'Buy Low, Sell High': Rory the foreclosure fraud lizard king

SPECIAL TO THE WEB

Rory Sykes was about a foot shorter than Bam-Bam Baker but just as clever. He briefly operated as a traditional real estate agent before opening his own business, Sykes Real Estate Services, in 1999, which focused on the acquisition of residential properties in the late stage of foreclosure and quick-turnaround sales. "Buy low, sell high" was Rory's secular mantra.

Rory had a deep understanding of the complex minutiae of the foreclosure process and an equally deep understanding of the lack of scrutiny exercised on the contents of documents filed in the county recorder's office. Rory wanted to gain an advantage over his numerous competitors in acquiring specific properties after a sheriff's foreclosure sale, and to enhance the likelihood of owning these properties at the end of the redemption periods at the least possible expense. So he filed documents — affidavits, lien notices, documents of conveyance — containing one or more false statements designed either to discourage redemption by others or to minimize the cost of his acquisition of the properties. He also timed the filings of these fraudulent documents so that no others could have a good chance at redeeming.

FALSE FILINGS GALORE

The Hennepin County Attorney's Office detailed Rory's acquisitions of seven properties in its case against him. In three of these acquisitions, Rory filed Notices of Lien for Payment of Property Taxes, Notices of Intent to Redeem Under Property Tax Lien, an Affidavit of Amounts Owed and a subsequent Corrected Affidavit of Additional Amounts, all falsely stating he or Sykes Real Estate Services had paid property taxes on the parcels.

In five of these acquisitions, Rory filed other Affidavits of Amounts Owed on Redemption or on the Sheriff's Certificate, which falsely claimed expenses that were never incurred, that were misstated as to type of expense (certain expenses incurred in the acquisition of a foreclosed property are allowed, others are disallowed) and/or that were grossly inflated.

In two of these acquisitions, Rory filed quitclaim deeds (QCD) conveying the properties from the owners to him after he had directly paid each of these owners $2,500 and $6,250 respectively. (A quitclaim deed transfers the owner's interest in a parcel of real estate to another with no warranties of the status of the property title.) A false statement was printed on each of these QCDs — "total consideration is less than $500" — which resulted in the minimum deed tax assessment of $1.70 rather than an accurate deed tax calculated on the actual consideration paid to the owners.

In one acquisition, Rory filed an Assignment of Sheriff's Certificate for the benefit of and on behalf of Sykes Real Estate Services, falsely stating "[t]he total consideration for this transfer of property is $500 or less," for which a deed tax of $1.70 was again assessed. This property was being foreclosed based on a default of townhome association dues of a fairly minimal amount.

In one acquisition, Rory filed a mortgage that falsely stated that it had been issued "in consideration of the sum of $5,000 to Mortgagor in hand paid by Mortgagee" rather than the accurate figure of $6,250, and filed a Notice of Intention to Redeem upon the mortgage containing the false statement. In another acquisition, Rory filed a mortgage from himself to his corporate alter ego, Sykes Real Estate Services, and a subsequent Mortgage and a Notice of Intent to Redeem from the Mortgage, signed by Rory, resulting in an issuance of a Sheriff's Certificate of Redemption to Sykes Real Estate Services.

BUY LOW, SELL HIGH

While the false statements in these documents may seem picayune to the outside observer, they had their desired effect. Rory acquired certain properties at amounts significantly beneath their true market value and cost — after he'd discouraged others from redeeming or buying them — and shortly afterward resold the properties at substantial profits. Owners or estate heirs redeemed back other properties or competitors acquired them after they paid inflated amounts back to Rory. One of the property owners was in prison, another was suffering from profound lung problems that required him to use an oxygen tank, another was dead, two were elderly and one was being foreclosed upon for default on a $15,000 second mortgage that would have been forgiven had she been able to remain in the property for a few more years. Buy low, sell high.

Read the rest of the article and find more exclusive content on Fraud-Magazine.com.

 

5 Background Check Red Flags You’re Probably Missing

GUEST BLOGGER

Dennis Lawrence, CFE

Lawrence is a former U.S. Army Counterintelligence Special Agent and Investigations Manager at a publicly traded software company. He is a graduate of The Johns Hopkins University.

