/
Suspicious Activity Reporting System (SARS)  and Identity theft Suspicious Activity Reporting System (SARS)  and Identity theft

Suspicious Activity Reporting System (SARS) and Identity theft - PowerPoint Presentation

pamella-moone
pamella-moone . @pamella-moone
Follow
347 views
Uploaded On 2019-11-30

Suspicious Activity Reporting System (SARS) and Identity theft - PPT Presentation

Suspicious Activity Reporting System SARS and Identity theft Peoples Home Equity Inc December 2013 What is SARs A suspicious activity report or SAR is a report made by a financial institution to the Financial Crimes Enforcement Network FinCEN an agency of the US Dept of the Treasury ID: 768645

activity fraud customer loan fraud activity loan customer suspicious sars mortgage report information credit theft sar identity red incidents

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Suspicious Activity Reporting System (SA..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Suspicious Activity Reporting System (SARS) and Identity theft Peoples Home Equity, Inc. December 2013

What is SARs?A “suspicious activity report” or SAR is a report made by a financial institution to the Financial Crimes Enforcement Network (FinCEN), an agency of the US Dept. of the Treasury. The goal of SAR filings is to help the federal government identify individuals, groups or organizations involved in fraud, terrorist financing, money laundering, and other crimes. PHE employees involved in the origination, underwriting, and closing/funding processes are required to file a SARs upon discovery of suspicious activity.

Filing a SARsFinCEN requires a SAR to be filed when we notice a suspicious incident or suspected violations of law subject to the Bank Secrecy Act (BSA).Each SAR must be filed within 30days of the initial determination of suspicious activity. PHE must maintain our SARs filings for a period of 5years from the date of the filing.

Confidentiality of SARs filingYou are prohibited from discussing your SARs filing with anyone. It is required to be only between yourself and our SARs Administrator, Brian Dutton. Unauthorized disclosure of a SAR filing is a federal criminal offense.PHE and its employees face civil & criminal penalties for failing to properly file SARs; including a large combination of fines, regulatory restrictions, cease & desist order, or imprisonment.

SARs filing options5 sections to complete containing info about the individual/organization of the suspicious activity in question.Part 1 – PHE’s name, address, tax ID#, location of the activity, and any account numbers involved in the activity. Part 2 – Any name, address, SSN or tax ID’s, birth date, drivers license#, passport#, occupation and phone#’s of all parties involved with the activity.

SARs filing optionsPart 3 – the Date range of the activity, total dollar amount and a list of any law enforcement agency that has been contacted while investigating the activity. Part 4 – contains the contact information of PHE’s SAR Administrator; Brian Dutton, 5205 Maryland Way, Suite 100, Brentwood, TN 37027. PH: 865-934-1414 or bkdutton@peopleshomeequity.com. Part 5 – a written description of the activity.

Who conducts fraud?1st place = Employees 2nd place = Customer3 rd place = Broker or Brokering Agent4th place = An Officer of the institution 8 th place = Appraiser 10 th place = Attorney

What is mortgage loan fraud?Mortgage loan fraud is when someone engages in submitting misrepresentations of customer income, employment, credit, occupancy and other requirements; submission of improper gift letters; unduly influencing appraisers to increase values; misrepresenting equity and other information to the underwriting team. Loan Officers were often identified as employees in these activities.

What is mortgage loan fraud?Some accountants/customers committed fraud by providing false financial or occupancy information with their loan application. Altered or falsified CPA Letters – where either the CPA, the customer, or someone else altered the document.Fraud by accountants or CPAs include loan modification, debt elimination or short sale fraud schemes in cases of pending foreclosure. Fraud tax letters stating the customer had self-employment income and owned their own business. Fraudulent tax returns were prepared with the knowledge that they were not intended to be filed with the IRS.

Types of activity to report SARsElder financial exploitation – perpetrated by a relative or caregiver against elderly victims. Coercing or cajoling the victim into gaining access to financial accounts and/or power of attorney over the victims accounts. Abuse involves forgery, check fraud, suspicious documents or ID presented, wire fraud, embezzlement/theft, and mail fraud. Often involves the sweetheart scam as described below. Sweetheart scam – involves the fraudster feigning romantic intentions toward a victim, gaining their trust and affection to where the financial accounts and/or identity security are at risk. Most victims are unwilling to charge fraud against the perpetrator or others on the perpetrator’s behalf.

