SlideShare a Scribd company logo
1 of 39
TOOLS AND TECHNIQUES
Fraud Prevention and Detection Tools
Facilitating Private-Public Cooperation
2008 ECI Conference
GLOBAL WARNING!
Economic Crime Home and Abroad
Raymond W. Schick, Vice President, Fraud Prevention Manager
Global Security and Investigations
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 1
Outline
Check Fraud Methods
 Statistics
 Components of a Check
 Types of Check Fraud
 ACH Fraud
Prevention Strategies
 What is JPMorgan Chase doing to combat fraud?
 Our client’s role in preventing fraud
 Fraud schemes targeting our client’s and their companies
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 2
Statistics
Fraud continues to increase:
 According to the FBI, fraud costs consumers, banks and businesses $18
to $20 billion per year.
 In a 2006 survey of member banks, the American Bankers Association
(ABA) found that losses from check fraud cases totaled $12.2 billion.
 The AFP Payments Risk Survey for 2007 reported 72% of organizations
were targets of attempted or actual payment fraud.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 3
Why are fraud losses on the rise?
 Organized and professional fraud rings are becoming more prevalent and
sophisticated.
o Fraud rings are now global enterprises with key organizers residing in
uncooperative countries.
 Cyber-crime advances make it possible to compromise large quantities of
data.
 Desktop publishing makes counterfeiting checks relatively cheap and easy.
o Some utilities are delivered through non-criminal websites.
 The potential victims of fraudulent checks include millions of consumers.
o Lottery scams, internet job postings, work-at-home opportunities.
 Regulation CC availability requirements have decreased the window of
opportunity for banks to identify and return suspicious checks.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 4
Components of a check
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 5
Types of check fraud
 Alteration
 Forged/Missing endorsement
 Counterfeit
 Forged maker
 Deposit fraud
 Kiting
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 6
Check Kiting
Check kiting is any sort of fraud that involves drawing out
money from a bank account that does not have sufficient funds
to cover the check. It is typically achieved by taking advantage
of the float, the time between the negotiation of the check and
its clearance at the check-writer's bank.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 7
ACH fraud
Automated Clearing House (ACH) debit fraud risk is the risk that a transaction
will be initiated or altered in an attempt to misdirect or misappropriate funds.
Although ACH fraud risk does occur, the frequency is relatively low when
compared to other payment systems fraud.
 Any ACH may debit post to your account. No authorization is required by the
client.
 Critical elements of ACH fraud — account and routing numbers that can be
obtained from any given check.
 Organizations that were victims of attempted ACH fraud were more likely to
suffer a loss because the did not use defenses available from institutions.
 The number of days after which a client may recover a fraudulent ACH
transaction is limited as compared to checks:
o 60 days for Web and telephone-initiated transactions
o Two days for business-to-business transactions
PREVENTION STRATEGIES
What is JPMorgan Chase doing to combat fraud?
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 9
Prevention tools
JPMorgan Chase proactively develops prevention tools to reduce the risk
of loss due to fraudulent activity. We work closely with our clients to
provide up-to-date security features in a controlled environment.
 ASI-16 fraud detection software
o A fraud detection filter that examines daily check transactions and
compares them to the individual’s check writing history through a
predefined set of bank parameters.
 Large-dollar item review
o Items above a specified dollar threshold are out sorted for additional
fraud review.
 Teller system alerts
o The bank may mark an account with a caution/surveillance restraint
as an interim step to protect against additional losses while account
closing is pending.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 10
Prevention tools
 Multiple Identification
o Tellers require non-Chase clients to present two forms of
identification and a thumbprint when cashing checks.
 Loss avoidance warehouse (LAW)
o Tracks and reports deposit-account-related losses. The system is
designed to help
— improve understanding of how the losses occur
— improve decision making for loss reduction initiatives
— improve audit controls
 Proprietary transaction monitoring systems
o AMEX – Partner in traveler check verification system
o FPS- Internal fraud prevention system used for vetting
 Participation in industry wide exchanges
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 11
 Positive pay
o Positive pay provides the ability to make pay or return decisions on checks
presented against an account that do not match an issue record
(exception item). Fraud risk is reduced through tighter controls and the
ability to choose either to authorize payment or return the check prior to
the return deadline.
 Payee verification
o An enhancement to positive pay that also matches the payee line of the
check presented for payment to the payee name provided on the issue file
from the client. Provides fraud protection against payee name alterations.
 Teller protection
o Checks presented at a Chase banking center are matched against a
positive pay file. If the check appears on the file, it will be honored. If
the check is not on the file, the teller will not pay the item and the
presenter will be directed to contact the originator of the check.
Positive pay services
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 12
ACH debit blocking
ACH debit blocking service guards corporate accounts against unauthorized
ACH debit transactions. It is an optional service that provides a means of
returning unauthorized ACH debits in a timely manner.
 Benefits
o Security — no unauthorized ACH transactions will be posted.
o Fraud protection — eliminates outside access to your account.
o Reduced effort — your staff spends less time reconciling and
investigating debit transactions.
 Filtering criteria selected by clients
o Block all debits
o Block all debits over a certain dollar threshold
o Block all debits except from specific originators
o Allow all debits except from specific originators
 ACH debit blocking automatically rejects unauthorized transactions.
PREVENTION STRATEGIES
Client’s role
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 14
Implementing Tools & Controls
 Implementation of payment fraud protection tools and
internal controls is essential for a successful payment
fraud protection program – don’t wait to become a
statistic.
 According to the 2007 AFP Payment Fraud and Control
Survey:
 17% or organizations lost money through ACH fraud
because an employee was responsible.
 Internal fraud was the key reason why companies were
held liable for check fraud loss.
 Heightened awareness of the internal threat led 50% of
the respondents to improve internal controls.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 15
Liability for check fraud
The laws governing checks are primarily the Uniform Commercial
Code. For most states, the UCC provides for several defenses that
can be raised to a claim of loss due to fraud on the company's
account.
 UCC 3-103 “Ordinary Care”
 The observance of reasonable commercial standards that prevail in
the area in which the person is located and with respect to the
business in which the person is engaged.
 UCC 3-405 “Comparative Negligence”
 In situations where there is risk loss due to fraud, a court would
compare the company's negligence against the bank's negligence to
determine who should be liable.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 16
Liability for check fraud (cont’d)
 UCC 3-406 “Contributory Negligence”
 The company could be found to have contributed to the loss if, for
example, if it fails to safeguard checks from forgery or alteration by a
“reasonable commercial standard”, and that failure to safeguard
contributes to the forgery or alteration
 UCC 4-406 “Reasonable Promptness”
 Clients must exercise reasonable promptness in examining statements
or items to determine if any payment was not authorized and to notify
the bank.
*This presentation is given to for your general information and is not legal advice. Not all
state's versions of the UCC contain such provisions. Please consult your own attorney for any
legal advice with regard to liability for fraud on the company's account.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 17
Liability for check fraud (cont’d)
 Corporate clients may be found to be negligent if they fail to:
 maintain sufficient controls for check storage, issuance and
reconciliation
 notify the bank in a timely manner when fraud occurs
 review the bank statement
 reconcile accounts in a timely manner
 use standard fraud protection offerings (i.e., positive pay)
 Clients should engage their relationship advisors to reduce fraud:
 Understand the fraud mitigation technology used by the bank
 Understand the fraud protection tools the bank offers
 The risk of loss from check fraud is substantial, therefore the bank and
