Winnipeg Free Press

Monday, January 06, 2025

Issue date: Monday, January 6, 2025
Pages available: 28
Previous edition: Saturday, January 4, 2025

NewspaperARCHIVE.com - Used by the World's Finest Libraries and Institutions

Logos

About Winnipeg Free Press

  • Publication name: Winnipeg Free Press
  • Location: Winnipeg, Manitoba
  • Pages available: 28
  • Years available: 1872 - 2025
Learn more about this publication

About NewspaperArchive.com

  • 3.12+ billion articles and growing everyday!
  • More than 400 years of papers. From 1607 to today!
  • Articles covering 50 U.S.States + 22 other countries
  • Powerful, time saving search features!
Start your membership to One of the World's Largest Newspaper Archives!

Start your Genealogy Search Now!

OCR Text

Winnipeg Free Press (Newspaper) - January 6, 2025, Winnipeg, Manitoba B4 MONDAY JANUARY 6, 2025 ● BUSINESS@FREEPRESS.MB.CA ● WINNIPEGFREEPRESS.COM BUSINESS ‘The more employees there are inside a company with access to sensitive customer information, the higher the risk that access is going to be abused’ Bank insiders are leaking data on client accounts as scams surge T HE new staffer was supposed to help Toronto-Dominion Bank spot money laundering from an outpost in New York. She instead used her access to bank data to distribute customer details to a criminal network on Telegram, according to prosecutors in Manhat- tan. Local detectives who searched her phone allegedly found images of 255 cheques belonging to customers, along with other personal informa- tion on almost 70 others. It’s part of a little-noticed pattern popping up across U.S. banking — from towers in Manhattan, to hubs in Florida and even suburban Louisiana. As sophisticated scams targeting the life savings of Americans create head- lines across the U.S., the industry’s low- est-paid employees keep getting caught selling sensitive customer information out the back door — emerging as a critical area of weakness in banks’ risk controls. That’s an inconvenient trend as firms steadfastly argue to policymakers and the public that customers bear primary responsibility for ensuring they don’t get conned out of their savings. While many scams seemingly target people at random, some victims have said con artists who tricked them knew a lot about their finances at the outset. “The more employees there are in- side a company with access to sensitive customer information, the higher the risk that access is going to be abused,” said R.J. Cross, a privacy advocate at U.S. Public Interest Research Group. “Companies need to have technical measures in place to ensure employ- ees and contractors can’t run off with people’s information or access data that isn’t necessary for their job duties.” There have been warnings for years. Almost a decade ago, New York’s then-attorney general, Eric Schneider- man, publicly urged major lenders in- cluding JPMorgan Chase & Co., Bank of America Corp. and Citigroup Inc. to strengthen internal defences after an investigation found an identity-theft ring had enlisted tellers from the indus- try. That built on a broader study by his office showing leaks by corporate insid- ers were already on the rise, with data “often obtained exclusively for fraudu- lent purposes.” Such concerns now carry new ur- gency. U.S. retirees sitting atop a re- cord stockpile of wealth are facing an onslaught of elder fraud, with estimated annual losses soaring past US$28 bil- lion. For con artists, tips on who has a lot of money can be invaluable. Meanwhile, bank lobbyists are fend- ing off legislative attempts to force firms to do more to protect customers or share their losses. Data flowing wrong way The recent spate of busts shows banks haven’t yet figured out how to stop employees from trying to monet- ize their access to highly valuable and sensitive customer information. Some connect with local conspirators on so- cial media for schemes as mundane as faking cheques. Banks typically make those victims whole. But more sophis- ticated cons have proliferated in recent years, often leaving customers on the hook for their losses. A few prosecutions, like the one against Wade Helms of Navy Federal Credit Union, illustrate how far data can flow. Authorities in Escambia County, Fla., accused Helms of jotting personal in- formation about customers in a note- book, creating a handle for himself on the dark web, and making it known he was seeking a buyer for information on clients at Navy Federal, the largest U.S. credit union. In one chatroom, Helms found someone who claimed to be a broker for stolen data. The two alleged- ly spoke by phone, then continued the conversation on a personal computer Helms kept next to his office desk. The broker “wanted high-dollar ac- count information because that would sell easier on the dark web,” accord- ing an affidavit for an arrest warrant for Helms. The broker created Tele- gram pages called “Navy Wave,” where screenshots of customer accounts were posted. Some were provided by Helms, who had taken screenshots of custom- er banking statements and pictures of their identification, according to the warrant. “Navy Wave” had multiple handles that began with ScammingServices with more than 2,700 subscribers. By the time the credit union’s internal security discovered the breach, Helms allegedly had exposed as many as 50 accounts. At least five postings on the “Navy Wave” pages included Navy Fed- eral accounts Helms provided. In a deal with prosecutors this year, Helms pleaded no contest to 11 charges, including illegal use of personal identi- fication, and was sentenced to 10 years’ probation. He was also ordered to pay about US$9,100 in restitution to Navy Federal. A lawyer for Helms didn’t reply to messages seeking comment. “Navy