SlideShare a Scribd company logo
1 of 44
Overcoming Impediments to Effective
Protection of Elderly Victims’ Assets

25th ANNUAL COVA CONFERENCE
October 28-30, 2013
Keystone, Colorado

Presenter: Don Rudisuhle CFE
11
2 of 44
Presentation Major Points
•
•
•
•
•
•
•

What is Elder Financial Abuse
Causes and consequences
Indicators that signal abuse
The Elder Fraud Triangle
Ways that seniors are defrauded
Obstacles to recovery of assets
Organizing the investigation
3 of 44
Definition of Elder Financial Abuse
• Financial Abuse or Exploitation is the unauthorized
or improper use of the resources of an elder for
monetary or personal benefit, profit, or gain.
Examples include forgery, misuse or theft of money
or possessions; use of coercion or deception to
surrender finances or property; or improper use of
guardianship or power of attorney.
– United States Centers for Disease Control and Prevention

• Virginia Tech adds an age qualifier: “the unauthorized
use or illegal taking of funds or property of people
aged 60 and older.”
– Committee for the Prevention of Elder Abuse, and the Center for
Gerontology at Virginia Polytechnic Institute and State University
4 of 44
It’s getting worse. Why?
•
•
•
•
•
•
•

Aging Boomers increase the senior population
Longer lifespans and attendant fragility
Breakdown of traditional retirement vehicles
Diminished returns on savings instruments
Relatives are stressed by the weak economy
Widespread moral decay in society
Inadequate resources to pursue perpetrators
5 of 44
Elder Theft Consequences
•
•
•
•
•
•
•
•

Compromises elder’s financial security
Degrades their quality of life
Engenders fear and anxiety
Limits access to health insurance and care
Contributes to homelessness
Causes depression and despair
Increases costs to the state
Destroys relationships and harmony in the
family
6 of 44
Mandatory Reporting in Colorado
On May 16, 2013, Governor Hickenlooper signed Senate
Bill 13-111, Require Reports of Elder Abuse and
Exploitation. The main provisions are:
– Persons observing abuse or exploitation of person 70 years
or older must report it to law enforcement within 24 hours
– An observer who willfully fails to report the fact commits a
Class 3 misdemeanor
– A person reporting in good faith enjoys immunity from
civil suit or criminal action
– Members of the clergy are exempt under certain
circumstances
– The Peace Officer Standards and Training (POST) Board
should establish a training curriculum for law enforcement
7 of 44
Medical Personnel Who Must Report
• Physicians, surgeons, physicians
assistants, osteopaths, physicians in
training, podiatrists, occupational therapists, physical
therapists, medical examiners and coroners, registered
nurses, licensed practical nurses, nurse
practitioners, psychologists, mental health
practitioners, chiropractors, dentists, pharmacists and
hospital and long-term care facility personnel
engaged in the admission, care, or treatment of
patients
8 of 44
Other Professionals Who Must Report
• Social work practitioners, clergy members, law
enforcement officials and personnel, court-appointed
guardians and conservators, fire protection
personnel, community-centered board staff, personnel
of banks, savings and loan associations, credit unions
and other lending or financial institutions, a
caretaker, staff member, employee of or volunteer or
consultant for a licensed or certified care
facility, home care placement agency, home, or
governing board, including but not limited to home
health providers
9 of 44
Mandatory Reporting
• The Good
– The cycle of abuse can be interrupted
– Victim will have access to professional help
– Recovery of assets can be initiated sooner

• The Bad
– Embarrassment before peer group
– Loss of personal decision making authority
– May be ostracized from family and friends
10 of 44
Recognizing Elder Theft Symptoms
• Observation by third parties reveals that he or she:
–
–
–
–
–
–
–
–
–
–
–

Has recently made a new “best friend”
Often makes large bank or ATM withdrawals
Sends checks or wire transfers overseas
Is unaware of his/her financial status
Has difficulty paying bills and buying everyday necessities
Receives mail for lotteries, prizes and contests
Gets frequent calls from telemarketers
Is isolating him/herself from family and friends
Demonstrates fear or submissiveness towards caregivers
Caregiver tends to intercede and speak on behalf of victim
Living under squalid and unsanitary conditions
11 of 44
The Fraud Triangle
Donald Cressey was a sociologist and criminologist
who was a recognized expert in white-collar crime.
During his research for his doctoral thesis, he proposed
a framework for examining a perpetrator’s motivation to
commit fraud using a concept he called The Fraud
Triangle. It is comprised of three elements, which when
taken together, can explain how a person is led to
committing a fraudulent act. These are:
• Perceived unshareable financial need
• Perceived opportunity
• Rationalization
12 of 44
Donald Crecy’s Hypothesis
• According to Donald Crecy’s Hypothesis:
– Trusted persons become trust violators when they
conceive of themselves as having a financial problem
which is non-shareable, are aware this problem can be
secretly resolved by violation of the position of
financial trust, and are able to apply to their own
conduct in that situation verbalizations which enable
them to adjust their conceptions of themselves as
trusted persons with their conceptions of themselves as
users of the entrusted funds or property.
– Donald R. Cressey, Other People's Money 1973
13 of 44
The Fraud Triangle
Motivation

