Don Rudisuhle's 2016 presentation for 28th Annual Conference of the Colorado Organization for Victim Assistance in Keystone Colorado: Elder Financial Abuse: An Advocate's Guide to Proactive Intervention
Don rudisuhle 2019_no_coacfe_post-presentationDon Rudisuhle
A two-hour continuing education training session about investigating elder financial exploitation presented for Certified Fraud Examiners at the Northern Colorado Chapter of the Association of Certified Fraud Examiners.
Don Rudisuhle CFE 2013 Presentation at COVA Annual ConferenceDon Rudisuhle
Slides from a presentation on financial exploitation of the elderly delivered by Certified Fraud Examiner Don Rudisuhle at the 25th Annual Conference of the Colorado Organization for Victim Assistance in Keystone, Colorado on October 30, 2013.
This document discusses various factors related to crime victims, offenders, and motivations. Some key points include:
- Victims are often of the same age and ethnicity as offenders. Strangers commit 52% of victimizations, while 40% of victims know the offender.
- When multiple offenders are involved, those aged 12-20 account for 41% and are disproportionately black or white.
- 67% of violent crimes do not involve weapons, though guns are most frequently used when present.
- Only around 50% of crimes are reported to police, with reasons including considering it a private matter or the suspect being unsuccessful.
- Understanding these characteristics can help analyze crime and target prevention efforts.
Hitting or physically taunting an elderly in Nevada is considered a crime and it gets even worse when there is exploitation involved. Learn more about it on this blog!
Protect your Pocketbook Tips to Avoid Financial Exploitation- Mark - Fullbright
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Surprising Facts About Wrongful Death Cases in VirginiaAngela M. Deisley
If you need more information about wrongful death cases, get in touch with a trusted personal injury attorney in Roanoke. Contact us today for a free, no-obligation consultation at 540-345-2000.
Take a look at the statistics, implications, and charges of Battery Domestic Violence in Las Vegas, Nevada. For more details, visit https://rosscgoodman.com/criminal-defense/domestic-violence/an-in-depth-look-at-battery-domestic-violence/.
Although no amount of money can bring back a loved one, the laws of the State of Florida do allow a survivor of a wrongful death to recover damages from an at fault party in a wrongful death lawsuit. Learn more about wrongful death damages in Florida in this presentation.
Don rudisuhle 2019_no_coacfe_post-presentationDon Rudisuhle
A two-hour continuing education training session about investigating elder financial exploitation presented for Certified Fraud Examiners at the Northern Colorado Chapter of the Association of Certified Fraud Examiners.
Don Rudisuhle CFE 2013 Presentation at COVA Annual ConferenceDon Rudisuhle
Slides from a presentation on financial exploitation of the elderly delivered by Certified Fraud Examiner Don Rudisuhle at the 25th Annual Conference of the Colorado Organization for Victim Assistance in Keystone, Colorado on October 30, 2013.
This document discusses various factors related to crime victims, offenders, and motivations. Some key points include:
- Victims are often of the same age and ethnicity as offenders. Strangers commit 52% of victimizations, while 40% of victims know the offender.
- When multiple offenders are involved, those aged 12-20 account for 41% and are disproportionately black or white.
- 67% of violent crimes do not involve weapons, though guns are most frequently used when present.
- Only around 50% of crimes are reported to police, with reasons including considering it a private matter or the suspect being unsuccessful.
- Understanding these characteristics can help analyze crime and target prevention efforts.
Hitting or physically taunting an elderly in Nevada is considered a crime and it gets even worse when there is exploitation involved. Learn more about it on this blog!
Protect your Pocketbook Tips to Avoid Financial Exploitation- Mark - Fullbright
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Surprising Facts About Wrongful Death Cases in VirginiaAngela M. Deisley
If you need more information about wrongful death cases, get in touch with a trusted personal injury attorney in Roanoke. Contact us today for a free, no-obligation consultation at 540-345-2000.
Take a look at the statistics, implications, and charges of Battery Domestic Violence in Las Vegas, Nevada. For more details, visit https://rosscgoodman.com/criminal-defense/domestic-violence/an-in-depth-look-at-battery-domestic-violence/.
Although no amount of money can bring back a loved one, the laws of the State of Florida do allow a survivor of a wrongful death to recover damages from an at fault party in a wrongful death lawsuit. Learn more about wrongful death damages in Florida in this presentation.
Rachelle Lou Cloutier has over 30 years of experience working in administrative and customer service roles at 3M Company. She has a strong work ethic and is detail-oriented. Her experience includes providing administrative support, managing customer accounts and schedules, and coordinating projects. She has expertise in Microsoft Office, PeopleSoft, and customer service management systems.
