<img src="https://secure.hall3hook.com/198388.png" alt="" style="display:none;">

Fraud Prevention Blog

Why All Businesses Should Take Heed of the 7-Eleven ICE Raid

Posted by Stephanie Cho on Mon, Jan 29, 2018 @ 01:01 PM

If you are in noncompliance with Form I-9 requirements, your business could pay a rather hefty penalty.

Topics: regulatory compliance, I-9 compliance, Employee Verification, identity verification, identity authentication

Organized Retail Crime Prevention - Know Your Employees

Posted by Sean Trundy on Thu, Mar 22, 2012 @ 09:41 AM

At the heart of many acts of fraud lies the intentional misrepresentation of identity.  When ORC crime rings are attempting to infiltrate your company with “inside” employees, often the first, best step to take to prevent this from happening is to authenticate the ID document(s) presented by the individual.

Topics: I-9 compliance, ID Verification, organized retail crime

How ID Authentication can help the war against terrorism

Posted by Sean Trundy on Thu, Jan 26, 2012 @ 08:50 AM

The world has changed much since September 11, 2001.  Awareness of how fragile our way of life can be, what steps must be taken to protect it and what might happen if we don't, is now a constant part of our national psyche.  It is probably safe to say that while the degree of American military involvement overseas may fluctuate with the times and conditions, the War on Terror at home likely will not.  Although anti-terrorism efforts are focused on potential overt acts of violence by international terrorist groups, it is specter of domestic covert acts intended to generate funding for terrorism that is at the forefront of our national security efforts. 

The Patriot Act expanded the concept of terrorism to include domestic terrorism.  The Act states, in pertinent part: 
(5) the term `domestic terrorism' means activities that--
`(A) involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State;
`(B) appear to be intended--
`(i) to intimidate or coerce a civilian population;
`(ii) to influence the policy of a government by intimidation or coercion; or
`(iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and
`(C) occur primarily within the territorial jurisdiction of the United States.'.
Detecting activities intended to finance terrorism is extremely difficult.  Financial institutions are not expected to distinguish terrorist financing from other criminal misuse of the financial system.  They are, however, tasked with ascertaining whether any transactions are suspicious, either because they are unusual or, by their very nature, are indicative of potential criminal activity.  

Money laundering is at the heart of most illegal financial transactions and is made possible through the use of identity theft.  Many measures have been enacted to require financial institutions and other businesses to detect and assist the U.S. government in preventing money laundering.  These include, among others, the Bank Secrecy Act, regulations from the Office of Foreign Assets Control, the Know Your Customer Act, the Fair and Accurate Credit Transactions Act and the Red Flags Rule developed by the FTC. 

Underlying these statutes, regulations and rules is the basic concept of identifying the person who attempts to conduct a financial transaction (e.g., a wire transfer, purchase of a money order, opening a new account, etc.) with the intention of ultimately funding terrorism or other criminal activity.  Because identifying the person suspected of engaging in such activity is paramount to any criminal investigation, priority is placed on identity verification. 

There are many identity verification tools available.  The Fraud Fighter™ line of identity authentication equipment provides the degree of technological sophistication and effectiveness necessary to ensure compliance with the laws pertaining to the monitoring of financial transactions and identity verification.Id Authentication Whitepaper   

Modeled on the same concepts used to secure IT networks from intrusion, Fraud Fighter™ will optimize organizations' regulatory compliance framework by helping structure an intelligently "layered" approach to the problem. "Layering", in this context, means targetting the appropriate level of technology at the appropriate level of threat. So, for those areas where risk exposure is minimal, lower end (and less expensive) equipment can be utilized, while higher risk activities are equipped with the higher-end, most technolgically advanced soutions.

Topics: verification of ID, I-9 compliance, Employee Verification, authenticating drivers licenses, authenticating driver's licenses, counterfeit ID, ID Verification

A New Chinese Counterfeit Problem: Fake Driver Licenses

Posted by Sean Trundy on Thu, Aug 11, 2011 @ 11:39 AM

As if it weren’t already difficult enough to verify identity documents, now comes a new wrinkle in the game – high-quality counterfeit driver licenses produced by overseas factories.

Topics: identity theft, I-9 compliance, Employee Verification, bank secrecy act, authenticating driver's licenses, counterfeit ID

Proper I-9 Employment Verification - Beyond “Good Faith”

Posted by Sean Trundy on Tue, Jul 13, 2010 @ 02:00 PM

There’s a lot of semantic debate these days over what to name foreign nationals who violate U.S. immigration policies and national laws – whether you call them illegal immigrants, illegal aliens or undocumented workers, it comes down to the same thing at the end of the day for every business: hire them, and you’ll pay big fines if detected. Though the majority of U.S. companies do not intend to violate immigration laws; in fact, more compliance violations occur from nonexistent or simple lazy I-9 verification than intentionally shady hiring practices. Breaking the law is easily accomplished if you’re not properly prepared; the bottom line is this –

Topics: regulatory compliance, I-9 compliance, Employee Verification, fraud prevention