Types of activity to report SARsInsider abuse – involving relatives or friends of current or former employees, or third-party vendors who commit documentation fraud to improve the creditworthiness of a borrower. Examples: Accountant, Appraiser, Attorney, Borrower, Broker, Real Estate Agent, etc. Occupancy fraud – some borrowers commit mortgage loan fraud by providing false occupancy information with their loan application. Better rates/LTV limits are available for owner- occ vs. investment properties.

Types of activity to report SARsIdentity fraud – in one instance a cash-out 2nd lien was applied for by a married couple. When the closing occurred the husband was wrapped head to mid-waist (including hands) in gauze. The closing agent could not verify his identity, only seeing his eyes, and became suspicious. She excused herself to make copies of the ID’s presented, taking the loan file with her, and called the husband’s work to discover he was still at work and had no knowledge of the loan being applied for. The police were notified and it was discovered the wife and her ‘boyfriend’ were using the 2 nd lien funds to take a trip to the tropics.

Types of activity to report SARsAssets fraud – in one instance a VOD was received and appeared to have been altered. The current balance amount seemed to have changed to a larger amount by inserting a “1” between the $ sign and the actual amount. When the bank was contacted to verify the amount they listed on the VOD form, they confirmed the amount was different from what they submitted to the Broker. It was changed so the customer could qualify for their loan requiring 6mos PITI.

Types of activity to report SARsAssets fraud – in another instance on a Purchase loan the customer was using $50,000 down payment from the sale of their home. The HUD-1 from that sale showed the funds were sufficient, however, the customer only deposited $25,000 into their bank account and placed the remaining $25,000 cash into their safe at home. When sourcing the funds they provided a photo of the cash in their safe for the $25k, along with a bank statement for the remaining $25k deposited amount. Because PHE cannot confirm where the cash amount came from, even though it seems likely that it was from the sale proceeds, it becomes a suspicious incident for filing a SAR. FinCEN representatives said PHE should file a SAR.

Types of activity to report SARsIdentity fraud – in one instance a customer meets face-to-face with a loan officer to pre-qualify themselves for a mortgage loan. The loan officer pulls a credit report that returns an unacceptable result due to SSN validation. The customer then pulls out another SSN card and says to use a different SSN to order credit under his same name. Because a customer cannot have different or multiple SSNs this is a classic case of ID theft and the LO is required to file a SARs.

Types of activity to report SARsIdentity fraud – in one another instance a 2year previous customer came back to PHE for repeat business. The LO copied the previous loan and signed up the customer without re-verifying any possible changed information; the customer signed how they were prepared. During the UW process it was discovered the ID had a different last name for the customer and had been recently been issued within the last 6mos. Investigations showed the customer had divorced within the year and had changed back to her maiden name. When the new re- apped package was signed it was further discovered that the customer signature was “entirely” different than those on the recent package. No similarities between the 2 signatures at all. When questioned, the customer stated that when she changed her name she also changed her signature. Although the explanation sounded reasonable, PHE still could not verify the correct identity and filed a SARs.

Types of activity to report SARsSeller fraud – in one instance the HUD-1 from a Purchase transaction reflected 2 mortgage loan payoffs on the seller side. There was only 1 mortgage listed on the title commitment for $800,000. The payoff amount for the 2 nd payoff was for an even dollar amount, $300,000. The title agency refused to insure over an un-recorded 2 nd lien, and further discovered the disbursement agent was in on the seller scheme and split the $300k between 5 other fraudsters (including herself) when disbursement verification was requested. A SARs was filed by Closing/Funding.

The 5 W’s to the SAR narrativeWHO: is conducting the suspicious activity?WHAT: instruments or mechanisms are being used to identify the suspicious activity? WHEN: did the suspicious activity take place?WHERE: did the suspicious activity take place?WHY: does the SARs filer think the activity is suspicious?

The HOW to the SAR narrativeHOW: did the suspicious activity occur?This is an important feature of a SAR narrative. The narrative section of the SAR should describe the method of operation of the conducted suspicious activity. In a concise, accurate, and logical manner, the SARs filer should provide a description of how the suspect transaction or pattern of transactions were committed. Avoid long ramblings. But the narrative should offer a full picture of the suspicious activity.

