How To Catch a Fraudster That Doesn’t Exist

How To Catch a Fraudster That Doesn’t Exist

With the development of websites such as This Person Does Not Exist, anti-fraud professionals are continuing to see a rise in synthetic identity fraud. Synthetic identity fraud occurs when perpetrators combine piecemeal and, at times, factual information to create a new identity. These identities are cheap, quick and easy to produce, and may include a factual piece, or pieces, of information from sources such as breached data sites.

Read More

The Golden Era of Fraud Investigations Is Upon Us — But It Relies on Better Financial eDiscovery

The Golden Era of Fraud Investigations Is Upon Us — But It Relies on Better Financial eDiscovery

Recent reports show that PPP loan fraud soared in the last two years, putting billions of taxpayer dollars in the pockets of fraudsters and criminals. The Justice Department now faces an unprecedented number of cases to investigate and experts suggest it will be difficult, if not impossible, to build cases and convict all of those responsible. The merits of speeding aid versus having required additional guardrails can be debated endlessly but regardless, one thing stands out about these fraud cases: it’s challenging to “follow the money,” and the burden on teams having to investigate is exceptionally high.

Read More

Crocodile of Wall Street Rendered Toothless as Authorities Bite Back

Crocodile of Wall Street Rendered Toothless as Authorities Bite Back

The sums involved in the latest high-profile cryptocurrency fraud are mind-blowing. A self-proclaimed amateur rapper nicknamed the “Crocodile of Wall Street,” Heather Morgan, along with her husband Ilya Lichtenstein, were arrested and charged with conspiracy to allegedly launder $4.5 billion in stolen Bitcoin last month.

Read More

Fraud Talk: Following the Breadcrumbs-Tracing Cryptocurrencies in Fraud Investigations

Fraud Talk: Following the Breadcrumbs-Tracing Cryptocurrencies in Fraud Investigations

In this episode, Larry Nielsen, a detective who has spent the last several years teaching himself about cryptocurrencies, shares advice for fraud examiners who are interested in expanding their toolkits to accommodate cryptocurrency investigations. He also discusses some of his experiences tracing cryptocurrencies in both a law enforcement capacity and as a consultant.

Read More

5 Steps to Safeguard Your Business from Cyberattacks and Fraud in 2022

5 Steps to Safeguard Your Business from Cyberattacks and Fraud in 2022

In today’s modern age almost every business is dependent on the internet and information technology to accomplish a variety of daily operational tasks. From emails to e-commerce and e-banking, sensitive business activities are conducted via the internet. While the internet has undoubtedly made it easier for businesses of all shapes and sizes to operate, it has also made it easier for cybercriminals to gain access to confidential information and systems.

Read More