Life insurer survey:
What types of fraud are trending upward? 
    alt txt

    properties.trackTitle

    properties.trackSubtitle

    Fraud is a concern for life insurance companies, particularly with the shift toward digitalization and automation. In early 2024, Munich Re gathered insights from U.S. Life Insurance carriers through a survey about their experience with fraud. In the survey, fraud was defined as an intentional misrepresentation, deceit, or concealment of material fact known to one party with the intent to deceive another party for the purpose of wrongfully receiving life insurance benefits. 

    The results showed that the three types of fraud that have risen the most in the last five years, according to survey respondents, are: applicant misrepresentation, financial elder abuse, and data breach or improper use of data (Figure 1). 

    This article explores how some companies manage these risks and shares Munich Re’s suggested best practices for addressing them. 

    Insurance Application Misrepresentation 

    Material misrepresentation refers to an untrue statement or omission that affects an insurer’s decision to issue a life insurance policy and, if issued, what premium the insured will pay.  Material misrepresentations present unique challenges in all types of underwriting situations, from traditional (fully-underwritten) to fluidless accelerated programs. Munich Re’s Accelerated Underwriting (AUW) mortality slippage study showed that tobacco misrepresentation in AUW programs has trended up across the industry and averaged over 40% (as a percentage of all tobacco users) in 2023.1 

    In a separate internal analysis, Munich Re has observed that products with limited underwriting requirements can make it easier for those with high Body Mass Index (BMI) or adverse medical conditions to apply without thorough scrutiny.  We also noted an increase in material misrepresentation related to cancer and infectious respiratory diseases in fully underwritten cases, over the past five years.

    At underwriting 

    • Ensure complete review of the application disclosures and the data vendor reports.  Often with accelerated underwriting, information can be pulled from a variety of sources to put together a big picture of the risk.  Engage those critical thinking skills!
    • Consider careful use of credits, stretch criteria, and exceptions when issuing with limited underwriting requirements. 
    • Conduct additional due diligence when reviewing recommended tests. Investigate diagnostic tests like colonoscopies or mammograms, which are typically recommended from age 45 and 40, respectively. Further investigation is necessary if a younger individual has had or is scheduled for a colonoscopy. In addition, the timing of the visit and the application signature date should be analyzed. 
    • For prescription database checks, verify the prescribing doctor's specialty, particularly for multi-use drugs. For instance, it may be a red flag if an oncologist prescribed ondansetron (an anti-nausea medication), compared to an obstetrician/gynecologist (OBGYN). 

    When underwriting foreign risks in most non-sanctioned countries, utilize investigation companies to verify the credibility of CPA/accountants who provide third-party income verification.  

    At claim time 

    • Perform investigations on every case that is still in the contestable period, regardless of the manner of death. 
    • Investigate all aspects of the insurance application - medical, financial, social history, criminal, etc. 
    • Use vendor solutions for medical record retrieval, summaries, and foreign death investigations. 
    • Inform your underwriting area when underwriting issues result in having to pay what could have otherwise been a deniable claim. 

    Financial elder abuse

    Financial elder abuse may encompass extortion/scams, theft, misuse of authority, legal document abuse, and manipulation.  In April 2024, the U.S. Department of Treasury's Financial Crimes Enforcement Network (FinCEN) reported that financial institutions detect $27 billion in suspicious activity related to elder financial exploitation each year.2 This highlights the importance of safeguarding the elderly population from financial abuse. 

    Scams involve the transfer of funds to a stranger or impostor with the promise of a non-delivered benefit (e.g., telemarketing scams, romance scams, lottery scams, etc.)

    Theft occurs when a trusted individual steals the elder’s assets, funds, income, or uses an elder’s checks, bank account information, or credit cards without permission. In life insurance, this often manifests as financial transactions – i.e., cash value withdrawals or surrenders, unauthorized changes to bank accounts, beneficiary changes, owner changes, and updating mailing addresses. Elderly policyholders may be victims of undue influence or intimidation. Those with dementia or Alzheimer's are particularly vulnerable to financial abuse. Unfortunately, family members are the most common perpetrators of elder theft.

