SlideShare uma empresa Scribd logo
1 de 23
1
It’s Not a Rocket Science:
Defrauding Banks’ Customers by
Phone
University of Portsmouth
3rd
of June, 2014
2
These days everyone seems to be
afraid of them, right?
What is Telephone Fraud?
• A fraudster uses a pre-paid mobile phone for calling potential
victims at random
• Introduces himself as a police officer
• Uses psychological intimidation techniques to scare victims into
believing that their bank accounts are being used by organized
crime and corrupt bank staff to launder money
• Imitates that a victim’s call is being redirected to the bank’s call
centre
• Obtains victim’s online banking login details and transfers victim’s
money to the accounts controlled by the criminals
• In addition, fraudsters often use victim’s online banking facility to
obtain small loans in the victim’s name from the pay day loan
companies
3
Online Banking Facility
4
Variations of Telephone Fraud Before
2010
• Known as ‘It’s me, mother!’ fraud
• Fraudsters called random numbers usually late in the evening
or at night,
• Pretended they were close relatives (e.g. sons or grandsons)
who had just caused traffic accidents and seriously injured
someone; therefore they needed money to sort out the
problem (i.e. bribe a police officer, lawyer, etc.).
• If distressed victims complied, accomplices promptly turned
up at the victims’ addresses to collect bribe money
• Another variation of this fraud involved text messages about
lottery winnings which could be claimed only after purchasing
top up codes for prepaid GSM cards
5
6
Variations of Telephone Fraud After 2010
• Crooks finally discover they can
target customers who use online
banking facility
• Initially target job seekers whose
details can be obtained through
classifieds online / newspapers,
etc
• However, criminals soon invent
and utilize the law enforcement
angle and start targeting just
about everyone
Houston,
we have a
problem!
Old Variation vs. New Variation
• Limited gain
• Limited range of potential
victims
• Requires physical contact
• Difficult to recruit couriers
• Significantly increases gains
• Everyone’s a potential target
• No physical contact with the
victims
• Abundance of money mules
7
8
According to the Lithuanian
police, 95 per cent of
fraudulent phone calls
originate in Lithuanian
prisons
(Source: Respublika, 12th
of March, 2012)
Telephone Fraud Statistics from SEB
Bank
9
No. of
Victims
Total Loss /
LTL
Pay day
Loans / LTL
No. of Money
Mules
2012 97 428 000,00 144 000,00 89
2013 273 1 467 588,00 252 484,00 340
2014 (1st
Q) 16 57 127,00 9 782,00 22
Total 386 1 952 715,00 406 266,00 451
NB! One British Pound = 4,3 LTL
Police Statistics on Telephone Fraud,
2012
• Registered 816 telephone fraud
incidents
• Total estimated loss: 2 782 000,00
LTL
• Total cost of police investigation:
• 1 200 000,00 LTL
• Number of confiscated phones in
prisons – 7 884
(Source: Lietuvos Rytas, 15th
of May, 2013)
10
11
Profile of a Victim
• The majority of victims – 95 per cent - are women
• Average age - 55 years old
• Average loss – 5 376,00 LTL
• Many victims had been aware about telephone fraud
and its modus operandi (Suzuki, K., 2010)
• In addition to financial loss, victims often suffer loss of
self esteem, because they blame themselves for
having been ‘so stupid’
• The society contributes to this social stigma by
labeling victims as gullible or plain stupid (University
of Exeter, 2009)
• In other words, it is the victim’s fault or as the old
adage has it - ‘A fool and his money are soon parted’
• Additionally, this type of fraud undermines confidence
general public has in public and private institutions
and erodes sense of security in everyday life (Suzuki,
K., 2011)
Stupid cow!
How on earth
could I fall
for that!?
12
13
Profile of a Money Mule
• The average age of a money mule is
28-30 years old
• Often these individuals are
unemployed recipients of social
benefits from the state
• Most of them know that their
involvement facilitates criminal activity