Factors
contributing
to risk of fraud

Opportunity

Rationalization
14 of 44
Fraud Triangle Elements
• Motivation
– The various factors that drive the perpetrator to
commit the illegal act

• Opportunity
– The conditions that exist that facilitate the
commission of the act

• Rationalization
– The mindset that allows the perpetrator to justify
his or her actions
15 of 44
Motivation
• Economic need
– Perpetrator is financially stressed

• Greed
– Perpetrator desires material things

• Retribution
– Perpetrator feels victim wronged them

• Convenience
– “Just because its there”
16 of 44
Rationalization
• “I am entitled to the money”
– Aunt Rose promised it to me
– It’s just an advance on my inheritance
– Dad gave my brother more than he gave me
– I have been Mom’s caregiver for years

• “Grandma doesn’t need really it”
– Victim is perceived as wealthy
– Can’t use it due to physical or mental impairment
– Victim is not expected to live much longer
17 of 44
Opportunity
• Perpetrator has a fiduciary role
– Is a trustee or guardian
– Has power of attorney
– Is a signatory on financial accounts

• Perpetrator has access to victim’s assets
– Personal property
– Real estate and vehicles
– Credit cards
18 of 44
The Elder Theft Triangle
Desperation

Types
of elder
financial abuse
as per the 2011
Met Life study

Occasion

Predation
19 of 44
Elder Theft Triangle Elements
• Occasion (Opportunity)
• Victim is an obstacle to the perpetrator’s ability to acquire material
things he/she desires

• Desperation
– Family or friends are very desperate for money
– Will do whatever is necessary to obtain it, even if illegal

• Predation
– A false trusting relationship exists or is created
– The friendship becomes the vehicle for exploitation
– Perpetrator has a sociopathic personality and does not feel guilt

20 of 44
Crimes of Desperation
• Generally involves family or friends
• Need for money can be a result of:
–
–
–
–
–
–
–

Loss of employment
Health crisis or medical bankruptcy
Addiction to drugs or alcohol
A gambling habit
Compulsive shopping
A need to “Keep up with the Jones’”
Being in trouble with the law

• Perpetrator believes that he/she is entitled to
compensation for caregiving services
• Men are typically the perpetrators
21 of 44
Crimes of Occasion
• The victim has money and property
• The assets are accessible
• Victim is careless or unaware
– Door unlocked
– Money or valuables left in plain sight

• The perpetrator takes what is available
– Generally by stealth
– Less frequently by violence
22 of 44
Crimes of Predation
• Involves building a trusting relationship
– Social
– Romantic
– Professional

• Assets stolen by stealth or subterfuge
– Younger woman approaches lonely, elderly man
– Dishonest broker deceives victim on investments
– Contractor provides unneeded, shoddy or overpriced
home repairs
– Health care provider marries incapacitated person
23 of 44
Motivation
• Economic need
– Perpetrator is financially stressed

• Greed
– Perpetrator desires material things

• Retribution
– Perpetrator feels victim has wronged them

24 of 44
Characteristics of a Perpetrator
•
•
•
•
•
•
•
•
•
•
•

Is a wheeler and dealer
Is domineering and controlling
Doesn't like people questioning their judgment or actions
Has a strong desire for personal gain
Has a “Beat the system attitude”
Lives beyond his/her means
Has a close relationship with the victim
Is unable to relax
Outwardly, appears to be very trustworthy.
Often display some sort of drastic change in personality or behavior
Appears incapable of feeling guilt or remorse
– Adapted from The Certified Accountant, 1st Quarter 2009, Issue #37

25 of 44
Addressing Elder Theft
•
•
•
•
•
•
•

Know the signs
Document the abuse
Contact proper authorities
Obtain legal counsel
Search for the looted assets
Charge perpetrators in civil or criminal court
Recover assets on behalf of the victim

26 of 44
Vehicles for Defrauding Elders
There are many ways unscrupulous individuals
gain access to vulnerable individuals’ assets:
• The most common perpetrators are members
of the victim’s own family
• Trusted professional sometimes stray from
their fiduciary responsibilities
• Unscrupulous individuals seek vulnerable
targets to deceive and defraud
27 of 44
The Victim’s Family
Unlawful conversion of the victim’s assets via:
• Misuse of a Power of Attorney
• Trusteeship – abuse of fiduciary responsibility
• Quitclaim deed to real estate
• Adding themselves to a bank account
• Persuading the victim to change their will
• Forging checks and other documents
• Depositing retirement checks “less cash”
• Stealing valuable property or cash
28 of 44
Trusted Professionals
•
•
•
•
•
•
•