Whether vetting a new employee or an expert witness, we’re all familiar with the basic components of a background check. The industry standard includes a comprehensive criminal records search along with verification of educational credentials, employment history and professional licenses. Perhaps civil litigation searches and a credit report are thrown in as well. But are your background checks exploring the issues below that aren’t as easy to discover and could do the most damage?

  1. Secret companies and conflicts of interest
    Side businesses are becoming increasingly common as it is simpler today than it has ever been to set up your own website and LLC. However, these entrepreneurial projects aimed at earning extra income can potentially lead to conflicts of interest or outright fraud. How valuable would it be to learn that the new head of your IT department is purchasing marked up equipment and services from a company he quietly owns but is managed by a seemingly unrelated party? If you’re serious about boosting your capabilities in this arena, try testing out an investigative database offered by one of the big name legal research providers.
  2. Shell companies used to backstop employment history
    Individuals who have been let go from an employer may sometimes conceal a subsequent period of unemployment by representing on their résumé that they started their own business. Curiously, however, the business was only in operation until they found a new job six months later. I once observed a particularly clever Wall Street professional who had recently been released from prison create an LLC to backstop his employment history during his one-year jail sentence and used a co-conspirator as a professional reference. The bottom line is that all self-employment should be verified using state business records to prove the company’s legitimacy (when available), and copies of 1099s should be collected to verify that the company was actually earning money.
  3. Unverified military career with extraordinary claims
    As a federal employee who served in Afghanistan, I have a healthy respect for our veterans. Since joining Corporate America, however, I have been astounded at the number of background checks I have run on people falsely claiming to be decorated war heroes. In all cases, the purported military experience on their résumés fell outside the seven year scope which they knew was automatically subject to verification. It seemed as if they were hoping no one would bother to go further back and check their military service record. When in doubt about a particularly spectacular representation, request a copy of the individual’s DD-214 (Certificate of Release or Discharge from Active Duty) and follow up with an employment verification. You could learn a lot about someone’s credibility and state of mind.
  4. Recently issued social security number
    Social security number (SSN) validations tend to be overlooked even when they are included in a background check report. But what if your senior consultant purportedly born and raised in Ohio was only issued an SSN five years ago? A change in SSN, which is often accompanied by a name change, is a great way to start over in life, especially if your intent is to evade public records searches. A licensed attorney once vetted by our team went to extraordinary lengths to cover up his former life by using precisely this formula, albeit without success. The Social Security Administration offers a free SSN validator for registered users, so there is no excuse to refrain from conducting this basic due diligence and taking a moment to review the results.
  5. Inappropriate behavior on internet message boards and social media sites
    With the amount of time and resources spent verifying an individual’s résumé and searching online databases, it is ironic how often we forego using free sources of intelligence online. Facebook and LinkedIn searches are common sense, but what about slightly less obvious internet footprints? Reverse tracing a phone number on Google can lead to a scandalous internet message board posting, and searching for an email address can reveal a blog with loyalties to causes that may be of value in a litigation or investigative context. 

Use your creativity when examining someone else’s life – you never know when they could be using their creativity to undermine your job as an investigator.

Author’s Note: This article is for informational purposes only. It is the reader’s responsibility to ensure compliance with all applicable laws when conducting investigative activities.

How Will You Observe Fraud Week?

GUEST BLOGGER

Scott Patterson, CFE
ACFE Senior Media Relations Specialist

This year’s International Fraud Awareness Week (Fraud Week) is November 16-22, 2014, and I’m excited to see that Official Supporters are already signing up and planning their activities to help raise awareness of fraud. While preventing and detecting fraud is a year-round endeavor, Fraud Week provides a unique chance for organizations to unite in bringing this global problem to the fore of the public consciousness.

Why is Fraud Week so important right now? According to our 2014 Report to the Nations on Occupational Fraud and Abuse, organizations around the world lose an estimated 5 percent of their annual revenues to fraud. When applied to the 2013 Gross World Product, this translates to a staggering potential projected fraud loss of nearly $3.7 trillion.

