Fraud

“Misspelling to defraud,” a case study from our files

The subject’s biography provided along with our client’s request for due diligence in connection with a private equity funding transaction was ridden with misspellings. And it did not say much, apart from boasts of professional accomplishments and financial success, and the subject’s self-description of being a “people-person who likes to travel.” But even with the biography’s vague statements and typos, our research quickly found that the subject’s company, which contained a transposed letter in its name, was affiliated with a Mexican multi-level marketing operation whose executives were recently arrested or are wanted by authorities for setting up allegedly fake websites whereby they defrauded investors for millions of dollars. As our research continued, we located media reports and online documents which indicated that the fraud spanned across three continents, and involved at least four other entities closely held by the subject, whose names were not listed in the biography. And according to various government sources, there is also mounting evidence of money laundering. Our client, although somewhat surprised by our findings, immediately halted the funding transaction.

January 7th, 2013|Categories: Commercial Transactions Due Diligence|Tags: , |

Business identity theft: a crime that often goes unreported

According to the Federal Trade Commission (FTC) data from its Consumer Sentinel Network (CSN), an online database of consumer complaints available only to law enforcement, identity theft was the top consumer complaint in 2011, accounting for 17% or 287,232 complaints of the 1.8 million received; 990,242 of these cases involved fraud.

There are no reliable federal or state statistics that specifically track business identity theft, but various studies suggest that businesses do not report the crime because of the stigma attached to it. The company’s credibility and trust of its clients may never recover if they admit to being a victim.

Business identity theft comes in many forms. Posing as a look-alike or sound-alike business, and impersonating owners, officers or employees to illegally get cash, credit, and loans, is just one example. Thieves typically steal a business’ identity by gaining access to its bank accounts and credit cards, or by stealing sensitive company information, such as its tax identification number (TIN) and the owners’ personal information. Elaine Marshall, North Carolina’s Secretary of State, sees an increasing number of cases involving falsified documents. Marshall says that “the easiest targets are dissolved corporations, because whoever ran those defunct businesses usually no longer pays attention. Somebody comes 20 years later and reinstates it, and it looks like it’s a 40-year-old corporation. And if it was in good standing financially when it was dissolved, then

[the thief] will capitalize on that good standing.”

Indeed businesses have become easy targets for identity theft. Almost anyone can obtain a business’ tax identification number. A merchant’s basic financial information, including bank account numbers, may be known to hundreds of its customers and suppliers. Data access can be exploited by employees and insider theft, and fraud is often difficult to detect, especially when carried out by trusted employees. Many businesses do not review their own credit information for fraud and may be lax in shredding or disposing of documents. Although more businesses are conducting background checks on employees and suppliers, only a few ensure the integrity of their commercial shredding contractors and even fewer conduct background checks on in-house or contracted cleaning staff. And many companies are simply complacent in data security.

The Internet carries the highest perpetration of criminal theft and fraud. Since 2002, the FBI has recorded an 84% increase in the number of computer intrusion investigations. Cyber thieves use the web to obtain goods, services, and money while exploiting time-lags in discovery and investigation. They also prowl for valuable non-ID specific business data including confidential e-mails, customer and marketing data, bid and pricing sheets, and trade-secrets. In the financial services sector, the vast majority of transactions, including credit cards and debit cards, and even mortgage funding, occur online in virtual anonymity without the risks associated with in-person transactions. Because such identity theft crimes take place in cyber-space, police often must coordinate with other state, federal, or international agencies. And even when jurisdictional issues are resolved, often only high-profile offenders actually face criminal prosecution.

In this complex and dangerous environment, a proactive approach to preventing business identity theft is critical, and should include:

  • Security policies based on the highest reasonably assessed risk, including limiting the number of persons with a valid need to access sensitive information;
  • Corporate governance which advocates strong security planning;
  • System audits and tests to ensure detection of inappropriate usage and other vulnerabilities;
  • Background checks of all employees, key vendors, and contractors including document shredding entities, cleaning personnel, etc.;
  • Annual reviews of Secretary of State and other public filings;
  • Annual or more frequent reviews of Dun & Bradstreet reports, and if applicable, small business reports with Equifax, Experian and TransUnion;
  • Practice of excluding sensitive personal or business information in public filings;
  • Shredding or destroying business records as applicable;
  • Securing paper documents in locked cabinets in restricted areas;
  • Using privacy screens with smart phones, laptops, etc., when accessing sensitive information while traveling; and
  • Obtaining business insurance that covers potential business identity theft losses.

