use of savings accounts being misused to lodge unauthorised or .... making lending decisions. The continuing high levels
FRAUDSCAPE Depicting the UK’s fraud landscape
www.cifas.org.uk | March 2011
C I F A S The UK’s Fraud Prevention Service
CIFAS is the UK’s Fraud Prevention Service, a not-for-profit membership organisation operating in the public interest and dedicated to the prevention of financial crime. It has 260 Members spread across banking, credit cards, asset finance, retail credit, mail order, insurance, savings and investments, telecommunications, factoring and share dealing. Members share information about identified frauds in the fight to prevent further fraud. The CIFAS National Fraud Database contains records of frauds that have been perpetrated against CIFAS Member organisations. In order to be recorded on the CIFAS Database a case must satisfy a burden of proof. This means that there must be sufficient evidence to take the case to the police, although it is not mandatory to do so. This Report examines and assesses the fraud cases by CIFAS Member organisations during 2009 and 2010 to ascertain any key changes over that period. It looks at all frauds identified by the type of fraud committed and the product involved.
In this Report . . . 1. Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2. CIFAS National Fraud Database - Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3. Fraud by Fraud Type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2 Identity Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3 Misuse of Facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.4 Application Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.5 Facility Takeover Fraud. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.6 False Insurance Claims . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.7 Asset Conversion Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4. Location of Fraud in 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5. Fraud by Product Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2 Bank Account Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5.3 Mail Order Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
5.4 Plastic Cards Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.5 Communications Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.6 Asset Finance Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5.7 Loan Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.8 Insurance Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5.9 Mortgage Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
5.10 All-In-One Product Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
5. Demographics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 CIFAS is a not-for-profit organisation, concerned solely with the prevention of fraud and funded by subscription. Since February 1991 the membership association has been an independent Company Limited by Guarantee. CIFAS Members are drawn primarily from the UK financial services industry, but also from telecommunications, insurance and other business sectors and the public sector. Website: www.cifas.org.uk
www.identityfraud.org.uk
C I F A S
Introduction
by Peter Hurst, CIFAS Chief Executive CIFAS is the UK’s Fraud Prevention Service, a not
Inevitably, the poor economic situation continues to have
for profit organisation operating in the public interest,
an effect on fraud levels. Individuals subject to financial
dedicated to the investigation, detection and prevention
pressures are being tempted to commit fraud such as
of fraud. Our 260 plus Members share information
making false insurance claims or misusing accounts.
on fraud in order to prevent further fraud. As a result,
Historic frauds such as those that are mortgage related
analysis of the frauds recorded on the National Fraud
are still emerging, to be identified by organisations,
Database offers a clear picture of the fraud landscape
and tighter lending criteria are leading to some people
in the UK. Irrespective of the size of the fraud or the
adopting false identities in an effort to gain credit. In
organisation it was committed against, if it has been
addition, the threat from organised criminals remains
investigated and a burden of proof (sufficient evidence
high, especially those involved in developing malicious
to take it to the police) has been established, then the
technological threats to target both traditional and newer
CIFAS Member will have recorded it on the database.
sectors.
They are not suspicions. They are frauds. But, with new business levels lower now than they There are many truisms concerning fraud: fraudsters
were in 2007, the possibility is raised that attempted
adapt their methods; fraud rises to the surface during a
frauds are simply not reaching the fraud department for
recession and fraudsters will attack what they perceive
investigation: if they are declined at an initial ‘in principle’
to be the point of least resistance. These are just three
decision stage, then there is no opportunity to examine,
of them. In looking at the frauds recorded by CIFAS
prove and record what was still an attempt at fraud. The
Members in 2010, however, it is important also to view
changes in economic conditions have, therefore, led to
these in the context of the patterns identified during
changes across the board, in terms of both fraud and its
preceding years in order to see such statements as
prevention.
something other than glib sound-bites. While the small decrease in fraud identified in 2010 is For example, the term ‘identity fraud’ may have meant
welcome, the threat has not gone away, and it must be
little to most people as recently as five years ago. While
viewed in its proper context: as the latest in a series
identity fraud was a problem at that time – and its effects
of changes that have taken place over several years.
were noticeable – the number of cases was substantially
This is just as likely to be the calm before the storm,
lower. Now, in early 2011, however, we have had news
as fraudsters develop new methods to circumvent
stories, awareness campaigns and even TV dramas that
preventative techniques.
have focused on it, but it remains all too prevalent. The question that therefore needs to be asked is The drivers of fraud are numerous.
less ‘what did we do to reduce fraud levels’ but ‘what more do we do to battle whatever comes next?’
C I F A S
3
Fraudscape - Section One
1. Executive Summary An examination of the frauds recorded by CIFAS
mobile technologies and new communication devices
Members in 2010 reveals:
makes identity fraud a more attractive option for fraudsters. In addition, it becomes arguably easier
•
even after taking into account the 7% decrease
to commit on a larger scale. Identity fraud remains a
in 2010,fraud has still increased by 25% over the
complex affair, however: ranging from an opportunist
past five years. In 2010, 217,385 frauds were
applying in the name of a family member, to
recorded to the National Fraud Database by
increasingly intricate malicious software being placed
CIFAS Member organisations,
onto computers in order to steal personal information.
•
identity fraud accounted for nearly a half of all
•
misuse of facility accounted for 22% of all fraud
to circumvent security measures with incomplete
cases, and 55% of these cases are associated
information; for example, attempting to trick a call
with paying in false financial instruments –
centre operator into revealing information.
frauds recorded (47%) in 2010,
It is also evident that fraudsters do not necessarily need complete information about individuals in order to try to impersonate them. They will attempt
potentially indicative of accounts being used for ‘money mule’ purposes (where funds are laundered or dispersed illegally through bank accounts – sometimes unknowingly),
•
the continuing migration of fraud to new products; as fewer bank accounts and plastic cards were targeted by fraudsters (15% and 37% decreases respectively) only to be offset by increases of 30% in communications products and 34% in mail order, when compared with 2009.
The changes in the fraud landscape over recent years have led fraudsters to seek out new avenues to commit fraud. In the current economic climate, where lending criteria remain more strict (and many applications do not even make it past the ‘in principle’
M
isuse of facility develops new techniques
While misuse of facility fraud declined by 6% in 2010, this follows sharp increases during the previous two years. The nature of many of these frauds points towards a rise in accounts being used for money laundering and the use of ‘money mules’ and is now associated with over one half of misuse of facility fraud cases recorded on the database. The increased use of savings accounts being misused to lodge unauthorised or fraudulent payments also marks a further shift in the way that such activity is carried out. This report provides further details on pages 12-13.
decision stage to be examined by account handlers or fraud teams) the prospect of much fraud remaining undetected and unproven is of real concern. The decrease in fraud in 2010 is, therefore, no cause for complacency.
I
dentity fraud – more serious than ever before
Clearly, impersonating people remains a profitable route for fraudsters and an expensive problem for the organisations affected. Once a person’s identity is compromised, their identity details can be used to attack a range of products. The increasing use of 4
C I F A S
N
ot your usual suspects – fraud is not just seen in the ‘typical’ and ‘traditional’ product Fraudscape also presents evidence about the wide range of products that fraudsters attack: from high volume bank account and mail order frauds, to lower numbers of high value mortgage frauds. It clearly shows that industries cannot operate in silos. Fraud in one area has an impact on others: for example, where a fraudster uses a false identity to obtain a credit card and then uses it to obtain a mobile phone account. As barriers are put in place in one sector fraudsters simply turn their attention elsewhere, ˃
and the changing patterns over 2010 – and previous
taking over an existing mobile phone account to obtain
years – are testament to this. Intelligent data sharing
an upgrade by changing a mailing address, or simply
across sectors, therefore becomes even more of a vital
lying on an application form, all of these types of frauds
mechanism in the continued endeavour to prevent and
are attracting both opportunist fraudsters and those
detect fraud.
involved in organised criminal activity. As fraudsters continue to adapt their methods, further changes to the
It is clear that increasingly sophisticated initiatives to
fraud landscape are inevitable.
counteract fraud in the banking and financial services sectors are having some impact, contributing in 2010 to the fall in frauds attempted both in relation to bank accounts (a decrease of 15%) and plastic cards (a decrease of 37%). These decreases may be masking a
C
ountering the danger
In spite of the shifts seen, there remains an overall
greater problem, however, as perhaps high credit score
consistency. Figures collected by CIFAS over previous
cut offs mean that at least some potentially fraudulent
years have demonstrated that there is truth in the
applications are being screened out. A complacent
received wisdom that fraudsters change their methods,
approach would be to assume that what cannot be
or will move on to new targets. The intelligence
seen does not exist – but fraudsters target different
gathered by CIFAS demonstrates that cross-sector data
sectors in a fluid and ever-changing manner. Increases
sharing works to identify techniques and patterns, spot
in communications frauds (which grew by 30%) and
trends and arm the fraud prevention community with
mail order frauds (which rose by 34%) demonstrate the
the knowledge, and therefore the power, required to
flexibility with which fraudsters adapt their methods and
counter the danger.