Triggering EventsFinCEN has made it clear that certain triggering events constitute the appearance of mortgage loan fraud. Perpetrators seem to invent new scams all the time. Some salient schemes are listed next.Some Documentation Red Flags are listed.Red Flags do not only pertain to the document process but also extend to the way a customer or loan officer behaves.

Salient SchemesOccupancy FraudIncome Fraud Appraisal FraudEmployment FraudLiability Fraud Debt EliminationForeclosure RescueSSN / ID TheftHECM Fraud – reverse mortgage fraud to acquire taking title to a home.

Document Red FlagsCustomer submits invalid documents to cancel mortgage obligations or to payoff loan balances.Some notary public prepares, signs, and sends packages of nearly identical debt elimination documents for multiple customers with outstanding mortgage balances. Some notary public works with and/or receives payments from unusually large numbers of customers.

Document Red FlagsFalsification of certified checks, cashier’s checks drawn against customer’s account, rather than from the account of a financial institution. Customer applies for a “primary residence” loan but does not reside in the new residence as indicated on the loan application; instead it is being used as a 2nd home or investment property. Customer of a younger age purchases a “primary residence” in a senior citizen residential development.

Document Red FlagsLow appraisal values, non-arm’s length relationships between short sale buyers and sellers, or previous fraudulent sale attempts in short-sale transactions. Agent of the buyer and/or seller in mortgage transaction is unlicensed.Customer reluctance to provide more information and/or unfulfilled promises to provide it. Apparent resubmission of a rejected loan application with key applicant details changed or modified.

Document Red FlagsRequest from 3rd party affiliates on behalf of distressed homeowners to pay fees in advance of the homeowner receiving mortgage counseling, foreclosure avoidance, a loan modification, or other related services. 3rd party solicitation of distressed homeowners for purported mortgage counseling services may claim to be associated with legitimate mortgage lenders, the US government, or a US government program.

Applicant Red FlagsAppears nervous for no good reason.Avoids eye contact. Asks about reporting rules.Asks that rules be “bent.”Questionable source of funds. “Forgot” drivers license claim, lost due to drunk driving, or had wallet/purse stolen.Drivers license is outdated or picture is smudged beyond recognition.Comes in just before closing and asks for ‘paper work’ to be skipped. Is impatient and tries to hurry.

Applicant Red FlagsOffers a cash bonus (aka ‘bribe’) for skipping required information.Pretends to be sick or very tired and just ‘wants to get the application over with.’ Provides incomplete or suspicious information.Behaves abnormal or irregular. Claims the application is for a friend and does not have the required information.Lists funds that are inconsistent with the customers financial or economic situation.Causes suspicion of attempting a straw buyer transaction. Elicits suspicion of structuring. Provides apparent fraudulent documentation.

Loan Officer Red FlagsAlmost never takes a vacation.Does not want supervisory personnel to see or be aware of transactions with an applicant. Behavior changes to secretive with certain applicants.Whispers with certain applicants. Asks certain applicants to come back later when nobody is in the office.Acts guilty. (Whatever that means!)Lives beyond means.

Q3 2013 Fraud Hot SpotsThe 10 highest overall mortgage fraud risks areas in the United States:1 Fayetteville-Springdale-Rogers, AR-MO 2 San Francisco-Oakland-Fremont, CA3 Los Angeles-Long Beach-Santa Ana, CA 4 San Diego-Carlsbad-San Marcos, CA5 Modesto, CA6 Miami-Ft Lauderdale-Pompano Beach, FL7 San Jose-Sunnyvale-Santa Clara, CA 8 Bakersfield, CA 9 San Luis Obispo-Paso Robles, CA 10 Tulsa, OK

Q3 2013 Fraud Hot SpotsThe 10 highest ZIP code fraud risks areas in the United States:1 Hercules, CA 94547, 362 incidents 2 Rogers, AR 72756, 358 incidents 3 La Jolla, CA 92037, 357 incidents 4 San Jose, CA 95111, 348 incidents 5 San Diego, CA 92127, 343 incidents 6 Downey, CA 90240, 336 incidents 7 Harbor City, CA 90710, 330 incidents 8 Alhambra, CA 91801, 317 incidents 9 Joliet, IL 60435, 317 incidents 10 San Mateo, CA 94403, 307 incidents

Q3 2013 Mortgage Fraud TypesThe chart below shows the changes in overall risk from Q2 2013 to Q3 2013. Large increases were discovered in Identity / Occupancy, while a large decrease is seen in Employment / Income fraud risks.