There are many online information and action resources for identity theft. The FTC provides comprehensive guidelines for prevention and recovery from identity theft, along with complaint forms. The Identity Theft Resource Center also contains excellent reference materials, including links to state and local agencies, as do the Privacy Rights Clearinghouse and the National Consumers League. 

January 7th, 2013|Categories: Criminal Activity|Tags: , |

Overview of identity theft related crime laws

Below is an overview of federal laws in connection with identity theft crimes.

  • The Identity Theft and Assumption Deterrence Act (the “ITADA”)

The ITADA, passed in 1998, makes identity theft a distinct crime from wire fraud, covers theft of data (as well as documents), and encompasses businesses and persons that seek access to personal records through banks, state and federal agencies, or insurance companies. The ITADA mandates significant fines and imprisonment even for first offenders. The federal criminal jurisdiction requires an underlying felony (such as fraud or conspiracy) and involvement of an “identification document” that: (a) is purportedly issued by the United States, (b) is used or intended to defraud the United States, (c) is sent through the mail, or (d) is used in a manner that affects interstate or foreign commerce.

  • The Fair and Accurate Credit Transactions Act (the “FACTA”)

The FACTA was established as a national detection system to deter fraud resulting from identity theft in its early stages with or without subsequent law enforcement investigation. The FACTA, among other rights, allows victims to alert all three major credit rating agencies of suspected criminal use of their financial data or accounts affecting a credit rating. The FACTA created the rights to “free” annual credit reports, and requirements that mortgage lenders provide actual FICO credit scores (not just credit account data) if that score is used to determine interest rates for a housing loan. The FACTA also mandates that merchants show only the last five digits of credit card numbers on receipts. The FACTA further is responsible for developing a system to “red flag” suspicious requests for consumer data, and allows military personnel to “freeze” credit files when they are deployed overseas.

Under the FACTA, consumer “red flags” include fraud alerts from a reporting business that has identified a data breach, unusual patterns in credit usage, suspicious documentation, credit usage after long periods of inactivity, known mail drop addresses, and other anomalies.

The FACTA also requires employers to shred documents containing employee data; any business that supplies or facilitates consumer credit must secure or destroy consumer information. This “disposal rule” requires reasonable and appropriate destruction of all information derived from a consumer credit report, prior to its disposal. Failure to comply with destruction requirements (i.e. shredding) carries penalties of up to $2,500 per violation. There is an implied obligation within the FACTA disposal rule to conduct due diligence for hiring or contracting data disposal personnel, which includes reference checking, physical inspection of licenses or certificates, and audits.

 

  • The Fair Credit Reporting Act (the “FCRA”)

The FCRA requires consumer reporting agencies (CRAs) to adopt reasonable procedures to maintain and report consumer data with confidentiality, accuracy, relevancy, and reasonable security. CRAs must ensure “reasonable procedures to assure maximum possible accuracy of the information concerning the subject of the report.”

Victims may sue for willful or negligent failure to verify the accuracy of disputed information or correct inaccurate information resulting from a stolen identity. Consumers who report errors or fraudulent transactions are entitled to a “reasonable investigation” and an expectation that errors will be corrected and reported back promptly. The statute provides for attorney’s fees and punitive damages for willful violations. Under the FCRA, identity theft victims may authorize law enforcement agencies to obtain their credit reports and other records without obtaining a subpoena and at no personal cost. The FCRA imposes a two-year statute of limitations that begins when an inaccurate disclosure or report is filed, not when the consumer actually becomes aware of inaccuracies.

The FCRA also includes a “disposal rule” requiring any business that has access to or which utilizes consumer reporting information to dispose of this sensitive information properly.  The FCRA’s disposal rule is broader than FACTA’s in that it targets any company that complies, sells or purchases reports containing private personal or medical information. This includes employment agencies, banks, private investigators, landlords, auto dealers, insurance agents and others. The FCRA disposal rule applies to any information, in any format, and mandates that the disposal method must render the documents or information unreadable and incapable of being reconstructed.