targets in relation to the current environment. Whether it is using a false identity to obtain a mail order account,
Fraud over the past few years
O
ver the last few years, the prosperity of the UK economy has fluctuated and patterns in the types of fraud identified have fluctuated with it. In 2007, for instance, a slight decrease in the number of identity frauds recorded was overshadowed by a stark increase in application fraud (or people submitting applications in their own name, but with serious lies – such as inflating their income). With credit readily available, fraudsters seemed to believe it easiest to try and lie their way to a loan or credit card than go to the effort of a more complex fraud. September 2007 saw the public run on a bank, and the term ‘credit crunch’ became all too familiar. The prospect of recession became a reality. Economic hardship and the diminishing availability of credit were reflected relatively quickly in the types of fraud being committed. 2008 saw dramatic increases in the level of facility takeover fraud. Over the course of the year, facility takeover – or account takeover – went from being a fraud that was relatively modest in its regularity, to being committed in unprecedented numbers. When financial headlines spoke of the scarcity of credit, the fraudsters’ approach was simple: rather than risk the rejection of new applications, they turned their attention to abusing someone else’s existing account. With the economic malaise continuing throughout 2009, and the associated dearth of available credit, a continued decrease in application fraud was unsurprising, as was a further increase in facility takeover fraud. More noteworthy was the dramatic reappearance of identity fraud, this time targeting products and services not subject to the same strict approval conditions and scrutiny as credit applications. For the third year in a row, stark shifts in the patterns of fraudulent activity had been recorded. Economic conditions are not the only conditions to have changed during recent years. From the launch of the first iPhone in 2007 to the proliferation of smartphones in 2010, as well as the number of people choosing to manage their financial lives online, the way consumers live and work, has changed. It is no surprise, therefore, that fraudsters’ methods reflect those changes.
C I F A S
5
6
C I F A S
Fraudscape - Section Two
2. CIFAS National Fraud Database: Overview A total of 217,385 frauds were identified by CIFAS Members in 2010. This is a decrease of 7% compared with 2009. These frauds were filed to the National Fraud Database and the following section sets out an overview of recent trends. Intelligent data sharing allows CIFAS Members to detect, target and prevent fraud and the resulting data contained in this report provides a robust and reliable set of figures for 2010. Figure 2.1 sets out the number of frauds recorded to the National Fraud Database from 2006 until 2010. Despite the 7% decrease from 2009 to 2010, there has been an increase of over 25% in the number of frauds identified over the last five years. Continuing high fraud levels mean that this remains a serious issue, affecting both individuals and organisations on local and national levels.
Fraudscape presents data analysed by the types of frauds and related products. An explanation for each fraud type can be found throughout Section 3. Frauds are categorised according to: •
the ‘type’ of case: for example identity fraud or application fraud, and
•
by the ‘product’ offered by an organisation that was compromised by the fraud.
These categories are not mutually exclusive however. For example, application fraud can be committed on bank accounts, mortgages or credit cards, among others. Similarly, each product can be attacked in a number of different ways – a bank account could be targeted by fraudsters committing application fraud, identity fraud or facility takeover fraud. ●
Total Frauds Recorded on the National Fraud Database 2006-2010 Figure 2.1
% change
-
8%
16%
9%
-7%
Year
C I F A S
7
Fraudscape - Section Three
3. Fraud by Fraud Type 3.1 Introduction Table 3.1 sets out the number of frauds recorded on the National Fraud Database by each fraud type over the last three years.
Frauds Recorded by Fraud Type 2008-2010 Table 3.1
Fraud Type
% change since
2008
2009
2010
77,023
57,825
44,680
-23%
522
532
539
1%
Facility Takeover Fraud
19,275
22,387
21,226
-5%
False Insurance Claims
433
670
537
-20%
Identity Fraud
77,642
102,327
102,672
0%
Misuse of Facility Fraud
39,447
50,512
47,731
-6%
Total Frauds Recorded
214,342
234,253
217,385
-7%
Application Fraud Asset Conversion Fraud
Percentage of Frauds recorded 2010*
2009
Overall, the decrease in the number of frauds recorded during 2010 was evident across the majority of fraud types. The most notable was the 23% decrease in the number of application frauds. This reflects both restricted lending by organisations over recent years having a knock-on effect of fewer applications coming in (and, consequently, fewer frauds) and the more stringent lending criteria used by organisations when making lending decisions.
Figure 3.1.1
0.25%
0.25%
The continuing high levels of identity fraud demonstrate that, while people may feel that they are less likely to secure a new account using their own personal details, they (and, in these cases, frequently this means organised criminal gangs) are continuing to assume the identity of another person in order to obtain products. Figure 3.1.1 sets out the percentage of all frauds recorded in 2010 by fraud type. ˃
8
C I F A S
* Some percentages may add up to more or less than 100% due to rounding
Frauds Recorded 2006-2010 (four largest fraud types) Figure 3.1.2
T
he chronically high level of identity fraud demonstrate that individuals continue to assume the identity of another person in order to obtain products.
Figure 3.1.2 sets out the changes in the numbers and types of cases recorded over the last five years for the four largest fraud types. This shows that the current overall picture is one of high, but stable, levels of fraud, with the exception of application fraud which continues to decrease. The high identity fraud figures recorded at the end of 2009 have been maintained and this type of fraud again accounts for the highest overall proportion of fraud in 2010. Both facility takeover fraud and misuse of facility fraud have remained fairly stable compared with recent years. The current high level of fraud can be attributed to a combination of factors:
•
The continuing difficult economic conditions and increasing financial pressures have created challenging financial situations for individuals. This may be mitigated, however, by increasing media coverage of other options for individuals facing financial hardship, such as encouraging people to speak to their banks when struggling financially. The reality is, however, that some people will perceive no other option than fraud, in order to deal with the difficulties they face. This idea of ‘fraud for need’ as opposed to ‘fraud for greed’ should not be overlooked.
•
The movement towards mobile technology has opened up new methods of transaction and, therefore, new avenues for committing fraud – and the drive towards prevention is a constant battle: namely to be as innovative as the criminals, or more so.
•
Restricted lending by financial organisations has led to people feeling that opportunistic frauds are more likely to fail, thereby indicating a much more pernicious problem of serious and organised criminality coming to the surface. It is clear, however, that fraud continues to be committed by both individuals and organised criminals alike.
Over the rest of this section, each fraud type will be examined in further detail – starting with the most prevalent. ●
C I F A S
9
3.2 Identity Fraud
the more likely the fraudster is to attack higher value commodities.
Identity Fraud Identity Fraud includes cases of false identity (the use of an entirely fictitious identity) or the stolen identity of an innocent victim. Fraud Type Identity Fraud
2008
2009
2010
77,642
102,327
102,672
The number of identity frauds recorded by CIFAS Members remained stable in 2010 compared with the level recorded in 2009. What is more striking, however, is that this type of fraud now accounts for almost half of all frauds recorded (47%). That identity fraud remains high is unsurprising given, first, the drop in application frauds and, second, the tough economic climate. More stringent lending criteria make it more difficult for a potential fraudster to obtain credit in his or her own name, so using the identity of another person (who may have a better credit rating) is seen as a preferable option by the fraudster. In the present climate, however, there remains no guarantee that even making an application in another name will be successful.
47%
of all frauds recorded in 2010 were Identity Frauds.
There is the continuing threat of serious fraudsters obtaining high volumes of personal data. This can be sourced either through software attacks, purchasing bulk compromised data from criminal sources or from an individual who has stolen information (such as payroll data) from his or her employer. The quality of the data may determine the types of product the fraudster then chooses to target. It is possible that the more complete the dataset,
10
C I F A S
The media has continued to focus strongly on identity fraud with some stories becoming headline news. As a result, the public is increasingly aware of potential scams such as phishing and cold calling. In addition, CIFAS Members continue to provide their customers with information on identity theft attacks and how these can be prevented. The success of such endeavours may be demonstrated by the falling levels recorded, quarter by quarter, in 2010, but – as identity fraud remains as high in 2010 as it did in 2009 – such greater public awareness of the dangers is clearly only going so far to mitigate the problem. The reality is that identity fraud remains a complex affair – ranging from an opportunist applying in the name of a family member, to increasingly intricate malicious software finding its way onto computers in order to steal personal information. In addition, CIFAS Members report that there is still a place for the traditional identity fraudster who assumes the identity of a high worth individual such as a company director in order to carry out fraud more easily. The data suggests that in 2010 there was a drop in the number of individuals using the personal details of people they know well – such as friends or family. The increase in the proportion of false dates of birth identified (23% of cases in 2010 compared with 15% in 2009) indicates that information which would be known to close friends or family was not used. Instead, frauds were more likely to involve the use of the identities of strangers, where perhaps the address details were known but other information was not. There was a continuing decrease in the use of the more opportunistic fraud (or previous occupier fraud) where people found mail addressed to a previous resident and used those details to impersonate others. A worrying aspect is that more identity frauds were recorded as successful in 2010 – almost two thirds compared with 56% in 2009. This can be largely attributed to a decrease in frauds for those types of products that traditionally have lower success rates (such as bank accounts and plastic cards) and higher rates for those products which have different security checks such as online shopping where there is less necessity to provide identifying documentation such as passports or utility bills.●
DEFINITIONS
P
revious Address Fraud
The fraudster applies in the name of an innocent victim, gives an address accessible to the fraudster but unrelated to the victim as the current address on the application, and gives the address where the victim is living as the previous address, claiming that he or she (as the victim) has just moved. This explains why the victim’s data is still registered at the previous address on the application and means that any documentation is sent to an address unconnected to the victim but to which the fraudster has access.