El Programa Nacional de Carrera Magisterial era un mecanismo para promover y mejorar las condiciones laborales de los docentes de educación básica en México. Tenía el objetivo de estimular la calidad educativa y establecer un sistema de mejora profesional y salarial para los maestros. Aunque mejoró los salarios de los docentes, su aplicación no tuvo un impacto significativo en los logros educativos de los estudiantes. El programa operó de 1992 a 2014 y fue sustituido por un nuevo programa en 2015.
ARQUITECTURA 'HIGH-TECH'. DE LA ESTÉTICA DEL PROGRESO TECNOLÓGICO A LA PERSUA...RODRIGO ALMONACID C.
Este documento resume la evolución del estilo arquitectónico conocido como "High-Tech" desde sus orígenes en el siglo XIX hasta la década de 1970. Destaca algunos de los primeros exponentes que exploraron la estética del progreso tecnológico como Joseph Paxton, Le Corbusier y Buckminster Fuller. Luego describe los proyectos pioneros de los años 1960-1970 de arquitectos como Foster, Piano, Rogers y Price que popularizaron el estilo a través de la exhibición de la tecnología y la ingeniería.
Contented mooing 9.12% from those Newbies.
StockTakers UUOOPPsiesTM gives small investors means to grow their wealth with our Risk Price driven 'likeables'.
Enjoy another slice of our Risk Price method to earn investment income for yourselves.
Because You Can.
Accredited investors can Buy A Slice of StockTakers 12% Bond to earn investment income by leaving that work to us.
Because We Do.
El documento resume aspectos culturales del pueblo Qom, incluyendo su ubicación geográfica en las provincias de Chaco y Formosa, su historia de desplazamiento de sus territorios ancestrales, su vestimenta, vivienda, organización social, espiritualidad, lenguaje, alimentación y situación actual en la que viven en lucha por la obtención de sus tierras.
Baby Clear M. Pan is a third year student studying for a Bachelor's degree in Elementary Education. Their portfolio focuses on educational technology. The document outlines key topics like the roles of technology, how it can be both beneficial and detrimental, and how technology serves as a partner in the constructivist learning process rather than just delivering instruction. With educational technology, students can learn more effectively about computers and how they can be useful tools for learning in daily life, engaging 21st century students.
Este documento describe un proyecto para mejorar el levante del ganado caprino en comunidades indígenas utilizando las TIC. El proyecto tiene como objetivo investigar técnicas agropecuarias para la reproducción, cría y manejo de productos caprinos a través de las TIC y aplicar esta investigación en las comunidades. Se justifica debido a la importancia del ganado caprino para estas comunidades y la falta de recursos y profesionales en la región. El proyecto motivará a los estudiantes e indígenas a investig
Este documento describe diferentes generaciones de bloqueadores beta, incluyendo sus mecanismos de acción, metabolismo, semivida y aplicaciones terapéuticas principales como el tratamiento de la hipertensión, cardiopatía isquémica e insuficiencia cardiaca. Se dividen en bloqueadores beta no selectivos de primera generación, bloqueadores beta selectivos beta1 de segunda generación y bloqueadores beta de tercera generación con acciones adicionales como el bloqueo alfa1.
Don Rudisuhle CFE 2011 Presentation at COVA Annual ConferenceDon Rudisuhle
Slides from a presentation on financial exploitation of the elderly delivered by Certified Fraud Examiner Don Rudisuhle at the 23rd Annual Conference of the Colorado Organization for Victim Assistance in Keystone, Colorado on October 18, 2011.
The document discusses elder financial abuse, providing statistics showing that millions of older Americans fall victim to identity theft and financial fraud each year. It defines elder financial abuse and outlines how it can occur through mail, computer, phone, television/radio, or in person. Common scams and signs of abuse are described. The document provides tips for older adults and caregivers to avoid and report financial abuse and lists helpful resources for further information or assistance.
The document summarizes the key points from a presentation on elder financial fraud given to healthcare professionals. It shows the results of polls given to audience members to gauge their knowledge and experiences with elder financial abuse. Many were unaware of their obligation to report suspected abuse. They learned that 1 in 5 elders have been victimized, and it can negatively impact their health. Common perpetrators were discussed. Case studies demonstrated what constitutes fraud. Resources for reporting and getting help for victims were provided. The presentation aimed to increase awareness and reporting of elder financial exploitation.
