{"id":18,"date":"2007-02-07T10:12:00","date_gmt":"2007-02-07T15:12:00","guid":{"rendered":"http:\/\/blog.paymentconsulting.net\/?p=18"},"modified":"2007-02-07T10:12:00","modified_gmt":"2007-02-07T15:12:00","slug":"online-brokerage-fraud","status":"publish","type":"post","link":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/?p=18","title":{"rendered":"Online Brokerage Fraud"},"content":{"rendered":"<table align=\"center\" border=\"0\" cellpadding=\"0\" cellspacing=\"0\" width=\"100%\">\n<tbody>\n<tr>\n<td align=\"center\" bgcolor=\"#f5f5f5\" height=\"\" valign=\"middle\" width=\"\"><img decoding=\"async\" src=\"http:\/\/www.transactionworld.com\/images\/articles\/2007\/February\/Fraud.gif\" border=\"0\" \/><\/td>\n<p> <!-- headingImage -->       <\/p>\n<td bgcolor=\"#ffffff\" width=\"1\"><img decoding=\"async\" src=\"http:\/\/www.transactionworld.com\/images\/framework\/spacer.gif\" \/><\/td>\n<td align=\"left\" bgcolor=\"#f5f5f5\" height=\"50\" valign=\"top\" width=\"100%\">\n<div class=\"articleTitle1\">\n<div class=\"articleTitle2\">        Robbery on the Electronic Highway     <\/div>\n<div class=\"aClmHeadOrange\">        ONLINE BROKERAGE FIRMS:     <\/div>\n<div class=\"aClmHeadBlue\">        THE NEWEST TARGET     <\/div>\n<\/p><\/div>\n<p> <!-- articleTitle1 -->       <\/p>\n<hr size=\"1\" width=\"475\">  <!-- Sidebar -->           <\/p>\n<div class=\"articleTitle2\"><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>   <!-- Author --> <\/p>\n<table align=\"center\" border=\"0\" bordercolor=\"#000000\" cellpadding=\"0\" cellspacing=\"0\" width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"2\" bgcolor=\"#000080\" height=\"1\"><\/td>\n<\/tr>\n<tr>\n<td background=\"..\/..\/..\/images\/framework\/article-auth-bar.jpg\" height=\"20\" width=\"400\"><\/td>\n<td align=\"right\" bgcolor=\"#ffffff\">\n<div class=\"blackAuthor\"><i>by Joel <span id=\"misp_compose_4\" class=\"hm\">Rosen<\/span><\/i><\/div>\n<\/td>\n<p> <!-- BY KIETH TAYLOR -->  <\/tr>\n<tr>\n<td colspan=\"2\" bgcolor=\"#000080\" height=\"1\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>   <!-- Content -->                    <\/p>\n<p class=\"columnsgl\">         The age of electronic information, for all of its upside, does have a   downside \u2013 it takes something extremely valuable and turns it into   something incredibly portable.  This makes electronic information not   only the best thing to happen to business since the telephone, it   also makes it the perfect target for thieves.  Information theft,   particularly identity theft, is a fast-growing problem that affects   millions of people around the world.  It takes many forms, from   \u201c<span id=\"misp_compose_5\" class=\"hm\">phishing<\/span>\u201d schemes targeting individuals with online shopping   accounts, to mass information theft from large databases where   sensitive consumer information is stored.  But there\u2019s a new game in   town for information thieves \u2013 a sophisticated fraud scheme that has   been targeting some of the world\u2019s largest online brokerage firms.<br \/>    In recent months, overseas hackers broke into customer accounts at   major U.S. online brokerages and made trades worth millions of   dollars.  <span id=\"misp_compose_6\" class=\"hm\">Ameritrade<\/span> Holding\/TD <span id=\"misp_compose_7\" class=\"hm\">Ameritrade<\/span>, the third largest online   broker, reported that this new form of online fraud cost them $4   million in Q3 2006.  E*Trade Financial Corp, the fourth largest   online broker, reported that fraud losses increased by $18 million in   that same quarter.  Both companies reimbursed customers for losses   despite the fact that brokerage accounts are not protected by the   Federal Deposit Insurance Corporation (FDIC) and other rules that   protect banking customers.  The Federal Bureau of Investigation   (FBI), National Association of Securities Dealers (<span id=\"misp_compose_8\" class=\"hm\">NASD<\/span>) and the U.S.   Securities and Exchange Commission (SEC) are working to determine the   cause of the fraud, which is being classified as a \u201cpump and dump\u201d   scheme \u2013 one of the several increasingly popular information theft   scams, often initiated from locations like Eastern Europe and Thailand.<br \/>    In a pump and dump scheme, information thieves steal passwords for   victims\u2019 online brokerage accounts, then use this information to   purchase stocks using the hijacked accounts.  In recent cases,   thieves purchased a large number of shares of small-cap low-volume   stocks using an existing brokerage account, then liquidated the   assets of the hijacked account and used the proceeds to purchase the   same small-cap stocks.  This drove up the price of the original   shares so that the thieves made a profit when they sold the   previously purchased stock.  Not only was this very profitable for   the thieves, it was a clean theft since the stock market essentially   laundered the proceeds.  In addition, pump and dump schemes may go   unnoticed at the brokerage firms because funds are not withdrawn;   they\u2019re used to purchase stocks.<br \/>    Regulators say they\u2019<span id=\"misp_compose_9\" class=\"hm\">ve<\/span> seen an increase in pump and dump schemes over   the last few months, along with another type of brokerage scam where   thieves fraudulently obtain a customer\u2019s log-in credentials,   liquidate the account and wire the proceeds to offshore banks.<br \/>    The experts believe that in recent cases, the passwords were acquired   by installing keystroke-logging software on public-access computers,   located at Internet <span id=\"misp_compose_10\" class=\"hm\">caf\u00e9s<\/span> or hotels, or by tricking users into   installing keystroke-logging software on their own computers.  