its client must work together in preventing check fraud.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 18
What can you do to prevent payment fraud?
 Convert as many payments as possible to electronic delivery such as
ACH, EDI, wire and card
 Implement positive pay
 Implement payee verification
 Reconcile accounts frequently and regularly
o Use online statements, reporting and reconcilement services for
faster reconcilement
 Physical controls on check stock
o Secure storage and access to check stock and signature plates
o Usage
o Dual Controls
o Policies on how check stock is ordered, received
 Use image survivable and other high-security check stock features
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 19
What can you do to prevent payment fraud?
(cont’d)
 Separate accounts
o Collection and disbursement activity
o Check and electronic payments
o Payroll and accounts payable disbursements
o High-volume accounts and low-volume petty cash or emergency
payments ACH debits and ACH credits
 Implement ACH Debit Block
 Implement “Post No Checks” restriction on electronic payment
accounts
 Segregate duties — making payments and reconciling accounts
 Limit number of official signers on checks
 Update account and bank records
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 20
What can you do to prevent payment fraud?
(cont’d)
 Form an internal “anti-fraud” committee
o Use prior fraud occurrences to level set
o Match industry “best practices”
o Establish and maintain general controls:
— Document and enforce procedures
 Awareness and training
 Screen new employees and temporary help
 Know who you do business with
o Vendors
o Clients
o Maintenance staff
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 21
Final Thoughts
 Chase is focused on reducing fraud and fraud expense to
our client’s and ourselves:
 We proactively develop tools and processes to reduce
the risk of loss due to fraudulent activity. We work
closely with our clients to provide state-of-the-art
fraud protection services and security features.
 We want our clients to know the we are there to assist
throughout the fraud investigation and resolution
process.
 Combating check fraud is a collective effort among the
bank, the client and law enforcement working together
to prevent payment fraud.
CHECK FRAUD:
RECOGNIZE AND MANAGE RISK —
ARE YOU PROTECTED?
Fraud schemes targeting you & your company
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 23
Losses attributed to phishing
 2006 Statistics ( Symantec)
o January to September - 2.1 billion phishing emails sent
throughout the world
o Attacks growing substantially from year to year and becoming
more sophisticated and convincing
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 24
Elements of phishing
 The victim receives an e-mail purporting to be from a legitimate
source – PayPal, eBay, or a financial institution
 Victim compromises their bank account or credit card numbers,
passwords, or other personal or financial information
 Identify theft or financial loss often result
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 25
Typical phishing e-mail
From: Chase Bank
Subject: Possible Account Problems
Priority: URGENT
An Important Notice Concerning Your Personal Information
Dear Chase Bank Customer:
We have recently noticed several attempts to log into your Chase Bank
account from a foreign IP address. We have reasons to believe that your
account my be compromised by a third party.
However if you are the rightful Account holder, click on the link below
and login as we try to verify your identity:
https://chaseonline.chase.com/
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 26
Typical phishing e-mail
(Continued)
We ask that you allow at least 48-72 hrs for the case to be investigated
and we strongly recommend not making any changes to your account in
that time.
The information contained in this notice contains some terms we are
required to disclose to ensure that we comply with privacy laws. If you
have any questions about the information contained in this notice, please
call us at (212) 334-0555 or write to: Chase Bank, 231 Grand St, New
York, NY 10013.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 27
Typical phishing e-mail
Dear Name of Recipient
A complaint has been filled against you and the company you are affiliated to by
Mr. George Hanson and sent to Federal Trade Commission by fax in witch he's
claiming that he has been cheated by you and your company in paying a greater
amount of money than the one appearing on the invoice you gave him for using
your services.
The complaint states he contacted your company on MON,22 OCT 2007, trying to
solve this situation without interference from any Governmental Institution , but
your company refused to take action.
On WED,24 OCT 2007, the complaint was sent by fax to Federal Trade
Commission and we forwarded it to Internal Revenue and Better Business Bureau.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 28
Typical phishing e-mail
(continued)
Complaint was filled against :
Name : Name of recipient
Company : - Company Name
If you feel that this message has been sent to you in error or if you have any
questions regarding the next steps of
this process, please download the original comp! laint by clicking the link
below :
http://ftc.gov/fraud/complaints/24_oct_2007_george_hanson.doc
Please take knowledge of the complaint's content and complete the form at
the bottom of forward it to
fraudcomplaint@ftc.gov.
Bruce Jameson
Complaint Officer
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 29
Variations on phishing e-mail
 Including a valid phone number for the bank or credit card
company hoping you will consider them valid e-mails and log
into their site without call
 Offering a $25 account credit for the inconvenience caused
by having to reactivate or confirm your account
 Offering a free “Fraud Busters” enrollment
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 30
Tips to avoid phishing scams
Be suspicious of any e-mail that:
 Requires you to enter personal information directly into the e-mail or
submit that information some other way.
 Threatens to close or suspend your account if you do not take immediate
action by providing personal information.
 States that your account has been compromised or that there has been
third-party activity on your account and requests you to enter or confirm
your account information.
 States that there are unauthorized charges on your account and requests
your account information.
 Asks you to confirm, verify, or refresh your account, credit card, or
billing information.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 31
Tips to avoid phishing scams
 Don’t use the links in an e-mail to get to any web page, if you suspect
the message might not be authentic
 Avoid filling out forms in e-mails that ask for personal financial
information
 Always ensure that you are using a secure website when submitting
credit card or other sensitive information via your Web browser
o Web addresses beginning with “https://”
 Regularly check your online accounts, as well as bank and credit card
statements
 Ensure that your browser is up to date and all security patches are
applied
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 32
Report phishing scams
 If you do anything other than ignoring and deleting “phishing” or
“spoofed” e-mails, you may consider reporting them to the following
groups
o Federal Trade Commission at spam@uce.gove
o Internet Fraud Complaint Center of the FBI at www.ifccfbi.gov/
o Chase Bank at abuse@jpmchase.com
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 33
Lottery Schemes
We are pleased to inform you of the official announcement today
that you have emerged as one of the winners of the international
lotto program. You have therefore been awarded a lump sum pay
out of US $45,000 cash. You need only to pay the insurance and
stamp duty. The winnings are yours to use as you see fit.
You may provide your account number and bank routing number, or
you may accept the enclosed check as a loan if you cannot afford to
pay the required charges.
Please call your claims coordinator as soon as you receive this
confirmation to assist you in finalizing the payment process.
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 34
Employment Schemes
 Victim finds a job on an electronic board/site (Monster.com or
Jobseekers.com).
 The “employer” hooks the victim on the promise of a nice
salary, bonus or advanced commissions.
 “Employee” soon receives his first paycheck and receivables
with instructions to deposit the check and wire the funds back
to the “employer” minus the commission.
 Checks are deposited and appear good however subsequently
are returned.
 Financial hardship occurs as well as identity theft potential as
personal information may have been provided to the bogus
“employer”
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 35
Why these schemes work
 Organized networks of professional (cons) are behind it
 The pitch is very convincing
 Presumed legitimacy – “They couldn’t print it if it wasn’t true.”
 The lure of “easy money” is so tempting
 Prosecution is difficult because the scammers are often outside the
U.S. or never positively identified
© 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 36
Variations on these schemes
 Romance
 Inheritance
 Unclaimed Property
 Traditions 4-1-9 Letter
 Guaranteed Loans
Questions?
Thank You