C
urrent Address Fraud
The fraudster applies in the name of an innocent victim and uses the address where the victim is living as the current address on the application. This means that things look ‘normal’ to the lender (e.g. the victim is on the electoral roll at that address and his or her payment performance information is all located at that address). The fraudster is likely to need to gain access to the victim’s mail to intercept the relevant documentation.
P
revious Occupier Fraud
Typically, this is carried out by opportunist fraudsters who have moved into their victim’s previous address. It occurs when the fraudster applies in the name of an innocent victim who has recently moved. The fraudster may well not know where the victim has moved to, so uses the victim’s previous address as the current address on the application, and hopes the victim has not yet changed his or her address on accounts and the voters’ roll.
F
alse Identity The fraudster applies using an entirely fictitious identity.
The intelligent way to fight fraud TraceIQ is an unequalled source of consumer information, and will provide you with everything from an individual’s contact and home ownership details to their financial standing – helping your business to prevent, detect and investigate fraudulent activity. Whether you need to screen a potential employee or verify someone’s identity, TraceIQ’s wealth of data will help you to make informed decisions – fast. Like this idea? Contact us today for your free trial – call us on 029 2067 8555 or email
[email protected]
T: 029 2067 8555 E:
[email protected] www.traceiq.co.uk
C I F A S
11
3.3 Misuse of Facility Fraud
with other types of fraud, while the overall figure was lower,
Misuse of Facility Fraud
the number of frauds identified remained fairly constant throughout the year, with no great fluctuations.
Misuse of Facility Fraud occurs when an account, policy or other facility is used fraudulently, e.g. paying in an altered cheque. Fraud Type Misuse of Facility Fraud
2008
2009
2010
39,447
50,512
47,731
Much of the decrease was due to the drop in the number of cases associated with individuals running up bills and subsequently evading payment (a decrease of 54% in 2010 compared with 2009). Fraudsters have turned instead to the process of paying in false instruments. This involves paying in cheques which they know will subsequently bounce, or altering cheques that have been legitimately written. Any sort of fraudulent electronic transfer carried out by the account holder is also included in this category.
Misuse of facility fraud declined by 6% in 2010, following
The paying in of false instruments is now associated
sharp increases during the previous two years. In common
with over one half of misuse of facility frauds (55% of ˃
Means by which Misuse of Facility Frauds were carried out 2009-2010* Figure 3.3
12
C I F A S
* Some percentages may add up to more or less than 100% due to rounding
cases in 2010 compared with 47% in 2009). This change
The channel by which these misuse of facility frauds were
is indicative of a rise in accounts being used for money
carried out changed significantly, with the majority carried
laundering and the use of ‘money mules’.
out by phone (27%), mail (26%) and face to face (22%) as shown in Figure 3.3. There was a noticeable drop in the
In addition, frauds relating to the retention of wrongful
number carried out over the internet (down by 66% from the
credit(s) – such as holding proceeds from theft – remained
level recorded in 2009), marking out a difference from other
fairly stable, increasing by 1%. This links to those who
fraud types covered in this report. The most visible aspect
receive extra funds into their accounts through an
was the increase in the use of the phone to misuse current
electronic payment error and who chose to keep and spend
accounts which almost doubled in the period since 2009. ●
this money. Increasingly, savings accounts are targeted for this form of fraud.
Money Mules
D
efinition:
The term ‘money mule’ is most commonly used to describe an individual who allows his or her bank account to be used to facilitate the movement of criminal funds. The mule either knowingly helps, or is tricked, into moving money through his or her own account and then to a third party, who is often located in another country.
M
ethods:
The primary driver behind these transactions is a fraudster located overseas who has obtained funds through phishing or trojan scams and intends to launder these funds out of the UK. As it is difficult to make cross-border transfers from UK accounts, the fraudsters need collaborators with other UK accounts to move the funds for them. The fraudster asks the individual to receive a transfer of funds into his or her bank account, and then instructs the person either to send these funds on to another account, or to withdraw the funds (in cash or foreign currency), or to send them overseas using a legitimate money transfer service. The individual carrying out these transfers is typically offered payment, frequently in the form of commission, for this use of their account. This individual, the ‘mule’, may be complicit or completely unaware of the true nature of their actions.
F
ake employment scams:
Fraudsters are also known to contact people using email addresses harvested through phishing scams or legitimate recruitment websites – offering jobs based ‘at home’ with a high salary for few hours a week. These adverts state that the recruiter’s overseas company is seeking ‘UK representatives’ or ‘agents’ to act on its behalf for a period of time. Job titles will be typically vague; along the lines of financial manager, payment processing agent or money transfer manager. Once recruited, the new ‘employee’ will begin to receive regular deposits into his or her account. Minus a small commission, the mule is then asked to withdraw or transfer the funds for placement into an overseas account (See example overleaf).
T
argets:
University students are often recruited as they are more likely to have unblemished credit records and low incomes, and can be attracted by such schemes as these, as they offer an apparently easy way to make some additional money. The unemployed are sometimes targeted through legitimate employment websites. Difficulties in obtaining work may lead to some people becoming willing to take any likely looking role, without applying the same scrutiny that the person would usually apply to an approach by an employer or recruiter. People moving to the UK have also been approached, sometimes in their home countries, and offered jobs in the UK – moving funds as outlined above. In addition, people moving away from the UK are approached to hand over their bank accounts or good credit record when they leave, in order for fraudsters to make future use of them.
C I F A S
13
The letter below is a real example of a fake employment scam letter, and is printed verbatim. Example 3.3
E
xample:
Dear XXXX XYYYY, My name is XXXX XXXX and I represent XXXX XXXX Finance Inc. We’ve reviewed your resume and I’m glad to propose you a Payment Processing Agent vacancy. We are a large company founded and based in the UK. XXXX XXXX Finance Inc deals mainly with providing IT services to clients within the UK, while recruiting talented individuals and soliciting agencies from all around the world. This is a part-time position with a flexible schedule, working 2 to 3 hours a day from your home while staying in contact and receiving all your tasks online. During the training period, you’ll be paid £2,300 a month. In addition, you’ll keep 8% from every money transfer processed. Total income, considering the current volume of clients, will be up to £4,500 per month. After you successfully pass the training period, base salary will be increased up to £4,500 per month. Furthermore, you may request extra hours or even a full-time job. My goal is to spark your interest. In the present economy, our position offers training, support and a pay scale comparable to entry level position requiring 40 hours per week. I hope you will explore, compare, and then contact me with your questions. Please complete a form below with your updated contact information as a part of your return email. _____________________FORM_________________________ Your Full name:
____________________
Your Country of residence: ____________________ Your Contact phone:
____________________
Preferred call time:
____________________
_____________________FORM_________________________ We’ve found your resume at XXXXXXXXXX. This letter confirms that your resume has been duly processed and you meet our basic requirements for the Payment Processing Agent position. Sincerely yours,
XXXX XXXX XXXX XXXX Finance Inc.
14
C I F A S
3.4 Application Fraud
media coverage concentrating upon reduced lending, thus
Application Fraud
deterring many even from applying, the majority is likely to have resulted from the tighter lending requirements maintained by financial organisations throughout 2010.
Application Fraud relates to applications with material falsehoods (lies) or false supporting documentation (where the name given has not been identified as false).
As a result of this more stringent attitude to lending, there are two further possibilities to consider. First, that those determined to attempt fraud saw other methods (e.g. identity fraud) as a more viable alternative. Second, that the frauds were not reaching the fraud departments and
Fraud Type Application Fraud
2008
2009
2010
therefore were not being identified, because initial lending
77,023
57,825
44,680
before any underwriting, verification or fraud checks could
criteria were weeding out and rejecting these applications be carried out.
The number of application frauds identified in 2010
Figure 3.4 depicts the differing trends in application fraud,
continued on a downward trajectory, with a decrease of
by product, during 2009 and 2010. This shows that the
23% compared with the previous year. The decrease was
overall decrease in application fraud was driven specifically
evident across the majority of product groups with the most
by the drop in personal current account fraud, while other
noticeable being bank accounts and plastic cards. While
products remained fairly stable. ˃
some of the decrease can be attributed to widespread
Changes in Application Fraud Recorded 2009-2010 (by product type) Figure 3.4
C I F A S
15
It is clear, however, that some aspects of application fraud
As would be expected, compared with other fraud types,
were less affected by the current economic conditions. The
application fraud has seen the highest rate of frauds being
number of mortgage application frauds slightly increased in
carried out through more ‘face to face’ channels (27%)
2010, for instance. Mortgages have been among the most
– instead of remotely (online or by phone). Essentially,
tightly controlled financial products over the last few years
people were representing themselves but were including
(with low levels of lending – decreasing from the previous
material untruths on the applications or the supporting
year – continuing in 2010). The frauds identified tended
documentation such as by using forged passports or utility
towards practices such as the applicant hiding adverse
bills. ●
credit data, and concealing past convictions. In addition, fraudulent hire purchase applications remained fairly stable, showing a decrease of just 1%.
3.5 Facility Takeover Fraud
Facility Takeover Fraud Facility Takeover Fraud (also known as ‘account takeover’ fraud) occurs where a person (the ‘facility hijacker’) unlawfully obtains access to details of the ‘victim of takeover’, namely an existing account holder or policyholder, and fraudulently operates the account or policy for his or her own (or someone else’s) benefit. Fraud Type Facility Takeover Fraud
2008
2009
2010
19,275
22,387
21,226
Facility takeover fraud decreased by 5% in 2010 compared with 2009, but this follows very large increases over recent years. Despite the decrease in 2010, over 5,000 facility takeover frauds are still being recorded each quarter. The most common events associated with a facility takeover are the change of address on the account, unauthorised payments by the facility hijacker to another account (presumably the fraudster’s account, a third party accomplice or a similarly duped retailer, for example), or the application for an upgrade of a product in order to carry out further fraud.
