"identifying financial exploitation and protecting assets" by

38
Identifying Financial Identifying Financial Exploitation Exploitation & Protecting Assets & Protecting Assets Separating the Wheat from the Chaff Separating the Wheat from the Chaff

Upload: tomwinfrey

Post on 20-Jun-2015

183 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: "Identifying Financial Exploitation and Protecting Assets" by

Identifying Financial ExploitationIdentifying Financial Exploitation& Protecting Assets& Protecting Assets

Separating the Wheat from the ChaffSeparating the Wheat from the Chaff

Page 2: "Identifying Financial Exploitation and Protecting Assets" by

Presented byPresented by

Roger CoventryRoger Coventry

Financial Exploitation InvestigatorFinancial Exploitation Investigator

Maricopa County Public FiduciaryMaricopa County Public Fiduciary

Page 3: "Identifying Financial Exploitation and Protecting Assets" by

Training ObjectivesTraining Objectives

Be able to locate pertinent account Be able to locate pertinent account informationinformation

Be able to highlight “red flag” Be able to highlight “red flag” transactionstransactions

Be able to identify “at risk” assets Be able to identify “at risk” assets and take steps to protect themand take steps to protect them

Page 4: "Identifying Financial Exploitation and Protecting Assets" by

I don’t even balance my own checkbook…I don’t even balance my own checkbook…

How am I going to detect financial How am I going to detect financial exploitation?exploitation?

Page 5: "Identifying Financial Exploitation and Protecting Assets" by

DefinitionsDefinitions

ExploitationExploitation financial abuse of individuals by the repeated improper or

illegal use of their assets. taking unfair advantage of an adult's financial resources for

another individual's personal or financial advantage by the use of undue influence, coercion, harassment, duress, deception,

false representation or false pretense by a caretaker. . Fiduciary AbuseFiduciary Abuse

a situation in which any person who is the caretaker of, or who stands in a position of trust to, an adult, takes, secretes, or appropriates their money or property, to any use or purpose not in the due and lawful execution of such person's trust.

Page 6: "Identifying Financial Exploitation and Protecting Assets" by

What Are the Signs of What Are the Signs of Financial Exploitation?Financial Exploitation?

THEFT AHEAD

FORGERY Right 3 Miles

EXTORTION Next Left

Page 7: "Identifying Financial Exploitation and Protecting Assets" by

Exhibiting disparity between income, assets and lifestyle

Behaviors and Conditions That Behaviors and Conditions That Indicate Financial ExploitationIndicate Financial Exploitation

Exploiter works here part-time Yet...

Page 8: "Identifying Financial Exploitation and Protecting Assets" by

Unexplained, or sudden inability to pay bills, purchase food, or personal care items

Behaviors and Conditions That Behaviors and Conditions That Indicate Financial ExploitationIndicate Financial Exploitation

Page 9: "Identifying Financial Exploitation and Protecting Assets" by

Inaccurate, confused, or no knowledge of finances

Behaviors and Conditions That Behaviors and Conditions That Indicate Financial ExploitationIndicate Financial Exploitation

Page 10: "Identifying Financial Exploitation and Protecting Assets" by

Fear or anxiety when discussing finances

Behaviors and Conditions That Behaviors and Conditions That Indicate Financial ExploitationIndicate Financial Exploitation

Page 11: "Identifying Financial Exploitation and Protecting Assets" by

Unprecedented transfer of assets from an older person to others

Behaviors and Conditions That Behaviors and Conditions That Indicate Financial ExploitationIndicate Financial Exploitation

Page 12: "Identifying Financial Exploitation and Protecting Assets" by

Behaviors and Conditions That Behaviors and Conditions That Indicate Financial ExploitationIndicate Financial Exploitation

Extraordinary interest by family member of older person’s assets

Page 13: "Identifying Financial Exploitation and Protecting Assets" by

Where Do I Find The Evidence?Where Do I Find The Evidence?

It is in the financial documents!

Page 14: "Identifying Financial Exploitation and Protecting Assets" by

Financial Documents Include...Financial Documents Include...

Bank Statements Contracts Wills Codicils to Wills Trusts Deeds / Deeds of Trust

Page 15: "Identifying Financial Exploitation and Protecting Assets" by

Financial Documents Include...Financial Documents Include...

Stock / Bond Certificates Promissory Notes Tax Returns Titles Power of Attorney Insurance Policies

Page 16: "Identifying Financial Exploitation and Protecting Assets" by

Where Do You Begin?Where Do You Begin?

