An App a Day
The onslaught of new phones and apps and their related potential for financial crime
This article examines the high cost of convenience in regards to constantly evolving smart phones, iPads, and other personal communication device applications. The intentional (and unintentional) transfer of sensitive data between individuals happens in seconds. The author lays out the double-edged benefits of such technology and whether itâ€™s worth the risk of being a victim of fraud and theft.
iPhonesÂ®, iPadsÂ®, BlackberriesÂ®, AndroidsÂ®, tablets, and other related applications are released almost weekly. The innovation and ease have driven most usersâ€™ computing habits to the world of wireless.Â Itâ€™s a double-edged sword.
Computing evolved from mainframes to desktops, laptops to tablets, becoming more â€śpersonalâ€ť with each leap of evolution.Â Most users of these devices today simply access the Internet, social platforms, e-mail, and commonly used programs via inexpensive â€śapps,â€ť which they can select and install on their handheld devices almost instantaneously.Â The world of shopping obviously changed as well, maximizing this same technology.
The â€śPaperless Purchaseâ€ť
Visit an AppleÂ® store, and no paperwork will be completed, providedâ€¦, or required.Â The customer and purchase information enters the associateâ€™s phone, the seller and buyer complete the sale, the associate swipes the customerâ€™s credit card on the same phone, and e-mails the receipt to the customer.Â The sale is finalized, and the customer leaves only with their purchasesâ€¦and virtual receipt.
Created for convenience, several information transfer apps cause me concern regarding the potential for new financial crime.Â Indeed, several recent news stories give me cause for concern regarding the ease with which new apps will create opportunity for the potential commission of financial crimes.
One of these apps allow smart phone users to click (or touch) two phones together to transfer funds from one phone to another.Â As demonstrated, one smart phone user prepares a transfer on their smart phone, while the second user accesses their bank account.Â The users click (or touch) their phones together and the funds transfer from the first userâ€™s account to the other userâ€™s account.
Will this ease of transferring funds re-engineer a thiefâ€™s technique?Â Itâ€™s now even easier to stalk individuals, demand the victim queue a transfer on their phone, touch phones together (moving the funds into a fictitiously created account), and abscond with the victimâ€™s phone.Â While the victim tries to seek assistance from law enforcement, the perpetrator could transfer the funds back out of the account, or simply withdrawal the funds via an ATM or other method in real time, likely before police even arrive for the initial complaint.
â€śCheckâ€ť Your PhotosÂ
Another app of concern enables users to snap a picture of a check to be deposited, transfer the picture to their bank, and receive funds into their account, just as if they took the physical check to their bank and manually deposited it.Â Efficient?Â Absolutely!
My concern lies with stolen, altered, and counterfeit checks.Â Will this app make it even easier for an individual to convert unauthorized checks for personal gain?Â
A big problem concerns employees stealing checks from customers payable to their employers and converting them through deposit into their own personal ATM deposit.Â With this app, will the same individual simply take a picture of the employerâ€™s diverted check and receive funds on the deposit?Â
â€śAnd Your Point Is?â€ť
A third app relates to sharing of personal information between smart phones.Â The app allows users to share personal information by simply pointing the smart phones at each other.Â The issue of how susceptible unauthorized access to usersâ€™ information became apparent to me recently while dining at a shopping mall.
I had my iPad with me to purchase a cover at the Apple store in the mall, and while waiting for our food, we used the iPad.Â What happened next really interested me.
As other patrons walked by our table to use the restroom, several of the other customersâ€™ personal information automatically connected to my iPad and came up on our screen as they walked by us.Â I hadnâ€™t set anything to retrieve their information, and I suspect they didnâ€™t realize their personal information wasâ€¦well, no longer personal.Â
The problem?Â Criminals plant themselves in public areas, every day, attempting to steal personal and financial information, e-mail access, Internet access, and any other data to use for illicit purposes.Â
As these and other new apps develop and reach the public, we mustÂ review new wireless capabilities, and ensure these new venues do not increase the opportunity for financial crime.Â How can you minimize your risk of becoming a victim of these or other potential schemes?Â
- Ensure your smart phone and cellular devices are password protected from unauthorized access.Â If lost or stolen, the thief will have less of a chance of accessing your apps and information.
- As new apps become available, such as â€śclick transfer,â€ť determine if you really need such an app.Â If you really donâ€™t need it, donâ€™t install it.
- The fewer apps and access available on your smart phone and cellular device, the less access an unauthorized user will have to your data and funds. Â Yup.Â
- Monitor new capabilities released for your smart phone and cellular devices.
- If capabilities are â€śautomaticallyâ€ť installed in your smart phone and cellular device by your provider (instead of by you), inquire as to ways those types of services can be removed or disabled by the carrier.
- Ensure the security features of your smart phone or cellular device are active and configured to share only information you want to share, ifÂ you want to share anything at all.
- As always, vigilantly monitor your activity, bank accounts, debit cards, and credit cards on a very regular basis to detect issues as early as possible.
Trust me, it happens.
This article was originally published by Forensic Accounting Services, LLC and Stephen A. Pedneault, CPA/CFF, CFE, FCPA. Â You can reach Steve atÂ email@example.com or (860) 659-6550.Â