Hidden Risks and Mistakes to Avoid in Estate and Long-Term Care PlanningMelinda Merk
Co-presented with Buckley Kuhn Fricker on 11/4/17. Discusses the importance of pre-planning vs. crisis planning, and focuses on 3 key goals of estate and long-term care planning, which lead to Peace Of Mind, Protecting and Preserving Wealth, and Family Harmony: 1) maintaining control and protecting assets during life, including incapacity; 2) efficient and orderly wealth transfer at death; and 3) protecting beneficiaries from others and themselves.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
This document discusses various types of internet scams and fraud. It describes common scams like Nigerian 419 scams, work from home scams, romance scams, and malware scams disguised as important notifications. It provides tips on how to recognize these scams and advises readers not to provide personal information or money to potential scammers. The document also discusses psychological tricks scammers use and strategies to protect yourself from various internet and phone-based scams.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
Presented to NALS Philadelphia in September, 2017. This presentation explores common data security risks and discusses basic steps you can take to protect yourself. Includes a quick review of Equifax, Experian, and TransUnion recent breaches.
This document summarizes a presentation given by Paul Bonello from ANZ Banking Group on vulnerable customers and elder abuse. The presentation covers ANZ's work to implement processes to help frontline staff identify and escalate potential cases of financial abuse or customers with cognitive impairments. It discusses signs of abuse like suspicious withdrawals and what staff should do if they suspect issues like deceiving powers of attorney. The presentation also provides two case studies and resources on cognitive impairment from Alzheimer's Australia to help staff identify and assist vulnerable customers.
Rachelle Lou Cloutier has over 30 years of experience working in administrative and customer service roles at 3M Company. She has a strong work ethic and is detail-oriented. Her experience includes providing administrative support, managing customer accounts and schedules, and coordinating projects. She has expertise in Microsoft Office, PeopleSoft, and customer service management systems.
El Programa Nacional de Carrera Magisterial era un mecanismo para promover y mejorar las condiciones laborales de los docentes de educación básica en México. Tenía el objetivo de estimular la calidad educativa y establecer un sistema de mejora profesional y salarial para los maestros. Aunque mejoró los salarios de los docentes, su aplicación no tuvo un impacto significativo en los logros educativos de los estudiantes. El programa operó de 1992 a 2014 y fue sustituido por un nuevo programa en 2015.
ARQUITECTURA 'HIGH-TECH'. DE LA ESTÉTICA DEL PROGRESO TECNOLÓGICO A LA PERSUA...RODRIGO ALMONACID C.
Este documento resume la evolución del estilo arquitectónico conocido como "High-Tech" desde sus orígenes en el siglo XIX hasta la década de 1970. Destaca algunos de los primeros exponentes que exploraron la estética del progreso tecnológico como Joseph Paxton, Le Corbusier y Buckminster Fuller. Luego describe los proyectos pioneros de los años 1960-1970 de arquitectos como Foster, Piano, Rogers y Price que popularizaron el estilo a través de la exhibición de la tecnología y la ingeniería.
Contented mooing 9.12% from those Newbies.
StockTakers UUOOPPsiesTM gives small investors means to grow their wealth with our Risk Price driven 'likeables'.
Enjoy another slice of our Risk Price method to earn investment income for yourselves.
Because You Can.
Accredited investors can Buy A Slice of StockTakers 12% Bond to earn investment income by leaving that work to us.
Because We Do.
El documento resume aspectos culturales del pueblo Qom, incluyendo su ubicación geográfica en las provincias de Chaco y Formosa, su historia de desplazamiento de sus territorios ancestrales, su vestimenta, vivienda, organización social, espiritualidad, lenguaje, alimentación y situación actual en la que viven en lucha por la obtención de sus tierras.
Baby Clear M. Pan is a third year student studying for a Bachelor's degree in Elementary Education. Their portfolio focuses on educational technology. The document outlines key topics like the roles of technology, how it can be both beneficial and detrimental, and how technology serves as a partner in the constructivist learning process rather than just delivering instruction. With educational technology, students can learn more effectively about computers and how they can be useful tools for learning in daily life, engaging 21st century students.
Este documento describe un proyecto para mejorar el levante del ganado caprino en comunidades indígenas utilizando las TIC. El proyecto tiene como objetivo investigar técnicas agropecuarias para la reproducción, cría y manejo de productos caprinos a través de las TIC y aplicar esta investigación en las comunidades. Se justifica debido a la importancia del ganado caprino para estas comunidades y la falta de recursos y profesionales en la región. El proyecto motivará a los estudiantes e indígenas a investig
Este documento describe diferentes generaciones de bloqueadores beta, incluyendo sus mecanismos de acción, metabolismo, semivida y aplicaciones terapéuticas principales como el tratamiento de la hipertensión, cardiopatía isquémica e insuficiencia cardiaca. Se dividen en bloqueadores beta no selectivos de primera generación, bloqueadores beta selectivos beta1 de segunda generación y bloqueadores beta de tercera generación con acciones adicionales como el bloqueo alfa1.
