other organizations that are in positions to collect large amounts of cash Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 38  Three steps in the money laundering process  Placement  Layering  Integration Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 39  In the placement stage, the launderer inserts “dirty money” into a legitimate financial institution.  Usually, this involves making cash deposits to a bank.  This is often the riskiest stage of the laundering process because large cash deposits raise red flags and banks are required to report details regarding large cash transactions to the government.  The layering stage is the most complex step in a laundering scheme.  The purpose of this stage is to make the dirty money difficult to trace. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 40  Layering involves conducting various financial transactions to make it difficult to follow the flow of funds.  Layering may consist of such activities as making wire transfers between accounts located in different countries attached to different names.  It may also include making multiple bank-to-bank transfers, making deposits and withdrawals to continually vary the amount of money in the accounts, exchanging the money to a new currency, and purchasing high-value items (e.g., houses, cars, jewelry) to change the form of the assets. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 41  In the integration stage, the money reenters the economy in a form that appears to come from a legal transaction.  This transaction may involve the sale of other assets bought during the layering stage or giving funds to a business in which the launderer is supposedly “investing.”  Once the money is reintroduced as “clean” into the economy, the launderer can use the funds for personal consumption. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 42 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 43  Cooperative international efforts are necessary to combat money laundering because money laundering often takes place across many national borders.  The Financial Action Task Force (FATF) is an intergovernmental body that strives to combat money laundering globally.  FATF recommendations have been recognized by the International Monetary Fund (IMF) and the World Bank as the international standards for combating money laundering and the financing of terrorism. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 44  FATF recommendations deal with the following categories:  Customer due diligence and record keeping  Reporting of suspicious transactions and compliance  Other measures to deter money laundering and terrorist financing  Measures to be taken with respect to countries that insufficiently comply with the FATF rules  Regulation and supervision Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 45  Federal statutes deal with:  Money laundering instruments  Transportation or transferring of funds into or out of the United States  Transactions deriving from specified unlawful activity  Examples  Title 18, USC §§ 1956 and 1957  Focuses primarily on laundering and racketeering  Title 31, USC §§ 5316 and 5324  Focuses on records and reporting  In addition to federal statutes, individual states, as well as local governments, have developed statutes prohibiting money laundering. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 46  Investigations of money laundering often uncover other fraud or illegal activities.  Many different money laundering schemes  No exact method of detection exists for uncovering every money laundering scheme.  Red flags exist that indicate the existence of money laundering.  One single indicator does not prove that a suspicious transaction is money laundering.  Multiple red flags often exist, and a money launderer is typically identified from a combination of facts and events. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 47  Purchasing large assets or paying periodic expenses with cash  Purchasing property in the name of a nominee using different names on offers, closing documents, and deposit receipts  Purchasing personal use property under a corporate veil, whose ordinary business is inconsistent with this type of transaction  Using a post office box or general delivery address instead of a home address when dealing with contracts  Owning expensive assets without legitimate means of being able to afford them  Conducting suspicious banking activities such as excessive use of cashier’s checks or money orders  A business that does not appear to produce a sustainable amount of legitimate income  A person who is secretive about his or her occupation yet seems to be living an extravagant lifestyle Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 16 48 CHAPTER Fraud in E-Commerce Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. After studying this chapter, you should be able to:  Understand e-commerce fraud risk.  Take measures to prevent fraud in e-commerce.  Detect e-business fraud. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 2  Although fraud can occur in any environment, several aspects of e-business environments present unique risks.  These characteristics of the Internet-driven economy create pressures and opportunities specific to ecommerce fraud.  Just like other frauds, these new frauds are perpetrated when pressures, opportunities, and rationalizations interact.  E-commerce elements that create increased or unique risks are listed in Table 17.1. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 3 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 4  Data theft  Passwords  Social engineering  Sniffing  Wartrapping  Portable devices with large-capacity memory  Vandalism Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 5 Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 6  Computer viruses  True virus  Worm  Trojan horse  Spyware  Phishing  Spoofing  Falsified identity  Database query (SQL) injections  Bust-out  False Web sites  E-mail and Web site hijacking Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 7  Preventing fraud in each business setting involves reducing or eliminating the elements that motivate fraud: pressure, opportunity, and rationalization.  In e-business settings  Reducing pressures and eliminating rationalizations has thus far proved difficult.  