Lawyers
Accountants and bookkeepers
Financial and investment advisers
Brokers and securities dealers
Bankers
Professional conservators and guardians
Less frequently, judges
29 of 44
Telephone and Internet Scams
•
•
•
•
•
•

Halo, I am calling from Microsoft. You have virus…
Good News!!! You have won the Costa Rican lottery!!!
I am the Oil Minister of Nigeria. I have some funds…
Grandma, I’m in jail in Hungary. Send bail money…
I’m terminally ill. Can you help distribute my estate?
We need you to deposit checks from our customers and
wire us the money. You can keep a commission…
• This Rachel from Card Services. Your eligibility to
lower your interest expires soon. This is your final…
• Our church’s roof is leaking...
30 of 44
Tradesmen and Contractors
•
•
•
•
•
•
•

Prey on those who appear to vulnerable
Go door-to-door soliciting business
Most often are unlicensed
No references
Perform unnecessary home repairs
Shoddy or incomplete in work
Create trust with victims, steal their property
31 of 44
Obstacles to Pursuing Recovery
• Human
– Can be psychological or sociological

• Financial
– Incapable of funding costly litigation

• Legal
– Law enforcement and prosecutors uninterested

• Logistical
– Travel time and expense for all parties

• Reality
– Perpetrator may already have dissipated the assets
32 of 44
Human Obstacles
•
•
•
•
•
•
•
•

Lack of cooperation from the victim
Interference from the perpetrator
Lack of information about what to do
Reluctance to accuse anyone of wrongdoing
Fear of abandonment by the family member
Victim may be dependent upon the abuser
Unwillingness to harm the perpetrator
Victim with dementia can’t articulate facts
33 of 44
Financial Obstacles
•
•
•
•
•
•

High cost of litigation
Unwilling to commit scarce retirement funds
Uncertainty as to potential for recovery
Perpetrator may have depleted available cash
Can’t take time off work to pursue the case
Threat of retaliation by the accused in the form
of a countersuit that could be costly to defend
34 of 44
Legal Obstacles
• Statute of limitations
– 3 years in Colorado
– Can be tolled in some instances

•
•
•
•

Multistate jurisdictions
Law enforcement doesn’t see it as priority
Prosecutor is not sympathetic
Prosecutor is busy with more serious crimes

35 of 44
Logistical Obstacles
• Plaintiff, victim and perpetrator all live in
different states or countries
• Depositions might require expensive travel
• One or more parties are disabled and travel to
attorney’s office and court is problematic
• Victim is housebound

36 of 44
Reality Obstacles
•
•
•
•
•

Cash most likely has been dissipated
Perpetrator has left the state or the country
Assets have been transferred to a third party
Assets have put in a trust or corporation
Real estate has been retitled to someone else

37 of 44
Asset Recovery Steps
The Goal: Stop the hemorrhage and recover stolen assets
–
–
–
–
–
–
–
–
–
–
–
–

Collect as much documentation as possible
Confront the perpetrator, request voluntary restitution
Try to remove perpetrator from custody of the assets
If that fails, retain legal counsel
Initiate discovery - Request for Production of Documents
Retain the services of a forensic accountant, if appropriate
Analyze documentation
Prepare interrogatories and deposition questions for counsel
Analyze the products of discovery
Conduct deep web searches or concealed property
Prepare courtroom exhibits
Ask counsel if a pursuing criminal action is appropriate
38 of 44
Transmittal of Documents
Security must be observed when paper or electronic
documents are exchanged between parties.
• They often contain active bank account and credit
card information.
• Data should not be transmitted in emails as email
attachments
• Consider using a secure cloud platform.
– Dropbox – uses server-side encryption
– Spideroak– uses client-side encryption (better)
39 of 44
Preparing Courtroom Exhibits
Your courtroom exhibits are instrumental in
persuading the judge or jury to rule in favor of
your client
• Each exhibit should be concise and to the point
• Layer backup exhibits for each primary one
• Use charts and graphs where appropriate

40 of 44
Obtaining Data Using Discovery
• Discovery is a process used prior to trial
whereby litigants request information from
each other using vehicles such as:
– Requests for production of documents
– Interrogatories are written questions submitted to
the opposing party regarding facts of the case
– Depositions are interviews of a litigant conducted
by a lawyer in an out-of court-venue

41 of 44
Which Recovery Approach to Use?
• Egregious, destructive fraud
– Use the scorched earth, steam roller method
– Initiate concurrent civil and criminal actions

• Low grade fraud with minor harm to the victim
– Negotiate, persuade perpetrator to return funds

• Somewhere in between
– Consider arbitration
– Appointment of a guardian or conservator
– Nominate a trustee to manage the assets
42 of 44
Increasing Awareness
• Training for:
– Advocates
– Health care workers
– Sworn law enforcement officials
– Officers of the court
– Family caregivers
– Bankers, brokers and financial advisers
– CPAs and bookkeepers
– Attorneys
43 of 44
Ongoing Elder Theft Study
Elder Financial Exploitation via Power of
Attorney Abuse: What Family Members’
Experiences Reveal about this Problem, Its
Causes, and Consequences"
• We are still seeking multiple participants from
families with
– 1) successful family member POA agent experiences
– 2) families with allegedly exploitive POA experiences