  • The Gramm-Leach-Bliley Act (the “GLBA”)

The GLBA directs eight federal regulatory agencies and the states to administer and enforce the Financial Privacy Rule and the Safeguards Rule to ensure that financial institutions prevent unauthorized disclosure of consumer financial information, including fraudulent access, by implementing appropriate policies, procedures and controls. Also known as the Financial Services Modernization Act of 1999, the GLBA defines financial institutions as a “business significantly engaged in providing financial services or products for personal, family, or household use.” The GLBA is relevant to traditional banks and credit unions, and also includes check-cashing and payday loan services, non-bank lenders, real estate appraisers, tax preparers, debt collectors, financial advisors, and insurance agents and brokers.

  • The Right to Financial Privacy Act (the “RFPA”)

The RFPA falls under the ambit of the FDIC and targets industrial loan companies, trust companies, savings associations, credit unions and consumer finance institutions. The RFPA creates statutory Fourth Amendment protection for personal bank records by providing that ‘no government authority

[state or federal] may have access to or obtain copies of, or the information contained in the financial records of any customer from a financial institution unless the financial records are reasonably described and the customer authorizes access; there is an appropriate administrative subpoena or summons; there is a qualified search warrant; there is an appropriate judicial subpoena, or there is a written request from an authorized government authority.

The RFPA prohibits banks and other covered entities from requiring customers to release financial records as a condition of doing business, and mandates banks to provide customers with access to records of all disclosures made to third parties.

  • The Health Insurance Portability and Accountability Act (the “HIPAA”)

The HIPAA, which is administered by the U.S. Department of Health and Human Services (HHS), establishes nationwide security standards for electronic health care information. This ‘security rule’ requires all covered entities to be compliant with specific administrative, technical, and physical security standards and procedures for electronic data. HIPAA rules apply not only to doctors, clinics, hospitals, pharmacies, and laboratories, but may also apply to certain collection agencies, health insurers, and lawyers, and also to any businesses that maintain self-insured employee health care plans.

In addition to federal laws, each state has its own law regarding identity theft or impersonation. Twenty-nine states, Guam, Puerto Rico and the District of Columbia have specific restitution provisions for identity theft. Five states—Iowa, Kansas, Kentucky, Michigan and Tennessee—have forfeiture provisions for identity theft crimes. Eleven states—Arkansas, Delaware, Iowa, Maryland, Mississippi, Montana, Nevada, New Mexico, Ohio, Oklahoma and Virginia—have created identity theft passport programs to help victims from continuing identity theft.

Thirty-four states have introduced or have pending legislation regarding identity theft during the 2012 legislative session, including Louisiana which enacted its Business Identity Theft Prevention Act. For more information on state laws, visit the website of National Council of State Legislatures.

January 7th, 2013|Categories: Criminal Activity|Tags: , |

Diploma mill ordered to pay $22.7 million to 30,000 scam victims

On August 31, 2012, Belford High School, Belford University and several of their co-conspirators were ordered to pay $22.7 million to a class of more than 30,000 U.S. residents who were duped into purchasing fake high school diplomas from Belford. The defendants were also ordered to forfeit the websites used to perpetrate the scam, including www.belfordhighscool.com, www.belfordhighschool.org, www.belforduniversity.org, and www.belforduniversity.com.

The lawsuit, filed on November 5, 2009, charged that Belford High School is an Internet scam that defrauded students of their money by offering them a supposedly “valid” and “accredited” high school diploma. As affirmed by the judgment, the school is a fake and the diplomas are not valid. The lawsuit also alleged that the two accrediting agencies by which Belford claimed to be accredited – International Accreditation Agency for Online Universities and the Universal Council for Online Education Accreditation – are not legitimate accrediting agencies.

Notably, we came across Belford University in 2010 when a bachelor’s degree from the “school” was listed on an employment application by a candidate for a professional level position with one of our clients. Click here to read the 2010 blog.

