Fraudsters’ Accounts Malek Costa, CPA Head of Group Compliance BLOM Bank sal.

Slides:



Advertisements
Similar presentations
CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
Advertisements

Compliance with Federal Trade Commission’s “Red Flag Rule”
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
HOW TO WRITE A LETTER.
The Basics of Hiring Student Employees What’s different about hiring an international student? Wonderful! Working with an international student can be.
Checking Services and Credit-Card Transactions. Key Words 1. ATM cards 2. Cashier’s check 3. Money order 4. NSF 5. Notary Service 6. Online banking 7.
Anti Money Laundering (AML) An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
1.7.2.G1 © Family Economics & Financial Education – Revised February 2008 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Red Flags Rule & Municipal Utilities
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Anti-Money Laundering (AML)
FDIC Money Smart for Young Adults
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Checks The check is used more than any other instrument of credit as a means of making payment,
Massimiliano Di Pace1 INTERNATIONAL PAYMENTS Handling international payment can be complicated and risky The problems can be: - currency - transfer of.
Credit and claims management In practice for cross-border transactions within the EU.
Getting Paid. Payment Methods (Ranked from Most Secure for Exporter to Least Secure) 1.Cash 2.Letter of Credit 3.Collections (Payment against documents,
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
CHAPTER 8 Documentary Letters of Credit
1 GETTING PAID BY YOUR FOREIGN BUYER Presented By Nellie Smith Vice President Global Trade Services.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Export Finance Needs After obtaining an export order, finance would be needed for:  Procurement of raw materials and components and manufacture of the.
2015 ANNUAL TRAINING By: Denise Goff
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
Part V Short-Term Asset and Liability Management
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Credit Cards One of the most popular forms of credit Next Slide.
Chapter 16: Audit of Cash Balances
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
UNIT VII – Personal Financial Literacy Consumer Protection & Fraud.
Objective 4.02 Understand the banking system Classification of financial institutions.
Cost Sharing James Trotter Quality Standards Manager Sponsored Projects Administration.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Malware Targets Bank Accounts GAMEOVER!!. GameOver Cyber criminals have found yet another way to steal your hard-earned money: a recent phishing scheme.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Large Principle Money Transfer - APAC
Bank guarantees or letters of guarantee Know the letter of guarantee or bank guarantee is a written undertaking by a Bank, usually at the request of the.
Banking How banks work along with checking accounts.
Supervision SICOR Securities, Inc.. Why? NASD 3110 requires the firm to “…establish and maintain a system to supervise the activities of each registered.
PRODUCTS OF BANKING. Endorsements Before you cash, deposit, or transfer a check to someone else, you must first endorse the check. Endorse: to sign your.
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
 The forecasting and evaluation of financial risks  Identification of procedures to avoid or minimize their impact. Goals: ▪ Avoid or minimize losses.
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
ROE WEBSITE SUBMISSION OF RETURNS OF EARNINGS ONLINE.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Module 3 Processing Transactions. Section 1 Checking Accounts It is important for tellers to follow procedures with every transaction they complete. The.
© Take Charge Today – August 2013 – Understanding Credit Cards – Slide 1 Funded by a grant from Take Charge America, Inc. to the Norton School of Family.
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
Islamic banks. Submitted by We knew already that commercial banks rely on attracting deposits and funds to run a predefined interest, deposits for the.
Savings Tools Take Charge of Your Finances Family Economics & Financial Education.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
UW Whitewater Procurement Card Program. Overview The purpose of UW-Whitewater Procurement Card Program is to establish a more efficient, cost- effective.
Anti Money Laundering (AML)
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
Understanding Credit Cards
Business Office Manager Training The ACH Process in 7 Steps
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Protecting Your Identity
Procurement Card Program
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
Protecting Your Credit Identity
Business Compromise and Cyber Threat
Presentation transcript:

Fraudsters’ Accounts Malek Costa, CPA Head of Group Compliance BLOM Bank sal

2 Table of Contents  Beneficiary’s Bank  Account opening process  “Mule” Money or Accounts  Returning your client’s money

12/13/20153 Beneficiary’s Bank Big or Small Bank Bank’s Jurisdiction Bank’s AML/CFT Controls in place

Accounts’ opening process Type of Accounts: –Non Face-to-Face –Face to Face Customer Identification Program (CIP) of the Bank. –The CIP must be written, incorporated into the institution's Anti- Money Laundering program, and approved by the institution's board of directors. –The CIP must include risk-based procedures to verify the identity of customers (generally persons opening new accounts). –Procedures in the program should describe how the bank will verify the identity of the customer using documents, non- documentary methods, or a combination of both –The procedures should reflect the institution's account opening processes - whether face-to-face or remotely as part of the institution's e-banking services.

