How the wheels came off the Wells Fargo stagecoach
Read Time: 15 mins
Written By:
E. Scott Reckard
Theodore Swaggen was above reproach. This eight-year employee of a major Midwest bank, had won the trust of his coworkers and supervisors. But as the supervisor of the bank's wire transfer room, Swaggen handled ridiculous sums of money. He decided it was time to get his hands on some of it, $68.7 million to be exact.
Aided by a gang of outside accomplices and a few secret bank codes, Swaggen* planned the crime for a month and executed it in an hour. He transferred money from the accounts of major U.S. corporations to bank accounts that his co-conspirators had set up under assumed names at two banks in Vienna, Austria. But, fortunately, before the perpetrators could collect the loot, the bank discovered the fraud and put a stop payment on all electronic funds transfers (EFTs or more commonly called wire transfers). The embezzlers came tantalizingly close to succeeding and showed how vulnerable banks and their vast computerized cash movement networks can be to a dishonest insider.
EFTs are used by banks to move more than $1 trillion in funds around the globe each week and the amount is rising. Because of the large volume processed through
EFT systems, they are a prime target for fraud perpetrators wanting an immediate, enormous source of money.
Therefore, EFT systems are high risk and should receive the highest priority for security measures. As these FBI statistics show, more dollars change hands with EFTs than any other method but only make up a slight percentage of total transactions:
| Transactions | ||
| Category | Number | Dollars |
| Cash | 80 percent | 5 percent |
| Check | 18 percent | 12 percent |
| EFT | 2 percent | 83 percent |
The volume of EFTs continues to grow as more companies use this medium to conduct business.
When a corporation transfers funds from its account, they contact its bank's wire room by telephone. The bank initiates a predetermined call-back system (using various code numbers) to a designated executive at the company to verify authorization for the transaction. All calls are automatically taped. In the Swaggen case, he had access to the codes and knew the names of the appropriate executives at the various corporations used in his scheme.
The gang originally planned to steal $232 million from the accounts of quite a few companies. However, they never got that far. On the appointed day (Friday, May 13), the co-conspirators called other wire-room employees in Swaggen's bank to request that EFT transactions be processed from the target corporations to the designated fraudulent bank accounts. The wire room employees processed the transactions to Swaggen who was responsible for the bank's call-back procedures. But instead of calling the indicated corporations, he called his co-conspirators outside the bank at predetermined telephone numbers. These individuals then pretended to make the telephone conversations sound like they were EFT confirmations. Once they falsely obtained approvals for these transactions, the transfers were initiated. The scheme collapsed when one of the corporations being used in the scheme didn't have sufficient funds in its bank account to cover the EFT transaction; it bounced just like a non-sufficient funds check. Swaggen's bank then reversed the "irregular" EFT transactions and the perpetrators received nothing but hefty jail time.
When fraudsters use the EFT banking system to divert funds to personal use by sending vast sums of money from U.S. banks to overseas banks, chagrined bank managers often find these internal control weaknesses:
The following presentation describes a relatively simple computer software system that companies often use to process investment transactions by EFT. The software belongs to the bank, and access to the system is via a telephone modem through a personal computer or public telephone. Following are some of the internal controls designed to keep fraudsters out of the company's EFT activity:
If you're in the banking business, you could receive the following teletype, which undoubtedly would cause a wave of panic, dismay, and alarm:
FROM: ANOTHER BANK TO: YOUR BANK
MR. SMITH LEFT YOUR BANK IN 1989 TO JOIN US AS A SENIOR PROGRAMMER. YOU WILL RECALL YOU GAVE HIM AN EXCELLENT REFERENCE. YOU WILL THEREFORE BE SURPRISED TO HEAR THAT MR. SMITH WAS ARRESTED LAST WEEK FOR DEFRAUDING OUR BANK OF $5 MILLION. DURING INTERVIEWS HE ADMITTED USING THE SOFTWARE UTILITY "DOTTO" TO CHANGE THE BALANCES ON FILES AND TO DIVERT AND ROLL OVER PAYMENT INSTRUCTIONS. HE ALSO SAID THAT HE USED THE SAME METHOD OF FRAUD AT YOUR BANK AND GOT AWAY WITH AT LEAST $2 MILLION. HE HAS REFUSED TO ELABORATE FURTHER. WE THOUGHT YOU WOULD LIKE TO KNOW.
BEST REGARDS, JOHN JONES, DIRECTOR OF AUDIT
The immediate questions which arise are: a) Could you reconstruct the programs Mr. Smith had access to and worked on while employed at the bank? b) Could you trace his concealment activities? (c) Could you develop evidence to prove or disprove this confession? d) What would you say to the board of directors, shareholders, and investors? e) What security improvements would you put in place immediately?
Red Flags for EFTs
Detection of EFT Fraud
Company electronic funds transfers are ordinary and routine. But because huge amounts of money are handled every day, EFT transactions are prime targets for fraudsters and should receive the highest priority for security measures.
*The fraudster's name has been changed.
Joseph R. Dervaes, CFE, Association of Certified Fraud Examiners Fellow, CIA, is director of special investigations with the Washington State's Auditor's Office. He is chairman of the Association's Board of Regents, and the Association's first recipient of the Fellow status.
References
A market coordinator for a Midwest oil company stole $473,541 by processing two EFT transactions in the company's oil margin accounts in an 11-month period. These transactions transferred funds from the company's margin account (managed by a broker in New York) to the market coordinator's failing business, a non-alcoholic dance club for teenagers in San Antonio, Texas. The couple also bought three cars for cash.
Segregation of duties was the major cause of this loss but this internal control problem was compounded by a lack of independent authorization of any unusual account transactions. Only the market coordinator had access to the margin accounts and no one reconciled the accounts.
The broker handling the margin account had never received a list of the authorized bank accounts for routine transfers from the account, and didn't use call-back procedures to verify transactions. The market coordinator managed six margin accounts, and told the broker that the dance club was a company subsidiary.
A thorough investigation proved the existence of only two irregular EFT transactions in one margin account. The documents associated with these two transactions were falsified, and margin account statements were altered in an attempt to conceal the loss. Letters of authorization for the fraudulent EFT transactions were sent from the company to the margin account broker by facsimile machine. These letters were "cut and pasted" by the market coordinator to obtain the signatures of other company officials needed to authorize and approve the transactions. The first fictitious transaction occurred two weeks after the margin account was opened.
An audit found the margin accounts in disarray (by design), and recommended that they be independently reconciled by the accounting department. The accounting department pressured the market coordinator to resign. Subsequent reconciliation of the accounts revealed the two irregular EFT transactions. The market coordinator was charged with two counts each of mail and wire fraud for the two facsimile and EFT transactions involved in this case, promptly confessed and was sentenced to five years in prison, five years probation, and full restitution.
Her husband said that he thought the money came from his wife's family inheritance and plead innocent to conspiracy charges. However, he had no credibility with the jury, and was sentenced to four years in prison as a co-conspirator for his participation in the proceeds and money laundering.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 15 mins
Written By:
E. Scott Reckard
Read Time: 8 mins
Written By:
Jim Bracken
Read Time: 11 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Adrian Harrington
Read Time: 15 mins
Written By:
E. Scott Reckard
Read Time: 8 mins
Written By:
Jim Bracken
Read Time: 11 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Adrian Harrington