• However, when one bank closes their
accounts, they open a new one in
another bank and continue to assist
telephone fraudsters
Bank
accounts
for sale!
The Fake CEO/CFO Scam
• A multinational company makes a public announcement about its intentions to
divest in certain regions/countries
• A couple of days later a regional CFO employed in a subsidiary of the
multinational company receives a telephone call from someone who claims to be
the CFO of the parent company
• The fake CFO tells the victim the matter is very confidential since it’s related to
the sale of the parent company’s business in the region
• An accomplice poses as a female lawyer and e-mails a confidentiality agreement
to the victim
• The duo convince the regional CFO to make an urgent international transfer of
more than 400 000,00 EUR to a business bank account in Lithuania
• The funds are subsequently diverted to the banks’ accounts in Cyprus, Israel,
Thailand and Romania
• The time between the first telephone call and the actual transfer of money is less
than one hour
• All information about the victim company and the individuals affected was
harvested online (e.g. LinkedIn profiles, press releases, etc.)
14
15
Implications for the Banking Industry
• The banks aren’t directly affected since they do not
compensate losses to the victims of fraud
• However, since this type of fraud targets users of
electronic banking, some customers might stop or be
reluctant to use this products, and this might have some
impact on the long term plans of the banking industry
• Additionally, fraudsters might start targeting SMEs or
invent new and more elaborate fraudulent schemes
• Finally, if the incidence of telephone fraud continues to
increase, the regulator might step in and introduce new
rules
How do we tackle telephone fraud?
16
17
How do we tackle telephone fraud
(cont’d)?
• Training staff to identify customers who are at higher risks, so they
could provide customers with relevant advise on risk mitigation
techniques
• Advising staff on how to identify potential money mules
• Raising customers awareness through communication campaigns in
the news media, etc.
• Reduction of daily transfer limits for customers who do not want to
replace password cards with TAN generators
• Employing an internally developed monitoring software that detects
and suspends suspicious transactions
• Addressing this issue to various stakeholders – police, department
of prisons, telecommunication companies, etc.
• Assisting Vilnius University with a research on the victims of
telephone fraud
Remaining Challenges
• Banks are reluctant to exchange fraud statistics
• Banks do not exchange data on fraudsters and money mules
• Banking legislation doesn’t provide any guidance on how banks
should deal with fraud
• Police do not compile comprehensive statistics on telephone
fraud
• ‘It’s your own fault’ attitude prevalent towards the victims of
telephone fraud
• Fraudsters are always one or two steps ahead; therefore, they
eventually come up with new variations or target new
products/channels (e.g. Germany, Latvia and Estonia (Source:
Lietuvos Rytas, 5th
of August, 2013)
18
19
Variations of Telephone Fraud in Other
Countries
Courier Fraud (UK) Ore-Ore Sagi / Furikome Fraud (Japan)
Variations of Telephone Fraud in
Other Countries (cont’d)
20
Voice Phishing Fraud (South Korea) Tелефонные Mошенники (Russia)
21
If this particular type of fraud is of
further interest:
• Use Google to find out more variations around
the world:
– Voice Phishing (South Korea)
– Virtual Kidnapping / Telephone Extortion (South America)
– Courier Fraud (United Kingdom)
– Ore-ore Sagi / Furikome Fraud (Japan)
– Jamaican Lottery (USA)
– Telefon Betrug / Schockanrufen (Germany)
– Tелефонные Mошенники (Russia)
– Faux Neveu / Faux président (France, Switzerland)
– Metoda Accidentul (Romania)
– Grandparents Scam (North America)
– And many many more…
Thank you for your
attention!
If you’re interested in this topic, you’re welcome
to get in touch with me through
23

