38
Current Fraud Trends Computer Reseller Industry Jeff Riley, Director, Loss Prevention Scott Heim, Fraud Investigator

Current Fraud Trends Computer Reseller Industry

Embed Size (px)

DESCRIPTION

Current Fraud Trends Computer Reseller Industry. Jeff Riley, Director, Loss Prevention Scott Heim, Fraud Investigator. LP&S Contacts – The Americas. Agenda. Fraud Facts and Statistics Types of Fraud Current Fraud Trends Fraud Prevention Procedures Tech Data Loss Prevention Initiatives - PowerPoint PPT Presentation

Citation preview

Page 1: Current Fraud Trends Computer Reseller Industry

Current Fraud TrendsComputer Reseller Industry

Jeff Riley, Director, Loss PreventionScott Heim, Fraud Investigator

Page 2: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential

LP&S Contacts – The Americas

2

Page 3: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential3

• Fraud Facts and Statistics

• Types of Fraud

• Current Fraud Trends

• Fraud Prevention Procedures

• Tech Data Loss Prevention Initiatives

• Questions

Agenda

Page 4: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential4

Fraud Facts and Statistics

Page 5: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential5

Fraud Facts and Statistics• According to the Association of Certified Fraud Examiners, fraud and

abuse costs U.S. organizations more than $660 billion annually.

• The Washington Post recently reported that bankruptcy fraud is "part of a new wave of white-collar crime sweeping the country and costing businesses and government alike millions of dollars."

• The FBI estimates that 10% of bankruptcy filings involve fraud of some kind. Most Fraud Examiners believe this estimate is low and that fraud accounts for closer to 30% of commercial bad debt losses.

• Although business credit fraud is generally acknowledged by experts to cost American business several billion dollars annually, there have never been any statistics to quantify the exact magnitude of this type of crime. We know that it is a large figure, but establishing an exact number has not been possible to date.

• Most commercial bad debt losses are never properly identified as fraud and are merely classified as legitimate business failures.

Page 6: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential6

Types of Fraud

Page 7: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential7

“Bust Out” Fraud

Page 8: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential8

“Bust Out” Fraud

• This is the most common type of credit fraud.

• Criminals secretly acquire ownership of a legitimate company.

• Slowly but surely they will work to increase all available credit lines.

• Once credit limits are believed to have been maximized and accounts are opened with all available suppliers, they will skip out.

• “Bust Out” fraud is the most dangerous type of fraud from the financial impact perspective.

• Historic “Bust Out” frauds in the IT industry have averaged anywhere between $2 Million and $50 Million in losses for each fraudulent event.

• Examples of “Bust Out” frauds in the IT industry include Impaq Micro ($40 Million), Orange County ($5 Million), and Microline ($2 Million).

Page 9: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential9

Credit Terms Fraud

Page 10: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential10

Credit Terms Fraud

• Typically, credit terms fraud is associated with a new company or “shell” corporation, which exists only on paper.

• There will not be an industry “footprint” or “market presence indicator” for this entity.

• A suspect entity attempts to open an account with false and misleading information, which often includes fictitious financial statements and invalid trade references.

• Typically, the physical address for suspect entities will be a mail drop or a virtual office location.

Page 11: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential11

Credit Card Fraud

Page 12: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential12

Credit Card Fraud

• In a commercial situation, often there is not an industry “footprint” or “market presence indicator.”

• Typically, a new customer application is received containing account information from a recently compromised credit card account.

• Orders are subsequently shipped and billed to the stolen credit card account following receipt of front-end charge approvals.

• Charge backs will always occur after the product has shipped.

• The key to identifying this type of fraud is verifying that the bill to and ship to addresses are the same.

Page 13: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential13

Business Identity Theft

Page 14: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential14

Business Identity Theft

• Several U.S. Fortune 500 companies have been targeted for impersonation in this scam.

• Highly targeted items for theft include memory, toner cartridges, hard drives, notebooks, processors, digital projectors and networking equipment.

• Ship to locations will typically be either a residential address or a freight forwarder.

• Priority overnight shipping will almost always be requested.

• Contact to the victim will almost always occur via email and will typically be received from generic email addresses, such as yahoo.com, gmail.com, hotmail.com, etc.

