Risk Management: Integrating AML and Anti-Fraud Efforts



Similar documents
Identity Theft Prevention Program

CHAPTER 101: IDENTITY THEFT PREVENTION PROGRAM

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

Financial Crimes Enforcement Network

An Oracle White Paper October An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions

Questions and Answers About the Identity Theft Red Flag Requirements

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Delta Township Compiled Policy Manual

City of Caro Identity Theft Prevention Policy

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

Identity Theft Policy

Identity Theft Prevention Program (FACTA Identity Theft Red Flags Rule)

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

IDENTITY THEFT DETECTION POLICY

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

Red Flag Rules and Aging Services: What You Need to Know

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

Identity Theft Prevention Program

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Program

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

IDENTITY THEFT PREVENTION

Identity Theft Prevention Program Red Flag Rules Policy P Issued: May 2009

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

Z1.01 Guideline: Identity Theft Prevention Program

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

MARSHALL UNIVERSITY BOARD OF GOVERNORS

identity Theft Prevention and Identification Requirements For Utility

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

FACTA Identity Theft Red Flags Program.

REGULATORY ALERT NATIONAL CREDIT UNION ADMINISTRATION 1775 DUKE STREET, ALEXANDRIA, VA DATE: October 2001 NO.: 01-RA-11

Florida Agricultural & Mechanical University Board of Trustees Policy

POLICY: Identity Theft Red Flag Prevention

An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules

Christopher Newport University Policy and Procedures

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

University of North Dakota. Identity Theft Prevention Program

Central Oregon Community College. Identity Theft Prevention Program

UNC Asheville. Red Flag Rule and NC Identity Protection Act Information

Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

COUNCIL POLICY STATEMENT

Texas A&M International University Identity Theft Prevention Program

The University of North Carolina at Charlotte Identity Theft Prevention Program

IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

N a t i o n a l F u n e r a l D i r e c t o r s A s s o c i a t i o n

Identity Theft Prevention Policy

I know what is identity theft but how do I know if mine has been stolen?

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

RANDOLPH COUNTY HEALTH DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

IDENTITY THEFT PREVENTION PROGRAM

FinCEN Issues Notice of Proposed Rulemaking that Would Extend AML Requirements to Registered Investment Advisers

Springfield Technical Community College Identity Theft Prevention Program

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model

1. Entities and Accounts Covered by the New Rules Covered Entities

Top 5 reasons incident response is failing. kpmg.com

Chatsworth Water Works Commission. Identity Theft Prevention Program. Effective beginning December 1, 2008

Oregon University System Identity Theft Prevention Program Effective May 1, 2009

Identity Theft Red Flags Rule

ANTI-MONEY LAUNDERING FOR LENDERS

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

HOME DEPOT DATA BREACH

[Institution or GPLS Name] Red Flag Rules - Identity Theft/Fraud Prevention Program. Effective beginning, 2009

MOTLOW STATE COMMUNITY COLLEGE

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

II. F. Identity Theft Prevention

Facts About FACTA Red Flag Identity Theft Prevention Program

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Identity Theft Prevention Policy and Procedure

DHHS POLICIES AND PROCEDURES

Identity Theft Victims Universal Complaint Form (FTC)

ORDINANCE NO. Ot ~ft,

University System of New Hampshire. Identity Theft Prevention Program

Identity Theft Prevention Program

CATAWBA COUNTY IDENTITY THEFT RED FLAGS POLICY

The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual:

City of Lathrop, California - Red Flags and Preventing Identity Theft

Policies and Procedures: IDENTITY THEFT PREVENTION

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

Number: Index

IDENTITY THEFT PREVENTION PROGRAM

University of Arkansas at Monticello Identity Theft Prevention Program

Department of the Treasury Financial Crimes Enforcement Network

University of Alaska. Identity Theft Prevention Program

The FACT Act: An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies

Transcription:

Risk Management: Integrating AML and Anti-Fraud Efforts July 26, 2011

Reality Check AML and anti-fraud are necessarily intertwined the financial gain of fraudulent activity ultimately needs to be integrated into the financial system In 2008, FinCEN Director James Freis stated: While they are often viewed as separate criminal enterprises, acts of fraud and acts of money laundering are interconnected. Therefore, money laundering is often a malignant and pernicious product of fraud. By fighting fraud, you are fighting money laundering. And in turn, by identifying money laundering, you could be alerting law enforcement to a criminal attempting to mingle the proceeds of fraudulent activity committed against innocent victims some of whom may do business with your bank. Financial Fraud Enforcement Task Force Sharing potential fraud information with AML compliance personnel (analysts/investigators) is critical to compliance with SAR reporting obligations Low value SARs may only be the tip of the iceberg 1