44 of 44

More Related Content

What's hot

Learning Unit 6 -Judicial Role in D. V. CRJ 461
Learning Unit 6 -Judicial Role in D. V. CRJ 461Learning Unit 6 -Judicial Role in D. V. CRJ 461
Learning Unit 6 -Judicial Role in D. V. CRJ 461
Bonnie Black
 
Ppt family violence and family policy
Ppt family violence and family policyPpt family violence and family policy
Ppt family violence and family policy
Anna Montes
 
Ch 13 family violence
Ch 13 family violenceCh 13 family violence
Ch 13 family violence
difordham
 
Learning Unit 4 - Police as First Responders-CRJ 461
Learning Unit 4 - Police as First Responders-CRJ 461Learning Unit 4 - Police as First Responders-CRJ 461
Learning Unit 4 - Police as First Responders-CRJ 461
Bonnie Black
 
6 Sexual Assult Prevention - Risk Management - 6
6 Sexual Assult Prevention - Risk Management - 66 Sexual Assult Prevention - Risk Management - 6
6 Sexual Assult Prevention - Risk Management - 6
SOCUTD
 
Learning Unit 5: Prosecutor Response to D.V. -CRJ 461
Learning Unit 5: Prosecutor Response to D.V. -CRJ 461Learning Unit 5: Prosecutor Response to D.V. -CRJ 461
Learning Unit 5: Prosecutor Response to D.V. -CRJ 461
Bonnie Black
 

What's hot (20)

Learning Unit 6 -Judicial Role in D. V. CRJ 461
Learning Unit 6 -Judicial Role in D. V. CRJ 461Learning Unit 6 -Judicial Role in D. V. CRJ 461
Learning Unit 6 -Judicial Role in D. V. CRJ 461
 
Stagesfor change dvsv-training
Stagesfor change dvsv-trainingStagesfor change dvsv-training
Stagesfor change dvsv-training
 
Session 4 domestic abuse
Session 4   domestic abuseSession 4   domestic abuse
Session 4 domestic abuse
 
Ppt family violence and family policy
Ppt family violence and family policyPpt family violence and family policy
Ppt family violence and family policy
 
Ch 13 family violence
Ch 13 family violenceCh 13 family violence
Ch 13 family violence
 
DateRapeResearchPaper1
DateRapeResearchPaper1DateRapeResearchPaper1
DateRapeResearchPaper1
 
A Professional's Response To Human Trafficking
A Professional's Response To Human TraffickingA Professional's Response To Human Trafficking
A Professional's Response To Human Trafficking
 
Learning Unit 4 - Police as First Responders-CRJ 461
Learning Unit 4 - Police as First Responders-CRJ 461Learning Unit 4 - Police as First Responders-CRJ 461
Learning Unit 4 - Police as First Responders-CRJ 461
 
Domestic Violence Presentation
Domestic Violence PresentationDomestic Violence Presentation
Domestic Violence Presentation
 
6 Sexual Assult Prevention - Risk Management - 6
6 Sexual Assult Prevention - Risk Management - 66 Sexual Assult Prevention - Risk Management - 6
6 Sexual Assult Prevention - Risk Management - 6
 
Family Abuse in the Churched Community
Family Abuse in the Churched CommunityFamily Abuse in the Churched Community
Family Abuse in the Churched Community
 
Presentation1
Presentation1Presentation1
Presentation1
 
Domestic violence
Domestic violence Domestic violence
Domestic violence
 
Domestic abuse
Domestic abuseDomestic abuse
Domestic abuse
 
Geneseo Hazing Prevention Student Orgs Spring 2016
Geneseo Hazing Prevention Student Orgs Spring 2016Geneseo Hazing Prevention Student Orgs Spring 2016
Geneseo Hazing Prevention Student Orgs Spring 2016
 
Geneseo hazing prevention advisors for slideshare sprg 2015
Geneseo hazing prevention advisors for slideshare sprg 2015Geneseo hazing prevention advisors for slideshare sprg 2015
Geneseo hazing prevention advisors for slideshare sprg 2015
 
Hiding in plain sight recognizing and responding to abuse later in life
Hiding in plain sight   recognizing and responding to abuse later in lifeHiding in plain sight   recognizing and responding to abuse later in life
Hiding in plain sight recognizing and responding to abuse later in life
 
Domestic Violence
Domestic ViolenceDomestic Violence
Domestic Violence
 
Governor's conference financial exploitation
Governor's conference financial exploitationGovernor's conference financial exploitation
Governor's conference financial exploitation
 