 

December 18th, 2012|Categories: Employment Decisions|Tags: , , , |

Social media evolving as new platform for investment scams

The Securities and Exchange Commission (SEC) today charged an Illinois-based investment adviser with offering to sell fictitious securities through social media sites. According to the SEC’s Division of Enforcement, Anthony Fields of Lyons, IL, offered more than $500 billion in fictitious securities, and in some instances, used LinkedIn discussions to promote fraudulent “bank guarantees” and “medium-term notes.”

The SEC’s order instituting administrative proceedings against Fields charges that he made multiple fraudulent offers through his two sole proprietorships – Anthony Fields & Associates (AFA) and Platinum Securities Brokers. Fields allegedly provided false and misleading information concerning AFA’s assets under management, clients, and operational history to the public through its website and in SEC filings. Fields also failed to maintain required books and records, did not implement adequate compliance policies and procedures, and promoted himself as a broker-dealer while he was not registered with the SEC.
Also today, in recognition that fraudsters are now turning to new and evolving platforms to peddle their scams, the SEC issued two alerts to highlight the risks investors and advisory firms face when using social media.

One of these alerts, a National Examination Risk Alert titled “Investment Adviser Use of Social Media,” provides staff observations based on reviews of investment advisers of varying sizes and strategies that use social media. The bulletin addresses issues that may arise from social media usage by firms and their associated persons, and offers suggestions for managing the antifraud, compliance, and recordkeeping provisions of the federal securities laws. The alert notes that firms need to consider how to implement new compliance programs or revisit their existing ones to align with the rapidly changing technology.

In the SEC’s second bulletin, an Investor Alert titled “Social Media and Investing: Avoiding Fraud” prepared by the Office of Investor Education and Advocacy, the aim is to help investors be aware of fraudulent investment schemes that use social media, and provide tips for checking the backgrounds of advisers and brokers.

January 4th, 2012|Categories: Criminal Activity|Tags: , |

Epidemic of fake websites is real

Cyber crime experts report that fake websites are proliferating at the rate of 60,000+ per week or over 3,100,000 per year. And the fraudsters’ malicious exploitations are getting bold and more sophisticated, creating sites that are difficult to discern from those of legitimate businesses or organizations. From banks (which make up about 68% of fraudulent sites) to regulators and news reporting agencies, no entity is immune.

Recently, several local and national newspapers reported on a publicity campaign by a public relations company that purportedly set up a fake news site to promote one of its clients, a public entity, with positive articles and press releases “written in the image of real news” by “journalists” who allegedly do not exist. Although Web experts note that it is fairly common for celebrities and private-sector businesses to generate buzz or improve sales through news coverage, open government advocates called this stunt an egregious breach of trust and ethical standards.

The Federal Trade Commission (FTC) issued warnings a few months ago about scam artists exploiting well-known news organizations by setting up fake news sites to peddle their wares. The sites, which usually display logos of legitimate news organizations, promote everything from bogus weight loss products to work-at-home jobs, anti-aging products and debt reduction plans. The FTC cited several investigations that resulted in charges against the fraudsters, saying that many of the websites are owned by marketers and used to entice consumers to click on links to the sellers’ sites. In its case against acai berry supplement peddlers, the FTC disclosed that the sellers paid the marketers a commission based on the number of consumers they lured to their sites. There was no reporter, no studies, no dramatic weight loss, no satisfied consumers who left comments, and no affiliation with a reputable news source. As a rule, the FTC noted, legitimate news organizations do not endorse products.

The FTC itself, and other regulators have not escaped the fraudsters’ blitz. In April 2011, the FTC brought charges against an individual for multiple violations of the Federal Trade Commission Act for misrepresenting his affiliations with federal agencies, including the FTC, misrepresenting that the services advertised on his websites were government-approved, and making deceptive debt relief claims. The FTC alleged that the individual, a Texas-based “lead generator,” set up several websites through which he associated his business with a fictitious government agency – the “Department of Consumer Services Protection Commission” – that appeared to combine two real government entities, the Federal Trade Commission and the Consumer Financial Protection Bureau. Among other charges, the FTC stated that to further these scams, the websites depicted the FTC’s official seal, copied language about the fictitious agency’s consumer protection mission from the FTC’s site, and claimed that the fake agency “monitors and researches” member companies that provide financial assistance to American consumers.

