1 / 38

Current Fraud Trends Computer Reseller Industry

Current Fraud Trends Computer Reseller Industry. Jeff Riley, Director, Loss Prevention Scott Heim, Fraud Investigator. LP&S Contacts – The Americas. Agenda. Fraud Facts and Statistics Types of Fraud Current Fraud Trends Fraud Prevention Procedures Tech Data Loss Prevention Initiatives

branxton
Download Presentation

Current Fraud Trends Computer Reseller Industry

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Current Fraud TrendsComputer Reseller Industry Jeff Riley, Director, Loss Prevention Scott Heim, Fraud Investigator

  2. LP&S Contacts – The Americas

  3. Agenda • Fraud Facts and Statistics • Types of Fraud • Current Fraud Trends • Fraud Prevention Procedures • Tech Data Loss Prevention Initiatives • Questions

  4. Fraud Facts and Statistics

  5. Fraud Facts and Statistics According to the Association of Certified Fraud Examiners, fraud and abuse costs U.S. organizations more than $660 billion annually. The Washington Post recently reported that bankruptcy fraud is "part of a new wave of white-collar crime sweeping the country and costing businesses and government alike millions of dollars." The FBI estimates that 10% of bankruptcy filings involve fraud of some kind. Most Fraud Examiners believe this estimate is low and that fraud accounts for closer to 30% of commercial bad debt losses. Although business credit fraud is generally acknowledged by experts to cost American business several billion dollars annually, there have never been any statistics to quantify the exact magnitude of this type of crime. We know that it is a large figure, but establishing an exact number has not been possible to date. Most commercial bad debt losses are never properly identified as fraud and are merely classified as legitimate business failures.

  6. Types of Fraud

  7. “Bust Out” Fraud

  8. “Bust Out” Fraud This is the most common type of credit fraud. Criminals secretly acquire ownership of a legitimate company. Slowly but surely they will work to increase all available credit lines. Once credit limits are believed to have been maximized and accounts are opened with all available suppliers, they will skip out. “Bust Out” fraud is the most dangerous type of fraud from the financial impact perspective. Historic “Bust Out” frauds in the IT industry have averaged anywhere between $2 Million and $50 Million in losses for each fraudulent event. Examples of “Bust Out” frauds in the IT industry include Impaq Micro ($40 Million), Orange County ($5 Million), and Microline ($2 Million).

  9. Credit Terms Fraud

  10. Credit Terms Fraud Typically, credit terms fraud is associated with a new company or “shell” corporation, which exists only on paper. There will not be an industry “footprint” or “market presence indicator” for this entity. A suspect entity attempts to open an account with false and misleading information, which often includes fictitious financial statements and invalid trade references. Typically, the physical address for suspect entities will be a mail drop or a virtual office location.

  11. Credit Card Fraud

  12. Credit Card Fraud In a commercial situation, often there is not an industry “footprint” or “market presence indicator.” Typically, a new customer application is received containing account information from a recently compromised credit card account. Orders are subsequently shipped and billed to the stolen credit card account following receipt of front-end charge approvals. Charge backs will always occur after the product has shipped. The key to identifying this type of fraud is verifying that the bill to and ship to addresses are the same.

  13. Business Identity Theft

  14. Business Identity Theft Several U.S. Fortune 500 companies have been targeted for impersonation in this scam. Highly targeted items for theft include memory, toner cartridges, hard drives, notebooks, processors, digital projectors and networking equipment. Ship to locations will typically be either a residential address or a freight forwarder. Priority overnight shipping will almost always be requested. Contact to the victim will almost always occur via email and will typically be received from generic email addresses, such as yahoo.com, gmail.com, hotmail.com, etc.

  15. Business Identity Theft Tech Data has been targeted directly by criminals behind this type of business identity theft fraud scheme. However, none of these fraud attempts have been successful against Tech Data, directly. Typical fraudulent orders in Business ID Theft scams average between $30K to $150K in value. A prime example of this type of fraudulent order would be an order for 500 units of toner cartridges and 500 units of memory going to a residential location as the ship to address with priority overnight shipping requested. The overnight ship via requested is often the key to catching these! Awareness of the origin email address for quote or order requests is always key to catching these!

  16. Red Flags – Warning Signs Fraud Prevention Resources

  17. Red Flags – Warning Signs

  18. Red Flags / Warning Signs – References Trade References provided can be a valuable tool to investigate further in the event no market presence indicators are found for an “established” company. In developing fraud situations, the suspect company will often use fictitious trade references or trade references that can be linked to historic known fraud situations. Is there information to suggest a viable market presence for the trade references provided by the customer? Are the trade references provided affiliated with or operating within the IT industry? Are the trade references provided linked to any active or former problem or bad debt account? Is the physical address of the trade reference a mail drop or virtual office location?

  19. Red Flags / Warning Signs – “Footprint” No independent information suggesting an industry “footprint” for an “established” reseller. No advertising and/or consumer reviews available for a reseller claiming to have been in business for several years. Conflict between dates an “established” reseller claims to have been in operation and available industry “footprint” or market presence indicator.