Don Rudisuhle CFE 2011 Presentation at COVA Annual ConferenceDon Rudisuhle
Slides from a presentation on financial exploitation of the elderly delivered by Certified Fraud Examiner Don Rudisuhle at the 23rd Annual Conference of the Colorado Organization for Victim Assistance in Keystone, Colorado on October 18, 2011.
The document discusses elder financial abuse, providing statistics showing that millions of older Americans fall victim to identity theft and financial fraud each year. It defines elder financial abuse and outlines how it can occur through mail, computer, phone, television/radio, or in person. Common scams and signs of abuse are described. The document provides tips for older adults and caregivers to avoid and report financial abuse and lists helpful resources for further information or assistance.
The document summarizes the key points from a presentation on elder financial fraud given to healthcare professionals. It shows the results of polls given to audience members to gauge their knowledge and experiences with elder financial abuse. Many were unaware of their obligation to report suspected abuse. They learned that 1 in 5 elders have been victimized, and it can negatively impact their health. Common perpetrators were discussed. Case studies demonstrated what constitutes fraud. Resources for reporting and getting help for victims were provided. The presentation aimed to increase awareness and reporting of elder financial exploitation.
Hidden Risks and Mistakes to Avoid in Estate and Long-Term Care PlanningMelinda Merk
Co-presented with Buckley Kuhn Fricker on 11/4/17. Discusses the importance of pre-planning vs. crisis planning, and focuses on 3 key goals of estate and long-term care planning, which lead to Peace Of Mind, Protecting and Preserving Wealth, and Family Harmony: 1) maintaining control and protecting assets during life, including incapacity; 2) efficient and orderly wealth transfer at death; and 3) protecting beneficiaries from others and themselves.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
This document discusses various types of internet scams and fraud. It describes common scams like Nigerian 419 scams, work from home scams, romance scams, and malware scams disguised as important notifications. It provides tips on how to recognize these scams and advises readers not to provide personal information or money to potential scammers. The document also discusses psychological tricks scammers use and strategies to protect yourself from various internet and phone-based scams.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
Presented to NALS Philadelphia in September, 2017. This presentation explores common data security risks and discusses basic steps you can take to protect yourself. Includes a quick review of Equifax, Experian, and TransUnion recent breaches.
This document summarizes a presentation given by Paul Bonello from ANZ Banking Group on vulnerable customers and elder abuse. The presentation covers ANZ's work to implement processes to help frontline staff identify and escalate potential cases of financial abuse or customers with cognitive impairments. It discusses signs of abuse like suspicious withdrawals and what staff should do if they suspect issues like deceiving powers of attorney. The presentation also provides two case studies and resources on cognitive impairment from Alzheimer's Australia to help staff identify and assist vulnerable customers.
This document provides information to help social workers assist senior clients dealing with financial elder abuse. It defines elder abuse and outlines common situations where it arises. It discusses the two main types of abuse - by individuals like family/friends and by scams. For individual abuse, it provides questions to ask clients and initial steps social workers can take like gathering documents and reporting abuse. It also explains legal options to help clients avoid further abuse like restraining orders or get money back through small claims court or criminal charges. The document provides resources for locating an attorney and tips for preparing clients to meet with one. It also discusses scam detection and prevention strategies to educate clients.
This document discusses the hidden problem of elder financial abuse. It notes that 83% of financial institutions suspect elderly client financial exploitation, most often by relatives. Common types of exploitation include forgery, misappropriation of funds, and power of attorney abuse. The document provides clues for identifying financial exploitation and outlines steps victims and witnesses can take to report abuse, including contacting adult protective services or an elder law attorney. Overall, the document aims to raise awareness of elder financial abuse and provide resources for victims.
Estate planning 5 ways to engage with your clientsGil Gordon
This document provides guidance for financial advisors on engaging with clients about estate planning. It recommends focusing on clients' families by mapping out relationships across one generation up, one across, and two down. It suggests asking questions to understand clients' family situations and dependencies. The document also provides tips on using storytelling to engage clients emotionally. It discusses common estate planning problems like taxes, divorce, death, and asset protection that legal documents can address. It recommends partnering with lawyers and providing clients with key deliverables like a crisis management plan and ongoing review of their estate planning needs.