More Related Content

Similar to ECI Conference Presentation Ray Schick.ppt

Alternative Structures - PO Financing, Factoring & MCA (Series: Business Borr...
Alternative Structures - PO Financing, Factoring & MCA (Series: Business Borr...Alternative Structures - PO Financing, Factoring & MCA (Series: Business Borr...
Alternative Structures - PO Financing, Factoring & MCA (Series: Business Borr...Financial Poise
 
The Pros & Cons of Trade Receivables Financing.pptx
The Pros & Cons of Trade Receivables Financing.pptxThe Pros & Cons of Trade Receivables Financing.pptx
The Pros & Cons of Trade Receivables Financing.pptxM1xchange
 
Credit Bureau Basics
Credit Bureau BasicsCredit Bureau Basics
Credit Bureau BasicsWendy Polisi
 
Post Crisis Banking Legislation CEVick.docx
Post Crisis Banking Legislation CEVick.docxPost Crisis Banking Legislation CEVick.docx
Post Crisis Banking Legislation CEVick.docxCarolyn Vick
 
Debt Collection Agency in London
Debt Collection Agency in LondonDebt Collection Agency in London
Debt Collection Agency in LondonMarcSmith321601
 
B3 Fraud Intrnl Cntrl Presentation
B3 Fraud Intrnl Cntrl PresentationB3 Fraud Intrnl Cntrl Presentation
B3 Fraud Intrnl Cntrl PresentationMABSIV
 
CMI_Credit_Mediators_Inc
CMI_Credit_Mediators_IncCMI_Credit_Mediators_Inc
CMI_Credit_Mediators_IncErin Oberholzer
 
CMI_Credit_Mediators_Inc
CMI_Credit_Mediators_IncCMI_Credit_Mediators_Inc
CMI_Credit_Mediators_IncRobert Warner
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionDowney Law Group LLC
 
