Tomasz Konopka Borys D Sawicki Ms X, an accountant at company A, domiciled in country B, receives a phone call. Someone on the other side of the line explains that he is calling her in connection with a new project run by company A in which her assistance will be required. Shortly after, Ms X receives an e-mail from a top level manager of company A (whom she has never met personally), Mr Z, referring to that call and repeating the message. Mr Z explains the relevance of the project to company A and stresses the importance of Ms X's involvement for its success. He also requests Ms X to keep the matter secret and to work on the assignment solely with him. Ms X feels honoured. Not long after the call, Ms X receives her first task in the project: she has to wire €450,000 ($613,000) from company A's bank account to an account of a company (unknown to her) in Country C. The following days bring several similar requests; Ms X wires the monies and Mr Z praises her assistance and encourages her to continue, as the project is about to be successfully completed. But before the successful completion arrives, Ms X's direct superior finally notices the transfers from the bank account of company A and demands explanations. A few hours later, it is clear that Mr Z (the real one) has never contacted Ms X nor instructed her to make any money transfer. At which time, however, the monies are already in a bank account in country C. The story is neither unrealistic nor exceptional – frauds similar to the one depicted above are occurring more and more often. There are several reasons for this, the shift towards electronic means of communication in lieu of direct (face to face) contacts being one of them. Loosened relations between staff and managers and properly employed social engineering generate opportunities for those willing to take advantage of the dangerous mix created by modern technology and people's gullibility. While there is no way (and no need) to stop technological progress, companies assisted by experts, including lawyers experienced in similar matters, may undertake various precautionary steps to mitigate the threat.
July 07 2014