16
C I F A S
1 in 5
Facility Takeover Frauds relate to an account being hijacked in search of an upgrade. There was a noticeable increase in those looking for a facility upgrade (20%, compared with 9% in 2009) and this now accounts for one fifth of all facility takeovers. This involves fraudulently taking over an account in order to obtain an expensive and much sought after product (which will then either be used to run up substantial bills or be sold through another channel). This type of facility takeover fraud was most commonly associated with communication products in 2010, and is indicative of the increased focus on products such as smartphones in recent years. As in previous years, these attacks are carried out either by opportunists who obtain the details of those they live with, or know well, or organised criminals who carry out these frauds on a larger scale. ●
3.6 False Insurance Claims
common reason for a household insurance fraud, with
False Insurance Claims
people still tempted to claim a higher value for goods than those that were actually stolen or damaged.
False Insurance Claims occur when an insurance claim, or supporting documentation, contains material falsehoods (lies).
Despite the overall decrease in false insurance claims, motor insurance fraud remained steady; with an increase noted in the proportion of these frauds being identified as staged events (42% compared with 35% in the previous
Fraud Type False Insurance Claims
2008
2009
2010
433
670
537
year). These ‘crash for cash’ cases are where an individual deliberately causes an incident, often by stopping suddenly and causing another vehicle to crash. The driver of the other vehicle can either be innocent or can be a part of the fraud.
False insurance claims presented a fairly stable picture in 2010, following the fluctuation in figures seen in 2009. Overall, the number dropped by 20% in 2010 from the levels recorded in 2009, and this drop occurred gradually during the course of the year, as shown in Figure 3.6. The bulk of the overall decrease was driven by the fall in household insurance frauds recorded (down by 41% from 2009). The inflation of claims remained one of the most
Either way, the insurance claim is fraudulently made. These incidents were recently associated with a highly professional network of expert gangsters with doctors, solicitors, claims firms and victims all lined up ready to play their respective parts1. Most seriously, this immediately presents a very serious threat to the safety of anyone within the vicinity of the ‘accident’. The knock-on effect is that the populace at large suffer from the inevitable increase in all insurance premiums. ●
False Insurance Claims Recorded 2009-2010 (by quarter) Figure 3.6
1 ACPO Head of National Road Policing Intelligence, Geraint Anwyl; Submission to the House of Commons Transport Committee, Jan 2011.
C I F A S
17
3.7 Asset Conversion Fraud
shows that the numbers recorded closely follow the pattern
Asset Conversion Fraud
seen in 2008.
Asset Conversion Fraud relates to the unlawful sale of assets subject to a credit agreement where the lender retains ownership of the asset (for example, a car or lorry).
While it may be expected that asset conversion fraud could rise during a recession (due to people needing extra funds or wanting to dispose of an item such as a car that they cannot continue to pay for), this is not reflected in the figures. One reason could be that, in the years immediately preceding 2010, people were simply unable to obtain the
Fraud Type Asset Conversion Fraud
2008
2009
2010
522
532
539
finance required to purchase a product in the first place; therefore, they did not have an asset which they could sell on unlawfully. The difficulties facing the industry are evidenced by the 15% increase in the number of asset conversion frauds identified as having originated with a dealer compared
The number of asset conversion frauds remained similar to 2009 with a slight increase of 1% recorded. Figure 3.7
Asset Conversion Fraud 2008-2010 (by quarter) Figure 3.7
18
C I F A S
with the previous year. ●
Fraudscape - Section Four
4. Location of Fraud in 2010 Map 4.1 presents the number of instances of fraud
frauds recorded in this area in 2010 (as displayed in Map
recorded per 1,000 people across Great Britain in 2010. It
4.1). Identity fraud and misuse of facility fraud are the
clearly shows that high levels of fraud are concentrated in
most common fraud types recorded in 2010, as noted
urban areas. This is especially noticeable in the Greater
elsewhere in this report.
London area and the extended commuter belt in the South East, and also in the North West (Manchester and
Map 4.2 shows the number of identity fraud cases
Liverpool). In the Midlands, frauds were more prevalent in
recorded across London in 2010 per 1,000 people.
Birmingham and Nottingham, while in Scotland there were
The map shows that overall levels of identity fraud
higher levels in the urban centres of Glasgow, Edinburgh
are relatively high across the whole of London. There
and Aberdeen.
are some variations, however. The data shows higher concentrations of identity fraud centred around the inner
There are some interesting anomalies, however, where
London south east boroughs and the far north west of the
high levels of fraud were identified in areas that fall
region. Some areas, especially along the eastern and
outside the larger urban areas; for instance, along the
southern edges of the region, show markedly lower levels.
north coast of Cornwall, sections of the North West Wales coastal areas and in the far north of Scotland. These
Map 4.3 presents the number of misuse of facility frauds
could equally be explained by individuals or groups
recorded across London in 2010, per 1,000 people. This
targeting certain (more rural) areas, or it could indicate
map shows a greater polarisation in the distribution of
fraudsters obtaining bulk datasets specific to a locality.
misuse of facility frauds than is evident in the identity fraud map. The areas with the greatest concentration are in
Maps 4.2 and 4.3 display data on the Greater London
East London with another high density area in the western
area. This is presented based on the concentration of
boroughs.
Maps The maps on the following pages show:
P
age 20 The location of addresses actively involved in fraud cases identified by CIFAS Members in 2010. The term ‘actively
involved’ means that any previous addresses used by the fraudster have not been included.
P
age 21 The location of addresses within the Greater London area associated with Identity fraud in 2010.
The location of addresses within the Greater London area associated with Misuse of Facility fraud in 2010. Addresses are based on middle layer super output areas and the intermediate geographies as produced by the Office for National Statistics (ONS) and the General Register Office for Scotland (GROS). Population counts are based on figures sourced from the ONS. Greater London area maps are superimposed with London council boundaries.
The maps on pages 20 and 21 contain public sector information licensed under the Open Government Licence v1.0. Contain Ordnance Survey data © Crown copyright and database right 2011. Contain Royal Mail copyright and database right 2011. Source: Office for National Statistics
C I F A S
19
Number of Frauds recorded per 1,000 people in Great Britain Map 4.1
10 and above Between 5 and 10 Between 3 and 5 Between 1 and 3 Less than 1
20
C I F A S
See page 19 for attribution.
Number of Identity Frauds recorded per 1,000 people within Greater London Map 4.2 14 10 and above
13 2
Between 4 and 10 Between 3 and 4
28
15 12
1
16
27
17
31
Between 2 and 3
3 10
Less than 1
11
4
20
9
No fraud recorded
30
26
19
18
Between 1 and 2
33
29
25
21
32
22 8 5
6 7
24
23
Number of Misuse of Facility Frauds recorded per 1,000 people within Greater London Map 4.3 14 13
10 and above
2
Between 4 and 10 Between 3 and 4
12
1
Between 2 and 3
16
3 10
No fraud recorded
31 30
26
19
11
4
20
9
5
33
29
27
17
18
Between 1 and 2 Less than 1
28
15
25
21
32
22 8
1 Hillingdon 2 Harrow 3 Ealing 4 Hounslow 5 Richmond upon Thames 6 Kingston upon Thames 7 Sutton 8 Merton 9 Wandsworth 10 Hammersmith and Fulham 11 Kensington and Chelsea 12 Brent 13 Barnet 14 Enfield 15 Haringey 16 Camden
6 7
17 18 19 20 21 22 23 24 25 26
Islington City of Westminster City of London Lambeth Southwark Lewisham Croydon Bromley Greenwich Tower Hamlets
27 28 29 30 31 32 33
23
24
Hackney Waltham Forest Redbridge Newham Barking and Dagenham Bexley Havering See page 19 for attribution.
C I F A S
21
Fraud detection
Ordnance Survey marks the spot Where claimants in the same neighbourhood are colluding Our up-to-the-minute geographic intelligence provides banks and insurers with vital information, enabling them to analyse fraud hot spots, make better-informed decisions and protect themselves against fraudsters. In fact, organisations are seeing savings of up to 15% on the total cost of fraud investigation and prevention.
We help you discover more
22
C I F A S
www.ordnancesurvey.co.uk/cifas
Fraudscape - Section Five
5. Fraud by Product Group 5.1 Introduction For each case recorded to the National Fraud Database,
be perpetrated by several methods including using a false
CIFAS Members also record the type of product that was
identity or by providing untrue information on an application
applied for, and this information provides a useful basis for
form.
analysis. These products are the types of commodities that members of the public can obtain (such as bank accounts,
The product groups with the highest amounts of fraud were
insurance products and mortgages) and, by collating and
bank accounts (31%), mail order accounts (23%), plastic
sharing data, CIFAS and Members can identify those
cards (18%) and communications (15%) – and, together,
products which are being targeted by fraudsters most
these groups account for 87% of all frauds recorded by
regularly and the specific methods used.
CIFAS Members in 2010. Each product group will be presented, therefore, in descending order of total frauds.