Learning Unit 5: Prosecutor Response to D.V. -CRJ 461
Learning Unit 5: Prosecutor Response to D.V. -CRJ 461Learning Unit 5: Prosecutor Response to D.V. -CRJ 461
Learning Unit 5: Prosecutor Response to D.V. -CRJ 461
 

Similar to Don Rudisuhle CFE 2013 Presentation at COVA Annual Conference

12/12 understanding victims' mindsets
12/12 understanding victims' mindsets12/12 understanding victims' mindsets
12/12 understanding victims' mindsets
StopTrafficking
 
12/12 understanding victims' mindsets
12/12 understanding victims' mindsets12/12 understanding victims' mindsets
12/12 understanding victims' mindsets
StopTrafficking
 
Responding to Sexual Misconduct
Responding to Sexual MisconductResponding to Sexual Misconduct
Responding to Sexual Misconduct
Kayleigh Earl
 
NAADAC Code of Ethics Principle 1 Non-Discrimination I sh.docx
NAADAC Code of Ethics Principle 1 Non-Discrimination I sh.docxNAADAC Code of Ethics Principle 1 Non-Discrimination I sh.docx
NAADAC Code of Ethics Principle 1 Non-Discrimination I sh.docx
rosemarybdodson23141
 

Similar to Don Rudisuhle CFE 2013 Presentation at COVA Annual Conference (20)

Don rudisuhle 2019_no_coacfe_post-presentation
Don rudisuhle 2019_no_coacfe_post-presentationDon rudisuhle 2019_no_coacfe_post-presentation
Don rudisuhle 2019_no_coacfe_post-presentation
 
Care certificate unit 10
Care certificate unit 10Care certificate unit 10
Care certificate unit 10
 
Ethics issues and boundaries training
Ethics issues and boundaries trainingEthics issues and boundaries training
Ethics issues and boundaries training
 
Don Rudisuhle 2016_COVA_Presentation
Don Rudisuhle 2016_COVA_PresentationDon Rudisuhle 2016_COVA_Presentation
Don Rudisuhle 2016_COVA_Presentation
 
Don Rudisuhle's 2016 COVA Presentation
Don Rudisuhle's 2016 COVA PresentationDon Rudisuhle's 2016 COVA Presentation
Don Rudisuhle's 2016 COVA Presentation
 
Webinar: Navigating the Criminal Justice System for People with I/DD
Webinar: Navigating the Criminal Justice System for People with I/DD Webinar: Navigating the Criminal Justice System for People with I/DD
Webinar: Navigating the Criminal Justice System for People with I/DD
 
12/12 understanding victims' mindsets
12/12 understanding victims' mindsets12/12 understanding victims' mindsets
12/12 understanding victims' mindsets
 
12/12 understanding victims' mindsets
12/12 understanding victims' mindsets12/12 understanding victims' mindsets
12/12 understanding victims' mindsets
 
Don Rudisuhle CFE 2011 Presentation at COVA Annual Conference
Don Rudisuhle CFE 2011 Presentation at COVA Annual ConferenceDon Rudisuhle CFE 2011 Presentation at COVA Annual Conference
Don Rudisuhle CFE 2011 Presentation at COVA Annual Conference
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptx
 
What Is Elder Abuse and How to Prevent It?
What Is Elder Abuse and How to Prevent It?What Is Elder Abuse and How to Prevent It?
What Is Elder Abuse and How to Prevent It?
 
Mandate to Report, Responsibility to Prevent Child Abuse and Neglect
Mandate to Report, Responsibility to Prevent Child Abuse and NeglectMandate to Report, Responsibility to Prevent Child Abuse and Neglect
Mandate to Report, Responsibility to Prevent Child Abuse and Neglect
 
Responding to Sexual Misconduct
Responding to Sexual MisconductResponding to Sexual Misconduct
Responding to Sexual Misconduct
 
Emotional Abuse & Domestic Violence
Emotional Abuse & Domestic ViolenceEmotional Abuse & Domestic Violence
Emotional Abuse & Domestic Violence
 
Mediators' List Servs and the Rating Game
Mediators' List Servs and the Rating GameMediators' List Servs and the Rating Game
Mediators' List Servs and the Rating Game
 
Ethics of discharge planning
Ethics of discharge planningEthics of discharge planning
Ethics of discharge planning
 
CCher Nicholson Supported decision-making – the South Australian experience
CCher Nicholson Supported decision-making – the South Australian experience CCher Nicholson Supported decision-making – the South Australian experience
CCher Nicholson Supported decision-making – the South Australian experience
 
Hidden Risks and Mistakes to Avoid in Estate and Long-Term Care Planning
Hidden Risks and Mistakes to Avoid in Estate and Long-Term Care PlanningHidden Risks and Mistakes to Avoid in Estate and Long-Term Care Planning
Hidden Risks and Mistakes to Avoid in Estate and Long-Term Care Planning
 
Safeguarding in the work place (1) [Autosaved].pptx
Safeguarding in the work place (1) [Autosaved].pptxSafeguarding in the work place (1) [Autosaved].pptx
Safeguarding in the work place (1) [Autosaved].pptx
 