Demystifying Credit Repair
Demystifying Credit RepairDemystifying Credit Repair
Demystifying Credit RepairRob Aubrey
 
10 Credit Myths
10 Credit Myths 10 Credit Myths
10 Credit Myths Rob Aubrey
 
10 Myths About Credit
10 Myths About Credit10 Myths About Credit
10 Myths About CreditRob Aubrey
 
Snapshots-Banks-Empowering-Customers-and-Fighting-Exploitation-Brochure
Snapshots-Banks-Empowering-Customers-and-Fighting-Exploitation-BrochureSnapshots-Banks-Empowering-Customers-and-Fighting-Exploitation-Brochure
Snapshots-Banks-Empowering-Customers-and-Fighting-Exploitation-BrochureRob Neill
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
40 Credit Repair Secrets
40 Credit Repair Secrets40 Credit Repair Secrets
40 Credit Repair SecretsWilliam Lingle
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Understanding Your Credit Report and Score
Understanding Your Credit Report and ScoreUnderstanding Your Credit Report and Score
Understanding Your Credit Report and ScoreSpringboard
 
Pegasus Software White paper-credit-management
Pegasus Software White paper-credit-managementPegasus Software White paper-credit-management
Pegasus Software White paper-credit-managementStuart Anderson
 

Similar to ECI Conference Presentation Ray Schick.ppt (20)

Alternative Structures - PO Financing, Factoring & MCA (Series: Business Borr...
Alternative Structures - PO Financing, Factoring & MCA (Series: Business Borr...Alternative Structures - PO Financing, Factoring & MCA (Series: Business Borr...
Alternative Structures - PO Financing, Factoring & MCA (Series: Business Borr...
 
The Pros & Cons of Trade Receivables Financing.pptx
The Pros & Cons of Trade Receivables Financing.pptxThe Pros & Cons of Trade Receivables Financing.pptx
The Pros & Cons of Trade Receivables Financing.pptx
 
Credit Bureau Basics
Credit Bureau BasicsCredit Bureau Basics
Credit Bureau Basics
 
10 Credit Myth
10 Credit Myth10 Credit Myth
10 Credit Myth
 
Post Crisis Banking Legislation CEVick.docx
Post Crisis Banking Legislation CEVick.docxPost Crisis Banking Legislation CEVick.docx
Post Crisis Banking Legislation CEVick.docx
 
Debt Collection Agency in London
Debt Collection Agency in LondonDebt Collection Agency in London
Debt Collection Agency in London
 
B3 Fraud Intrnl Cntrl Presentation
B3 Fraud Intrnl Cntrl PresentationB3 Fraud Intrnl Cntrl Presentation
B3 Fraud Intrnl Cntrl Presentation
 
CMI_Credit_Mediators_Inc
CMI_Credit_Mediators_IncCMI_Credit_Mediators_Inc
CMI_Credit_Mediators_Inc
 
CMI_Credit_Mediators_Inc
CMI_Credit_Mediators_IncCMI_Credit_Mediators_Inc
CMI_Credit_Mediators_Inc
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing Profession
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Demystifying Credit Repair
Demystifying Credit RepairDemystifying Credit Repair
Demystifying Credit Repair
 
10 Credit Myths
10 Credit Myths 10 Credit Myths
10 Credit Myths
 
10 Myths About Credit
10 Myths About Credit10 Myths About Credit
10 Myths About Credit
 
Snapshots-Banks-Empowering-Customers-and-Fighting-Exploitation-Brochure
Snapshots-Banks-Empowering-Customers-and-Fighting-Exploitation-BrochureSnapshots-Banks-Empowering-Customers-and-Fighting-Exploitation-Brochure
Snapshots-Banks-Empowering-Customers-and-Fighting-Exploitation-Brochure
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
40 Credit Repair Secrets
40 Credit Repair Secrets40 Credit Repair Secrets
40 Credit Repair Secrets
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Understanding Your Credit Report and Score
Understanding Your Credit Report and ScoreUnderstanding Your Credit Report and Score
Understanding Your Credit Report and Score
 
Pegasus Software White paper-credit-management
Pegasus Software White paper-credit-managementPegasus Software White paper-credit-management
Pegasus Software White paper-credit-management
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