Page 17: "Identifying Financial Exploitation and Protecting Assets" by

Examine each Statement and Examine each Statement and Highlight the Following:Highlight the Following:

Account Ownership Listing of other accounts Opening Balances Deposits Transfers Name(s) added to accounts

Page 18: "Identifying Financial Exploitation and Protecting Assets" by

Look for Red FlagsLook for Red Flags

Page 19: "Identifying Financial Exploitation and Protecting Assets" by

Red FlagsRed Flags Elder adds friend or relative to Elder adds friend or relative to

account as “joint” account holder account as “joint” account holder

Page 20: "Identifying Financial Exploitation and Protecting Assets" by

Red FlagsRed Flags Sudden Changes in Account ActivitySudden Changes in Account Activity

Page 21: "Identifying Financial Exploitation and Protecting Assets" by

Red FlagsRed Flags Numerous transfers between accountsNumerous transfers between accounts

Page 22: "Identifying Financial Exploitation and Protecting Assets" by

Red FlagsRed Flags

Multiple “cash-back” transactions

Numerous, large cash / ATM withdrawals

Page 23: "Identifying Financial Exploitation and Protecting Assets" by

Red FlagsRed Flags Late payment of utility and other bills

Note: This victim had paid her utilities by automatic withdrawal

Page 24: "Identifying Financial Exploitation and Protecting Assets" by

Red FlagsRed Flags

Unusual purchasesUnusual purchases

Page 25: "Identifying Financial Exploitation and Protecting Assets" by

Red FlagsRed Flags Checks written as “loans” or “gifts”Checks written as “loans” or “gifts”

5,000

Fyve Thowsend

Thanks for the Gift!!!

Nicole Thomas

Page 26: "Identifying Financial Exploitation and Protecting Assets" by

Examine Checkbooks and Examine Checkbooks and Registers For:Registers For:

Check register(s) written in consistently colored ink

Checks written out of order Checks missing from the back of

check book(s) Checks that only have the signature

in the hand-writing of the owner

Page 27: "Identifying Financial Exploitation and Protecting Assets" by

Check For Documentation of Check For Documentation of Other Suspect ActivityOther Suspect Activity

Checks written to persons (not business names) for services

Checks orders sent to a P.O. box Checking and other accounts that

only list the elders social security number for tax reporting

Page 28: "Identifying Financial Exploitation and Protecting Assets" by

Establish What Would be Establish What Would be Considered “Normal” Account Considered “Normal” Account

ActivityActivity

Is there a history of overdrafts? Did the Elder use ATMs / debit cards? Was there a line of credit established

prior to the suspected exploitation? Had the line of credit been used?

Page 29: "Identifying Financial Exploitation and Protecting Assets" by

Systematic ApproachSystematic ApproachMONTH CASH/ATM HIGH BAL.

JAN $20.00 $88,558.00

FEB $0.00 $89,886.37

MAR $0.00 $91,234.67

APR $100.00 $92,503.19

MAY $300.00 $93,490.73

JUN $1,800.00 $92,693.09

JUL $5,000.00 $86,883.49

AUG $7,500.00 $73,486.74

SEP $8,500.00 $51,389.04

OCT $9,650.00 $19,309.88

NOV $13,000.00 $6,599.53

DEC $18,000.00 -$8.15

TOTALS $63,870.00 N / A

Exploiter Realizes “This is easy money”

Expect to see overdrafts and transfers

Create Simple

Spreadsheets for Each Account

for Year-over-Year

Comparison

Page 30: "Identifying Financial Exploitation and Protecting Assets" by

Asset Protection / PreservationAsset Protection / Preservation

Change locks / keys

Account Restrictions

Asset Collection (Close Accounts)

Page 31: "Identifying Financial Exploitation and Protecting Assets" by

Asset Protection / PreservationAsset Protection / Preservation

POA Revocation

Secure Vehicle

Page 32: "Identifying Financial Exploitation and Protecting Assets" by

FREQUENTLY ASKED FREQUENTLY ASKED QUESTIONSQUESTIONS

Q: Q: How can we obtain financial records / documents?How can we obtain financial records / documents?

A: A.R.S. §46-454(E) provides the authority, upon the written request of a peace officer or APS A: A.R.S. §46-454(E) provides the authority, upon the written request of a peace officer or APS worker investigating exploitation, to secure original or copies of medical or financial records. No worker investigating exploitation, to secure original or copies of medical or financial records. No subpoena is necessary.subpoena is necessary.

You can also secure financial documents from the home of the person you suspect is being You can also secure financial documents from the home of the person you suspect is being exploited. It is suggested to get as much documentary evidence as you can, then sort it later. exploited. It is suggested to get as much documentary evidence as you can, then sort it later. Make good copies and return the originals to the source.Make good copies and return the originals to the source.

Note:Note: Consult your department protocol. Consult your department protocol.