NAADAC Code of Ethics Principle 1 Non-Discrimination I sh.docx
NAADAC Code of Ethics Principle 1 Non-Discrimination I sh.docxNAADAC Code of Ethics Principle 1 Non-Discrimination I sh.docx
NAADAC Code of Ethics Principle 1 Non-Discrimination I sh.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Don Rudisuhle CFE 2013 Presentation at COVA Annual Conference

  • 1. Overcoming Impediments to Effective Protection of Elderly Victims’ Assets 25th ANNUAL COVA CONFERENCE October 28-30, 2013 Keystone, Colorado Presenter: Don Rudisuhle CFE 11
  • 3. Presentation Major Points • • • • • • • What is Elder Financial Abuse Causes and consequences Indicators that signal abuse The Elder Fraud Triangle Ways that seniors are defrauded Obstacles to recovery of assets Organizing the investigation 3 of 44
  • 4. Definition of Elder Financial Abuse • Financial Abuse or Exploitation is the unauthorized or improper use of the resources of an elder for monetary or personal benefit, profit, or gain. Examples include forgery, misuse or theft of money or possessions; use of coercion or deception to surrender finances or property; or improper use of guardianship or power of attorney. – United States Centers for Disease Control and Prevention • Virginia Tech adds an age qualifier: “the unauthorized use or illegal taking of funds or property of people aged 60 and older.” – Committee for the Prevention of Elder Abuse, and the Center for Gerontology at Virginia Polytechnic Institute and State University 4 of 44
  • 5. It’s getting worse. Why? • • • • • • • Aging Boomers increase the senior population Longer lifespans and attendant fragility Breakdown of traditional retirement vehicles Diminished returns on savings instruments Relatives are stressed by the weak economy Widespread moral decay in society Inadequate resources to pursue perpetrators 5 of 44
  • 6. Elder Theft Consequences • • • • • • • • Compromises elder’s financial security Degrades their quality of life Engenders fear and anxiety Limits access to health insurance and care Contributes to homelessness Causes depression and despair Increases costs to the state Destroys relationships and harmony in the family 6 of 44
  • 7. Mandatory Reporting in Colorado On May 16, 2013, Governor Hickenlooper signed Senate Bill 13-111, Require Reports of Elder Abuse and Exploitation. The main provisions are: – Persons observing abuse or exploitation of person 70 years or older must report it to law enforcement within 24 hours – An observer who willfully fails to report the fact commits a Class 3 misdemeanor – A person reporting in good faith enjoys immunity from civil suit or criminal action – Members of the clergy are exempt under certain circumstances – The Peace Officer Standards and Training (POST) Board should establish a training curriculum for law enforcement 7 of 44
  • 8. Medical Personnel Who Must Report • Physicians, surgeons, physicians assistants, osteopaths, physicians in training, podiatrists, occupational therapists, physical therapists, medical examiners and coroners, registered nurses, licensed practical nurses, nurse practitioners, psychologists, mental health practitioners, chiropractors, dentists, pharmacists and hospital and long-term care facility personnel engaged in the admission, care, or treatment of patients 8 of 44
  • 9. Other Professionals Who Must Report • Social work practitioners, clergy members, law enforcement officials and personnel, court-appointed guardians and conservators, fire protection personnel, community-centered board staff, personnel of banks, savings and loan associations, credit unions and other lending or financial institutions, a caretaker, staff member, employee of or volunteer or consultant for a licensed or certified care facility, home care placement agency, home, or governing board, including but not limited to home health providers 9 of 44
  • 10. Mandatory Reporting • The Good – The cycle of abuse can be interrupted – Victim will have access to professional help – Recovery of assets can be initiated sooner • The Bad – Embarrassment before peer group – Loss of personal decision making authority – May be ostracized from family and friends 10 of 44
  • 11. Recognizing Elder Theft Symptoms • Observation by third parties reveals that he or she: – – – – – – – – – – – Has recently made a new “best friend” Often makes large bank or ATM withdrawals Sends checks or wire transfers overseas Is unaware of his/her financial status Has difficulty paying bills and buying everyday necessities Receives mail for lotteries, prizes and contests Gets frequent calls from telemarketers Is isolating him/herself from family and friends Demonstrates fear or submissiveness towards caregivers Caregiver tends to intercede and speak on behalf of victim Living under squalid and unsanitary conditions 11 of 44
  • 12. The Fraud Triangle Donald Cressey was a sociologist and criminologist who was a recognized expert in white-collar crime. During his research for his doctoral thesis, he proposed a framework for examining a perpetrator’s motivation to commit fraud using a concept he called The Fraud Triangle. It is comprised of three elements, which when taken together, can explain how a person is led to committing a fraudulent act. These are: • Perceived unshareable financial need • Perceived opportunity • Rationalization 12 of 44