Mais conteúdo relacionado

Mais procurados (20)

ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Semelhante a Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014

Telephone fraud Frankfurt October 2014
Telephone fraud Frankfurt October 2014Telephone fraud Frankfurt October 2014
Telephone fraud Frankfurt October 2014Audrius Sapola
 
LIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxLIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxAbhishek356846
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Money Mulling: Student Involvement in Money Laundering Schemes
Money Mulling: Student Involvement in Money Laundering SchemesMoney Mulling: Student Involvement in Money Laundering Schemes
Money Mulling: Student Involvement in Money Laundering SchemesGAURAV. H .TANDON
 
Catch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st CenturyCatch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st CenturyAudrius Sapola
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Age Action
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedHelena Martin
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 

Semelhante a Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014 (20)

Telephone fraud Frankfurt October 2014
Telephone fraud Frankfurt October 2014Telephone fraud Frankfurt October 2014
Telephone fraud Frankfurt October 2014
 
FALR.docx
FALR.docxFALR.docx
FALR.docx
 
LIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptxLIFE SKILL PPT [Autosaved] (2).pptx
LIFE SKILL PPT [Autosaved] (2).pptx
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Money Mulling: Student Involvement in Money Laundering Schemes
Money Mulling: Student Involvement in Money Laundering SchemesMoney Mulling: Student Involvement in Money Laundering Schemes
Money Mulling: Student Involvement in Money Laundering Schemes
 
Catch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st CenturyCatch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st Century
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Cyber Laundering and the AML Directives
Cyber Laundering and the AML DirectivesCyber Laundering and the AML Directives
Cyber Laundering and the AML Directives
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
 
First Data: fraud worldwide
First Data: fraud worldwide First Data: fraud worldwide
First Data: fraud worldwide
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Safeguarding adults at risk from scams
Safeguarding adults at risk from scams Safeguarding adults at risk from scams
Safeguarding adults at risk from scams
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explained
 
ATM2.pdf.pdf
ATM2.pdf.pdfATM2.pdf.pdf
ATM2.pdf.pdf
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
ID Theft
ID TheftID Theft
ID Theft
 

Mais de Audrius Sapola

Challenges of fraud management in public and private sectors
Challenges of fraud management in public and private sectors Challenges of fraud management in public and private sectors
Challenges of fraud management in public and private sectors Audrius Sapola
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_finalAudrius Sapola
 
Managing Security Risks Teaser
Managing Security Risks TeaserManaging Security Risks Teaser
Managing Security Risks TeaserAudrius Sapola
 
Invisible Enemy Pro Bono
Invisible Enemy Pro BonoInvisible Enemy Pro Bono
Invisible Enemy Pro BonoAudrius Sapola
 
Bank robberies in Lithuania - status report (teaser)
Bank robberies in Lithuania - status report (teaser)Bank robberies in Lithuania - status report (teaser)
Bank robberies in Lithuania - status report (teaser)Audrius Sapola
 
Financial Crime Prevention Seminar 25 Feb 2010
Financial Crime Prevention Seminar 25 Feb 2010Financial Crime Prevention Seminar 25 Feb 2010
Financial Crime Prevention Seminar 25 Feb 2010Audrius Sapola
 
Finan Crime Seminar Ppt
Finan Crime Seminar PptFinan Crime Seminar Ppt
Finan Crime Seminar PptAudrius Sapola
 
AML/CFT workshop, Tallinn, 2009
AML/CFT workshop, Tallinn, 2009AML/CFT workshop, Tallinn, 2009
AML/CFT workshop, Tallinn, 2009Audrius Sapola
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering PresentationAudrius Sapola
 

Mais de Audrius Sapola (12)

Challenges of fraud management in public and private sectors
Challenges of fraud management in public and private sectors Challenges of fraud management in public and private sectors
Challenges of fraud management in public and private sectors
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_final
 
Telephone fraud ppt
Telephone fraud pptTelephone fraud ppt
Telephone fraud ppt
 
Managing Security Risks Teaser
Managing Security Risks TeaserManaging Security Risks Teaser
Managing Security Risks Teaser
 
Invisible Enemy Pro Bono
Invisible Enemy Pro BonoInvisible Enemy Pro Bono
Invisible Enemy Pro Bono
 
Bank robberies in Lithuania - status report (teaser)
Bank robberies in Lithuania - status report (teaser)Bank robberies in Lithuania - status report (teaser)
Bank robberies in Lithuania - status report (teaser)
 