Here are just a few other important facts that every business leader should know:

  • A single instance of fraud can be devastating. The median loss per fraud case in the ACFE study was $145,000, and more than a fifth of cases involved losses of at least $1 million.
  • The median duration — the amount of time from when a fraud commences until it is detected — for a fraud case is 18 months.
  • Tips are consistently the most common fraud detection method. Organizations with hotlines in place detected frauds 50% more quickly, and experienced frauds that were 41% less costly, than organizations without hotlines.
  • The smallest organizations tend to suffer disproportionately large losses. Additionally, the specific fraud risks faced by small businesses differ from those faced by larger organizations, with certain categories of fraud being much more prominent at small entities than at their larger counterparts.

The ACFE founded Fraud Week in 2000 to help shine a spotlight on the global problem. The grassroots campaign encourages organizations of all sizes and industries to host fraud awareness training for employees, conduct employee surveys to assess levels of fraud preparedness, post articles on company websites, newsletters and social media, and team with local news sources to promote fraud prevention and detection. 

You can learn more about it at FraudWeek.com, and we hope while you’re there you sign up your organization as an Official Supporter (at no cost), and then check the site often, as we will be adding new resources (including a printable handout of fraud tips and a downloadable infographic) to help raise awareness. Currently, you will find white papers, PowerPoint presentations, podcasts, videos and other helpful items available for Official Supporters to access online.

It is great to have one week out of the year to put fraud prevention in the spotlight. Fraud Week is right around the corner. What do you have planned to help raise awareness?

Back to the Basics: Red Flags and the Fraud Triangle

GUEST BLOGGER

Jeremy Clopton, CFE, CPA, ACDA
Managing Consultant, Forensics and Valuation Services, BKD, LLP

When it comes to looking for ways to improve fraud detection and prevention efforts, sometimes it is best to get back to basics. By basics, I mean the very basics – shapes and colors.  

Criminologist Dr. Donald R. Cressey developed the Fraud Triangle to help examiners understand what leads individuals to commit fraud. Many people refer to the signs that indicate an individual is facing pressure, sees an opportunity or is beginning to rationalize behaviors as red flags. The key becomes identifying the red flags that indicate the legs of the Fraud Triangle are coming together, thus increasing the risk for a potential fraud.

The August issue of the Journal of Accountancy includes an article that examines the inner-workings of an $8 million dollar fraud. In the article, there are repeated examples of pressures (debt, a new baby, gambling, divorce), opportunities (approval access, password knowledge) and rationalization (paying off existing debt). After reading the fraudster’s part of the article it is clear that the Fraud Triangle was complete and, though they went unnoticed, there were multiple red flags. The latter half of the article, written by Dr. Mark Nigrini (author of Forensic Analytics and Benford’s Law), explains the controls and methods organizations should consider to help mitigate the risk of the fraud scheme perpetrated.  

This article emphasizes three important uses of data for fraud investigators:

  • Fraud Triangle analytics – While this fraud took place back in the early 2000s, today the widespread use of email, social media and instant messaging provides a large volume of data for analysis. Analyzing these communications, as well as the related geo-tagging data, may help an investigator identify pressures, opportunities and rationalizations.  
  • Control testing – One of the keys to this fraud scheme’s success was the ability of the fraudster to log in to the system under another individual’s credentials. In fact, there are multiple users’ credentials the fraudster described using during the scheme. Analyzing the access logs of various users with check request and approval authority is beneficial for both deterrence and detection. For example, most employees work off a single computer. Users that log in through multiple terminals may be indicative of a control issue.
  • Payroll trends – The fraudster in the article stated his subordinate had to have the day off in order for the fraud to work. This provided the access needed to take the fraudulent checks. An analysis of the payroll detail, in this situation, would likely have shown an unusual pattern in vacation time for the subordinate. Typically used for vendor activity, trend analysis is also beneficial in analyzing payroll activity (or any activity with an expected pattern over time).