  20. Red Flags – Information Validation / Links to Bad Debt Accounts Association between customer and previous bad debt or problem accounts. Association between trade references and previous bad debt or problem accounts. Association between physical address and previous bad debt or problem accounts. Association between phone or fax and previous bad debt or problem accounts. Association between contact names and previous bad debt or problem accounts. Association between website registrant information and previous bad debt or problem accounts.

  21. Red Flags – Financial Statements Self generated, un-audited financial statements (may be unreliable or possibly fictitious). Financial Statements in an identical format from multiple customers in the same geographic area. Financial Statements reflecting information inconsistent with known facts...such as high rent, utilities or insurance for a non-commercial address, including mail drops or virtual office locations. Stated total sales/revenue appears inconsistent with known banking information.

  22. Red Flags – Ownership Change Unreported ownership change. An ownership change has occurred with an inactive customer account now attempting to renew the relationship with net terms.

  23. Red Flags – Highly Targeted Items Are the items requested to be ordered unusual, such as highly targeted items for theft/fraud, which include the following: Memory Toner Processors Hard Drives Notebooks Ipods Digital Cameras Is there a rush order request from a new customer? Is priority overnight shipping requested?

  24. Research – Records Check New customer information should always be cross referenced against existing bad debt records as searches for potential links to former bad debt or problem accounts. Contact names, physical addresses, phone number, fax number and trade reference information should all be checked for potential matches. Internet search engines such as Google can be utilized to validate business address information.

  25. Research – Websites Customer Websites – Reviewing customer websites can be useful in identifying the website creation date, the website registrant information, along with reviewing the format and overall nature of the website. In fraud situations, many times the website source code may have actually been stolen from an alternative legitimate website. Website domain registration information such as creation date, last maintenance date and information on the registered agent can be found for free on such sites as www.checkdomain.com or www.godaddy.com.

  26. Research – Market Presence Information is readily available online via free search engines which is useful in establishing a “footprint” in the industry which suggests a viable market presence. A company claiming to be “established” in the industry should have some consumer reviews or feedback. Simple internet searches by company name on free search engines such as Google can be very informative. Other free consumer review sites can be informative as well. A Better Business Bureau search can help establish information to help validate a legitimate market presence.

  27. Research – Due Diligence You may determine whether the phone and fax number information given is a land line or cell phone by reviewing and searching on free websites such as www.searchbug.com. Individual contact names can be run for phone number or address matching for free on websites such as www.zabasearch.com. Advanced search tools such as Accurint by LexisNexis are also available as fee-based options.

  28. Research – Financial Statements Be aware of self-generated, unaudited financials. Check for expense categories that don’t make sense, such as high rent expense for a residential address, mail drop or virtual office location. Check for expense categories such as utility expenses, when the address is a residential, mail drop or virtual office location. Take note of similarly formatted financials from multiple customers from the same geographic area. More than likely this is a fraud situation. If financial statements seem questionable, check against “trusted” documents such as banking and utility bills received from customer.

  29. Research – Trade References Trade References could be merely “shell” companies, which have no “footprint” in the industry. Cross reference trade references against existing records in an attempt to identify any potential matches to previous bad debt or problem accounts. Utilize simple internet searches to check out trade references by looking for a footprint in the industry. Contact trade reference companies to validate information provided by the customer.

  30. Research Resource – Tech Data Please do not hesitate to reach out to Tech Data for assistance. We are always willing to offer assistance to our customers. Tech Data Loss Prevention maintains a database of suspect trade references previously linked to known fraud situations. Tech Data Loss Prevention has the capability to run pay-based searches through LexisNexis, which can include phone number tracing, social security number vetting, criminal records checks, SOS validation from fee-based states, FEIN validation and Dun’s number validation, if needed. Tech Data Loss Prevention has the capability to conduct fraud inquiries through third party sources within the industry, industry security contacts, law enforcement agencies and, when appropriate, can send someone to personally view a suspect location.

  31. Fraud Prevention – Protecting Customers

  32. Tech Data Loss Prevention Initiatives Fraud Awareness Program developed to protect Tech Data and customers alike through researching current fraud trends and providing related information both internally and externally. Coordination with other targeted companies and organizations, i.e., Tech Data competitors and industry LP contacts. Coordination with law enforcement at all levels (Federal, state, local). Tech Data’s fraud prevention program has been successful in stopping approximately $1.5 million annually in fraudulent orders accepted by Tech Data customers. Tech Data LP&S identifies these fraudulent orders placed through Tech Data and either cancels them or recovers product in transit.

  33. Fraud Prevention – FY10

  34. Summary

  35. Summary Don’t hesitate to reach out to Tech Data for assistance at any time. Trust your instincts when you sense something is wrong – you’re probably right! Know your customer!

  36. Tech Data Loss Prevention Contacts Scott Heim, Fraud Investigator Loss Prevention and Security Tech Data Corporation 5350 Tech Data Drive, A1-4 Clearwater, FL 33760 Tel: 800-237-8931, ext. 72652 Fax: 727-532-6038 E-mail: scott.heim@techdata.com Jeff Riley, Director - North America Loss Prevention and Security Tech Data Corporation 5350 Tech Data Drive, A1-4 Clearwater, FL 33760 Tel: 800-237-8931, ext. 78003 Fax: 727-532-6038 E-mail: jeffrey.riley@techdata.com

  37. Questions?

  38. TheDifferenceIn Distribution

More Related