ECI Conference Presentation Ray Schick.ppt

  • 1. TOOLS AND TECHNIQUES Fraud Prevention and Detection Tools Facilitating Private-Public Cooperation 2008 ECI Conference GLOBAL WARNING! Economic Crime Home and Abroad Raymond W. Schick, Vice President, Fraud Prevention Manager Global Security and Investigations
  • 2. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 1 Outline Check Fraud Methods  Statistics  Components of a Check  Types of Check Fraud  ACH Fraud Prevention Strategies  What is JPMorgan Chase doing to combat fraud?  Our client’s role in preventing fraud  Fraud schemes targeting our client’s and their companies
  • 3. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 2 Statistics Fraud continues to increase:  According to the FBI, fraud costs consumers, banks and businesses $18 to $20 billion per year.  In a 2006 survey of member banks, the American Bankers Association (ABA) found that losses from check fraud cases totaled $12.2 billion.  The AFP Payments Risk Survey for 2007 reported 72% of organizations were targets of attempted or actual payment fraud.
  • 4. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 3 Why are fraud losses on the rise?  Organized and professional fraud rings are becoming more prevalent and sophisticated. o Fraud rings are now global enterprises with key organizers residing in uncooperative countries.  Cyber-crime advances make it possible to compromise large quantities of data.  Desktop publishing makes counterfeiting checks relatively cheap and easy. o Some utilities are delivered through non-criminal websites.  The potential victims of fraudulent checks include millions of consumers. o Lottery scams, internet job postings, work-at-home opportunities.  Regulation CC availability requirements have decreased the window of opportunity for banks to identify and return suspicious checks.
  • 5. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 4 Components of a check
  • 6. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 5 Types of check fraud  Alteration  Forged/Missing endorsement  Counterfeit  Forged maker  Deposit fraud  Kiting
  • 7. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 6 Check Kiting Check kiting is any sort of fraud that involves drawing out money from a bank account that does not have sufficient funds to cover the check. It is typically achieved by taking advantage of the float, the time between the negotiation of the check and its clearance at the check-writer's bank.
  • 8. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 7 ACH fraud Automated Clearing House (ACH) debit fraud risk is the risk that a transaction will be initiated or altered in an attempt to misdirect or misappropriate funds. Although ACH fraud risk does occur, the frequency is relatively low when compared to other payment systems fraud.  Any ACH may debit post to your account. No authorization is required by the client.  Critical elements of ACH fraud — account and routing numbers that can be obtained from any given check.  Organizations that were victims of attempted ACH fraud were more likely to suffer a loss because the did not use defenses available from institutions.  The number of days after which a client may recover a fraudulent ACH transaction is limited as compared to checks: o 60 days for Web and telephone-initiated transactions o Two days for business-to-business transactions
  • 9. PREVENTION STRATEGIES What is JPMorgan Chase doing to combat fraud?
  • 10. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 9 Prevention tools JPMorgan Chase proactively develops prevention tools to reduce the risk of loss due to fraudulent activity. We work closely with our clients to provide up-to-date security features in a controlled environment.  ASI-16 fraud detection software o A fraud detection filter that examines daily check transactions and compares them to the individual’s check writing history through a predefined set of bank parameters.  Large-dollar item review o Items above a specified dollar threshold are out sorted for additional fraud review.  Teller system alerts o The bank may mark an account with a caution/surveillance restraint as an interim step to protect against additional losses while account closing is pending.
  • 11. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 10 Prevention tools  Multiple Identification o Tellers require non-Chase clients to present two forms of identification and a thumbprint when cashing checks.  Loss avoidance warehouse (LAW) o Tracks and reports deposit-account-related losses. The system is designed to help — improve understanding of how the losses occur — improve decision making for loss reduction initiatives — improve audit controls  Proprietary transaction monitoring systems o AMEX – Partner in traveler check verification system o FPS- Internal fraud prevention system used for vetting  Participation in industry wide exchanges
  • 12. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 11  Positive pay o Positive pay provides the ability to make pay or return decisions on checks presented against an account that do not match an issue record (exception item). Fraud risk is reduced through tighter controls and the ability to choose either to authorize payment or return the check prior to the return deadline.  Payee verification o An enhancement to positive pay that also matches the payee line of the check presented for payment to the payee name provided on the issue file from the client. Provides fraud protection against payee name alterations.  Teller protection o Checks presented at a Chase banking center are matched against a positive pay file. If the check appears on the file, it will be honored. If the check is not on the file, the teller will not pay the item and the presenter will be directed to contact the originator of the check. Positive pay services
  • 13. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 12 ACH debit blocking ACH debit blocking service guards corporate accounts against unauthorized ACH debit transactions. It is an optional service that provides a means of returning unauthorized ACH debits in a timely manner.  Benefits o Security — no unauthorized ACH transactions will be posted. o Fraud protection — eliminates outside access to your account. o Reduced effort — your staff spends less time reconciling and investigating debit transactions.  Filtering criteria selected by clients o Block all debits o Block all debits over a certain dollar threshold o Block all debits except from specific originators o Allow all debits except from specific originators  ACH debit blocking automatically rejects unauthorized transactions.
  • 15. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 14 Implementing Tools & Controls  Implementation of payment fraud protection tools and internal controls is essential for a successful payment fraud protection program – don’t wait to become a statistic.  According to the 2007 AFP Payment Fraud and Control Survey:  17% or organizations lost money through ACH fraud because an employee was responsible.  Internal fraud was the key reason why companies were held liable for check fraud loss.  Heightened awareness of the internal threat led 50% of the respondents to improve internal controls.
  • 16. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 15 Liability for check fraud The laws governing checks are primarily the Uniform Commercial Code. For most states, the UCC provides for several defenses that can be raised to a claim of loss due to fraud on the company's account.  UCC 3-103 “Ordinary Care”  The observance of reasonable commercial standards that prevail in the area in which the person is located and with respect to the business in which the person is engaged.  UCC 3-405 “Comparative Negligence”  In situations where there is risk loss due to fraud, a court would compare the company's negligence against the bank's negligence to determine who should be liable.
  • 17. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 16 Liability for check fraud (cont’d)  UCC 3-406 “Contributory Negligence”  The company could be found to have contributed to the loss if, for example, if it fails to safeguard checks from forgery or alteration by a “reasonable commercial standard”, and that failure to safeguard contributes to the forgery or alteration  UCC 4-406 “Reasonable Promptness”  Clients must exercise reasonable promptness in examining statements or items to determine if any payment was not authorized and to notify the bank. *This presentation is given to for your general information and is not legal advice. Not all state's versions of the UCC contain such provisions. Please consult your own attorney for any legal advice with regard to liability for fraud on the company's account.
  • 18. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 17 Liability for check fraud (cont’d)  Corporate clients may be found to be negligent if they fail to:  maintain sufficient controls for check storage, issuance and reconciliation  notify the bank in a timely manner when fraud occurs  review the bank statement  reconcile accounts in a timely manner  use standard fraud protection offerings (i.e., positive pay)  Clients should engage their relationship advisors to reduce fraud:  Understand the fraud mitigation technology used by the bank  Understand the fraud protection tools the bank offers  The risk of loss from check fraud is substantial, therefore the bank and its client must work together in preventing check fraud.