Once   the software was installed, the thieves waited until the user typed   their user name and password.  The software then sent the information   to the thieves via the Internet.<br \/>    Thieves are also obtaining passwords and other sensitive personal   information by using \u201cscreen-scraping\u201d software.  This technology   captures whatever is on the screen and sends it to the perpetrator.    \u201c<span id=\"misp_compose_11\" class=\"hm\">Phishing<\/span>\u201d is another popular method for obtaining account   information.  It uses e-mails that appear to be from trusted   institutions to get users to visit bogus Web sites, where they are   encouraged to log in, thus revealing sensitive information.  Thieves   will also use <span id=\"misp_compose_12\" class=\"hm\">phishing<\/span> scams to encourage people to unknowingly   download keystroke-logging software.<br \/>    With the number of incidents rising over the last year, it\u2019s clear   that this problem is only getting worse.  At an industry conference   in Phoenix on October 5, John Walsh, chief counsel in the SEC\u2019s   office of compliance inspections and examinations, publicly   recognized this growing trend and acknowledged that hackers\u2019 attacks   have grown in sophistication.<br \/>    While brokerage firms are responsible for protecting the sensitive   information in their care, some of the responsibility for keeping   personal account information safe lies with consumers.  According to   John Gannon, vice president of investor education for the <span id=\"misp_compose_13\" class=\"hm\">NASD<\/span>,   consumers should be monitoring their accounts for any unauthorized   trades.  It\u2019s likely that consumers will start feeling some of the   heat generated by these fast-growing crimes as the industry may be   looking to consumers to share the burden of protecting their   sensitive information.<br \/>    There are several things consumers can do to help keep thieves out of   their online accounts.  The SEC has published a guide called Online   Brokerage Accounts: What you Can Do to Safeguard Your Money and Your   Personal Information.  You can find it online at www.sec.gov\/investor\/  pubs\/ <span id=\"misp_compose_14\" class=\"hm\">onlinebrokerage<\/span>.<span id=\"misp_compose_15\" class=\"hm\">htm<\/span>.  This guide provides helpful information on   scams and how to avoid them, and includes tips on how to protect   yourself online and how to know if your identity has been stolen.<br \/>    But while consumers are the first line of defense, they are not the   only factor in preventing online fraud.  Although the online   brokerage firms have demonstrated exemplary behavior towards their   customers over the last few months \u2013 reimbursing them for the losses   they incurred \u2013 it\u2019s obvious from the attacks that the fraud   monitoring systems that these firms have in place can be circumvented.<br \/>    Fortunately, there are a host of security technologies, including new   data activity monitoring and behavioral analysis solutions, that can   be added to the lines of defense already in place at many firms to   identify suspicious activity.  It\u2019s safe to say that reputable online   brokerage firms will do everything in their power to avoid future   mishaps.  Breaches such as these are very expensive.  Beyond the   obvious losses they incur when they reimburse millions of dollars to   customers affected by fraud, this is also a customer-retention and a   brand equity issue.<br \/>    Ultimately, the solution to brokerage fraud lies in consumers and   institutions working together to address the problem.  Consumers must   stay informed and take the necessary precautions to protect account   information and passwords, as well as closely monitor the activity in   their accounts.  Institutions must make sure that the layers of   technology are in place to know what\u2019s really going on with the   valuable assets in their care.  There will always be bad guys to be   dealt with where valuables are concerned, but despite malicious   hackers and information thieves, the upside of the electronic   information age still far outweighs the downside.       <\/p>\n<p>&#8212;<br \/>Bill <span id=\"misp_compose_16\" class=\"hm\">Hoidas<\/span><br \/>District Sales Manager<br \/>Larger B2B\/<span id=\"misp_compose_17\" class=\"hm\">MOTO<\/span>\/Internet Accounts<br \/>Product Development Manager<br \/>Matrix Payment Systems<br \/>(847) 381-3482 office<br \/>(847) 381-4289 fax<br \/>http:\/\/paymentconsulting.net<br \/>John 3:16 For God so loved the world, that he gave his only begotten Son, that whosoever <span id=\"misp_compose_18\" class=\"hm\">believeth<\/span> in him should not perish, but have everlasting life.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Robbery on the Electronic Highway ONLINE BROKERAGE FIRMS: THE NEWEST TARGET by Joel Rosen The age of electronic information, for all of its upside, does have a downside \u2013 it takes something extremely valuable and turns it into something incredibly portable. This makes electronic information not only the best thing to happen to business since &hellip; <a href=\"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/?p=18\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Online Brokerage Fraud<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-18","post","type-post","status-publish","format-standard","hentry","category-news-update"],"_links":{"self":[{"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":0,"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/18\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.paymentconsulting.net\/Blog\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}