when you aren’t you: corporate identity theft corporate identity … greg... · 2015. 4. 22. ·...

12
1 1 When You Aren’t You: Corporate Identity Theft – A New Snake in the Grass.... (and Check Fraud – Still #1….) Presented at 2015 Greg Litster, President SAFEChecks Corporate Identity Theft Corporate Identity Theft is one of the newest financial threats facing businesses and organizations. There are two major types of Corporate Identity Theft. In one major type, fraudsters target and imitate a legitimate business. Targeting businesses can be much more profitable for fraudsters than personal identity theft. Dun & Bradstreet has reported cases of corporate identity theft in at least 22 states, and predicts this crime will spread across the country. Corporate identity theft is the unauthorized use of a company’s name and information by criminals in order to illegally obtain money, goods, or services. The Internet has made it easy to create a non-existent business that looks legitimate – no organization is immune from the threat of corporate identity theft. Some losses have reached a half-million dollars before the crime was discovered.

Upload: others

Post on 12-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

1

1

When You Aren’t You:

Corporate Identity Theft –

A New Snake in the Grass....

(and Check Fraud – Still #1….)

Presented at

2015

Greg Litster, President

SAFEChecks

Corporate Identity Theft Corporate Identity Theft

is one of the newest financial threats

facing businesses and organizations.

There are two major types of

Corporate Identity Theft.

In one major type,

fraudsters target and imitate

a legitimate business.

Targeting businesses can be much

more profitable for fraudsters than

personal identity theft.

Dun & Bradstreet has reported cases

of corporate identity theft in at least

22 states, and predicts this crime will

spread across the country.

Corporate identity theft

is the unauthorized use of a

company’s name and information

by criminals in order to illegally

obtain money, goods, or services.

The Internet has made it easy to

create a non-existent business that

looks legitimate – no organization is

immune from the threat of corporate

identity theft.

Some losses have reached a

half-million dollars before the

crime was discovered.

Page 2: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

2

2

When banks or other commercial

lenders evaluate a business, they

look for evidence that the company

is what its officers say it is, and that

it has the legal and financial capacity

to conduct its business.

Evidence = “Proof of Right”“Proof of Right” can include…

● financial statements

● business addresses

● telephone numbers

● government licenses

● credit history

● etc.

Each Proof of Right that can be

verified increases the appearance

of a company’s legitimacy.

Thieves can create fraudulent

Proofs of Right by gaining access

to state government records of

legitimate businesses, and then

altering company information,

such as the registered agents’

names and addresses.

Criminals open new bank accounts

and obtain loans and credit cards

in the name of the business, often

using the compromised identity of

business owners or officers.

They use falsified financial

statements to even lease offices,

furniture and equipment, creating

the illusion of a successful business.

They use bank loans and retailer

lines of credit to purchases items

that can readily be sold for cash.

Often, this leaves the unwitting

victimized business awash in debt

and legal fees defending itself

against creditors….

Page 3: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

3

3

Criminals tend to target smaller

and midsize businesses with strong

credit ratings that are easily

identified through credit rating

agencies.

Business credit reports are intended

to promote “buying and selling,” and

help managers make risk assessment

decisions, so business credit reports

are readily available to virtually

anyone.

Family businesses, churches, and

inactive companies have been targeted.

Smaller businesses with strong

credit ratings are tempting targets

for criminals because they often

have fewer legal and financial

defenses than large corporations. Real Life Examples….

In California: A seafood company received

an order for $500,000 worth of goods.

After completing a credit check, the

company shipped the order and billed the

customer.

The customer responded that it had never

placed nor received the order.

It was discovered that the customer's

credit information and a different address

had been given by a fraudster.

By that time, both the goods and the thief

had already vanished.

In California, identity thieves moved

into the same building as a law firm

—under the firm's own name! — and

billed the firm for $70,000 worth of

computers and furniture.

When the products arrived, they hired

a moving truck and disappeared….

Page 4: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

4

4

In Oregon, identity thieves reinstated old mining companies to steal their corporate identity.

(Oregon recently established limits on how long a company can be dormant before it is reinstated.)

In Colorado: Criminals updated or

altered the registration information on

file with the state.

After the registration information was

changed, the criminals used the altered

corporate identity to make online

applications for credit from various

retailers, including Home Depot, Office

Depot, Apple and Dell.

Colorado authorities became aware of

the scam after one of the targeted

companies was contacted by a major

retailer regarding nearly $250,000 in

purchases made in its name.

In Colorado: A small business owner

learned of his company’s identity theft

when he contacted Dun & Bradstreet to

ensure an address change was recorded

properly.

That's when he learned of a new

registered agent and address - an Aurora

mail drop that was set up to forward

everything to California.

The thieves also had changed key

information about his company on

Dun & Bradstreet's database, such as

increasing the number of his employees

from 15 to 150 and his company's

annual revenues by a factor of 10!