  • 13. Donald Crecy’s Hypothesis • According to Donald Crecy’s Hypothesis: – Trusted persons become trust violators when they conceive of themselves as having a financial problem which is non-shareable, are aware this problem can be secretly resolved by violation of the position of financial trust, and are able to apply to their own conduct in that situation verbalizations which enable them to adjust their conceptions of themselves as trusted persons with their conceptions of themselves as users of the entrusted funds or property. – Donald R. Cressey, Other People's Money 1973 13 of 44
  • 14. The Fraud Triangle Motivation Factors contributing to risk of fraud Opportunity Rationalization 14 of 44
  • 15. Fraud Triangle Elements • Motivation – The various factors that drive the perpetrator to commit the illegal act • Opportunity – The conditions that exist that facilitate the commission of the act • Rationalization – The mindset that allows the perpetrator to justify his or her actions 15 of 44
  • 16. Motivation • Economic need – Perpetrator is financially stressed • Greed – Perpetrator desires material things • Retribution – Perpetrator feels victim wronged them • Convenience – “Just because its there” 16 of 44
  • 17. Rationalization • “I am entitled to the money” – Aunt Rose promised it to me – It’s just an advance on my inheritance – Dad gave my brother more than he gave me – I have been Mom’s caregiver for years • “Grandma doesn’t need really it” – Victim is perceived as wealthy – Can’t use it due to physical or mental impairment – Victim is not expected to live much longer 17 of 44
  • 18. Opportunity • Perpetrator has a fiduciary role – Is a trustee or guardian – Has power of attorney – Is a signatory on financial accounts • Perpetrator has access to victim’s assets – Personal property – Real estate and vehicles – Credit cards 18 of 44
  • 19. The Elder Theft Triangle Desperation Types of elder financial abuse as per the 2011 Met Life study Occasion Predation 19 of 44
  • 20. Elder Theft Triangle Elements • Occasion (Opportunity) • Victim is an obstacle to the perpetrator’s ability to acquire material things he/she desires • Desperation – Family or friends are very desperate for money – Will do whatever is necessary to obtain it, even if illegal • Predation – A false trusting relationship exists or is created – The friendship becomes the vehicle for exploitation – Perpetrator has a sociopathic personality and does not feel guilt 20 of 44
  • 21. Crimes of Desperation • Generally involves family or friends • Need for money can be a result of: – – – – – – – Loss of employment Health crisis or medical bankruptcy Addiction to drugs or alcohol A gambling habit Compulsive shopping A need to “Keep up with the Jones’” Being in trouble with the law • Perpetrator believes that he/she is entitled to compensation for caregiving services • Men are typically the perpetrators 21 of 44
  • 22. Crimes of Occasion • The victim has money and property • The assets are accessible • Victim is careless or unaware – Door unlocked – Money or valuables left in plain sight • The perpetrator takes what is available – Generally by stealth – Less frequently by violence 22 of 44
  • 23. Crimes of Predation • Involves building a trusting relationship – Social – Romantic – Professional • Assets stolen by stealth or subterfuge – Younger woman approaches lonely, elderly man – Dishonest broker deceives victim on investments – Contractor provides unneeded, shoddy or overpriced home repairs – Health care provider marries incapacitated person 23 of 44
  • 24. Motivation • Economic need – Perpetrator is financially stressed • Greed – Perpetrator desires material things • Retribution – Perpetrator feels victim has wronged them 24 of 44
  • 25. Characteristics of a Perpetrator • • • • • • • • • • • Is a wheeler and dealer Is domineering and controlling Doesn't like people questioning their judgment or actions Has a strong desire for personal gain Has a “Beat the system attitude” Lives beyond his/her means Has a close relationship with the victim Is unable to relax Outwardly, appears to be very trustworthy. Often display some sort of drastic change in personality or behavior Appears incapable of feeling guilt or remorse – Adapted from The Certified Accountant, 1st Quarter 2009, Issue #37 25 of 44
  • 26. Addressing Elder Theft • • • • • • • Know the signs Document the abuse Contact proper authorities Obtain legal counsel Search for the looted assets Charge perpetrators in civil or criminal court Recover assets on behalf of the victim 26 of 44
  • 27. Vehicles for Defrauding Elders There are many ways unscrupulous individuals gain access to vulnerable individuals’ assets: • The most common perpetrators are members of the victim’s own family • Trusted professional sometimes stray from their fiduciary responsibilities • Unscrupulous individuals seek vulnerable targets to deceive and defraud 27 of 44
  • 28. The Victim’s Family Unlawful conversion of the victim’s assets via: • Misuse of a Power of Attorney • Trusteeship – abuse of fiduciary responsibility • Quitclaim deed to real estate • Adding themselves to a bank account • Persuading the victim to change their will • Forging checks and other documents • Depositing retirement checks “less cash” • Stealing valuable property or cash 28 of 44
  • 29. Trusted Professionals • • • • • • • Lawyers Accountants and bookkeepers Financial and investment advisers Brokers and securities dealers Bankers Professional conservators and guardians Less frequently, judges 29 of 44
