<?xml version="1.0" encoding="utf-8"?>
<oembed>
  <version>1</version>
  <type>rich</type>
  <provider_name>Libsyn</provider_name>
  <provider_url>https://www.libsyn.com</provider_url>
  <height>90</height>
  <width>600</width>
  <title>Fraud Leaves Fingerprints - Retired FBI Agent Dan Sigmond on Financial Crime, the Cases That Stick, and Why Your Business Probably Has a Problem You Don't Know About</title>
  <description>Retired FBI Special Agent Dan Sigmond returns to&amp;amp;nbsp;What's Working to discuss his 21 years investigating financial crimes, a remarkable story of how a previous episode of this very podcast helped crack a case, and his new private-sector firm, Special Agent Advisory Group. Dan shares how fraud always comes down to the manipulation of trust, offers vivid case stories ranging from a Jamaican lottery scheme to the &amp;quot;Pepper Spray Bandit&amp;quot; bank robber, and closes with a preview of his next topic: cybercrime as financial crime in a hoodie.  Fraud is relational, not transactional. Today's scammers build long-term trust with victims — often elderly — before extracting money. The shift from one-time hits to slow, sustained manipulation makes detection far harder and the psychological damage far deeper.  Most financial crime goes unreported. When Dan left the Bureau, only 40–50% of crimes were being reported, meaning billions in losses — particularly in business email compromise and cryptocurrency fraud — never make it into official tracking systems like the FBI's IC3.   Internal fraud bleeds slowly. The most significant embezzlement cases Dan worked unfolded over years, exploiting trusted employees with access to financial systems or merchandise. Most companies, focused on revenue and optics, don't know what signals to look for until significant damage is done.   Criminals aren't masterminds — they're persistent. The biggest misconception people carry is that scams are too sophisticated to fall for. In reality, the tactics are often simple. What's changed is the access to personal data and the ability to personalize attacks at scale.   </description>
  <author_name>What's Working with Cam Marston</author_name>
  <author_url>http://www.whatsworkingcam.com</author_url>
  <html>&lt;iframe title="Libsyn Player" style="border: none" src="//html5-player.libsyn.com/embed/episode/id/40665560/height/90/theme/custom/thumbnail/yes/direction/forward/render-playlist/no/custom-color/88AA3C/" height="90" width="600" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen&gt;&lt;/iframe&gt;</html>
  <thumbnail_url>https://assets.libsyn.com/secure/item/40665560</thumbnail_url>
</oembed>