  • 19. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 18 What can you do to prevent payment fraud?  Convert as many payments as possible to electronic delivery such as ACH, EDI, wire and card  Implement positive pay  Implement payee verification  Reconcile accounts frequently and regularly o Use online statements, reporting and reconcilement services for faster reconcilement  Physical controls on check stock o Secure storage and access to check stock and signature plates o Usage o Dual Controls o Policies on how check stock is ordered, received  Use image survivable and other high-security check stock features
  • 20. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 19 What can you do to prevent payment fraud? (cont’d)  Separate accounts o Collection and disbursement activity o Check and electronic payments o Payroll and accounts payable disbursements o High-volume accounts and low-volume petty cash or emergency payments ACH debits and ACH credits  Implement ACH Debit Block  Implement “Post No Checks” restriction on electronic payment accounts  Segregate duties — making payments and reconciling accounts  Limit number of official signers on checks  Update account and bank records
  • 21. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 20 What can you do to prevent payment fraud? (cont’d)  Form an internal “anti-fraud” committee o Use prior fraud occurrences to level set o Match industry “best practices” o Establish and maintain general controls: — Document and enforce procedures  Awareness and training  Screen new employees and temporary help  Know who you do business with o Vendors o Clients o Maintenance staff
  • 22. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 21 Final Thoughts  Chase is focused on reducing fraud and fraud expense to our client’s and ourselves:  We proactively develop tools and processes to reduce the risk of loss due to fraudulent activity. We work closely with our clients to provide state-of-the-art fraud protection services and security features.  We want our clients to know the we are there to assist throughout the fraud investigation and resolution process.  Combating check fraud is a collective effort among the bank, the client and law enforcement working together to prevent payment fraud.
  • 23. CHECK FRAUD: RECOGNIZE AND MANAGE RISK — ARE YOU PROTECTED? Fraud schemes targeting you & your company
  • 24. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 23 Losses attributed to phishing  2006 Statistics ( Symantec) o January to September - 2.1 billion phishing emails sent throughout the world o Attacks growing substantially from year to year and becoming more sophisticated and convincing
  • 25. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 24 Elements of phishing  The victim receives an e-mail purporting to be from a legitimate source – PayPal, eBay, or a financial institution  Victim compromises their bank account or credit card numbers, passwords, or other personal or financial information  Identify theft or financial loss often result
  • 26. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 25 Typical phishing e-mail From: Chase Bank Subject: Possible Account Problems Priority: URGENT An Important Notice Concerning Your Personal Information Dear Chase Bank Customer: We have recently noticed several attempts to log into your Chase Bank account from a foreign IP address. We have reasons to believe that your account my be compromised by a third party. However if you are the rightful Account holder, click on the link below and login as we try to verify your identity: https://chaseonline.chase.com/
  • 27. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 26 Typical phishing e-mail (Continued) We ask that you allow at least 48-72 hrs for the case to be investigated and we strongly recommend not making any changes to your account in that time. The information contained in this notice contains some terms we are required to disclose to ensure that we comply with privacy laws. If you have any questions about the information contained in this notice, please call us at (212) 334-0555 or write to: Chase Bank, 231 Grand St, New York, NY 10013.
  • 28. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 27 Typical phishing e-mail Dear Name of Recipient A complaint has been filled against you and the company you are affiliated to by Mr. George Hanson and sent to Federal Trade Commission by fax in witch he's claiming that he has been cheated by you and your company in paying a greater amount of money than the one appearing on the invoice you gave him for using your services. The complaint states he contacted your company on MON,22 OCT 2007, trying to solve this situation without interference from any Governmental Institution , but your company refused to take action. On WED,24 OCT 2007, the complaint was sent by fax to Federal Trade Commission and we forwarded it to Internal Revenue and Better Business Bureau.
  • 29. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 28 Typical phishing e-mail (continued) Complaint was filled against : Name : Name of recipient Company : - Company Name If you feel that this message has been sent to you in error or if you have any questions regarding the next steps of this process, please download the original comp! laint by clicking the link below : http://ftc.gov/fraud/complaints/24_oct_2007_george_hanson.doc Please take knowledge of the complaint's content and complete the form at the bottom of forward it to fraudcomplaint@ftc.gov. Bruce Jameson Complaint Officer
  • 30. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 29 Variations on phishing e-mail  Including a valid phone number for the bank or credit card company hoping you will consider them valid e-mails and log into their site without call  Offering a $25 account credit for the inconvenience caused by having to reactivate or confirm your account  Offering a free “Fraud Busters” enrollment
  • 31. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 30 Tips to avoid phishing scams Be suspicious of any e-mail that:  Requires you to enter personal information directly into the e-mail or submit that information some other way.  Threatens to close or suspend your account if you do not take immediate action by providing personal information.  States that your account has been compromised or that there has been third-party activity on your account and requests you to enter or confirm your account information.  States that there are unauthorized charges on your account and requests your account information.  Asks you to confirm, verify, or refresh your account, credit card, or billing information.
  • 32. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 31 Tips to avoid phishing scams  Don’t use the links in an e-mail to get to any web page, if you suspect the message might not be authentic  Avoid filling out forms in e-mails that ask for personal financial information  Always ensure that you are using a secure website when submitting credit card or other sensitive information via your Web browser o Web addresses beginning with “https://”  Regularly check your online accounts, as well as bank and credit card statements  Ensure that your browser is up to date and all security patches are applied
  • 33. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 32 Report phishing scams  If you do anything other than ignoring and deleting “phishing” or “spoofed” e-mails, you may consider reporting them to the following groups o Federal Trade Commission at spam@uce.gove o Internet Fraud Complaint Center of the FBI at www.ifccfbi.gov/ o Chase Bank at abuse@jpmchase.com
  • 34. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 33 Lottery Schemes We are pleased to inform you of the official announcement today that you have emerged as one of the winners of the international lotto program. You have therefore been awarded a lump sum pay out of US $45,000 cash. You need only to pay the insurance and stamp duty. The winnings are yours to use as you see fit. You may provide your account number and bank routing number, or you may accept the enclosed check as a loan if you cannot afford to pay the required charges. Please call your claims coordinator as soon as you receive this confirmation to assist you in finalizing the payment process.
  • 35. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 34 Employment Schemes  Victim finds a job on an electronic board/site (Monster.com or Jobseekers.com).  The “employer” hooks the victim on the promise of a nice salary, bonus or advanced commissions.  “Employee” soon receives his first paycheck and receivables with instructions to deposit the check and wire the funds back to the “employer” minus the commission.  Checks are deposited and appear good however subsequently are returned.  Financial hardship occurs as well as identity theft potential as personal information may have been provided to the bogus “employer”
  • 36. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 35 Why these schemes work  Organized networks of professional (cons) are behind it  The pitch is very convincing  Presumed legitimacy – “They couldn’t print it if it wasn’t true.”  The lure of “easy money” is so tempting  Prosecution is difficult because the scammers are often outside the U.S. or never positively identified
  • 37. © 2007 JPMorgan Chase & Co. All rights reserved. JPMorgan Chase Bank, N.A. Member FDIC 36 Variations on these schemes  Romance  Inheritance  Unclaimed Property  Traditions 4-1-9 Letter  Guaranteed Loans