Page 15: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential15

Business Identity Theft

• Tech Data has been targeted directly by criminals behind this type of business identity theft fraud scheme. However, none of these fraud attempts have been successful against Tech Data, directly.

• Typical fraudulent orders in Business ID Theft scams average between $30K to $150K in value.

• A prime example of this type of fraudulent order would be an order for 500 units of toner cartridges and 500 units of memory going to a residential location as the ship to address with priority overnight shipping requested.

• The overnight ship via requested is often the key to catching these!

• Awareness of the origin email address for quote or order requests is always key to catching these!

Page 16: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential16

Red Flags – Warning SignsFraud Prevention Resources

Page 17: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential

Red Flags – Warning Signs

Footprint - Market Presence

Indicators

Trade References

Information Verification: Physical

Address, Names, Phone, Fax, References

Ownership Change, Legitimate Financial

Statements?

Urgent Order Requested - Highly

Targeted Items

17

Page 18: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential18

Red Flags / Warning Signs – References

• Trade References provided can be a valuable tool to investigate further in the event no market presence indicators are found for an “established” company.

• In developing fraud situations, the suspect company will often use fictitious trade references or trade references that can be linked to historic known fraud situations.

• Is there information to suggest a viable market presence for the trade references provided by the customer?

• Are the trade references provided affiliated with or operating within the IT industry?

• Are the trade references provided linked to any active or former problem or bad debt account?

• Is the physical address of the trade reference a mail drop or virtual office location?

Page 19: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential19

Red Flags / Warning Signs – “Footprint”

• No independent information suggesting an industry “footprint” for an “established” reseller.

• No advertising and/or consumer reviews available for a reseller claiming to have been in business for several years.

• Conflict between dates an “established” reseller claims to have been in operation and available industry “footprint” or market presence indicator.

Page 20: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential20

Red Flags – Information Validation / Links to Bad Debt Accounts

• Association between customer and previous bad debt or problem accounts.

• Association between trade references and previous bad debt or problem accounts.

• Association between physical address and previous bad debt or problem accounts.

• Association between phone or fax and previous bad debt or problem accounts.

• Association between contact names and previous bad debt or problem accounts.

• Association between website registrant information and previous bad debt or problem accounts.

Page 21: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential21

Red Flags – Financial Statements

• Self generated, un-audited financial statements (may be unreliable or possibly fictitious).

• Financial Statements in an identical format from multiple customers in the same geographic area.

• Financial Statements reflecting information inconsistent with known facts...such as high rent, utilities or insurance for a non-commercial address, including mail drops or virtual office locations.

• Stated total sales/revenue appears inconsistent with known banking information.

Page 22: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential22

Red Flags – Ownership Change

• Unreported ownership change.

• An ownership change has occurred with an inactive customer account now attempting to renew the relationship with net terms.

Page 23: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential23

Red Flags – Highly Targeted Items

• Are the items requested to be ordered unusual, such as highly targeted items for theft/fraud, which include the following:

– Memory– Toner – Processors– Hard Drives– Notebooks – Ipods– Digital Cameras

• Is there a rush order request from a new customer?

• Is priority overnight shipping requested?

Page 24: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential24

Research – Records Check

• New customer information should always be cross referenced against existing bad debt records as searches for potential links to former bad debt or problem accounts.

• Contact names, physical addresses, phone number, fax number and trade reference information should all be checked for potential matches.

• Internet search engines such as Google can be utilized to validate business address information.

Page 25: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential25

Research – Websites

• Customer Websites – Reviewing customer websites can be useful in identifying the website creation date, the website registrant information, along with reviewing the format and overall nature of the website.

• In fraud situations, many times the website source code may have actually been stolen from an alternative legitimate website.

• Website domain registration information such as creation date, last maintenance date and information on the registered agent can be found for free on such sites as www.checkdomain.com or www.godaddy.com.

Page 26: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential26

Research – Market Presence

• Information is readily available online via free search engines which is useful in establishing a “footprint” in the industry which suggests a viable market presence.

• A company claiming to be “established” in the industry should have some consumer reviews or feedback.

