Fraud Detection

    Fraud Detection Training

    Keyword Search Phrase SOP

    This helps us track your training progress
    6 Categories
    10 Sections
    ~15 Minutes
    0%
    1 / 10
    Introduction

    Purpose of This SOP

    This Standard Operating Procedure helps you detect potential fraudulent activities by identifying high-risk keywords and phrases within customer interactions.

    🎯 Your Mission

    Ensure timely escalation and appropriate actions when suspicious activity is detected through keyword monitoring.

    What You'll Learn:

    • ✓ 6 critical keyword categories
    • ✓ How to search and flag suspicious calls
    • ✓ Proper escalation procedures
    • ✓ Documentation and reporting requirements
    Category A

    Sensitive Financial & Identity Information

    ⚠️ High Risk: These keywords indicate requests for sensitive information that can facilitate fraud.

    Keywords to Monitor:

    "Card Verification Value"
    "CVV"
    "passcode"
    "security code"
    "verification code"
    "expiry date"
    "SSN"
    "social security number"

    Why This Matters:

    Requests for sensitive financial or identity information present a high fraud and data-privacy risk. These details can be used to:

    • Facilitate unauthorized transactions
    • Enable account takeovers
    • Commit identity theft

    Any occurrence requires immediate review to confirm adherence to security and data-handling policies.

    Category B

    Personal Contact Information Requests

    🚨 Red Flag: Attempts to bypass official communication channels.

    Keywords to Monitor:

    "personal email"
    "private email"
    "cell phone number"
    "mobile number"
    "call me directly"
    "reach me at"
    "off the record"
    "just between us"
    "don't go through the office"

    Why This Matters:

    Requests for personal contact information or attempts to bypass official communication channels may indicate an effort to move the conversation off-record, which is often used in fraudulent activity.

    Category C

    Money Release / Fund Transfer Discussions

    💰 Critical: Urgent money transfer requests are a strong fraud indicator.

    Keywords to Monitor:

    "wire transfer"
    "send the payment"
    "urgent transfer"
    "move the funds"
    "same day transfer"
    "rush the funds"
    "emergency funds"
    "need money today"
    "expedite payment"
    "before end of day"

    Why This Matters:

    Keywords related to urgent or unverified money transfers are a strong indicator of fraud. These phrases often suggest:

    • Pressure to bypass normal procedures
    • Rush financial transactions
    • Circumvent verification processes
    Category D

    Out-of-Channel Communication

    📱 Alert: Requests to use unofficial communication platforms.

    Keywords to Monitor:

    "WhatsApp me"
    "text me"
    "Telegram"
    "meet offline"
    "call my personal line"
    "encrypted message"
    "private chat"
    "keep this quiet"
    "confidential discussion"

    Why This Matters:

    Requests to communicate outside of official channels (e.g., WhatsApp, Telegram) may indicate an attempt to evade monitoring systems and commit fraud without a record.

    Category E

    Unusual Authentication or Verification Patterns

    🔐 Security Breach: Attempts to bypass security protocols.

    Keywords to Monitor:

    "skip verification"
    "waive authentication"
    "you know who I am"
    "bypass security"
    "make an exception"
    "just this once"
    "calling on behalf"
    "spouse calling"
    "family member"
    "representing the account holder"

    Why This Matters:

    Requests to bypass security, authentication, or verification procedures suggest fraudulent behavior, as they indicate an attempt to access information or conduct transactions without proper identification.

    Category F

    General Red Flag Language

    🤫 Secrecy Alert: Requests for confidentiality outside normal business practices.

    Keywords to Monitor:

    "don't tell anyone"
    "keep confidential"
    "between us"
    "this is off the record"
    "just between you and me"

    Why This Matters:

    Requests for secrecy or confidentiality, especially when unrelated to business, can be indicative of attempts to conceal fraudulent actions or avoid accountability.

    Implementation

    Keyword Search Process

    1

    Set Up Search Queries

    For each category, create a search query in Nexidia Voice Analytics using the Add Phrase Function to cover multiple keywords.

    💡 Pro Tip: Group related keywords together for more efficient searching.
    2

    Define Search Parameters

    • Frequency: Flag calls that contain 2 or more keywords from any of the high-risk categories.
    • Sample Calls: Review 5-10 calls per day with flagged keywords.
    3

    Flag Calls for Review

    Once the search identifies relevant calls:

    1. Listen to the flagged calls
    2. Assess if they show indications of fraud based on context and urgency
    3. If fraud is suspected, escalate to the Program Director for further investigation
    Final Steps

    Monitoring, Reporting & Accountability

    📊 Monitoring and Reporting

    Escalation:

    If fraud or suspicious activity is confirmed, escalate the case to the Program Director for further investigation.

    Regular Reporting:

    Maintain a log of flagged calls and actions taken. Report weekly on:

    • Number of flagged calls
    • The category of each flag
    • The outcome of the investigation

    🔄 Review and Adjustment

    Adjust Search Criteria: Update keyword lists based on emerging fraud trends, adjusting search parameters as needed to reflect evolving risks.

    📝 Accountability

    Documentation: Ensure that all flagged calls and actions taken are documented for future reference and audit purposes.

    Final Step

    Complete Your Training

    🎉 You've Reached the End!

    Congratulations! You've completed all 9 sections of the Fraud Detection SOP training.

    What You've Learned:

    6 critical keyword categories
    How to flag suspicious calls
    Proper escalation procedures
    Documentation requirements

    📋 Important: Mark Your Training as Complete

    To receive credit for this training, you must click the button below.

    This will officially record your completion in the system and update your training status.

    Your completion will be recorded with your NTID/EID:

    Training Completed! 🎉

    Great job completing the Fraud Detection SOP training!

    100% Progress
    Your ID

    Next Steps:

    • ✓ Apply this knowledge in your daily work
    • ✓ Review the categories regularly
    • ✓ Report suspicious activity immediately
    Back to top button