The lack of personal contact makes it hard to know what pressures exist or what rationalizations perpetrators are using. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 8  Security through obscurity is the tactic of keeping security strategies, encryption algorithms, and processes secret in an effort to confuse attackers.  In contrast, true security is found when algorithms and processes are subjected to intense review and stand the test of time. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 9  One of the best ways to prevent fraud in e-business settings is to focus on reducing opportunities, usually through the implementation of appropriate internal controls.  In traditional businesses, internal controls involve five different elements:      The control environment Risk assessment Control activities or procedures Information and communication Monitoring  In e-businesses, the first three elements are often the most important. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 10  Risk assessment identifies the risks of doing business with ebusiness partners.  A key part of the assessment focuses on the control environment of those organizations.  Another part identifies key risks in the electronic exchange of information and money  Control procedures can be tailored to the special challenges that these exchanges present  Control procedures can be installed to counter the risk of data theft, sniffing, unauthorized access to passwords, falsified identity, spoofing customer impersonation, false Web sites, and e-mail or Web site hijacking.  A specialized branch of risk assessment is intrusion detection.  Firms specializing in intrusion detection try to gain access to networks and secure information and report their findings to management.  Normally, a security audit includes an investigation into technology, processes, controls, and other factors at a client. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 11  Adequate separation of duties  Proper authorization of transactions and activities  Adequate documents and records  Physical control over assets and records  Independent checks on performance Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 12  In e-business, this control is useful for making sure that individuals who authorize transactions are different from those who execute them.  Segregation of duties can help prevent bribery because employees don’t have complete control of transactions. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 13  Every transaction must be properly authorized.  The most common authorization controls:  Passwords  Firewalls  Digital signatures and certificates  Biometrics Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 14  Documents and records are the physical objects by which transactions are entered and summarized.  Examples include sales invoices, purchase orders, subsidiary records, sales journals, employee timecards, and checks  In e-business, documents are present in electronic form.  This lack of hard-copy documentation creates opportunities for fraud.  Because many of the traditional document controls aren’t available in e-commerce, additional controls are needed.  The primary electronic transaction and document control is encryption.  Encryption protects confidential and sensitive information (such as checks, purchase or sales transactions) from being “sniffed” or stolen. Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 15  Companies need to go to special lengths to protect computer equipment, programs, and data files.  Onsite access control needed for  Physical facilities  Equipment such as computers and servers  Software  Applications  Data  Offsite location of services  Cloud-based architectures Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 16  A key component in e-business controls is the careful and continuous review of the other four components—the independent checks and internal verification.  Independent checks are particularly important in preventing fraud in e-business.  Organizations should always conduct checks on their ebusiness partners.  To prevent fraud, gaining an understanding of the management or the organization’s business partners and what motivates them is important.  In particular, three items must be examined:  Backgrounds  Motivations  Decision-making influence Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 17  Data-driven fraud detection  Endeavor to understand the business or operations of the organization  Identify what frauds can occur in the operation  Determine the symptoms that the most likely frauds would generate  Use databases and information systems to search for those symptoms  Analyze the results  Investigate the symptoms to determine if they are being caused by fraud Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 18  Many hackers use tools that were originally written to troubleshoot networks and catch perpetrators rather than to hack into systems.  Fraud investigators who specialize in e-commerce need to understand the tools and methods that perpetrators use.  Examples of knowledge and expertise needed for catching perpetrators and securing systems:  Knowledge of web servers, e-mail clients and servers, and intrusion programs such as Nmap, and Wireshark  Knowledge of Unix/Linux  Knowledge of the security strengths and weaknesses in Windows  Knowledge of computer scripts (written in languages such as Python, Ruby, and Bash) that monitor logs and systems for potential break-ins  Knowledge of intrusion detection systems (IDS) is on the market today Albrecht, Fraud Examination, 6th Edition. ©2019 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CHAPTER 17 19
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

Running Head: CONSUMER FRAUD

1

Consumer Fraud
Name
Institution Affiliation
Date

CONSUMER FRAUD

2

Identity Theft and Its Symptoms and Warning Signs
Today, people encounter consumer frauds that target individual victims. An example of
consumer fraud is identity theft. It happens when the perpetrator uses someone else’s details like
name, password, or pin to commit crimes. All cases of identity theft follow the following steps.
The first step is discovery, where the perpetrator gains access and verifies another person’s
information. Secondly, the perpetrator document possible ways to be...

Related Tags