• Simple internet searches by company name on free search engines such as Google can be very informative. Other free consumer review sites can be informative as well.

• A Better Business Bureau search can help establish information to help validate a legitimate market presence.

Page 27: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential27

Research – Due Diligence

• You may determine whether the phone and fax number information given is a land line or cell phone by reviewing and searching on free websites such as www.searchbug.com.

• Individual contact names can be run for phone number or address matching for free on websites such as www.zabasearch.com.

• Advanced search tools such as Accurint by LexisNexis are also available as fee-based options.

Page 28: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential28

Research – Financial Statements

• Be aware of self-generated, unaudited financials.

• Check for expense categories that don’t make sense, such as high rent expense for a residential address, mail drop or virtual office location.

• Check for expense categories such as utility expenses, when the address is a residential, mail drop or virtual office location.

• Take note of similarly formatted financials from multiple customers from the same geographic area. More than likely this is a fraud situation.

• If financial statements seem questionable, check against “trusted” documents such as banking and utility bills received from customer.

Page 29: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential29

Research – Trade References

• Trade References could be merely “shell” companies, which have no “footprint” in the industry.

• Cross reference trade references against existing records in an attempt to identify any potential matches to previous bad debt or problem accounts.

• Utilize simple internet searches to check out trade references by looking for a footprint in the industry.

• Contact trade reference companies to validate information provided by the customer.

Page 30: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential30

Research Resource – Tech Data

• Please do not hesitate to reach out to Tech Data for assistance.

• We are always willing to offer assistance to our customers.

• Tech Data Loss Prevention maintains a database of suspect trade references previously linked to known fraud situations.

• Tech Data Loss Prevention has the capability to run pay-based searches through LexisNexis, which can include phone number tracing, social security number vetting, criminal records checks, SOS validation from fee-based states, FEIN validation and Dun’s number validation, if needed.

• Tech Data Loss Prevention has the capability to conduct fraud inquiries through third party sources within the industry, industry security contacts, law enforcement agencies and, when appropriate, can send someone to personally view a suspect location.

Page 31: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential31

Fraud Prevention – Protecting Customers

Page 32: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential32

Tech Data Loss Prevention Initiatives

• Fraud Awareness Program developed to protect Tech Data and customers alike through researching current fraud trends and providing related information both internally and externally.

• Coordination with other targeted companies and organizations, i.e., Tech Data competitors and industry LP contacts.

• Coordination with law enforcement at all levels (Federal, state, local).

• Tech Data’s fraud prevention program has been successful in stopping approximately $1.5 million annually in fraudulent orders accepted by Tech Data customers.

• Tech Data LP&S identifies these fraudulent orders placed through Tech Data and either cancels them or recovers product in transit.

Page 33: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential33

Fraud Prevention – FY10

Q1 - FY10 Q2 - FY10 Q3 - FY10 Q4 - FY10 FY10 - Total$0.00

$200,000.00

$400,000.00

$600,000.00

$800,000.00

$1,000,000.00

$1,200,000.00

$102,562.57

$245,895.31

$581,737.71

$201,647.80

$1,131,843.39

FY10 LP Corporate Recovery Dollars

Recovery Dollars

Page 34: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential34

Summary

Page 35: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential35

Summary

• Don’t hesitate to reach out to Tech Data for assistance at any time.

• Trust your instincts when you sense something is wrong – you’re probably right!

• Know your customer!

Page 36: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential36

Tech Data Loss Prevention Contacts

Scott Heim, Fraud InvestigatorLoss Prevention and Security

Tech Data Corporation5350 Tech Data Drive, A1-4Clearwater, FL 33760Tel: 800-237-8931, ext. 72652

Fax: 727-532-6038E-mail: [email protected]

Jeff Riley, Director - North AmericaLoss Prevention and SecurityTech Data Corporation

5350 Tech Data Drive, A1-4Clearwater, FL 33760

Tel: 800-237-8931, ext. 78003Fax: 727-532-6038

E-mail: [email protected]

Page 37: Current Fraud Trends Computer Reseller Industry

Tech Data Confidential37

Questions?

Page 38: Current Fraud Trends Computer Reseller Industry

38

The Difference In Distribution