The Shared Traits of Those Committing Fraud Against Elderly Family Members

SPECIAL TO THE WEB

Annette Simmons-Brown, CFE

A MOTHER'S LOVE RUNS DEEPER THAN PLANNED
Let's examine the case of "William," the adult son of a victim. Since 1998, William's mother (we'll call her Debra) authorized him to manage her financial accounts that had a balance of $3 million to $4 million. However, she didn't authorize William to withdraw funds from these accounts, and she never initiated the execution of a power of attorney (POA) instrument.

Over the next 11 years, William systematically transferred funds from his mother's accounts to pay his bills and to supplement his accounts. He also opened at least two credit card accounts in his mother's name and tried to hide bank statements from her. By 2009, her accounts were overdrawn. Debra — and her other adult children — finally detected William's thefts and reported them to the police. William was ultimately charged with and convicted of one felony count of theft by swindle over $35,000; he was given a stayed prison sentence of 42 months and ordered to pay restitution of $110,500.

(This is one of many cases in Hennepin County in recent years criminally charged when a POA instrument was absent; thus, the lack of a POA instrument doesn't necessarily prevent criminal charges of financial crimes against the elderly.)

THE FEVA PLAYBOOK
The Hennepin County Attorney's Office (HCAO) in Minneapolis, Minnesota — for which I am a paralegal in its complex crime unit — has long had attorneys specifically assigned to the prosecution of financial exploitation of vulnerable adult (FEVA) crimes. A review of 15 intra-familial FEVA cases charged by the HCAO within the past three years, in which the victims were elderly and related by family to the defendants, reveals a depressingly uniform fact pattern:

  • The life circumstances of the defendants and the victims were similar.
  • The manner and speed with which the defendants accessed the victims' funds were similar.
  • The degree of the thefts was similar.
  • The mindsets of the defendants as revealed in case investigation, litigation and conviction were — you guessed it — similar.

In all 15 cases, the victims were single and either widowed or long divorced. The youngest was 58 years old — a man who had been injured by a car accident and then required assistance with daily living activities and transportation. The oldest was 90.

At least 12 of the victims required professional care for daily living and health problems, either in-home or in an assisted living facility. At least three of the victims experienced memory loss or other cognitive dysfunction.

These were the family ties:

  • Eleven of the victims were parents of at least one of the defendants (in two of the cases involved husband-and-wife defendants).
  • Two of the victims were the defendants' grandparents.
  • One victim was the defendant's aunt.
  • One victim was the defendant's sister.

FINANCIAL EXPLOITATION
Six of the 15 defendants — all of whom were responsible for paying the victims' home- or assisted-living care costs from the victims' accounts — defaulted on these payments, which resulted in the threatened termination of care or even the threatened eviction of the victims from their facilities. In six cases, the amounts stolen from the victims (within the date range of the charges) exceeded $100,000 — the lowest was $107,348 and the highest was $250,196. In eight other cases the defendants stole $14,046 to $71,500.

In every case, the defendants used the victims' funds to finance their lifestyles. They accessed the victims' bank accounts using checks, ATM withdrawals, debit card payments, counter withdrawals and online transfers from the victims' accounts straight into their own accounts.

They used the victims' credit cards for their purchases and accessed the victims' funds to pay the credit card balances. They also transferred money from victims' investment accounts into the victims' bank accounts and spent that cash.

In one egregious case, the defendant took out a mortgage on a real estate parcel that was part of her father's trust estate (for which she was co-trustee) that she and her brother were due to jointly inherit. She used the proceeds of that mortgage to pay off the mortgage on another real estate parcel within the trust estate that she was due to solely inherit. This devious move left her with an unencumbered property but left her brother with the shaft.

In 12 of the 15 cases, the victims executed a POA. Judging from the defendants' spending patterns after the POAs were executed, it's clear they all felt they "owned" the victims' funds or at least had joint ownership. They failed to remember, or deliberately disregarded, that the POA confers more responsibilities than rights. Most importantly, the fiduciary responsibility is to spend the principals' money to benefit the principals rather than themselves, always.

They also all failed to remember, or deliberately disregarded, that a financial transaction always leaves a paper trail. And when their conduct came to light, the paper trail told the story far better than an interview with an enfeebled, distraught victim ever could. And they all failed to realize that their conduct couldindeed come to light, the subtleties of modern-day money transfers notwithstanding.

In 10 of the 12 cases in which a POA instrument was present, the defendants were charged with at least one count of felony — financial exploitation of a vulnerable adult — and several received an additional felony of theft by swindle. In the remaining cases, the defendants were charged with a felony of theft by swindle of amounts over various thresholds. Seven of the cases have resulted in felony convictions, one case has been sent to diversion, two cases have been dismissed and five are pending disposition.

A GROWING PROBLEM
These examples are a fraction of elderly financial crimes cases charged worldwide. Financial crimes against the elderly are growing internationally because many countries are experiencing graying populations. I can easily see the day when crimes like these replace employee theft as the standard-issue blue jeans of fraud.