Financial Crime Prevention Seminar 25 Feb 2010
Financial Crime Prevention Seminar 25 Feb 2010Financial Crime Prevention Seminar 25 Feb 2010
Financial Crime Prevention Seminar 25 Feb 2010
 
Finan Crime Seminar Ppt
Finan Crime Seminar PptFinan Crime Seminar Ppt
Finan Crime Seminar Ppt
 
AML/CFT workshop, Tallinn, 2009
AML/CFT workshop, Tallinn, 2009AML/CFT workshop, Tallinn, 2009
AML/CFT workshop, Tallinn, 2009
 
Sounds familiar?
Sounds familiar?Sounds familiar?
Sounds familiar?
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering Presentation
 

Último

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 

Último (15)

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 

Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014

  • 1. 1 It’s Not a Rocket Science: Defrauding Banks’ Customers by Phone University of Portsmouth 3rd of June, 2014
  • 2. 2 These days everyone seems to be afraid of them, right?
  • 3. What is Telephone Fraud? • A fraudster uses a pre-paid mobile phone for calling potential victims at random • Introduces himself as a police officer • Uses psychological intimidation techniques to scare victims into believing that their bank accounts are being used by organized crime and corrupt bank staff to launder money • Imitates that a victim’s call is being redirected to the bank’s call centre • Obtains victim’s online banking login details and transfers victim’s money to the accounts controlled by the criminals • In addition, fraudsters often use victim’s online banking facility to obtain small loans in the victim’s name from the pay day loan companies 3
  • 5. Variations of Telephone Fraud Before 2010 • Known as ‘It’s me, mother!’ fraud • Fraudsters called random numbers usually late in the evening or at night, • Pretended they were close relatives (e.g. sons or grandsons) who had just caused traffic accidents and seriously injured someone; therefore they needed money to sort out the problem (i.e. bribe a police officer, lawyer, etc.). • If distressed victims complied, accomplices promptly turned up at the victims’ addresses to collect bribe money • Another variation of this fraud involved text messages about lottery winnings which could be claimed only after purchasing top up codes for prepaid GSM cards 5
  • 6. 6 Variations of Telephone Fraud After 2010 • Crooks finally discover they can target customers who use online banking facility • Initially target job seekers whose details can be obtained through classifieds online / newspapers, etc • However, criminals soon invent and utilize the law enforcement angle and start targeting just about everyone Houston, we have a problem!
  • 7. Old Variation vs. New Variation • Limited gain • Limited range of potential victims • Requires physical contact • Difficult to recruit couriers • Significantly increases gains • Everyone’s a potential target • No physical contact with the victims • Abundance of money mules 7
  • 8. 8 According to the Lithuanian police, 95 per cent of fraudulent phone calls originate in Lithuanian prisons (Source: Respublika, 12th of March, 2012)
  • 9. Telephone Fraud Statistics from SEB Bank 9 No. of Victims Total Loss / LTL Pay day Loans / LTL No. of Money Mules 2012 97 428 000,00 144 000,00 89 2013 273 1 467 588,00 252 484,00 340 2014 (1st Q) 16 57 127,00 9 782,00 22 Total 386 1 952 715,00 406 266,00 451 NB! One British Pound = 4,3 LTL
  • 10. Police Statistics on Telephone Fraud, 2012 • Registered 816 telephone fraud incidents • Total estimated loss: 2 782 000,00 LTL • Total cost of police investigation: • 1 200 000,00 LTL • Number of confiscated phones in prisons – 7 884 (Source: Lietuvos Rytas, 15th of May, 2013) 10
  • 11. 11 Profile of a Victim • The majority of victims – 95 per cent - are women • Average age - 55 years old • Average loss – 5 376,00 LTL • Many victims had been aware about telephone fraud and its modus operandi (Suzuki, K., 2010) • In addition to financial loss, victims often suffer loss of self esteem, because they blame themselves for having been ‘so stupid’ • The society contributes to this social stigma by labeling victims as gullible or plain stupid (University of Exeter, 2009) • In other words, it is the victim’s fault or as the old adage has it - ‘A fool and his money are soon parted’ • Additionally, this type of fraud undermines confidence general public has in public and private institutions and erodes sense of security in everyday life (Suzuki, K., 2011) Stupid cow! How on earth could I fall for that!?