The scammers and their fake websites are also busy abroad. Earlier this month, international news sources reported that Russian fraudsters set up a counterfeit site of a popular five-star hotel, complete with the real hotel’s photographs, room descriptions and services. According to published reports, they also paid a fee to Google to ensure that their bogus site was listed before the hotel’s genuine site. The fraudulent website purportedly came to an abrupt end after, among other disparities, it was discovered that the room rates were advertised in dollars.

Another story about a flagrant website invasion came in October 2011 from Belgrade, where Serbian media reported that a mock-up of the official Nobel Prize website was set up purportedly by political activists to promote their causes and views.

Fraudulent websites appear daily and no industry or organization is beyond these fraudsters’ reach. Scherzer International, a provider of specialized background investigations for business transactions and employment decisions, includes comprehensive website reviews in its reports. We know how to spot scams, exaggerated claims and other red flags.

November 29th, 2011|Categories: Commercial Transactions Due Diligence|Tags: , , |

Bribing for business: Russia and China score lowest in fighting corruption

According to a survey released on November 3, 2011, by Transparency International, a non-profit, corruption watchdog, Russia and China got the lowest scores in its 2011 Bribe Payers Index, which ranked the top 28 largest economies according to the probability of companies headquartered in these countries practicing bribery. The scores were calculated from responses of 3,016 executives in 30 countries who had business dealings in those economies.

Companies based in China and Russia scored below 7 on a scale of 10, at 6.5 and 6.1, respectively. Mexico, with a 7.0 score, was third from the bottom. Companies in the Netherlands and Switzerland tied for first place with scores of 8.8, with Belgium, Germany, and Japan rounding out the top five.
The survey also ranked the business sectors in which bribery was perceived to be prevalent. Public works and construction were reported as the most pullulated along with oil and gas. Agriculture and light manufacturing were ranked as the cleanest.

The report noted that “there is no country among the 28 major economics whose companies are perceived to be wholly clean and do not engage in bribery.” And the scores, on average, have not improved significantly from the 2008 Bribe Payers Index. The average score of 22 countries increased only 0.1 points to 7.9 in the latest edition.

The survey also found that “international business leaders reported the widespread practice of companies paying bribes to public officials in order to, for example, win public tenders, avoid regulation, speed up government processes or influence policy.” However, companies are almost as likely to pay bribes to other businesses, according to the survey, which looked at business-to-business bribery for the first time. This suggests that corruption is not only a concern for the public sector, but for many businesses, and carries major reputational and financial risks.

November 3rd, 2011|Categories: Criminal Activity, International|Tags: , , , |

Financial advice show hosts have host of problems

Just about any time of the day, the airwaves are filled with self-appointed financial gurus spewing their secrets for managing money and ways to get rich. But the true secrets of more than a dozen of these wealth peddlers may be in their shady backgrounds and off-the-air dealings. Here are a few examples of the bamboozlements, as disclosed by the Securities and Exchange Commission (SEC) and other authorities.

On June 13, 2011, Clifford Robertson was sentenced to 97 months for bank fraud, to be followed by 24 months for aggravated identity theft and ordered to pay $4,627,520 in restitution, according to a statement by the U.S. Department of Justice’s Federal Bureau of Investigation Dallas Field Office. The bureau’s investigation determined that Robertson claimed to be a real estate investment advisor who hosted AM radio real estate investment talk shows and in-person seminars. Robertson admitted that beginning in December 2007, he used the identity of another person to submit a fraudulent personal financial statement to a lending institution in order to obtain money by false pretenses. The loss to investors was estimated at around $3 million.

Another recent financial show host shakedown was announced in a June 3, 2011 press release by the Department of Justice’s U.S. Attorney’s office for the Southern District of Florida which said that “criminal information was filed against Anthony F. Cutaia, charging him with nine counts of mail fraud…” Cutaia, who was the host of “Talk About Mortgages and Real Estate,” a television and radio program, was also the managing member and beneficial owner of CMG Property Investment Group, LLC, which purportedly engaged in commercial real estate investments in Florida, and promised not to collect commissions or fees from the investors until the properties were sold and a profit was made. However, court papers allege that Cutaia invested little of the money and instead used it to make payments to pre-existing investors and to pay his own business and personal expenses. Legal documents further show that Cutaia filed for bankruptcy in 2007, but that case was tossed out. He filed another Chapter 7 petition on May 11, 2011.