    The term, “Fraud Triangle” was coined by anti-fraud professionals to identify three conditions that contribute to the risk of fraud. These components are often at play in cases of elder abuse: 

    • Incentive: The offender may feel entitled to the funds.
    • Justification: The offender may believe they need the money more than the elder does. 
    • Opportunity: The offender has the means to carry out the elder abuse, such as access to bank accounts, policy documents, or passwords.

    Lack of proper controls, bypassing requirements, and ignoring red flags can enable the exploitation of the elderly.  Here are some examples: 

    • Ignoring patterns of suspicious activity without investigation 
    • Failing to verify the identity of the person making changes to the policy  
    • Neglecting to obtain proper authorization before making changes to the policy
    • Complete training on elder financial abuse. Employees interacting with customers and handling policy-related requests (e.g., beneficiary changes, policy cancellations, and policy loans/surrenders) should be trained in how to recognize red flags for financial abuse. Certain states now require such training. 
    • Implement a clear procedure for escalating matters to the Special Investigation Unit (SIU) when any suspicious activities are detected. 

    Data breach or improper use of data

    Cyber risk continues to increase, driven by rapid technological advances such as (generative) artificial intelligence (AI) and cloud technology. Global industries are increasingly dependent on IT, IoT (Internet of Things), OT (Operational Technology), and digital services such as cloud computing, each of which represents a critical part of the supply chain for many risk owners. Furthermore, the advancing sophistication of cyber criminals and the tense geopolitical situation shape the cyber threat landscape and pose a threat to global societies and democracies. 

    Major cyber risks and trends

    According to Munich Re experts, the following key risks and trends are shaping the threat landscape in 2024 and beyond: 
    Amidst all technological developments, one factor should not be forgotten when discussing data breaches or other cyber incidents: The value and criticality of data, together with governing data regulation and underlying issues regarding liability, will further push the emergence of more groups offering hack-for-hire and data theft services.3 Nevertheless, even the most advanced AI-enhanced data breaches will still involve the human element in approximately 90% of instances.4 Multifaceted efforts to create awareness and implement proper defenses that go beyond technology are and will be a must, according to Munich Re’s cyber risk specialists. 

    Find and classify your crown jewels: Enhancing visibility of where your sensitive data is located and labeling it according to its confidentiality level enables a more targeted and optimized security program implementation.

    Identify and assess risks: Establish a methodology for identifying and calculating inherent residual security risks to support the prioritization of mitigating controls and investment decisions.

    Prioritize and deploy security controls: Implement high-priority controls to improve access management, data security, and leakage prevention, system hardening configurations, log management, and other controls.

    Enhance breach detection skills: Ensure assets are monitored to find anomalies, indicators of compromise, and other potentially adverse effects that would lead or indicate an undergoing data breach attempt.

    Improve response and recovery: Establish and test incident response plans in coordination with relevant stakeholders once an incident is declared, including communication requirements and forensic analysis capabilities.

    Above all, training employees in security best practices and encouraging incident reporting should be a top priority for all organizations.

    Summary

    Fraud is a continual concern for life insurance carriers. In addition to applicant misrepresentation, financial elder abuse, and cyber security, survey respondents indicated several other upward-trending fraud types, including check and other financial frauds, and agency fraud (Figure 1). Strong monitoring practices are necessary for carriers to mitigate fraud attempts, both anticipated (such as misrepresentation) and emerging practices that attempt to take advantage of new digital products and processes. Munich Re has the expertise to support carriers in their efforts to establish diligent monitoring practices at each end of the policy life cycle, from underwriting to claim time. Please reach out to discuss. 

    References

    1Accelerated underwriting: Mortality slippage study and monitoring best practices, Munich Re Life US, February 2024.  2FinCEN Issues Analysis on Elder Financial Exploitation, U.S. Treasury Financial Crimes Enforcement Network, April 18, 2024.  3Cyber insurance: Risks and trends 2024, Munich Re, April 4, 2024. 4The Future Is Now: Introducing Human Risk Management, Forrester, February 13, 2024. 
    Contact the authors
    James Swinton
    James Swinton
    2nd Vice President, Underwriting Risk Management
    Munich Re Life US
    Iraida Labra
    Iraida Labra
    Claims Manager, NA Individual Claims
    Munich Re Life US
    Kona Bahr.
    Kona Bahr
    Senior Risk Management Consultant
    Munich Re Life US
      alt txt

      properties.trackTitle

      properties.trackSubtitle