As technology changes, so too must our investigation methods. In 2004, when this fraud took place, it may not have been possible to use data for the three types of tests described above. Ten years later these are just a small subset of the ways fraud investigators use data. However, it all comes back to the basics of shapes and colors. Investigators use data to find the red flags indicating the legs of the Fraud Triangle are all in place.

Follow Jeremy on Twitter @j313 or at BKDForensics.com.

Nonverbal Communication Expert to Keynote ACFE Canadian Fraud Conference

AN INTERVIEW WITH

Christine Gagnon
Nonverbal Communication Expert and keynote speaker at the upcoming 2014 ACFE Canadian Fraud Conference in Toronto, September 7-10

How have you seen the study of nonverbal communication change over the past five years? Is it something that continues to evolve or do you see it as something that will always hold the same tenets?
Synergology, the study of nonverbal communication, has evolved quite a lot in the last few years. The discipline goes beyond recognition of facial expressions, the face representing a mere one-eighth of the body. Synergology now studies the whole body, scrutinizing it thoroughly. Each body part is analysed individually, as if it were a piece of a robot. Synergology uses the corporal lexicon, based on a classification of gestures.

Currently the synergology database contains tens of thousands of video sequences in support of the research. It is through this massive collection of real-life situational videos that synergologists have understood and underlined the importance of contextual embedding – in other words, the meaning of the same movement may be different in different situations. It should, therefore, be made perfectly clear that it is never enough to make a judgment based on one isolated gesture. Analysing only one gesture without considering other indicators can lead an observer to an unjustified conclusion. Seeing gestures as a coordinated system of signals is what sets synergology apart from other nonverbal communication assessment techniques.

This video database allows us to structure the nonverbal information it provides, to compare the same gesture done in different contexts, to control the nonverbal information by analysing the logical chain of events and finally, to witness the same gesture over and over again while cross-referencing it with other videos in order to reinforce its significance. Videos are added daily on our server, allowing us to validate or reject the connotation or sense given to a gesture.

Our students undertake preliminary work for dozens of research projects every year. Those results are taken to the next level of research if the findings are relevant and interesting. Investigators, psychologists, doctors and other specialists studying synergology conduct that research. Here are a few examples of preliminary research done by our students: Is it possible to detect whether or not a person is carrying a concealed weapon by analysing their body language? What are the main differences in the body language of guilty and non-guilty suspects when left alone during an interrogation? Are there nonverbal gestures indicating an upcoming confession. Is it possible to detect a particular body language according to the drug used? Etc.

One of our faculty members, Don Rabon, spoke at our recent U.S. conference about an upcoming trend that may affect the investigative interviewing process: the use of video interviews via Skype and other technologies. He warned that video interviews may cost interviewers valuable information gleaned from nonverbal cues and communication. How do you see technology like this playing a role in interviewing in the future?
To me, there are positive as well as negative aspects in using this technology. The communication is altered by the presence of a camera in a negative way. The answer to the question, “Are you comfortable in front of a camera?” is generally, “No.” Imagine a person being interrogated on top of it! The first part of an interrogation, called the small talk, is very important. It is where the interrogator creates a bond with the suspect and also where the suspect's basic body language is analysed. It is the starting point, the base on which it will be possible to detect changes when the suspect doesn't want to talk about a particular subject. The added stress of the camera will make the changes in the body language that much harder to detect. Also, the investigator will not see the whole gesture, body or environment, which may influence the interpretation of the gestures. However, if the interview is filmed for other reasons, such as being filed, it is then possible to review it in further detail to analyse it more carefully.

What do you most hope attendees will take away from your address?
My address is entitled “How to Manage Interviews and Question According to Gestures.” The most difficult part in synergology is to observe while holding a conversation -- see a gesture, analyse it and then find the right question to introduce the subject without being intrusive, thus jeopardizing the communication. My first goal with the attendees will be to reach the first step and detect the gesture, then find the right question to ask, and finally, to get them to act quickly in order to confirm or deny their impression. It will then be up to them to practice and improve their interview techniques though experience.

Read more about Gagnon and other keynote speakers at ACFE.com/Canadian. Register by August 15 to save CAD 100.