Accounts’ opening process –As part of its nondocumentary verification methods, a financial institutions may rely on third parties to verify the identity of an applicant or assist in the verification. The financial institution is responsible for ensuring that the third party uses the appropriate level of verification procedures to confirm the customer's identity. New account applications submitted on-line increase the difficulty of verifying the application information

Accounts’ opening process Many institutions choose to require the customer to come into an office or branch to complete the account opening process. Institutions conducting the entire account opening process through the mail or on-line should consider using third-party databases to provide: Positive verification to ensure that material information provided by an applicant matches information available from third-party sources, Logical verification to ensure that information provided is logically consistent, and Negative verification to ensure that information provided has not previously been associated with fraudulent activity (e.g., an address previously associated with a fraudulent application ).

“Mule” Money or Accounts Mules are the ones who receives the cash or goods from a fraudulent operations and transfer them back to the fraudster. “Bank Drop” and “Item Drop” Scenarios Mules are a crucial part of the work of fraudsters Money mules are often unaware that they are accomplices to a crime.

“Mule” Money or Accounts Mule Herders: fraudsters who specialize in recruiting mules and managing mule networks. Fraudsters realized they could recruit mules more easily by doing what they do best: scamming them over the internet. –fraudsters create and advertise a fake “work from home” opportunity. –create a fake website for a nonexistent company (usually in the shipping field) –spam job seekers’ s. –advertise the opportunity to work from home as an “account manager”, “Financial manager” –claim that the position is designed to help the company’s foreign customers receive funds from banks

“Mule” Money or Accounts –Interested parties are interviewed by phone or and then receive a contract to sign, largely to make it appear as though the entire operation were legitimate –When the mule starts working, they provide the fraudster their bank account details, and the cybercriminal in turn uses the mule’s bank account to send fraudulent transfers. –Once the money is received in the mule’s account, the mule picks it up and forwards it. His or her “salary” is a percentage of the transferred sum, which the fraudster absorbs as an expense –The mule is usually operational until the bank realizes the account is used as a mule (which can take some time, considering it’s the mule’s personal account which has a legitimate activity history), at which point the bank shuts the account down.

“Mule” Money or Accounts Mules can also be recruited as witting accomplices, usually from poorer countries. These mules are flown someplace with tickets paid for by the fraudster, and in return they either need to open bank accounts or pick up items. Mules are also flown by fraudsters to the foreign countries where they open a bunch of mule accounts, extract the fraudulent funds, and fly out. Money mule, who is left holding the bag, faces criminal charges, while the cyber criminal, residing in a different country, under a different jurisdiction, gets away scot- free.

“Mule” Money or Accounts Identifying unwitting mules can be very easy by asking simple question before they can open bank accounts. It is the same as security screening found in airports, where weird sets of questions are asked; questions that are not designed for liars but for certain individuals who were cheated and place into a particular situation. For example: –Asking the potential customer whether someone else told him or her to open a banking account in this bank. –Asking if opening this particular bank account is related into a particular job offer he or she received on the internet or even in the real life. –OR any other questions that would raise an alarm for the bank.

Returning your client’s money The ordering customer should sign a declaration letter stating that he was exposed to a fraudulent transaction, ask his bank to claim for the amount from the beneficiary’s bank under his full responsibility and bearing the consequences that may occur from this process. The Ordering and Beneficiary banks sign a “Hold Harmless and indemnification Agreement”. –Stating that transaction is erroneous/improper/ unauthorized. –The ordering bank is requesting a debit for the full amount from beneficiary’s account and remit the funds back to the ordering customer accounts. –The ordering agree to keep the beneficiary’s bank indemnified against all actions, proceedings, claims, losses, etc…

THANK YOU