In Florida: An aviation company had been

dissolved by the owners. It was then

reinstated by corporate identity thieves.

Soon after, they applied for a $140,000

federal fuel tax credit, which was delivered

as a check.

The scammers and the money disappeared

and the previous owners only learned

about it when “the IRS came knocking on

their door."

Solutions to this type of Corporate Identity Theft….

Many state governments

are actively working to

help better protect

government controlled

and regulated business

data.

Page 5: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

5

5

The biggest challenge is alerting and

educating organizations about this

new type of crime, and motivating

them actively self-monitor.

Defensive strategies include using

better passwords, dual-authentication

controls, and checking business legal

filings regularly.

Organizations should protect their

business EIN / TIN as they would

a Social Security number.

Businesses should verify atypical large

purchases and change of shipping

address from current clients.

Businesses should verify unusual

large purchases from new clients.

Keep all documents containing

business information or business

identifiers in a secure place that is

not accessible by

unauthorized persons.

Shred them when

discarded.

Use caution when completing a credit

application.

Criminals post fake credit applications,

and after a legitimate company has

filled it out, the criminals have all the

information they need to defraud the

business, or obtain loans or lines of

credit in the business' name.

Review your commercial and business

banking agreements – understand the

time frames for reporting fraud,

anomalies, etc.

Monitor your business accounts daily.

Many banks provide email and text alerts

regarding your account activity, which

can help alert you to suspicious

transactions.

Page 6: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

6

6

If your business provides or maintains a

list of trade or credit references, request

each reference to notify you if they are

contacted by a third party.

If you are not applying or planning to

apply for new credit, you can place a

security freeze on your personal credit to

prevent businesses with whom you do not

already have an existing relationship from

accessing your credit file.

Training!!

Protecting your business, and the

sensitive information of your business,

your customers, and employees is the

responsibility of everyone in your

organization.

In the second major category of Corporate Identity Theft,

criminals target an organization’s clients or vendors through

Corporate Hacking.

� Hackers target Accounts Receivable List� Hackers target Accounts Receivable List

� Send bogus change-of-bank notifications

to customers

� Hackers target Accounts Receivable List

� Send bogus change-of-bank

notifications to customers

� New PO Box controlled by hackers

� Hackers target Accounts Receivable List

� Send bogus change-of-bank notifications

to customers

� New PO Box controlled by hackers

� New Bank R/T and account controlled by

hackers

Solutions to this type of Corporate Identity Theft….

Page 7: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

7

7

� Banks: Monitor bank changes on

outgoing repetitive wires� Banks: Monitor bank changes on

outgoing repetitive wires

� Companies: Confirm ALL bank change

notifications from vendors

� Banks: Monitor bank changes on

outgoing repetitive wires

� Companies: Confirm ALL bank change

notifications from vendors

� Buy cyber crime and check fraud

insurance

� Banks: Monitor bank changes on

outgoing repetitive wires

� Companies: Confirm ALL bank change

notifications from vendors

� Buy cyber crime and check fraud

insurance

� Use payee positive pay and high

security checks

RESOURCES:

businessidtheft.org

Dun & Bradstreet

Bloomberg BusinessWeek,

The Council of State Governments

Also, review information and resources offered

by your state and local government.

Check Fraud

Why talk about Check Fraud?

Check Fraud

Produces more $ Losses

than all other types of payment fraud!

50% of organizations

still issue checks.

Check fraud is not going away!

AFP 2015

Payments Fraud Survey “Checks remain the most-often targeted

payment method by those committing

fraud attacks. Check fraud also

accounts for the largest dollar

amount of financial loss due to

fraud.”

AFP 2015 Payments Fraud Survey

Page 8: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

8

8

Fraudulent Payments by Method(Respondents were hit multiple ways; total > 100%)

0

20

40

60

80

100

Percentage

CHECKS 77%

Corporate

Cards 34%

Wire Tranfers

27%

ACH Debits

25%

ACH Credits

10%

Fraud Losses by Method

How Dollars were actually lost

0

20

40

60

80

100

Percentage

CHECKS 45%

Corporate

Credit Cards

25%

Wire

Transfers 20%

ACH Debits 7%

Corporate

Debit Cards 2%

ACH Credits

1%

The newest twists on Check Fraud….

Mobile Banking and Deposit Fraud:

Double Debits

Mobile Banking Deposit Fraud

Scenario: A check is mailed to Dishonest Don

• Don deposits the check using smart phone app

Digitized check is paid at drawer’s bank

• 10 days later, Don cashes the same check at a

check cashing store

2nd check hits the drawer’s bank account

(check is presented for payment twice)

Who Takes The Loss?

The answer is found in the Rules

governing Check 21

Liability for the loss falls to the bank that allowed

its customer to use its smart phone app.