Page 33: "Identifying Financial Exploitation and Protecting Assets" by

FREQUENTLY ASKED FREQUENTLY ASKED QUESTIONSQUESTIONS

Q: Q: What if the financial documents are incomplete or do not have What if the financial documents are incomplete or do not have details of the transactions?details of the transactions?

A: When requesting financial documents from any institution ask for “the A: When requesting financial documents from any institution ask for “the most detailed” statements available.most detailed” statements available.

Remember:Remember: The “Big Picture” will probably give you enough The “Big Picture” will probably give you enough information to determine if there has been financial exploitation.information to determine if there has been financial exploitation.

Q: Q: How do I know if checks were written by someone other than How do I know if checks were written by someone other than the owner of the account?the owner of the account?

A: Try to secure various handwriting samples from sources within the A: Try to secure various handwriting samples from sources within the victim’s residence. These can be used as evidence and for victim’s residence. These can be used as evidence and for comparison to a suspect’s handwriting. Secure samples of the comparison to a suspect’s handwriting. Secure samples of the suspects handwriting, if available. suspects handwriting, if available.

Page 34: "Identifying Financial Exploitation and Protecting Assets" by

FREQUENTLY ASKED FREQUENTLY ASKED QUESTIONSQUESTIONS

Q: Q: Is Financial Exploitation just a “Civil” matter?Is Financial Exploitation just a “Civil” matter?

A: Not in most cases. There are usually several criminal violations that could A: Not in most cases. There are usually several criminal violations that could be charged in association with most financial exploitations.be charged in association with most financial exploitations.

Note:Note: Under A.R.S. §46-454, you have the duty to report (make a criminal Under A.R.S. §46-454, you have the duty to report (make a criminal complaint) even if someone tells you that it is not a criminal matter.complaint) even if someone tells you that it is not a criminal matter.

Q: Q: Does a Power of Attorney exempt the exploiter from criminal Does a Power of Attorney exempt the exploiter from criminal or civil liability?or civil liability?

A: A: No. Just the opposite! No. Just the opposite! Under A.R.S. §14-5506 (A) an attorney in Under A.R.S. §14-5506 (A) an attorney in fact must act solely for the benefit of the principal. Any actions that fact must act solely for the benefit of the principal. Any actions that are taken that are not solely for the benefit of the principal must be are taken that are not solely for the benefit of the principal must be specifically identified by the power of attorney and be separately specifically identified by the power of attorney and be separately initialed by the principal and the witness at the time of execution of initialed by the principal and the witness at the time of execution of the instrument. A.R.S. §14-5506 (B). the instrument. A.R.S. §14-5506 (B).

Page 35: "Identifying Financial Exploitation and Protecting Assets" by

FREQUENTLY ASKED FREQUENTLY ASKED QUESTIONSQUESTIONS

Q: Q: The care giver simply asked for money to help pay for her daughters The care giver simply asked for money to help pay for her daughters “emergency surgery.” Is that a crime?“emergency surgery.” Is that a crime?

A: I could be. Did the care giver ask repeatedly? Did they ask in such a way as to make A: I could be. Did the care giver ask repeatedly? Did they ask in such a way as to make the elder person believe that they would be responsible for the daughters the elder person believe that they would be responsible for the daughters complications if the surgery was not done soon? Did the care giver intimidate or complications if the surgery was not done soon? Did the care giver intimidate or badger the elder?badger the elder?

46-456. Duty to an incapacitated or vulnerable adult; financial

exploitation;... (B.) A person who is in a position of trust and confidence and who by intimidation

or deception knowingly takes control, title, use or management of an incapacitated or vulnerable adult's asset or property with the intent to permanently deprive that person of the asset or property is guilty of theft as provided in section 13-1802.

Page 36: "Identifying Financial Exploitation and Protecting Assets" by

RESOURCESRESOURCES

http://www.crimes-of-persuasion.com/index.htm

Crimes of Persuasion.Com

http://www.usss.treas.gov/financial_crimes.shtml

U.S. Secret Service

http://all.net/cybercop/pointers.html

Listing of On-line Crime-fighting Resources

http://www.ckfraud.org/

The National Check Fraud Center

Page 37: "Identifying Financial Exploitation and Protecting Assets" by

RESOURCESRESOURCES

http://bonds.yahoo.com/glossary1.htmlBond Glossary

http://www.investorwords.com/

Investor Glossary

http://www.nysscpa.org/terminologyguide/main.htmAccounting Glossary

Page 38: "Identifying Financial Exploitation and Protecting Assets" by

RESOURCESRESOURCES

Jacque Humphreys--Asst.. Vice President, Wells Fargo BankInvestigative Services Department(520) 792-5333

Michael Lawler--Assistant Vice President, Bank OneInvestigations Project Manager(602) 221-4850

Don Thomas--Vice President, National Bank of ArizonaSecurity / Fraud Manager(602) 212-5529