The document discusses common fraud schemes and how to avoid becoming a victim. It covers telemarketing fraud, advanced fee schemes like Nigerian letter scams and lottery scams, work from home scams, and romance scams. The key advice is to be skeptical of unsolicited offers, never send money or personal information to strangers, research companies independently, and talk to a trusted advisor before engaging in any financial activities with unknown parties.
What Is Elder Abuse and How to Prevent It?Lanzone Morgan
This Slide is presenting about what is elder abuse and how to prevent elder abuse. Look at this presentation and visit website for more info on elder abuse and how to stop it.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
After a person passes away, their family, attorney, and personal representative have many legal steps to complete to close out the deceased's affairs. This can take months or years depending on the complexity of the estate. The personal representative must navigate federal and state laws to complete tasks like reporting the death, locating important documents, canceling subscriptions, protecting assets, paying debts and benefits, filing probate documents, settling with creditors, and filing a final report to close out the estate. Completing all of these steps properly is required by law.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Identity theft is the #1 consumer complaint filed with the Federal Trade Commission for 14 consecutive years. All age and socio-economic groups are affected by Identity theft. This problem is affecting a younger demographic, affecting the workplace productivity of their parents.
Watch this presentation, get educated, and find out how you can avoid identity theft.
Similar to Don Rudisuhle 2016_COVA_Presentation (20)
Bharat Mata - History of Indian culture.pdfBharat Mata
Bharat Mata Channel is an initiative towards keeping the culture of this country alive. Our effort is to spread the knowledge of Indian history, culture, religion and Vedas to the masses.
AHMR is an interdisciplinary peer-reviewed online journal created to encourage and facilitate the study of all aspects (socio-economic, political, legislative and developmental) of Human Mobility in Africa. Through the publication of original research, policy discussions and evidence research papers AHMR provides a comprehensive forum devoted exclusively to the analysis of contemporaneous trends, migration patterns and some of the most important migration-related issues.
UN WOD 2024 will take us on a journey of discovery through the ocean's vastness, tapping into the wisdom and expertise of global policy-makers, scientists, managers, thought leaders, and artists to awaken new depths of understanding, compassion, collaboration and commitment for the ocean and all it sustains. The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.Christina Parmionova
The best available, up-to-date information on all fishing and related vessels that appear on the illegal, unregulated, and unreported (IUU) fishing vessel lists published by Regional Fisheries Management Organisations (RFMOs) and related organisations. The aim of the site is to improve the effectiveness of the original IUU lists as a tool for a wide variety of stakeholders to better understand and combat illegal fishing and broader fisheries crime.
To date, the following regional organisations maintain or share lists of vessels that have been found to carry out or support IUU fishing within their own or adjacent convention areas and/or species of competence:
Commission for the Conservation of Antarctic Marine Living Resources (CCAMLR)
Commission for the Conservation of Southern Bluefin Tuna (CCSBT)
General Fisheries Commission for the Mediterranean (GFCM)
Inter-American Tropical Tuna Commission (IATTC)
International Commission for the Conservation of Atlantic Tunas (ICCAT)
Indian Ocean Tuna Commission (IOTC)
Northwest Atlantic Fisheries Organisation (NAFO)
North East Atlantic Fisheries Commission (NEAFC)
North Pacific Fisheries Commission (NPFC)
South East Atlantic Fisheries Organisation (SEAFO)
South Pacific Regional Fisheries Management Organisation (SPRFMO)
Southern Indian Ocean Fisheries Agreement (SIOFA)
Western and Central Pacific Fisheries Commission (WCPFC)
The Combined IUU Fishing Vessel List merges all these sources into one list that provides a single reference point to identify whether a vessel is currently IUU listed. Vessels that have been IUU listed in the past and subsequently delisted (for example because of a change in ownership, or because the vessel is no longer in service) are also retained on the site, so that the site contains a full historic record of IUU listed fishing vessels.
Unlike the IUU lists published on individual RFMO websites, which may update vessel details infrequently or not at all, the Combined IUU Fishing Vessel List is kept up to date with the best available information regarding changes to vessel identity, flag state, ownership, location, and operations.
Indira awas yojana housing scheme renamed as PMAYnarinav14
Indira Awas Yojana (IAY) played a significant role in addressing rural housing needs in India. It emerged as a comprehensive program for affordable housing solutions in rural areas, predating the government’s broader focus on mass housing initiatives.
How To Cultivate Community Affinity Throughout The Generosity JourneyAggregage
This session will dive into how to create rich generosity experiences that foster long-lasting relationships. You’ll walk away with actionable insights to redefine how you engage with your supporters — emphasizing trust, engagement, and community!