  • 30. Telephone and Internet Scams • • • • • • Halo, I am calling from Microsoft. You have virus… Good News!!! You have won the Costa Rican lottery!!! I am the Oil Minister of Nigeria. I have some funds… Grandma, I’m in jail in Hungary. Send bail money… I’m terminally ill. Can you help distribute my estate? We need you to deposit checks from our customers and wire us the money. You can keep a commission… • This Rachel from Card Services. Your eligibility to lower your interest expires soon. This is your final… • Our church’s roof is leaking... 30 of 44
  • 31. Tradesmen and Contractors • • • • • • • Prey on those who appear to vulnerable Go door-to-door soliciting business Most often are unlicensed No references Perform unnecessary home repairs Shoddy or incomplete in work Create trust with victims, steal their property 31 of 44
  • 32. Obstacles to Pursuing Recovery • Human – Can be psychological or sociological • Financial – Incapable of funding costly litigation • Legal – Law enforcement and prosecutors uninterested • Logistical – Travel time and expense for all parties • Reality – Perpetrator may already have dissipated the assets 32 of 44
  • 33. Human Obstacles • • • • • • • • Lack of cooperation from the victim Interference from the perpetrator Lack of information about what to do Reluctance to accuse anyone of wrongdoing Fear of abandonment by the family member Victim may be dependent upon the abuser Unwillingness to harm the perpetrator Victim with dementia can’t articulate facts 33 of 44
  • 34. Financial Obstacles • • • • • • High cost of litigation Unwilling to commit scarce retirement funds Uncertainty as to potential for recovery Perpetrator may have depleted available cash Can’t take time off work to pursue the case Threat of retaliation by the accused in the form of a countersuit that could be costly to defend 34 of 44
  • 35. Legal Obstacles • Statute of limitations – 3 years in Colorado – Can be tolled in some instances • • • • Multistate jurisdictions Law enforcement doesn’t see it as priority Prosecutor is not sympathetic Prosecutor is busy with more serious crimes 35 of 44
  • 36. Logistical Obstacles • Plaintiff, victim and perpetrator all live in different states or countries • Depositions might require expensive travel • One or more parties are disabled and travel to attorney’s office and court is problematic • Victim is housebound 36 of 44
  • 37. Reality Obstacles • • • • • Cash most likely has been dissipated Perpetrator has left the state or the country Assets have been transferred to a third party Assets have put in a trust or corporation Real estate has been retitled to someone else 37 of 44
  • 38. Asset Recovery Steps The Goal: Stop the hemorrhage and recover stolen assets – – – – – – – – – – – – Collect as much documentation as possible Confront the perpetrator, request voluntary restitution Try to remove perpetrator from custody of the assets If that fails, retain legal counsel Initiate discovery - Request for Production of Documents Retain the services of a forensic accountant, if appropriate Analyze documentation Prepare interrogatories and deposition questions for counsel Analyze the products of discovery Conduct deep web searches or concealed property Prepare courtroom exhibits Ask counsel if a pursuing criminal action is appropriate 38 of 44
  • 39. Transmittal of Documents Security must be observed when paper or electronic documents are exchanged between parties. • They often contain active bank account and credit card information. • Data should not be transmitted in emails as email attachments • Consider using a secure cloud platform. – Dropbox – uses server-side encryption – Spideroak– uses client-side encryption (better) 39 of 44
  • 40. Preparing Courtroom Exhibits Your courtroom exhibits are instrumental in persuading the judge or jury to rule in favor of your client • Each exhibit should be concise and to the point • Layer backup exhibits for each primary one • Use charts and graphs where appropriate 40 of 44
  • 41. Obtaining Data Using Discovery • Discovery is a process used prior to trial whereby litigants request information from each other using vehicles such as: – Requests for production of documents – Interrogatories are written questions submitted to the opposing party regarding facts of the case – Depositions are interviews of a litigant conducted by a lawyer in an out-of court-venue 41 of 44
  • 42. Which Recovery Approach to Use? • Egregious, destructive fraud – Use the scorched earth, steam roller method – Initiate concurrent civil and criminal actions • Low grade fraud with minor harm to the victim – Negotiate, persuade perpetrator to return funds • Somewhere in between – Consider arbitration – Appointment of a guardian or conservator – Nominate a trustee to manage the assets 42 of 44
  • 43. Increasing Awareness • Training for: – Advocates – Health care workers – Sworn law enforcement officials – Officers of the court – Family caregivers – Bankers, brokers and financial advisers – CPAs and bookkeepers – Attorneys 43 of 44
  • 44. Ongoing Elder Theft Study Elder Financial Exploitation via Power of Attorney Abuse: What Family Members’ Experiences Reveal about this Problem, Its Causes, and Consequences" • We are still seeking multiple participants from families with – 1) successful family member POA agent experiences – 2) families with allegedly exploitive POA experiences 44 of 44