Read part one of this article on Fraud-Magazine.com, and read how Annette looked at the growing incidence of family members who defraud their aging relatives and the similarities of these miscreants to traditional occupational fraudsters. 

Review: Spam Nation Provides Detailed, Practical Workings of Cyberfrauds

BOOKSTORE STAFF PICK

Spam Nation: The Inside Story of Organized Cyber Crime

The ACFE Bookstore offers hundreds of resources including books and manuals, self-study CPE courses, the CFE Exam Prep Course, merchandise and more. In this interview, Dick Carozza, CFE, editor-in-chief of Fraud Magazine, offers his suggestion on one must-have resource to help you in your fight against fraud.

What is your professional background and current role at the ACFE?
My background is in journalism. I’ve worked as an editor and writer for several newspapers and magazines. I’ve been editor-in-chief of the ACFE publication, Fraud Magazine, since we developed it into a four-color magazine in 1995.

Why would CFEs be interested in the new book, Spam Nation?
Brian Krebs, the author of KrebsOnSecurity.com, is a noted cybersecurity expert and a former Washington Post reporter. (He’ll be a keynoter at the upcoming 26th Annual ACFE Global Fraud Conference and will receive the ACFE’s Guardian Award.) He broke the story that credit and debit card accounts stolen in a massive data breach at Target had been flooding underground black markets. Krebs also discovered breaches at Home Depot, Neiman Marcus and others. Because of his deep contacts in the financial sector and the shadowy cybercrime world, he’s able to provide detailed, practical workings of some of the largest global cyberfrauds. Early detection equals prevention. (Read the cover article for the March/April 2015 issue of Fraud Magazine.)

How is the information in this product useful for CFEs in their professional roles?
CFE’s clients, employers, family members and friends look to them to help deter fraud in their lives and organizations. The detailed information Krebs provides — including the prevention tips — will help us keep our personally identifiable information intact and prevent organizational data breaches. And the book is a great read. Krebs writes about the machinations of cybercrime rings and his travels to Russia to interview some of the colorful, complex fraudsters who spew spam around the world that enables identity theft. Edge-of-your seat copy!

Order your copy of Spam Nation today on ACFE.com.

Interview with a CFE: 'Find the Lie and Find Who Benefited From It'

MEMBER PROFILE

Peter Donnelly, CFE
Deputy Constable, Tarrant County, Texas

An assistant U.S. attorney once told Peter Donnelly, CFE: “All fraud starts with a lie; somebody told a lie to get what they wanted illegally. Find the lie and who benefited from it.” He has followed this advice throughout his career as a deputy constable in Tarrant County, Texas. Donnelly has worked more than 1,000 non-real estate judgment writs and has collected more than $800,000 for plaintiffs in two and a half years.

How did you become passionate about fighting fraud?
I became passionate about fighting fraud when I transferred to Texas as a postal inspector; I had worked mainly street and internal crimes prior to that. In Fort Worth, Texas, I was initially assigned to a credit card fraud team and later served on the Southwest Financial Crimes Task Force. I went back to external street crimes, but I found that mail thieves had gotten more sophisticated in what they stole and how they used the information. This meant that there were more crimes involving banks, credit unions and other financial institutions. A simple check forgery, for example, represents identity theft, because of the forgery and ID used: bank fraud, wire fraud and bank larceny. Around that time a fellow postal inspector and former ACFE Regent, Marty Biegelman, CFE, suggested I become a Certified Fraud Examiner (CFE). 

What is one of the biggest lessons you have learned since becoming a CFE?
This is something the same assistant U.S. attorney mentioned earlier told me: “When you are looking for a particular tree, be sure to look at the whole forest,” i.e., the big picture.

What is your current role and what does it entail?
I’m a deputy constable assigned to execute non-real estate judgment writs. I’ve had nine defendants attempt to hide assets, mainly through transfers to family members, or by creating new shell companies and then “selling” the property to them. These instances are where my CFE training has really helped. I’ve found that once you discover the scheme, having followed the money or property, and confronted the defendant, the defendant can’t open his wallet or checkbook fast enough.

Did you always plan to pursue the role you are currently in?
I always wanted to be a small town police chief but after what I’ve learned and experienced, I think I’ll stay where I am. I’ve simply allowed my talents and aptitudes to guide me.

What do you wish someone would have told you about your career when you were just starting out?
How to write a decent report!

What advice do you have for those looking to become a CFE?
Explore all opportunities, like government inspector general agencies, and commercial and industrial special investigation units, and learn as much as you can about the areas you’d like to investigate. Above all, be ethical.

What activities or hobbies do you like to do outside of work?
I teach child protection courses for my church, sing in the choir and I am a member of the Knights of Columbus. I enjoy quality time with my two dogs, a shot of good bourbon with a good cigar. I also play the piano (badly, I might add) and enjoy shooting sports.