  • 12. 12
  • 13. 13 Profile of a Money Mule • The average age of a money mule is 28-30 years old • Often these individuals are unemployed recipients of social benefits from the state • Most of them know that their involvement facilitates criminal activity • However, when one bank closes their accounts, they open a new one in another bank and continue to assist telephone fraudsters Bank accounts for sale!
  • 14. The Fake CEO/CFO Scam • A multinational company makes a public announcement about its intentions to divest in certain regions/countries • A couple of days later a regional CFO employed in a subsidiary of the multinational company receives a telephone call from someone who claims to be the CFO of the parent company • The fake CFO tells the victim the matter is very confidential since it’s related to the sale of the parent company’s business in the region • An accomplice poses as a female lawyer and e-mails a confidentiality agreement to the victim • The duo convince the regional CFO to make an urgent international transfer of more than 400 000,00 EUR to a business bank account in Lithuania • The funds are subsequently diverted to the banks’ accounts in Cyprus, Israel, Thailand and Romania • The time between the first telephone call and the actual transfer of money is less than one hour • All information about the victim company and the individuals affected was harvested online (e.g. LinkedIn profiles, press releases, etc.) 14
  • 15. 15 Implications for the Banking Industry • The banks aren’t directly affected since they do not compensate losses to the victims of fraud • However, since this type of fraud targets users of electronic banking, some customers might stop or be reluctant to use this products, and this might have some impact on the long term plans of the banking industry • Additionally, fraudsters might start targeting SMEs or invent new and more elaborate fraudulent schemes • Finally, if the incidence of telephone fraud continues to increase, the regulator might step in and introduce new rules
  • 16. How do we tackle telephone fraud? 16
  • 17. 17 How do we tackle telephone fraud (cont’d)? • Training staff to identify customers who are at higher risks, so they could provide customers with relevant advise on risk mitigation techniques • Advising staff on how to identify potential money mules • Raising customers awareness through communication campaigns in the news media, etc. • Reduction of daily transfer limits for customers who do not want to replace password cards with TAN generators • Employing an internally developed monitoring software that detects and suspends suspicious transactions • Addressing this issue to various stakeholders – police, department of prisons, telecommunication companies, etc. • Assisting Vilnius University with a research on the victims of telephone fraud
  • 18. Remaining Challenges • Banks are reluctant to exchange fraud statistics • Banks do not exchange data on fraudsters and money mules • Banking legislation doesn’t provide any guidance on how banks should deal with fraud • Police do not compile comprehensive statistics on telephone fraud • ‘It’s your own fault’ attitude prevalent towards the victims of telephone fraud • Fraudsters are always one or two steps ahead; therefore, they eventually come up with new variations or target new products/channels (e.g. Germany, Latvia and Estonia (Source: Lietuvos Rytas, 5th of August, 2013) 18
  • 19. 19 Variations of Telephone Fraud in Other Countries Courier Fraud (UK) Ore-Ore Sagi / Furikome Fraud (Japan)
  • 20. Variations of Telephone Fraud in Other Countries (cont’d) 20 Voice Phishing Fraud (South Korea) Tелефонные Mошенники (Russia)
  • 21. 21 If this particular type of fraud is of further interest: • Use Google to find out more variations around the world: – Voice Phishing (South Korea) – Virtual Kidnapping / Telephone Extortion (South America) – Courier Fraud (United Kingdom) – Ore-ore Sagi / Furikome Fraud (Japan) – Jamaican Lottery (USA) – Telefon Betrug / Schockanrufen (Germany) – Tелефонные Mошенники (Russia) – Faux Neveu / Faux président (France, Switzerland) – Metoda Accidentul (Romania) – Grandparents Scam (North America) – And many many more…
  • 22. Thank you for your attention!
  • 23. If you’re interested in this topic, you’re welcome to get in touch with me through 23