Federal takes all necessary precautions to protect our members’ personal and financial information,” a spokesperson for the credit union said in a statement. “We strengthen our processes on a constant basis to ensure member information is kept confiden- tial and continuously monitor member accounts for unusual activity.” The lender said it worked with law en- forcement to help secure a conviction. Incentivizing firms It’s challenging for companies to ad- just to trends in crime, especially as firms are scaling up workforces with thousands of staff, including high-turn- over jobs, said Jonathan Lopez, a for- mer U.S. federal prosecutor who spe- cializes in bank crime cases. “The issue may not be one of a faulty program in many instances, but the sheer numbers of people involved,” said Lopez, a partner at Jacobson Lopez in Washington. “While zero fraud rates may be impossible, institutions should be incentivized to continue to strive to get their fraud rates and insider fraud rates as close to zero as possible.” Toronto-based TD Bank’s recent US$3.1 billion settlement with U.S. au- thorities for failing to prevent money laundering revealed executives’ focus on costs had contributed to weak in- ternal systems. A result was a rash of crime that mostly went undetected until U.S. federal investigators tracking fentanyl sales on the East Coast took a close look at the bank. The probe found several branch-level employees accepted bribes of cash and gift cards to open accounts and issue debit cards that were then used to move money to Colombia through ATMs. The increased scrutiny also revealed a New York-based branch manager stole more than US$200,000 from an elderly client, using account informa- tion and a fraudulent email address to siphon funds even after the retiree died. The banker, later fired by TD, ad- mitted to the crime and was sentenced to more than a year in prison. His law- yer said he stole the money to pay for his son’s college tuition. In September, authorities in New York swooped in on Daria Sewell, a new employee in TD’s anti-money laundering operations, accusing her of storing images of customers’ cheques on her cellphone. The breach exposed accounts to a network of New York-ar- ea fraudsters who were charged in a US$500,000 cheque-fraud scheme, ac- cording to the Manhattan district attor- ney’s office. Investigators said Sewell distributed information on Telegram with instruc- tions on how to open bank accounts and move money from the TD accounts into them. Recipients allegedly then split profits with her. Sewell has pleaded not guilty to un- lawfully possessing personal informa- tion. A lawyer representing her didn’t reply to messages seeking comment. “In both instances the employees were terminated and we co-operated fully with authorities in their investi- gations,” a TD spokesperson said in an email. “As we have consistently said, these individuals aren’t representative of our 30,000 colleagues in the U.S. who serve our customers with integrity.” Fraud ring Outsourcing can create more cracks in banks’ defences. In Louisiana, federal prosecutors traced a cheque-fraud ring to employ- ees of international call centre Teleper- formance, where three employees in Shreveport were accused of selling the account information of elderly USAA customers. The scheme went on for almost two years with the three — Arazhia Gully, Maya Green and Zarrajah Watkins — joining and offering information on customers with high account balan- ces to a network of more than a dozen others, according to federal prosecu- tors. Some recipients used counterfeit cheques to make withdrawals. A por- tion of the proceeds was later deposited into the personal account of a Teleper- formance employee and withdrawn at a nearby casino. The trading of that data was similar to ordering from a menu at a restau- rant, with outsiders choosing which ac- counts to exploit. In an example provided by prosecu- tors, Gully sent a conspirator a text message containing the ages and ac- count balances of eight USAA custom- ers. The person responded with their pick: a 79-year-old with US$442,000. Gully then sent a picture of a computer screen showing detailed account infor- mation. Another victim was a 95-year- old with US$174,000. “We fully co-operated with author- ities to aid in the investigation and terminated the employees as soon as we were made aware of the incidents,” Teleperformance said in an emailed statement. “We work closely with our clients to ensure we minimize our employees’ ac- cess to customer account information to include only the access needed to de- liver the services and minimize the risk of fraud to the lowest possible level.” A spokesperson for USAA declined to comment. The three Teleperformance employ- ees pleaded guilty to bank fraud con- spiracy and are awaiting sentencing. Lawyers for Gully and Watkins de- clined to comment. Green’s attorney, Joey Greenwald, said his client was low-level in the net- work and paid just a few hundred dol- lars for taking screenshots of accounts. Greenwald said he was surprised his client was able to see so much informa- tion, noting she had a Grade 10 educa- tion and was working from home. “They hooked her up with a comput- er and a phone and she had all this ac- cess to customer accounts.” Greenwald said he’s not aware Green received any training on how to handle the data. “To trust her with this kind of infor- mation was pretty appalling,” he said. — Bloomberg News TOM SCHOENBERG MARK SCHIEFELBEIN / THE ASSOCIATED PRESS FILES U.S. Attorney General Merrick Garland speaks in October to announce Toronto-based TD Bank will pay a US$3.1-billion settlement after authorities say the financial institution’s lax practices allowed for significant money laundering. ;