1. Elder Financial Abuse: An Advocate's
Guide to Proactive Intervention
28th ANNUAL COVA CONFERENCE
October 23-26, 2016
Keystone, Colorado
Presenter: Don Rudisuhle CFE
don@eldertheft.com
www.linkedin.com/donrudisuhle
(307) 745-6391
2. My Background
• Personal
– From Honolulu, Hawaii. Now live in Laramie, Wyoming
– Raised in Mexico, lived in Europe, Africa and Asia
• Education:
– BS Economics, MBA Finance
• Career:
– Former pharmaceutical company executive
– Former international development consultant
– Current occupation:
• Certified Fraud Examiner
• Forensic Accountant
• Expert Witness
• Elder Financial Exploitation Researcher
• Disclaimer: I am not a lawyer (I can’t give you legal advice)
3. Your Background?
Poll Question #1
• How many of you are:
– Advocates?
– Attorneys?
– Law Enforcement Officials?
– Administrators?
– Financial Personnel?
– Other?__________________________
4. Presentation Major Points
• What is elder financial exploitation? What is
its effect on the victim and the family?
• What are the characteristics of a perpetrator?
How do they operate?
• What is the role of the advocate? How can an
advocate help families deal with the problem?
• How does a forensic accountant investigate a
suspected case? What tools are used?
5. Elder Financial Exploitation
• Elder financial exploitation is defined as the
illegal or improper use of an elder's resources
for another's profit or advantage.
– According to the Colorado Department of Human
Services, from the years 2011 to 2021, the
number of older adults in Colorado will increase
54 percent
– Underreporting is estimated to range from 10 to
44 cases for every reported case
– Losses to victims are believed to exceed $3 billion
annually
6. The Victim
Is often:
• An elderly person
• A disabled individual
• A widow/widower
• Confined or bedridden
• Chronically ill
• A lonely individual
• A trusting soul
7. Who are the Victims?
• Typically, the victims:
– Are above the age of 65
– Female
– Widowed or estranged from mate
– Have some amount of savings or real estate
– Lonely, living alone, or in a facility
– Suffering from some degree of cognitive
impairment
8. Consequences to Victim
• Consequences of Financial Exploitation
– Compromises elder’s financial security
– Degrades their quality of life
– Engenders fear and anxiety
– Limits access to health insurance and care
– Contributes to homelessness
– Causes depression and despair
– Increases costs to the state i.e. Medicaid
– Destroys relationships and harmony in the family
– Heirs lose their inheritance
9. Victims with Dementia
• A few things to consider:
– Persons with dementia are much more vulnerable
– Cognitive impairment affects financial decision
making
– Women and minorities are more likely to be
affected
– An Alzheimer’s victim may be incapable of
articulating a concern
– Unscrupulous individuals may try to take
advantage of them
10. Impediments to Reporting
• Many victims are hesitant to report because:
– They don’t know what to do
– Unsure of what has occurred
– Denial of the facts
– Embarrassment with friends and family
– Fear of retribution from perpetrator
– Fear of isolation or abandonment from loved ones
– Fear of loss of medical or other care
– Don’t want family member to be imprisoned
11. The Advocate
The advocate’s role is:
• Know the client
• Listen to concerns
• Be understanding
• Provide reassurance
• Assess the client’s needs
• Offer resources
• Make proper reports
12. The Advocate’s Objectives
• If the advocate suspects financial abuse on
interaction with the elder, a family member or
a caregiver, the steps to take are:
– Assess client needs
– Identify possible resources
– Determine whether a report needs to be made
– Request help from the proper authorities
13. Symptoms to Look For
– Elder has recently made a new “best friend”
– Often makes large bank or ATM withdrawals
– Sends checks or wire transfers overseas
– Is unaware of his/her financial status
– Has difficulty paying bills and buying everyday necessities
– Receives mail for lotteries, prizes and contests
– Gets frequent calls from telemarketers
– Is isolating him/herself from family and friends
– Demonstrates fear or submissiveness towards caregivers
– Caregiver tends to intercede and speak on behalf of victim
– Living under squalid and unsanitary conditions
14. The Urgency for Taking Action
• Taking action is a matter of urgency. The
desired outcomes are:
– Stop the hemorrhage
– Reassure the victim
– Initiate measures to recover assets
– Hold the perpetrator accountable
15. Ascertaining the Facts
• Things are not always what they appear
– Listen patiently to the elder’s story
– Does it sound plausible?