Editor's Notes

  1. For the past 25 years, the accounting firm KPMG International has surveyed the top 1,000 U.S. Companies asking them to rank the crimes that hurt their business the most, both internally and externally. Since the survey began, embezzlement has ranked first. Check fraud was ninth in the list 10 years ago… Today, it’s #2. The American Bankers Association reports that check fraud and counterfeiting are among the fastest-growing crimes affecting the nation’s financial system at 25% annually. Findings indicate that smaller organizations are the most vulnerable to fraud and abuse. Organizations with less than 100 employees suffered the largest median losses per capita. Generally, this is because sophisticated internal controls, designed to deter fraud, are less prevalent in smaller organizations. (Fraud Detectives Consultant Network) Small organizations continue to say, “we don't really have a check problem." The numbers, however, say otherwise.
  2. Organized and professional fraud rings can make bogus checks from a "good check" copy that has a valid signature and other corporate data and logo information on it. Corporate Payroll and Accounts Payable accounts are great targets. All types and sizes of companies are targets. Some counterfeit checks are color copied, but most are created using inexpensive check printing software purchased from office supply stores or via the Internet. The software prints checks on blank laser paper stock readily available from office supply stores, mail order catalogs, software companies and even check printers. Almost all of the major check printers sell blank, generic laser check stock, and the forgers buy it like legitimate companies. Regulation CC provides bank clients access to their funds in a short period of time, (e.g., local checks within two days, non-local checks within four days). Criminals often alter a check’s routing and transit numbers creating an inconsistency regarding the true paying bank. The result is confusion in the collection process which may delay the time when notice of dishonor is given to the bank of first deposit. When the fraudulent item is returned to the right paying bank, the deposited funds have usually been withdrawn. Fraud is on the rise ... and it is up to each company to prepare to defend itself.
  3. Altered Check Fraud. The payee name is changed. The written amount can be increased, resulting in overpayment to the payee. Some checks had the MICR line altered with wrong information (such as routing/transit number or the account number) to slow down the clearing / return process. Forged Signatures / Forged Endorsements are crimes often perpetrated by employees or other parties known to the client Counterfeit checks are most prevalent and fastest growing of check fraud. Check counterfeiters use today’s sophisticated color copies to copy valid checks. Exact imitations of genuine checks can be created with readily available desktop publishing capabilities. Third Party Bill payment services- The checks are produced by service providers and do not include the payor signature. Instead, the signature line reflects something such as “signature on file”. Unauthorized checks produced by third party payment services are usually not detected until the client reviews the monthly bank statement. By the time the client identifies the unauthorized check, it is often too late to recover the funds, since the “24 hour window” . These checks usually sail right through the check sorting operation, since they include good account information and sometimes even include good serial numbers. Check Kiting requires multiple bank accounts and the movement of monies between accounts. The check kiter takes advantage of the time required by a bank to clear a check. Closed Account Fraud is added by the reduced clearing time mandated by Regulation UCC
  4. Altered Check Fraud. The payee name is changed. The written amount can be increased, resulting in overpayment to the payee. Some checks had the MICR line altered with wrong information (such as routing/transit number or the account number) to slow down the clearing / return process. Forged Signatures / Forged Endorsements are crimes often perpetrated by employees or other parties known to the client Counterfeit checks are most prevalent and fastest growing of check fraud. Check counterfeiters use today’s sophisticated color copies to copy valid checks. Exact imitations of genuine checks can be created with readily available desktop publishing capabilities. Third Party Bill payment services- The checks are produced by service providers and do not include the payor signature. Instead, the signature line reflects something such as “signature on file”. Unauthorized checks produced by third party payment services are usually not detected until the client reviews the monthly bank statement. By the time the client identifies the unauthorized check, it is often too late to recover the funds, since the “24 hour window” . These checks usually sail right through the check sorting operation, since they include good account information and sometimes even include good serial numbers. Check Kiting requires multiple bank accounts and the movement of monies between accounts. The check kiter takes advantage of the time required by a bank to clear a check. Closed Account Fraud is added by the reduced clearing time mandated by Regulation UCC
  5. Why does ACH Fraud occur? Ease of ACH participation; Industry acceptance; Flexibility of payment applications Recent trend - Higher dollar non-recurring activity; Shift from controlled corporate to uncontrolled consumer initiation; ARC & POP, WEB & TEL A number of businesses have experienced some ACH fraud because they haven’t sufficiently protected themselves against it. A common misconception is that ACH transactions need to be authorized. They don’t. Any ACH may debit post to a DDA account. The only pieces of information that an individual needs are Account Number and Routing Number which can be obtained from any given check. For example, from your payroll check, someone can use the account and routing number to make unauthorized payments or purchases via the internet or phone.