Identity Theft Prevention The moment you give your personal information to another entity – a bank, the DMV, or even a medical provider – you give up control over that information and how it might be used. We can’t control what happens when we willingly share our information with a company or with friends.Short of hiding in a closet and using cash only for purchases, every person is at risk of identity theft.

ID Theft signsThere are several things people do everyday that makes it easier for thieves to steal their identities: Giving personal info to those who call or email youPost personal info on social media sitesCarry your SSN card in your wallet Access the internet over public/insecure Wi-Fi networksThrow away mail, checks or financial docs intactLeave outgoing mail in your mailbox Let online retailers save your credit card number

What is ID Theft used for?Financial fraudIncludes bank fraud, credit card fraud, social program fraud, tax refund fraud, mail fraud, etc. Typically used to fund a criminal enterpriseFinancial fraud is investigated by the U.S. Secret Service Criminal activitiesTaking someone’s identity in order to commit a crime, enter a country, get special permits, hide one’s own identity, or commit an act of terrorismCan include: computer/cyber crimes, organized crime, drug trafficking, alien smuggling, and money laundering

ID Theft victims get their life backID Theft Victim To Do List; take your life back in 7 steps (website: http://www.idhijack.com) 1) contact the credit bureaus; ask that they issue a fraud alert and attach a statement to your credit report, get copies from the 3 credit bureaus ( TransUnion, Equifax, and Experian)2) review your credit reports thoroughly ; look for accounts you didn’t apply for or open, inquiries you didn’t initiate, or defaults and delinquencies you didn’t cause 3) file a report with your local police or in the community where the ID theft took place; keep a copy of the police report

ID Theft victims get their life back4) fill out an ID theft victim’s complaint and affidavit form; available from the FTC at www.ftc.gov/idtheft 5) close any accounts that have been accessed fraudulently; contact all creditors, including banks, credit card companies, and other service providers where your accounts have been compromised 6) stop payment on checks; if a thief stole checks or opened bank accounts in your name, contact a major check verification company to report the fraud activity7) contact the local postal inspector; if you believe someone has changed your address through the post office or has committed mail fraud, ask the postmaster to forward all mail in your name to your own address

Other ways to protect your IDMonitor your credit annuallyRequest fraud alerts from the 3 credit bureaus Opt out of junk mail / internal marketing listsUse a P.O. BoxSmall box costs around $5 rangeFreeze your creditFreezing/unfreezing costs around $10 range

Hacked/Phished ID TheftTo Do List when computer is hacked or phishedChange all passwords Run anti-spyware and anti-virusClear out private info in your browsersClear out sensitive data from Temp folder Close online accounts

Contacting 3 credit bureausEquifax Credit Information Services - Consumer Fraud Div. P.O. Box 105496Atlanta, Georgia 30348-5496 Tel: (800) 997-2493www.equifax.comExperianP.O. Box 2104 Allen, Texas 75013-2104 Tel: (888) EXPERIAN (397-3742) www.experian.com TransUnion Fraud Victim Assistance Dept. P.O. Box 390 Springfield, PA 19064-0390 Tel: (800) 680-7289 www.transunion.com

Prosecuting ID TheftReporting to the FTCConsumer Response Center Federal Trade Commission600 Pennsylvania Ave, NWWashington, DC 20580 Toll-free 877-FTC-HELP (382-4357)On the Web: www.ftc.gov/ftc/complaint.htm For consumer information: www.ftc.gov/ftc/consumer.htm

What will PHE do?If a customers personal information becomes compromised at PHE, we will enroll each customer into monitoring services for a period of 24-months to help track changes to their identity, credit, and/or account information. Staff training and reportingPHE employees are trained to detect and respond to Red Flags. Report any incident of ID theft to the Compliance Committee at 615-872-0220 x603 or compliance@peopleshomeequity.com

Thank You!When filing a SARs it must be filed using the attached fillable PDF form.Questions? File your SARs with the SAR Administrator, Brian Dutton, 865-934-1414 or bkdutton@peopleshomeequity.com Report any incident of ID theft to the Compliance Committee at 615-872-0220 x603 or compliance@peopleshomeequity.com