– Be sympathetic and understanding
– Learn as much as possible without probing
– Don’t frighten or alienate the person
– Assess possible courses of action
• Obtain more information, or
• Report the incident without delay
16. Mandatory Reporting
On May 16, 2013, Governor Hickenlooper signed Senate Bill 13-
111, Require Reports of Elder Abuse and Exploitation
– Persons observing abuse or exploitation of person 70 years or older must
report it to law enforcement within 24 hours
– Adults with intellectual or development disabilities also included
– A person reporting in good faith enjoys immunity from civil suit or criminal
action
– Members of the clergy are exempt under certain circumstances
– Since the law went into effect, the number of reported cases in Colorado
has reached 17,743, an increase of 50%
17. Who Must Report?
• Mandatory Reporters in Colorado include:
– Medical personnel
• Physicians, nurses, pharmacists, dentists, chiropractors,
therapists, long-term care staff and others
– Home health workers and social workers
– Court appointed guardians and conservators
– Bank and financial institution staff
– Government officials
• Police and firefighters
– Clergy (under some circumstances)
18. Where to Report?
• Reports can be made to:
– Adult Protective Services: call the APS intake
number for the County Department of
Human/Services where the at-risk adult lives.
• Examples: Denver (720) 944-2994, Arapahoe (303) 636-
1750, Larimer (970) 498-7770, Weld (970) 346-7676
– Your county Department of Social Services. For
contact information www.colorado.gov/cdhs
– Your local police department or sheriff’s office.
19. Families Will Need Guidance
• Help families decide what to do
• Pursue legal action or negotiate?
• Identify legal resources who can help with:
– Recovery of assets
– A conservatorship or guardianship
• Tasks that they can perform themselves
• Write up a narrative of the facts
• Collect documents like bank and investment statements
• Make a list of persons involved in the case
• Create a timeline of events
20. Can You Recommend Resources?
Poll Question #2
• Does your organization do pro-bono legal
work?
• Can you recommend resources that the
advocates can use to obtain assistance?
21. The Perpetrator
Can be anybody!
• A family member
• A distant relative
• A neighbor
• A health care worker
• A trusted professional
• A tradesman
• A complete stranger
22. Perpetrator Characteristics
• Some typical attributes
– Is narcissistic and lacks empathy
– Is a wheeler and dealer
– Is domineering and controlling
– Doesn't like people questioning their judgment or actions
– Has a strong desire for personal gain
– Has a “Beat the system attitude”
– Lives beyond his/her means
– Has a close relationship with the victim
– Is unable to relax
– Outwardly, appears to be very trustworthy.
– Displays some sort of drastic change in personality or behavior
– Appears incapable of feeling guilt or remorse
Adapted from The Certified Accountant, 1st Quarter 2009, Issue #37
23. Four Case Studies
• A case of involving close family members
– A daughter misuses a power of attorney
• A retired couple falls for a foreign lottery scam
– A cold call from Jamaica causes excitement in the
family
• “Your computer has a virus!”
– An elderly widower invites a telescammer into his PC
• “It looks like your roof has hail damage”
– The stranger at the front door can put on a new roof
at no cost!
24. Daughter Misuses POA
• Ripe for the picking!
– An aging couple sets up an estate plan
– Elder’s daughter is trustee and POA agent
– Husband dies, wife develops Alzheimer’s
– Daughter accesses funds for personal use
– Builds a custom home, buys truck, goes to Vegas
– Sibling brings civil suit, conservatorship action
– Long story short, daughter gets away with it
25. Losing the Jamaican Lottery
• Educated woman had by clever scammers
– In retirement she enters sweepstakes for fun
– One day a cold caller tells her she was won!
– To claim her millions she needs to pay the taxes
– A courier will deliver her check shortly
– Repeated misfortunes befall the courier
– Money is need for medical costs and to post bail
– Nearly six figures sent to Jamaica
26. Your Virused Computer…
• A trusting elderly disabled man gets a cold call
– The man is from “Windows Technical Service”
– He is on a poor crackly overseas connection
– He says that the man’s PC is sending out viruses
– He asks the man to go to a special website
– Scammers then take control of his computer
– They can fix everything for a modest fee
– Man gives them a credit card and bank password!
– A bad ending ensues
27. Hail Has Damaged Your Roof
• A door-to-door huckster pitches a new roof
– Shows up on the porch at an inopportune time
– Says the roof has hail damage which he can fix
– Senior homeowner lets him put up a ladder
– In 20 seconds, he determines damage is extensive
– He produces glossy brochures from his clunker car
– Your homeowner’s insurance will pay for new roof
– Homeowner subjected to a high pressure pitch
– Homeowner sends him packing
28. A Victim’s Family Member
Unlawful conversion of the victim’s assets via:
• Misuse of a Power of Attorney
• Trusteeship – abuse of fiduciary responsibility
• Quitclaim deed to real estate
• Adding themselves to a bank account
• Persuading the victim to change their will
• Forging checks and other documents
• Depositing retirement checks “less cash”
• Stealing valuable property or cash
29. Long Distance Scammers
• Hallo, I am calling from Microsoft. You have virus…
• Good News!!! You have won the Costa Rican lottery!!!