  6. The best defense against counterfeit checks is Positive Pay, an automatic check-matching service offered by Chase. This service matches the check number and dollar amount of checks presented for payment against a file of issued checks transmitted to the bank by the account holder.
  7. ACH Debit blocking enables the client to set parameters acting as a filter for ACH postings to the account. The client can define which transactions could hit the account, from originators to dollar limits.
  8. Who is responsible for fraud losses has changes over time… UCC 3-103 “Ordinary Care” Ordinary Care now requires corporate customers to follow “reasonable commercial standards” prevailing in their area – for their industry or business. UCC 3-405 “Comparative Negligence” Asks the question – who was in the best position to prevent the fraud – and what was their negligence by what they did – or did not do… The fraud risk would remain with the company (or employer) if the bank exercised “ordinary care” in processing the check In short, employers are responsible for the integrity of their employees and to safeguard against outside fraud.
  9. UCC 3-406 “Contributory Negligence” The company could be found to have contributed to the loss if, for example, if it fails to safeguard checks from forgery or alteration by a “reasonable commercial standard”, and that failure to safeguard contributes to the forgery or alteration Both the bank and the company could be responsible for the loss, with the court making the final decision on who bears what monetary loss. UCC 4-406 “Reasonable Promptness” Requires that customers exercise timeliness in reconciling bank statements and promptly notifying the bank if a payment has been made on a counterfeit or forged check. Generally means within 30 days. Banks may be able to establish a shorter time limit.
  10. Our competitors indicated that other banks are requiring positive pay.
  11. Deterrence is accomplished by using high-security checks, which discourage forgers by complicating the task of altering or replicating checks. Some clients ask, “How many security features are enough?” Many industry experts agree that checks should have a minimum of eight safety features, and 10 or more is even better. The marginal cost of adding additional security features is insignificant compared to the stress, management time and legal expense of trying to recover money by forgers.
  12. Check fraud is primarily a crime of opportunity. Implementing preventive measures will help you significantly decrease the number of opportunities available to forgers, thus minimizing losses from check fraud. Review Fraud Brochure
  13. According to a recent survey, two-thirds of consumers mistakenly believed that the scam e-mails they received had been sent by legitimate companies.(1) In 2005, losses reported by U.S. victims of Internet fraud crimes reached a record $182 million in losses; however, the number of actual cases that get reported is very low. (2)
  14. JPMC has seen a dramatic increase in phishing attacks against the bank in 2006. From an average of 15 attacks per year in 2004, to 50 attacks per month in late 2005, we are now experiencing approximately 300 attacks per month in 2006. JPMC recently implemented a Sender Policy Framework on the chase.com, bankone.com, and firstusa.com domains. This framework enables us to identify "official" JPMC email and instructs the ISPs not to deliver any email purporting to come from us that does not come from our gateways.
  15. For detailed information on what other fraudulent e-mails look like, steps you should follow in dealing with these solicitations and other information, please go to your browser and type in www.chase.com. Then click on "recognize and report fraudulent e-mail" on the left-hand side of the screen.
  16. For detailed information on what other fraudulent e-mails look like, steps you should follow in dealing with these solicitations and other information, please go to your browser and type in www.chase.com. Then click on "recognize and report fraudulent e-mail" on the left-hand side of the screen.
  17. For detailed information on what other fraudulent e-mails look like, steps you should follow in dealing with these solicitations and other information, please go to your browser and type in www.chase.com. Then click on "recognize and report fraudulent e-mail" on the left-hand side of the screen.
  18. For detailed information on what other fraudulent e-mails look like, steps you should follow in dealing with these solicitations and other information, please go to your browser and type in www.chase.com. Then click on "recognize and report fraudulent e-mail" on the left-hand side of the screen.
  19. SPECIAL NOTE: If you have responded to a phishing e-mail that appears to have originated from Chase by entering personal or account information into an e-mail or unauthorized site, we ask that you immediately call our client service team for further guidance and assistance. Please call the toll free number on the back of your Credit or ATM/ Debit Card or on your statement.
  20. SPECIAL NOTE: If you have responded to a phishing e-mail that appears to have originated from Chase by entering personal or account information into an e-mail or unauthorized site, we ask that you immediately call our client service team for further guidance and assistance. Please call the toll free number on the back of your Credit or ATM/ Debit Card or on your statement.
  21. SPECIAL NOTE: If you have responded to a phishing e-mail that appears to have originated from Chase by entering personal or account information into an e-mail or unauthorized site, we ask that you immediately call our client service team for further guidance and assistance. Please call the toll free number on the back of your Credit or ATM/ Debit Card or on your statement.