This section provides an overview of common trends recorded in 2010, and the following section presents
Table 5.1 shows the number of fraud cases recorded in
information on each group of products separately in
each product group in 2009 and 2010 and the change
order of the number of cases identified, starting with the
between the two years. It is evident that there was
largest group, bank accounts. Data for each product
considerable variation in the types of product targeted in
group is analysed in relation to the types of case it was
2010 compared with 2009. ˃
recorded against, for example a bank account fraud can
Frauds Recorded by Product Group 2009-2010 Table 5.1
Product Group
2009
2010
% Change
Bank Account
80,105
67,904
-15%
Mail Order
38,718
50,495
30%
Plastic Card
63,396
39,651
-37%
Communications
23,939
32,152
34%
Asset Finance
9,579
9,665
1%
Loan
6,653
6,018
-10%
Insurance
6,106
3,679
-40%
Mortgage
3,004
3,542
18%
Other
2,182
3,518
61%
571
761
33%
234,253
217,385
-7%
All-in-One TOTAL
C I F A S
23
The ‘other’ group in Table 5.1 consists of products which do
Figure 5.1 shows the changes in the number of frauds
not fall into any of the other product groups. The majority
recorded (in the four largest product groups) between
of cases recorded in this group in 2010 relate to ‘credit file
2007 and 2010. The data in 2010 presents a less polarised
requests’. These occur when a fraudster attempts to obtain
picture with frauds more evenly spread across the four
a credit file of an innocent party in order to acquire as much
largest product groups. This reflects the emergence of
financial detail as possible about a future victim. This is an
new methods to perpetrate fraud in recent years – and is
increasing issue, with 3,341 frauds identified; 68% higher in
indicative of the move in emphasis from the more traditional
2010 than in 2009.
products in the financial sector, to a wider range of newer products and markets. ●
A credit file is information relating to an individual that is held by one of the Credit Reference Agencies (CRAs). The credit file contains personal information about an individual such as date of birth, address and previous address. It also holds a record of current and previous financial commitments such as mortgages and credit cards. The most common way in which this type of fraud was carried out was through current address fraud: when a fraudster used the existing address of his or her victim and then attempted to intercept the file.
Frauds Recorded 2007-2010 (the four largest Product Groups) Figure 5.1
24
C I F A S
5.2 Bank Account Fraud
The types of bank account fraud recorded in 2010 are set out in Table 5.2.1:
Bank Account Frauds Recorded 2009-2010 by Fraud Type Table 5.2.1
Fraud Type
2009
2010
% Change
Application Fraud
26,822
17,756
-34%
Misuse of Facility Fraud
34,571
37,144
7%
Facility Takeover Fraud
4,051
1,974
-51%
Identity Fraud
14,661
11,030
-25%
Total
80,105
67,904
-15%
As shown in Table 5.2.1, bank account frauds decreased
The most notable aspect over recent years is the
by 15% in 2010 compared with 2009. This decline can be
interesting dichotomy between the continuing decrease in
attributed, in part, to the continued heavy investment by
application frauds with a corresponding increase in misuse
financial organisations in counter fraud systems.
of facility frauds, as shown in Figure 5.2. ˃
Application Frauds and Misuse of Facility Frauds Recorded 2007-2010 Figure 5.2
C I F A S
25
This pattern can be linked to the types of accounts that
pressures and resorted to paying cheques that they knew
were targeted in 2010, with an increase in personal savings
would bounce. Other activity, meanwhile, is carried out by
account frauds and a decrease in the use of personal
organised criminals who launder money by persuading
current accounts. Table 5.2.2 shows that frauds targeted
people to pay in funds through their own lawful accounts.
at personal fixed notice savings accounts increased
This can occur through coercion of individuals who are paid
by 133% and frauds targeted at instant or easy access
by criminals to allow their accounts to be used for money
savings products increased by 49%. During the same
laundering purposes. In addition, it is known that people
time period, personal current account fraud decreased by
reply to job adverts where the role in question requires the
20%. Savings products could have been targeted due to a
innocent party to move funds (fraudulently, although they
perception that these would not receive the same amount
may not realise it) through their accounts. (see information
of scrutiny or security as current accounts. During 2010 the
box on ‘money mules’ page 13)
number of company current account frauds also increased. Despite the drop in application fraud, there was an increase
Misuse of Facility Fraud accounted for of all bank account frauds identified in this period.
55%
in the proportion of people hiding their adverse credit history (67% compared with 60% in 2009), by claiming to reside at an address for longer than they actually lived there (9% compared with 5% in 2009) or by providing false employment details (8% compared with 4% in 2009). This could be a reflection of the higher unemployment levels and the harsher economic climate of 2010. The nature of identity fraud relating to bank accounts continued to display a similar pattern to that presented in 2009, with a continuing reduction in the use of completely fictitious identities to open bank accounts. Use of a false identity accounted for just 9% of these types of fraud compared with 15% in 2009. The most common types
Misuse of facility fraud accounted for 55% of all bank
were impersonation at a current address (42% compared
account frauds identified in this period. In part this was
with 36% in 2009) and the use of false documents (27%).
linked to the reduction in application frauds as a result
Once again, this is a worrying trend that points towards
of more stringent credit checking. As it was increasingly
an organised element. An account could be opened in
difficult for fraudsters to open a new bank account
someone’s name and they would not know about it until
(due to the variety of Know Your Customer (KYC) and
they try to open another account or were chased for the
verification requirements), fraudsters were making use
debt, as the fraudster would intercept the correspondence.
of existing accounts, which might have been obtained
Furthermore, with a move away from paper based to online
through legitimate means. In addition, CIFAS Members
statements, a fraudster has often simply to intercept the
have reported that lower levels of applications to financial
first contact sent by post from a financial organisation as
organisations meant that some fraud departments
further statements can be accessed online from an account
continued to have more time to examine existing accounts
of his or her choice.
and patterns of payment. Following a leap in levels in mid 2009, facility takeover Misuse of facility fraud arises due to a number of different
fraud reduced by over 50%. There appear to have been
circumstances. It can be that individuals suffered financial
changes both in how individuals’ details are being ˃
Changes in Bank Account Frauds 2009-2010 Table 5.2.2
Product Type
2009
2010
% change
74,006
59,311
-20%
93
217
133%
Personal Instant Access Savings/Investment Accounts
4,431
6,611
49%
Company Current Accounts
1,551
1,738
12%
Personal Current Accounts Personal Fixed Notice Savings/Investment Accounts
26
C I F A S
obtained and, once obtained, how they are being used. The majority of the decrease is accounted for by the reduction of facility takeovers recorded as being carried out online. Instead, there was an increase in the number of accounts taken over through face to face interaction and especially by phone. This reflects the increased security placed on online accounts so that fraudsters resort to dealing directly with a member of staff in order to persuade them to make account changes. Compared with 2009, a lower proportion of these takeovers consisted of unauthorised electronic payments (51% compared with 87% in 2009) and also lower numbers of unauthorised security and personal detail changes being made. Instead there were increases in the number of unauthorised address changes and paper payment instructions. Changing addresses on an account might appear to be an innocuous thing to do and, once the fraudster has effectively diverted the account to a new address, he or she can request new cards or chequebooks to be issued to that address. There was a decrease in the use of the internet as a bank
While Bank Account Fraud decreased by 15% in 2010, it still accounted for of all frauds.
31%
This is a reflection of the considerable efforts made by financial institutions to combat internet fraud, together with an increasingly educated public who are less likely to respond to phishing attacks. It is too early to say if this is a trend, however. The emergence of new malware threats makes it harder for personal users to protect their home computers and it is difficult to predict how this will affect banking fraud in the next year. The increase in phone fraud relating to bank accounts was also notable (22% in 2010 compared with 11% in 2009) and this is an area that will need to be monitored closely. ●
account fraud facilitator from 33% in 2009 to 19% in 2010.
Enterprise Risk Management • Uncover entire fraud networks • Reduce false positives • Accelerate investigations • Prevent fraud in real-time • Support regulatory compliance
Find out more by visiting www.deticanetreveal.com C I F A S
27
5.3 Mail Order Fraud
The types of mail order fraud recorded
Mail Order Frauds Recorded 2009-2010 by Fraud Type
in 2010 are presented in Table 5.3.
Table 5.3
After a sharp increase in the last quarter of 2009, mail order fraud continued to increase in early 2010, followed by a decrease and levelling off later in the year. The most noticeable aspect was the drop in misuse of facility fraud and the continuing, though slightly moderated, increase in identity fraud as shown in Figure 5.3. ˃
Fraud Type Application Fraud Facility Takeover Fraud Identity Fraud Misuse of Facility Fraud Total
Mail Order Frauds Recorded 2008-2010 (by quarter) Figure 5.3
28
C I F A S
2009
2010
% change
280
246
-12%
2,816
4,168
48%
30,920
44,577
44%
4,702
1,504
-68%
38,718
50,495
30%
The overall increase was driven almost exclusively by the
decrease in the middle of the year was likely to have been
internet – with 99% of all mail order frauds carried out in
due to mail order organisations identifying fraudster tactics
this way.
and moving to counteract them. Following the pattern in 2009, the link between mail order frauds and organised
The overall increase was driven almost exclusively by the internet – with of all Mail Order Frauds carried out in this way.