Also exposed this year was John Farahi, a host on a Farsi language radio station in the Los Angeles area. The SEC’s complaint filed in the U.S. District Court for the Central District of California alleges that NewPoint, co-owners John Farahi and Gissou Rastegar Farahi, and its controller Elaheh Amouei targeted investors in the Iranian-American community by touting NewPoint on a daily finance radio program hosted by Farahi. The SEC charges that the Farahis or Amouei would then make appointments with interested listeners to discuss investment opportunities offered by NewPoint, and subsequently misled more than 100 investors into purchasing over $20 million worth of debentures that they claimed were low risk. Many investors also were falsely told that they were investing in FDIC-insured certificates of deposit, or government or corporate bonds issued by companies backed by the funds from the Troubled Asset Relief Program (TARP). According to the SEC, most of the money raised was instead transferred to accounts controlled by the Farahis to, among other things, fund construction of their multi-million dollar personal residence in Beverly Hills.

 

June 18th, 2011|Categories: Criminal Activity|Tags: , , |

SEC issues warning about investing in reverse merger companies

On June 9, 2011, the Securities and Exchange Commission (SEC) issued an Investor Bulletin about investing in companies that enter U.S. markets through the so-called “reverse mergers.” These mergers allow private companies, including those outside the U.S., to access U.S. investors and markets by merging with an existing public shell company. The SEC and U.S. exchanges recently suspended trading in more than a dozen reverse merger companies, citing a lack of current, accurate information about these companies and their finances.

“Given the potential risks, investors should be very careful when considering investing in the stock of reverse merger companies,” said Lori J. Schock, director of the SEC’s Office of Investor Education and Advocacy. “As with any investment, investors should thoroughly research the company – including ensuring there is accurate and up-to-date information – before making a decision to invest.”

The SEC’s warning is especially strong regarding Chinese companies, as more than 150 entities have recently put their shares up for grabs to American investors through the backdoor “without any of the vetting from underwriters and investors that companies undergo when they perform a traditional IPO,” as noted by Commissioner Luis Aguilar.

Shareholders already have sued a string of China-based, U.S.-listed companies for fraud, claiming that they lost money when stocks plummeted after the financial scandals. They charge that the companies operated sham businesses, inflated revenue or gave vastly different information to U.S. and Chinese regulators. And they are starting to sue the auditors who signed off on the financial statements. But it will be tough to win these cases in American courts, as Chinese entities often have refused to comply with U.S. court proceedings.

The best hope for investors may be the SEC, which has launched an inquiry into U.S. audit firms with China-based clients. Investors could benefit if the SEC, which can force companies and auditors to cooperate in investigations, sues more auditors or companies.

 

June 15th, 2011|Categories: Criminal Activity|Tags: , |

FCPA enforcement milestone: corporate conviction handed down by jury

The Department of Justice announced on May 11, 2011 that Lindsey Manufacturing Company, a privately-held Azusa, CA emergency systems manufacturer, its executives Keith Lindsey and Steve Lee, and a Mexican intermediary were convicted by a federal jury on all counts for their roles in a scheme to pay bribes to Mexican government officials at the Comisión Federal de Electricidad (CFE), a state-owned utility, to win $19 million in contracts.

According to court documents, between February 2002 and March 2009, Lindsey Manufacturing, Keith Lindsey, Steve Lee and others used the company’s Mexican agent, Enrique Aguilar, to funnel bribe payments to officials of the CFE. (See http://www.justice.gov/opa/pr/2011/May/11-crm-596.html for further details about the case.)

Although individuals have gone to trial and been convicted of violating the FCPA, this is a first such conviction for a company, as companies previously have opted to settle or plead guilty. The FCPA is expected to be an important enforcement tool under the new Dodd-Frank law as similar cases are likely to end up in court.

May 13th, 2011|Categories: Criminal Activity|Tags: , |
Go to Top