Bank can charge the loss against its customer

(assuming $$ is still there)

Under the § 229.56 Warranty… Mobile Banking and Deposit Fraud:

Holder in Due Course

Scenario: A title insurance company gives

John Doe a check at closing. John Doe

deposits the check via a mobile app,

then comes back to office and returns the

check, asking that it be made payable to

John Doe or Jane Doe.

Page 9: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

9

9

The company doesn’t think to place a

Stop Payment on the first check

because they have the check in hand.

1. If a physical check is returned for a replacement,

place a stop payment on the returned check. It

may have been deposited remotely.

2. Recipient MUST sign an affidavit stating the

check was not “deposited.”

3. An Affidavit does not provide protection, only a

right to sue and collect legal fees.

Strategies to Prevent

Check Fraud

Don’t Write Checks!

• Use Commercial Purchase Cards

• Pay electronically (ACH)

But, if you are going to

write checks…

#1. Positive Pay

Positive Pay...

...a powerful tool!

PositivePay.net#2. H

igh Security Checks

Effective check fraud

prevention strategies begin

with a high security check.

Page 10: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

10

10

High Security Checks

1. Deter the forger (psychological warfare)

2. Thwart forgers’ attempts to replicate or

alter the check

3. Provide legal protection from some Holder

in Due Course claims (UCC § 3-302)

What makes a check

secure?

10+ safety features

Important Security Features

� Controlled Check Stock

� Dual-tone True Watermark

� Thermochromatic Ink (reacts to heat)

� Warning Bands worded correctly

� Toner Anchorage

� Copy Void Pantograph

� Chemical-reactive Ink + Paper

� Inventory Control Number on Back (laser)

� UV Ink + UV Fibers

� Microprinting

� Laid Lines www.safechecks.com

� Is a critical security feature

� Checks should be unique in some way to every other

organization’s check stock

� No two organizations should have the exact, identical

check stock

www.safechecks.com

Controlled Check Stock

• Checks ARE NOT uniquely designed or

customized for every end-user

• It is sold entirely blank to countless entities,

organizations, and fraudsters, by print brokers

all over the USA

Uncontrolled Check Stock

www.safechecks.com

How is

Uncontrolled Check Stock

a problem?

Counterfeit Cashiers Checks Counterfeit Cashiers Checks Counterfeit Cashiers Checks

Page 11: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

11

11

Counterfeit Cashiers Checks Counterfeit Cashiers Checks

Holder in Due Course

and

Uncontrolled Check Stock

Web: FraudTips.net

Robert Triffin v.

Somerset Valley Bank and

Hauser Contracting Company

HIDC & Uncontrolled Check Stock

1. Custom-manufacture checks using an

ORIGINAL design, true-watermarked paper,

and at least 10 security features, OR

2. Buy from a supplier that only sells controlled

check stock that has never been replicated

or used in a check fraud scam.

SAFEChecks.com

Obtaining Controlled Check Stock Other Important Security Features

� Dual-tone True Watermark

� Thermochromatic Ink (reacts to heat)

� Warning Bands worded correctly

� Toner Anchorage

� Copy Void Pantograph

� Chemical-reactive Ink + Paper

� Inventory Control Number on Back (laser)

� UV Ink + UV Fibers

� Microprinting

� Laid Lines www.safechecks.com

Robert Triffin v.

Pomerantz Staffing Services

HIDC & High Security Checks AFP 2014 Payments Fraud Survey

Check Fraud Methods – Alterations:

1. Payee Name Alterations = 52%

2. Dollar Amount Alterations = 37%

This is up from 49% and 22% respectively, in the 2013 Survey….

AFP 2014 Payments Fraud Survey

1. Payee Name Alterations = 52%

2. Dollar Amount Alterations = 37%

Most of these alterations could have been prevented with check security features!

Page 12: When You Aren’t You: Corporate Identity Theft Corporate Identity … Greg... · 2015. 4. 22. · The thieves also had changed key information about his company on Dun & Bradstreet's

12

12

� High-security checks

� 14 point font for Payee Name

� High-quality toner

� Hot laser printer

� Payee Positive Pay

Frank Abagnale’s Fraud Bulletin on Laser Check Printing

Preventing Altered PayeesPositive Pay Provides

NO PROTECTION

Against

Added Payee Names!#3. S

ecure Check W

riting

Software

To Prevent Added Payees

Open Areas Where Forgers Add A New Payee Name

Typical Check Layout

Secure Name Font

Secure Name Font printed above original payee name

helps eliminate Added Payee Name Risk

Fix it: Use a Secure Name Font

No room for an Added Payee

Secure Name Font printed above original payee name

helps eliminate Added Payee Name Risk

Leaves No Room for Adding Bogus Payee

Identical data is printed on both checks.Which check would forgers prefer to attack?

Greg Litster, President

SAFEChecks

(800) 949-BANK

(818) 383-5996 cell

[email protected]

[email protected]

# # # #