99%
criminals again appeared to be supported by the data. This was especially the case where data sets of compromised identity details were being used. The majority of the increase in identity fraud was accounted for by a large increase in the number of current address frauds (which now account for 87% of all mail order identity frauds). A proportion of these will have been committed by people impersonating family or friends that they live with or know well. In over half of all cases, however, a false date of birth was provided. This indicates that a high number of attacks were being made by strangers, using the data sets that were not always complete. Mail order application fraud continued to decline, and
Identity fraud continued to account for the highest
the fraudsters’ success rate was much lower: at 78%
proportion of all mail order frauds (88%). Although not
compared with 85% in 2009. The number of mail order
showing the same spike as seen in the last quarter of
facility takeover frauds increased to levels close to those
2009, the levels overall were higher than in 2009. The
of 2008. ●
Revolutionary solutions for fraud and risk management Advanced application fraud prevention solution
Risk ranking & sophisticated scoring capability
Transactional monitoring for effective fraud detection
Employee fraud screening
Integrated case management system
Procurement fraud identification
Automated fraud network & data mining modules
Real-time and batch infrastructure
01782 664000
[email protected]
C I F A S
29
5.4 Plastic Card Fraud
The types of plastic card fraud recorded in 2010 are set out in Table 5.4. There was a decrease across all plastic card fraud types, following the pattern seen in 2009.
Plastic Card Frauds Recorded 2009-2010 by Fraud Type Table 5.4
Fraud Type
2009
2010
% change
Application Fraud
5,866
3,830
-35%
Facility Takeover Fraud
11,503
8,209
-29%
Identity Fraud
39,249
23,560
-40%
6,778
4,052
-40%
63,396
39,651
-37%
Misuse of Facility Fraud Total This decrease is likely to have been due to financial
This could be linked to the reduction in bank account
organisations having more stringent initial lending criteria.
frauds noted in Section 5.2.
Lenders have remained cautious and it is widely known that they are continuing to decline a high proportion of
Identity fraud on plastic card accounts is largely reliant
credit card applications. As a result, people are simply not
upon current address fraud (see definition on page
applying for as many card accounts as they might have
11) which accounted for 63% of identity fraud in 2010,
done in previous years. Organised fraudsters will be just as
compared with 51% in 2009. Current address fraud
aware that they will not succeed with an application in their
remained a serious issue with cards, as an impersonator
own names and, even if they assume another person’s
would have free rein to use a card as he or she wished
identity, that there is no guarantee that this other identity
once it had been intercepted. The innocent party would
will be ‘creditworthy’. In addition, there is a sizeable group
have no knowledge that this was happening until, perhaps,
of people who simply do not want to get into the position of
they applied for another product or were chased for the
having additional credit in these straitened times, although
debts. Therefore, while less identity frauds were being
they may have been tempted to commit fraud to obtain
recorded, those that were remained very serious and were
credit in previous years.
frequently indicative of more organised activity.
Despite the overall decrease, the success rate of the
The pattern of plastic card-related misuse of facility fraud
plastic card frauds attempted remains consistent with
remained remarkably similar to that seen in 2009, with the
previous years – with just over half (51%) being successful.
main reason for recording a fraud of this type being regular
The frauds identified were increasingly concentrated on
payment fraud (40%). This occurs, for example, when a
online frauds with this channel accounting for 70% in 2010
fraudster sets up a direct debit from an innocent party’s
compared with 60% in 2009.
account in order pay off his or her own credit card. Facility takeover fraud, meanwhile, continued to decrease: with a
30
For the majority of application frauds, the story remained
lower proportion associated with changing address (49%
similar to recent years with the largest proportion being
in 2010, compared with 62% the year before). Instead,
efforts to hide a poor credit history (70%), and providing
there was a move to plastic card frauds being associated
false employment details (13%); both of which were likely
with an unauthorised electronic payment instruction (39%
to be related to current economic difficulties and increasing
in 2010 compared with 26% in 2009), for example when
unemployment. There was a notable decrease of 75% in
a fraudster had acquired debit or credit card details and
the number of people providing false bank details (which
used these to transfer funds from the victim’s account to
now account for just 6% as compared with 15% in 2009).
his or her own. ●
C I F A S
5.5 Communications Fraud
The types of communication fraud recorded in 2010 are set out in Table 5.5:
Communications Frauds Recorded 2009-2010 by Fraud Type Table 5.5
Fraud Type
2009
2010
% change
Application Fraud
5,172
4,578
-11%
Facility Takeover Fraud
3,879
6,590
70%
11,511
16,821
46%
3,377
4,163
23%
23,939
32,152
34%
Identity Fraud Misuse of Facility Fraud Total
Communications fraud has seen a continuing increase from
Figures 5.5.1 to 5.5.3, on page 32, show how these
2009 into 2010, with the key drivers again being identity
approaches have changed since 2008, with unauthorised
fraud and facility takeover fraud. In 2010, facility takeover
facility upgrades becoming the vehicle of choice for
fraud accounted for a greater number of the total frauds
fraudsters.
identified than application fraud. There is, though, no one clear method by which facility The most notable increase during the year was in facility
takeover frauds are being carried out. A fraudster might
takeover fraud. There are two main approaches used by
obtain some details from a phishing attack, and then
fraudsters to take over a communications account:
change the account or apply for an upgrade over the
1
phone. The online security measures used by many ) Unauthorised facility upgrade: this occurs
communications providers may mean that, while a fraudster
when an individual takes over an account (e.g. a
may obtain details of a victim online (by exploiting any
mobile phone account) to obtain an upgrade of the
potential weaknesses in individual PCs or laptops), they
product. The fraudster then receives a new model of
think they have a better chance of talking their way around
phone, which they can use or sell on for a profit. This
the extra security on the phone.
method increased by 113% compared with 2009
2
However, we are at a very interesting juncture in the use ) Unauthorised addition of another facility
of communications products, specifically mobile phones.
to an account: for example, adding another
The functionality of smartphones is changing rapidly and
number to a genuine mobile phone account leaving
they are being used, by increasing numbers of consumers,
the innocent party to pay the extra charges.
almost like mobile computers. This is bringing new dangers for customers, and new opportunities for hackers ˃
The challenge
for those involved in providing mobile data services and the internet, is to counteract this threat with increased security and to educate consumers. C I F A S
31
Communications Facility Takeover Frauds 2008 Figure 5.5.1
scouring the internet for personal data. Accessing public wi-fi hotspots using a mobile phone can mean that any information accessed is visible to others. The challenge is for all those involved in providing mobile data services and the internet to counteract this threat with increased security controls and by educating consumers to become more security aware. The rise in communications-related facility takeover fraud can also be linked to the decrease in application fraud
Communications Facility Takeover Frauds 2009 Figure 5.5.2
recorded in 2010. Communications companies continued to sell high volumes of aspirational consumables such as smartphones, and introduced tougher credit-checking procedures. As these phones have been on the market for a few years now, it has become common knowledge that mobile phone companies require detailed levels of personal information from new applicants. As it may be more difficult to open a new account, the fraudster uses an existing account instead, obtaining the necessary details by whatever means possible. For communications-related application fraud, however, concealing a bad credit history by failing to disclose addresses remained the most common reason for a fraud being recorded. Identity fraud again accounted for the highest proportion of communications fraud and continued to increase strongly. Current address fraud (see definition on page 11)
Communications Facility Takeover Frauds 2010 Figure 5.5.3
remained the most common method used by fraudsters, and again increased sharply in 2010. Interestingly, the use of completely fictitious identities also continued to increase and was associated with 21% of frauds in 2010. It has been suggested by some that this type of attack is less sophisticated (as the fraudster is just trying his or her hand), and this is somewhat borne out by the continuing increase in the number of cases where the company ran its usual checks, only to find out that the person named on the account was not known at the address cited on the form. Following a decrease last year, misuse of facility fraud in relation to communications products has shown an increase in 2010. The most noticeable increase in these types of fraud was in regular payment fraud (from 23 cases recorded in 2009 to 2,071 cases in 2010). This could be a result of a fraudster setting up a payment from an innocent party’s bank account to pay for a mobile phone account. ●
32
C I F A S
Premium addressing software doesn’t have to come at London prices Address auto-fill is an essential tool for fast, reliable data entry, whether on your contact database or website. But why make do with old technology that costs the earth? Switching to Postcode Anywhere is easier than you think. • Official Royal Mail PAF® data updated automatically every day via internet • No set-up fees, no service upgrade charges and full backwards compatibility • Free technical support, from a team of specialists in the UK • Effortless integration with any IT system, including bespoke software
Lloyds TSB, National Savings & Investments, British Gas, Pizza Hut, Rolls Royce, Oxfam and over 8,000 others have already moved to Postcode Anywhere. To make it easier for you too, we’re offering 10% off your first credit pack or user licence.
Just quote SWITCH11 when you call or check out online. Call 0800 047 0495 now or visit postcodeanywhere.com/switch
C I F A S
33
5.6 Asset Finance Fraud
Table 5.6 sets out the figures for asset finance fraud in 2010 compared with 2009, by fraud type:
Asset Finance Frauds Recorded 2009-2010 by Fraud Type Table 5.6
Fraud Type
2009
2010
% change
526
539
2%
8,196
8,247
1%
Identity Fraud
479
472
-1%
Misuse of Facility Fraud
378
407
8%
9,579
9,665
1%
Asset Conversion Fraud Application Fraud
Total
Following a decline over recent years, asset finance fraud
declare. There was also a notable increase in the numbers
presented a fairly stable picture for 2010, showing an
presenting fraudulent bank statements to support their
increase of 1%.
applications, which was the case with over one fifth of asset finance application frauds.
