10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

that employees are more concerned about getting caught by their employer than about<br />

the law or morality <strong>of</strong> their conduct. 181<br />

Our interviews with directors <strong>of</strong> fraud investigation units in leading financial institutions<br />

confirm this view. However, they point out that in an economic environment in which job<br />

stability is elusive threatens, loyalty to the employer. Hence there is always the<br />

temptation <strong>of</strong> quick financial rewards. Thus employees are now increasingly less worried<br />

about the employer too. One interviewee suggested that the ‘instant gratification’ <strong>of</strong><br />

today’s culture contributes to the readiness <strong>of</strong> employees to compromise confidential<br />

data. And such behaviour is not limited to those in low paid jobs. 182<br />

Another way illegally to obtain data is by mail interception. Fraudsters have a variety <strong>of</strong><br />

strategies for accessing post once it is delivered. These include targeting properties with<br />

external or multiple mailboxes in a secure area, or by gaining access to the property<br />

itself. More sophisticated fraudsters will have a range <strong>of</strong> safe addresses and will arrange<br />

for particular items <strong>of</strong> mail to be redirected, perhaps by advising the bank <strong>of</strong> a change <strong>of</strong><br />

address, ordering a duplicate card, or reporting a lost card and requesting a new card<br />

and pin number. 183,184<br />

(b) Use <strong>of</strong> cyber capabilities to harvest data.<br />

Credit card fraudsters are becoming much more adept at exploiting new technologies for<br />

their criminal activities. They are keeping pace with technological developments and<br />

even outpacing them through the adaptation and upgrading <strong>of</strong> existing s<strong>of</strong>tware tools.<br />

181 192.com Business Services, (2008), The Fraudster’s Modus Operandi. London.<br />

182 These directors also highlight a greater concern with insider agents than external fraudsters. One director <strong>of</strong><br />

the fraud investigation unit <strong>of</strong> a leading financial institution also noted that debit card fraud is more significant<br />

than credit card fraud. This is because debit card transactions are processed the same day, whether they are<br />

domestic or international. So this makes it easier for “insider” debit card fraudsters to operate. Interview<br />

conducted 26 th November 2008.<br />

183 Interviews with directors <strong>of</strong> fraud investigation units <strong>of</strong> two leading financial institutions, 11 th and 26 th<br />

November 2008. For details on how mail interception is carried out, see 192.com Business Services, (2008),<br />

The Fraudster’s Modus Operandi. London.<br />

184 According to Experian (2008) redirecting a person’s post to a different address, continues to grow in the UK<br />

as means <strong>of</strong> perpetrating ID theft. Experian (May 2008): Victims <strong>of</strong> Fraud Dossier.<br />

Page 61

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!