Read more profiles like Peter's in the Career Center on ACFE.com.

Data Breach: Two Words You Don't Want to Hear

LETTER FROM THE PRESIDENT

Data breach! Stomachs churn, blood pressures rise and knees quiver when organizations hear those two words.

On Dec. 18, 2014, Brian Krebs was the bearer of bad news when he broke the story that credit and debit card accounts stolen in a massive data breach at Target had been flooding underground black markets. The next day, Target confirmed to Krebs, the author of KrebsOnSecurity.com, that cybercriminals had stolen more than 40 million debit and credit cards from the retailer's stores throughout the U.S.

Management at Home Depot, Kmart, P.F. Chang's and many others also reached for the Pepto-Bismol when Krebs revealed that they were data breach victims, too.

Why do these huge breaches keep happening? Well, first of all, the largest ones make the splashiest news, no doubt. But any organization that's connected to the Internet is at risk. Cybercriminals can creep into companies via outside vendors (like the Target breach), email attachments, bogus websites or some adept social engineering.

"Stolen credentials and passwords, in particular, are some of the most intractable problems in cybersecurity today," Krebs, an award-winning investigative journalist, says in the cover article of the March/April issue of Fraud Magazine. "It's bad enough that many banks do not even offer their customers the ability to authenticate themselves with anything more than a user name and password which, when phished, lost or stolen, can be used to impersonate that person. However, the lack of two-factor authentication within organizations for employees with access to sensitive customer and employer data is a recipe for disaster."

Krebs says that most companies spend "ridiculous percentages" of their security budgets on hardware, software and services that alert them when suspicious activity occurs on their networks that might indicate breaches. "Unfortunately, these systems generate so much noise and false alarms that it becomes a challenge whittling down the alerts to a few that you really need to read and act on," Krebs says. "This is a constant struggle because organizations are producing lots more data each day, and more devices are being added that generate alerts."

Read Krebs' interview so you can help your organizations (plus family and friends) protect themselves against breaches and data theft. Better yet, come to the 26th Annual ACFE Global Fraud ConferenceJune 14-19 in Baltimore, Maryland, to hear Krebs, a keynoter speaker, in person.

I'm looking forward to seeing all of you as we compare notes on the latest fraud-fighting techniques. See you in Baltimore!

Target Uses Corporate Alliance Program to Connect Faster and More Genuinely

PARTNER PROFILE

Today the ability to connect with people at any time and from any place seems easier than ever. A tap of a finger makes the time it takes to reach someone almost instantaneous. However, reaching someone is only half the battle. The dreaded blocked-out day on an Outlook calendar, family obligations and the ding of a new email can sometimes get in the way of many attempted connections. But, the investigative team at Target is using partnerships like the ACFE’s Corporate Alliance programs to become connected to others in their industry and get the insight they need to stay ahead of the curve.

“To be successful in fighting fraud, you need to have broad knowledge and have a diverse network both inside and outside of your organization,” said Gregg Patyk, CFE, Senior Manager of Target’s Global & Information Security Investigations. “The Corporate Alliance helps us attain those goals. It enables us to connect faster and more genuinely with other companies that have similar goals and mindsets.”

Since joining the Corporate Alliance program in 2011, Patyk and his team have been able to build relationships with other member companies, especially during face-to-face seminars. At the ACFE Global Fraud Conference in San Antonio, Texas, last June, Target representatives sat down with other members and discussed specific initiatives regarding whistleblowing reporting within large companies.

“Since the conference, we’ve received assistance that we could not have received anywhere else,” Patyk said. “Likewise, we reciprocated and helped another member company resolve some of their issues. In both examples, both of our companies were able to expedite the resolutions of each matter because of partnerships and information sharing. Building partnerships with other companies enables Target to learn what other companies are doing and how they are successful with their anti-fraud programs.”

However, Patyk said that as in any relationship, it isn’t just about sharing the successes and passing along what has worked. There is also value in sharing challenges and having those tough discussions about things that didn’t work. “Being part of a group that shares information freely is conducive to learning. For example, not every program and method we have tried in the past has worked. I think it is equally important to share failures along with the success stories, so we can learn together.”

In addition to building connections with other corporations, Target uses data analytics to remain proactive and forecast potential threats. But Patyk said that there is another crucial step that goes along with that analysis. “I believe using analytics is a secondary step in being proactive. To truly be proactive, you need to be well-informed and have the right skills, knowledge and information. We connect with our internal business partners on a routine basis to have a better understanding of their businesses. By building these connections ahead of time, it really helps when there is an issue because we’ll have at least a cursory, if not better, understanding of that part of the business and be viewed as problem solvers versus adversaries. Building partnerships, staying informed and being well-trained are the first steps in being proactive.”

Read more about how Target is staying one step ahead of fraudsters in the full article on ACFE.com.