• I am the Oil Minister of Nigeria. I have some funds…
• Grandma, I’m in jail in Hungary. Send bail money…
• I’m terminally ill. Can you help distribute my estate?
• We need you to deposit checks from our customers
and wire us the money. You can keep a commission…
• This is Rachel from Card Services. Your eligibility to
lower your interest expires soon. This is your final
notice…
• Our church’s roof is leaking. Can you donate…?
30. Failed Advance Fee Scam
We are looking for a Clerk.
In spite of its today�s success and stern stance on the
market of relevant services, our company goes on
developing and improving. Our corporation
permanently works at the presentation of new
services…
If you are a young, conceited, pertinacious, attentive,
responsible, reliable specialist who desires to begin a
career in the legal entity with the perfect reputation,
you are welcome to apply for the vacancies we offer.
Our company cherishes its employees etc etc...
31. Penalties in Colorado
• In Colorado, there are enhanced penalties and
a surcharge for crimes against at-risk persons.
• Under C.R.S. 18-6.5-107 (7)(b) Criminal
exploitation of an at-risk person is a class 3
felony if the thing of value is five hundred
dollars or greater.
32. The Dance of the Auditors
A modern interpretation of Matisse’s “Dance”
33. Beginning the Investigation
• How the forensic accountant gets involved
– A trust and estate lawyer or an elder law attorney
contacts the forensic accountant, usually through
a trusted referral
– The attorney calls and discusses the case
– The attorney’s client sends financial data
– The accountant analyzes the bank statements
– A report is sent to the attorneys
– Lawyer, client and accountant decide on action
– Litigation may be initiated
34. Vetting an Expert
• Attorneys recruit experts based on:
– Education, certificates and training
– Involvement in prior cases
– Publications in print or online
– Presentations, seminars and webinars
– Social media presence
– Referrals from other attorneys or their clients
35. Investigative Tools
• Some of the tools used in an investigation
– Microsoft Excel (Spreadsheet Analysis)
– Perfect Audit (Convert bank statements to Excel)
– Adobe Acrobat Professional (Edit PDFs)
– Microsoft Access (Database)
– Genopro (Genograms)
– Dragon Naturally Speaking Professional Edition
– Online data sources (Veromi, Intelius etc.)
– Public records (Recorder, Assessor, Sec. of State)
– NodeXL (Social Network Analysis)
36. Outcome of the Case
• There are a number of possible outcomes:
– All parties work it out among themselves (rare)
– All parties agree to mediation
– A civil suit is filed and it ends with:
• A negotiated settlement through arbitration
• A judgment against the defendant
• A dismissal by the court
• Abandonment by the plaintiffs on financial grounds
• A criminal case being initiated
45. Obstacles to Recovery
• Cash most likely has been dissipated
• Perpetrator has left the state or the country
• Assets have been transferred to a third party
• Assets have put in a trust or corporation
• Real estate has been retitled to someone else
• Complainant can’t afford cost of litigation
• Statute of limitations has lapsed
• Victim may be deceased
46. Your Personal Experience?
Poll Question #3
Have you ever had a personal experience with
Elder Financial Exploitation?
• Yes
• No
If yes, was the outcome:
• Positive?
• Negative?
47. Current Research
• The USDA Multi-state Research Team
– Spearheaded by the University of Wyoming
– Includes researchers from:
• Eastern Illinois University
• University of Wisconsin-Madison
• Virginia Tech University
• Washington State University-Vancouver
• University of Minnesota
48. Purpose of the Research
The purpose of the team’s current research is to
understand the risk factors associated with elder
financial exploitation by analyzing family
members’ experiences when a power of
attorney document has been used by another
family member to manage an elderly (age 60 or
older) relative’s finances
49. Call for Participants
• Seeking multiple participants from families with:
– Successful family member experiences
– Families with allegedly exploitive experiences
• Requirements:
– Need to be a U.S resident 18 or older
• Contact:
Virginia B. Vincenti, PhD, CFCS
Professor of Human Development & Family Sciences
University of Wyoming
307-766-4079 vincenti@uwy.edu
50. Q & A Session
• Ask whatever question you wish
• Tell your own story about elder financial
exploitation
• This slide deck can be found at
http://www.slideshare.net/eldertheft