Asset finance is an important part of the survival of many businesses, especially those that need to manage their cash flow closely. It allows investment in business assets (such as machinery, office technology and vehicles) over a medium term period. That fraud figures remained stable in this sector may either be a result of companies in the economic slowdown struggling to pay leases or of companies looking at extra finance as a way of increasing cash flow. It could also be a reflection of individuals being unable to pay leases and selling the product such as a vehicle (still subject to a hire purchase or similiar
The main evidence presented for application frauds was again proof of electoral roll (27%), where after investigation it was discovered that the applicant appeared on the electoral roll at a different address.
agreement) to pay other debts. In relation to asset finance, both misuse of facility fraud and Application fraud continued to account for the highest
asset conversion fraud continued to increase in 2010. This
proportion of asset finance frauds – and increased during
has been a repeating trend over recent years, and could
the year by 1% after several years of decline. This was
be linked to the economic slowdown. People are unable to
contrary to the overall trend of application frauds falling
afford repayments on products and so attempt to sell the
across other product groups. The increase in application
item, simply fail to make repayments, or attempt to continue
fraud was concentrated on contract hires (whereby cars
to pay using false instruments, such as a cheque that they
are hired for set periods of time at a fixed monthly rate but
know will bounce.
continue to be owned by the finance company). The main
34
reason for these frauds was that people were hiding a poor
As noted earlier in this report (page 18) asset conversion
credit history by not disclosing a previous address. The
is the sale of an asset that is still owned by a finance
main evidence presented for application frauds was again
company as the loan has not yet been paid in full, for
proof of electoral roll (27%), where after investigation the
example a car that is bought on hire purchase and then
finance company discovered that the applicant appeared
sold. This accounted for 6% of asset finance frauds in
on the electoral roll at an address they had failed to
2010. ●
C I F A S
5.7 Loan Fraud
The types of loan fraud recorded in 2010 compared with 2009 are set out in Table 5.7.
Loan Frauds Recorded 2009-2010 by Fraud Type Table 5.7
Fraud Type
2009
2010
% change
Application Fraud
4,198
3,397
-19%
17
13
-24%
2,093
2,404
15%
Misuse of Facility Fraud
344
204
-41%
Asset Conversion Fraud
1
0
-100%
6,653
6,018
-10%
Facility Takeover Fraud Identity Fraud
Total
Loan fraud refers to both secured and unsecured loans but
figure of 2007. Figure 5.7 demonstrates that, overall, the
not mortgages. This type of fraud decreased by 10% overall
decline in 2010 was more gradual than in preceding years. ˃
in 2010, continuing a trend noted over the last four years; with the total now representing less than one third of the
Loan Frauds Recorded 2007-2010 by Fraud Type Figure 5.7
C I F A S
35
loan frauds in 2010 compared with 63% in 2009 and 70% in
Loan-related identity fraud
2008. Hiding an adverse credit history by failing to disclose a previous address continued to be the preferred option for those attempting loan application fraud, albeit with a
is increasingly perpetrated
lower proportion than in recent years (72% down from
using the internet (an
decreased. The number providing false employment details
increase of 66%
from 2009) and the phone
(up by 80%).
80%). Similarly, those providing a false time at an address continued to climb, now accounting for 15% of cases. This reflected the higher unemployment figures in 2010, with people attempting to hide unemployment when applying for a loan. Following a decrease in 2009, loan-related identity fraud increased in 2010 and accounted for 40% of all the loan frauds identified. It is likely that, having come across strong resistance from the standard financial organisations, fraudsters turned to less traditional lenders whom they
The decrease was linked to the tighter lending criteria
perceived to be an easier target. Loan-related identity fraud
discussed elsewhere in this report as financial institutions
is increasingly perpetrated using the internet (an increase
remained reticent about lending. This was also reflected in
of 66% from 2009) and the phone (increase of 80%) to
the figures for application fraud which has shown the most
carry out frauds. ●
notable decrease over recent years, accounting for 56% of
a fresh approach to emerging threats THE 1st CIFAS DIRECT AGENCY Extra data to identify more fraudulent transactions at all stages of the customer lifecycle.
THE 1st PARTNER FOR NEW NCOA® ALERT SERVICE NCOA® Alerts is a new service from Royal Mail, and is proven to identify identity and address-based fraud.
Find out more at www.transactis.co.uk/freshapproach Email:
[email protected] 36
C I F A S
5.8 Insurance Fraud
Table 5.8 sets out the types of insurance fraud recorded in 2010 compared with 2009:
Insurance Frauds Recorded 2009-2010 by Fraud Type Table 5.8
Fraud Type
2009
2010
% change
Application Fraud
4,284
2,944
- 31%
False Insurance Claim
670
537
- 20%
Facility Takeover Fraud
2
0
- 100%
1,046
108
-90%
104
90
- 13%
6,106
3,679
- 40%
Identity Fraud Misuse of Facility Fraud Total
There was a notable fall in insurance fraud in 2010: the
Inflated claims accounted for the greatest proportion of
biggest decrease being in home insurance which reduced
false insurance claims: 28% in 2010 compared with 15% in
by 66% from 2009. Motor insurance, the other largest
2009.
product type in insurance terms, declined by 27% in 2010 compared with 2009. The decrease, however, occurred
Overall, the most notable change in the methods
across all insurance fraud types, with the most substantial
associated with insurance fraud was in the provision of
reduction seen in identity fraud – which dropped by 90%,
false payment details. This has decreased from 29%
back to a level last seen in the first half of 2008. Insurance
of insurance frauds in 2009 to 7% in 2010. In terms of
related application fraud also showed a substantial
changes, this was closely followed by the provision of a
decrease, down by almost one third (31%).
false address (9% in 2010 down from 14% in 2009). There was also a substantial reduction in the provision of false
Although there was a decrease in application fraud, there
phone numbers, which were filed in only 10 cases in 2010
were some notable changes in how these were carried out.
compared with 648 in 2009. The decrease in insurance
The most common method was the provision of false bank
related identity fraud has contributed to the lack of cases
details (24% of application frauds) but an increase was
recorded for ‘confirmed not known at address’, false
also recorded in the proportion of applications where other
identities, and impersonations. As insurance premiums can
claims were not declared (18% in 2010 compared with
change depending on postcodes, manipulating an address
5% in 2009). The latter is often attempted in an effort, by
is another common method of attempting to obtain a lower
individuals, to reduce an insurance premium, perhaps not
premium.
surprisingly, given the economic situation and uncertainty regarding 2011’s economic prospects. There was also
The internet remained the favoured method to carry out
a surge in insurance applicants providing inconsistent
insurance fraud, although at a lower proportion: 63% in
details across applications (17% in 2010 compared with
2010 compared with 73% in 2009. There was an increase
6% in 2009). This is caused by individuals putting different
in the number of brokers identified, primarily in relation to
combinations of details on different application forms; again
application fraud: jumping from 81 overall in 2009 to 543
in an effort to obtain a lower premium. The number of
in 2010. This could indicate that brokers struggling for
these types of fraud being identified is indicative of greater
business were increasingly tempted to alter information on
scrutiny by insurance companies of applications, together
application forms in order to meet targets. ●
with the benefits of data sharing across the industry.
C I F A S
37
5.9 Mortgage Fraud
Table 5.9 sets out the types of mortgage fraud recorded in 2010 compared with 2009:
Mortgage Frauds Recorded 2009-2010 by Fraud Type Table 5.9
Fraud Type
2009
2010
% change
Application Fraud
2,677
3,391
27%
6
0
-100%
Identity Fraud
161
66
-59%
Misuse of Facility Fraud
160
85
-47%
3,004
3,542
18%
Facility Takeover Fraud
Total
Mortgage fraud increased by 18% in 2010, largely driven •
by a 27% increase in the number of application frauds 96% of all mortgage frauds, with identity frauds and misuse
•
of facility frauds dropping back to the levels recorded in
during boom times may be abandoned or
in line with expectations that falling house prices and
offloaded hurriedly during a recession, or
tighter lending criteria have exposed falsified mortgages,
the account may fall into arrears, meaning
especially those where key information on the original
that the original fraud is only now being
application form, such as salary, was untrue.
uncovered. •
Application frauds now account for of all Mortgage Frauds.
year figures in 2009. There was a subsequent decline in the second half of 2010, with quarter 3 showing a decline of 14% and a further decline of 9% in quarter 4. Following sharp falls in 2008 and 2009, mortgage lending stabilised in 20102. Lenders continued to maintain stringent lending criteria and to require large deposits from applicants. Given this context, the overall increase in mortgage application fraud can be attributed to:
and struggling to keep their companies afloat. Some may have turned to fraudulent activities such as changing the details of clients’ incomes in order to obtain a mortgage. Applicants in such cases, of course, may not necessarily be in collusion with the broker. There is also a group of people who falsify applications in order to obtain the mortgage initially, yet who do intend to make their repayments. During the boom times these people would obtain a mortgage, pay it as agreed and sell the property for a profit. It is no longer certain that a property sale will make a profit and the applicant is in danger of falling into negative equity. This type of application, however, is likely to have reduced substantially because of the prevailing conditions. ˃ 2
38
C I F A S
some brokers being under financial pressures due to the economic slowdown
96%
the first half of the year following on from the high end-of-
the long ‘lag time’ in identifying mortgage fraud. Properties fraudulently obtained
2008. The increase in mortgage application fraud was
Figure 5.9 shows that the bulk of the increase occurred in
increased scrutiny by lenders which has detected more issues with applications.
compared with 2009. Application frauds now account for
Council of Mortgage Lenders website http://www.cml.org.uk/cml/media/press/2838
Mortgage Frauds Recorded 2008-2010 by quarter Figure 5.9
43%
of Mortgage Application Frauds attempted to hide adverse credit information linked to an undisclosed address.
difficult to identify fraudulent applications, especially those supported by high quality false documents. It is therefore not surprising that the majority of mortgage frauds continued to be associated with businesses introduced by brokers (69%). There is some evidence, however, that there is a move towards greater scrutiny of documents – with a notable increase in the numbers recorded as presenting false evidence of electoral roll information, wage slips or bank statements which did not pass examination. The increase in fraudsters using forged P60s noted in 2009 was not sustained in 2010.