Recent Typologies and Trends Identity Theft FinCEN Report on Identity Theft - Trends, Patterns, and Typologies Reported in SARs (study covered 2003-2009) Identity theft sixth most frequently reported characterization of suspicious activity within the period of the study 2004 was the first full year in which depository institutions were obliged to report identity theft as a separate suspicious activity characterization on SARs. Since January 1, 2004, the number of SAR filings reporting identity theft has increased by 123% Three main types of fraud facilitated by identity theft: Credit card fraud All types of loan fraud Depository account fraud 2

Credit Card Fraud Most prevalent type of identity theft-facilitated fraud Takeovers of existing legitimate credit card accounts and setting up new unauthorized accounts using identifying information of identity theft victims Physical theft of credit cards from mail or person or residence of the victim Skimming of credit card numbers Collection of information online Cloned cards Credit card fraud was co-reported in about 45.5% of the sample SAR filings Reported methods: Attempts to become authorized purchasers Private label cards Accounts opened under business names 3

Loan & Depository Account Fraud Loan Fraud: About 31% of sample SAR filings reported successful and unsuccessful attempts at loan fraud, including fraud related to loans for: Automobiles Mortgages Student loans Other types of consumer loans Significant success in identifying fraudulent loans before they are funded Depository Account Fraud: Identity thief opens a new joint account in the name of the victim and him/herself Identity thief then poses as victim and directs that funds be transferred from one or more legitimate existing victim accounts into the new joint account 4

How was theft discovered? For over 27.5% of filings: Discovered when customers contacted filer to question transactions on existing accounts or to contest ownership of recently established accounts Discovered when customers confirmed identity theft after filers contacted them to question anomalous account transactions ti For nearly 21% of filings, normal account monitoring uncovered identity theft In 14.5% of filings, searches of commercial databases contributed to discovery of identity theft In 10.5% of filings, filer or customer review of customer credit reports In 5% of filings, a federal, state, or local law enforcement agency reportedly brought identity theft to attention of financial institutions In 2.5% of filings, unexpected call from a bill collector alerted victims to identity theft For less than 2% of filings, credit monitoring services or receipt of an unexpected bill were each responsible for uncovering identity theft 5

Red Flags Two most common: The financial institution or creditor is notified by a customer, victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in identity theft The financial institution or creditor is notified of unauthorized charges or transactions in connection with a customer s covered account Other red flags reported included: Social Security number provided on application is assigned to individual other than the applicant The Social Security number has not been issued, or is listed on the Social Security Administration s Death Master File Shortly following the notice of change of address for a covered account, the institution or creditor receives a request for a new, additional, or replacement card or a cell phone, or for the addition of authorized users on the account The customer fails to make the first payment or makes an initial payment but no subsequent payments 6

Integrating AML & Anti-Fraud Efforts - Challenges Culture - anti-fraud and AML departments typically think differently Fraud and AML investigators independently investigate the same cases SAR filing responsibilities are segregated Data disparities Separate systems, red flags and watch lists Centralized versus decentralized functions Path to integration can be costly, particularly for large institutions Specialized skill sets require cross-training Different backgrounds (e.g., former bankers versus former law enforcement) Fear of creating more inefficiencies when resources are scarce 7

Integration Approach Leadership & Oversight People Skill sets Training & awareness Accountability Integration Technology Manual and automated monitoring Watch lists Case management Communication & Tone at the Top Controls Written policies and procedures Internal audits/independent reviews Information sharing

Leading Practice Solutions Integrated risk assessment, CIP, monitoring Leverage KYC from other business units Required communication between AML and Fraud departments Cross-training and awareness Integrated internal audits Quality assurance procedures around non-aml SARs Shared case management platform File for attempted transactions Take advantage of 314(b) information sharing program Shared meetings and participation in committees Commitment and support from senior management Long-term view: successful integration i won t happen overnight! 9

Presenter s Contact Details: Edwige Sacco, Director Forensic Advisory Services KPMG LLP Mobile: (703) 855-0803 Email: esacco@kpmg.com KPMG website: www.kpmg.com LinkedIn: http://www.linkedin.com/in/edwigesacco All information provided is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particular situation. KPMG and the KPMG logo are registered 2011 trademarks KPMG of LLP, KPMG a U.S. International, limited liability a Swiss partnership cooperative. and Service a member offerings firm of are the subject KPMG to network legal and of regulatory independent restrictions. Some services are not permitted and therefore may not be offered to KPMG's financial statement member or firms other affiliated attest service with KPMG clients. International, 21001NSS a Swiss cooperative. All rights reserved.