In 2010, the most common form of mortgage application fraud was an attempt to hide adverse credit information
The decrease in the number of mortgage-related identity
linked to an undisclosed address (43% compared with 30%
frauds can account for some of the reduction in frauds
of cases in 2009), followed by 22% of cases of applicants
associated with the presentation of false documents.
simply not disclosing a bad credit history. There was
These accounted for just 15% of cases in 2010 compared
another increase in those providing false employment
with 33% in 2009. Within mortgage frauds, using false or
details (8% compared with 5% in 2009).
altered documents, stating false income, or providing false employment details have all decreased from over two thirds
Much mortgage business is carried out at a distance,
of mortgage application frauds in 2009 to account for less
for example an intermediary such as a broker based
than half in 2010. ●
in Manchester could be dealing with a client based in London and a solicitor in Birmingham. As the intermediary never meets the client face to face they may find it more
C I F A S
39
5.10 All-In-One Product Fraud
The types of all-in-one frauds recorded in 2010 are set out in Table 5.10.
All-in-One Product Frauds Recorded 2009-2010 by Fraud Type Table 5.10
Fraud Type
2009
2010
% Change
Application Fraud
194
179
-8%
Facility Takeover Fraud
109
255
134%
Identity Fraud
189
271
43%
79
56
-29%
571
761
33%
Misuse of Facility Fraud Total
An all-in-one product is one where a group of financial
application frauds could be related to the overall tight
products are offered together and operate through
lending conditions relating to mortgages, which have
interaction. A common example of this is an offset mortgage
affected the whole market, whether they are stand-alone or
when, instead of paying interest on an entire mortgage,
all-in-one.
customers pay interest on the difference between the balance of a mortgage and their savings. The number of all-in-one frauds was low overall but increasing and showed a rise of 33% in 2010 compared with the previous year. The majority of this increase was due to a 134% upsurge in all-in-one product facility takeover frauds, following on from the very high increase of over 500% in 2009. The most common means by which this was carried out was through unauthorised electronic payment instructions (33%); indicating that fraudsters
74%
of All-in-One product-related impersonation cases are current address frauds.
were using the interaction between accounts to hide their activities, targeting accounts that they hoped would not be noticed. This increase could also be related to the increase in savings account fraud, noted in Section 5.2. There is
In cases of all-in-one product-related impersonation, the
little evidence, to date, that certain bank accounts are being
methods have swung back to current address fraud with
targeted simply because they are linked to other products,
74% of all cases associated with frauds of this type. This
so it is most likely a case of the fraudster abusing whatever
is considered a more sophisticated method as fraudsters
facilities are available on the account once they get access.
need to establish a means of obtaining access to a person’s mail to retrieve any post. This may not need to
Application fraud on all-in-one products has not increased
happen regularly, because once the first piece of mail is
despite the increased presence of all-in-one products on
received, other aspects of account manipulation can be
the market. Demand for offset mortgages was strong
carried out online. The most common means by which all-
in 20103 as base-rate stability and low interest rates on
in-one frauds were carried out continued to be the internet
savings accounts continued to encourage customers
(45%). ●
to look for increased value. However, the decrease in 3
40
C I F A S
http://www.mortgages.co.uk/news/2010/Oct/first-direct-sees-rise-in-offset-mortgages-800160353.html
Fraudscape - Section Six
6. Demographics Information about those who are associated with frauds is recorded to the National Fraud Database. These demographic details are identified by Members at the time the fraud is recorded. This section focuses on those who carried
A
total of 107,867 victims were identified in 2010. Of these, 21% were recorded as being victims of facility takeover and the remaining 79% were recorded as victims of impersonation.
out the frauds. However, those frauds which involve impersonation or facility takeover involve the targeting of an innocent victim. A total
Table 6.2 sets out the gender of fraudsters by fraud type. In
of 107,867 victims were identified in 2010. Of these, 21%
identity fraud, the details presented are the characteristics
were recorded as being victims of facility takeover and the
of the victim’s identity that the impersonator used to commit
remaining 79% were recorded as victims of impersonation.
the fraud. In application fraud, the details are accepted as
Often the details of the fraudster and their victim are the
genuine (except where identified as false, for example a
same, for example in relation to identity fraud as the true
date of birth).
identity of the fraudster is never established - merely
The gender of fraudsters 2008-2010
that the applicant is not who he or she purported to be.
Table 6.1
Therefore, in order not to double count these figures, the data presented in this section is based on the information
2008
2009
2010
Female
34%
31%
32%
Male
66%
69%
68%
recorded as being associated with the fraudster at the time the fraud was recorded.
G
ender In the vast majority of cases, the gender of an
individual was recorded (97%). Table 6.1 sets out the
Males continued both to carry out more frauds, and to be
gender breakdown of frauds and shows that the proportion
the target of higher amounts of identity fraud and facility
of males to females has remained fairly stable in recent
takeover fraud. The distribution of females recorded
years with males accounting for approximately two thirds of
against different fraud types presents an interesting picture,
frauds each year.
however. On the one hand, the higher than average ˃
The Gender of Fraudsters by Fraud Type 2010* Table 6.2
Fraud Type
Female
Male
Unknown
Asset Conversion Fraud
19%
75%
7%
Application Fraud
33%
66%
2%
False Insurance Claim
27%
70%
4%
Facility Takeover Fraud
37%
61%
2%
Identity Fraud
30%
68%
2%
Misuse of Facility Fraud
23%
70%
7%
* Some percentages may add up to more or less than 100% due to rounding
C I F A S
41
proportion of females associated with facility takeover
Fraudsters fell predominantly into the age groups 21-30
fraud may indicate a greater number of women being
years old and 31-40 years old which together accounted for
targeted in these types of fraud. It is, however, also likely
over half of all frauds recorded in 2010.
to be as a result of more organised criminals carrying out frauds using bulk data obtained through cyber attacks
The information above is based on the data identified by
such as phishing and use of spyware. These types of fraud
Members. In some cases, such as application fraud, this
do not discriminate in terms of the age or gender of the
may not be the actual age of a fraudster but instead it was
victim. They rely on volume instead of specifically targeting
the age given by the fraudster because he or she thought it
individuals who may be perceived as ‘a good victim’ due
was the optimum age needed to obtain a product.
to age or wealth. On the other hand, the higher rate of females recorded against application frauds shows that
Figure 6.2 shows how each type of fraud attracts a different
a significant number of women actually carry out these
age group. There is a greater prevalence of identity fraud
frauds themselves.
and facility takeovers as the age profile increases. This
A
is in line with perceptions that fraudsters are more likely
ge Groups
to target those with ‘good’ credit records who have
The date of birth of an individual connected to a fraud
amassed assets in their name. For those recorded as
was recorded in the majority of cases. In 2010, the average
being in the age group ‘under 21’, the main fraud type was
age of a fraudster recorded on the National Fraud Database
overwhelmingly misuse of facility (64%) with these being
was 38 years old, the same for males and for females.
primarily focused on current accounts. Application frauds show the greatest prevalence among those in the age
Figure 6.1 sets out the breakdown of fraudsters by the age group they were in at the time the fraud was identified.
Age Groups of those Involved in Fraud 2010 Figure 6.1
42
C I F A S
groups ’21-30’ and ’31-40’. ˃
Age Groups by Fraud Type 2010 Figure 6.2
Both asset conversion fraud and misuse of facility fraud were associated with a younger age group. These two fraud types were also dominated by males. While this presents a clear picture of younger men being involved in these types of fraud, the reasons why could be varied. It could be that these frauds appear on the surface to provide a quick short term gain for little effort, or it could be that some people in this group simply turned a blind eye to their account being used for fraudulent purposes. It could also be that some people did not realise that what they saw as acquiring something for nothing was in fact committing fraud. ●
C I F A S
43
For further information, please contact our Research Manager and the Communications Team CIFAS 6th Floor, Lynton House 7-12 Tavistock Square London WC1H 9LT
[email protected]
C I F A S The UK’s Fraud Prevention Service
CIFAS - The UK’s Fraud Prevention Service 6th Floor, Lynton House 7-12 Tavistock Square London WC1H 9LT www.cifas.org.uk CIFAS - A company limited by Guarantee. Registered in England and Wales No.2584687 at 6th Floor, Lynton House, 7-12 Tavistock Square, London WC1H 9LT