How Family Members Are Stealing $32 Billion from America's Elderly

By Dorothy Hill

Jun 17, 2025

When Dorothy Hill launched the premiere episode of "From the Hill to the Trenches: The Search for Justice", she chose to tackle one of America's most underreported yet devastating crimes: elder financial exploitation. Joining Hill for this inaugural discussion is Chuck Harold, a cybersecurity expert and retired California Peace Officer with more than 40 years of experience in law enforcement, corporate security, and private investigations.

Harold's extensive background includes having served as former head of security for Fox Broadcasting and Walt Disney Studios and worked as a licensed California Private Investigator/Consultant and Private Patrol Operator. He is the creator, producer, and host of SecurityGuyTV.com with over 3,000 podcasts, including those done on-site at BlackHat conferences. This four-decade career in law enforcement and technology gives him unique insights into financial crime investigation that would prove invaluable in his personal battle against elder financial exploitation of his own mother.

The conversation centers around a crisis that affects millions of American families yet remains largely hidden from public view. Elder financial exploitation represents a staggering $32 billion in annual losses to seniors across the United States, with the most shocking statistic being that approximately 65% of these crimes are committed by family members. This isn't the stereotypical overseas-based scam operations targeting vulnerable seniors through phone calls; this is systematic theft by the very people seniors trust the most. Harold's personal experience of fighting for his mother's century-old family trust illustrates how sophisticated these schemes have become and why traditional legal remedies often fail to protect victims.

The Scope and Scale of Elder Financial Exploitation  

The statistics surrounding elder financial exploitation paint a picture that many people would find difficult to believe. The annual losses of $28-32 billion represent just the tip of the iceberg, as experts estimate that the vast majority of elder financial exploitation cases go unreported. The primary reason for this underreporting lies in the subtle nature of family-perpetrated financial crimes, which often masquerade as legitimate legal proceedings within family financial and inter-generational estate management.

Unlike the more recognizable forms of elder fraud, such as romance scams or fake charity solicitations, family-based financial exploitation typically involves complex manipulation of legal instruments as well as financial holdings and accounts. Perpetrators often hold positions of trust as trustees, power of attorney holders, or designated caregivers, giving them legitimate access to seniors' financial accounts and legal documents. This legitimate access provides cover for systematic theft that can continue for years without detection.

The demographic most vulnerable to this type of exploitation includes seniors with significant assets, those experiencing cognitive decline, and/or individuals who have become socially isolated from other family members who may otherwise never notice suspicious activity. The complexity of modern financial instruments and legal structures makes it particularly difficult for seniors to monitor their own affairs, especially when they're dealing with health issues and/or have delegated financial management to trusted family members.

Loan Stacking to Legal Manipulation  

Harold's investigation into his mother's trust revealed the sophisticated methods modern financial criminals employ to steal from elderly family members. One of the most complex schemes he uncovered involved what is known as loan stacking, a process where the perpetrator takes out multiple loans against the same property without properly recording all the liens. In Harold's case, he discovered that the trustee had accumulated 55 different deeds on just three residential properties, creating a web of debt that resulted in over $600,000 in negative equity.

The mechanics of this scheme relied heavily on exploiting gaps in public record systems. By using databases like MERS (Mortgage Electronic Registration Systems), perpetrators can record property transactions in ways that make them difficult to track through traditional county record searches. This creates a situation where lenders may not be aware of existing liens when approving new loans, thus allowing the criminal to extract far more money than the properties are worth while using the victim's assets as collateral.

Perhaps even more insidious is the concept of extrinsic fraud, fraudulent acts committed outside formal court proceedings that significantly impact legal outcomes. Harold's case involved a trustee who hired expensive out-of-state attorneys to threaten legal action while not being licensed to practice law in the relevant jurisdiction. This type of legal intimidation relies on victims' unfamiliarity with legal procedures and their natural inclination to avoid costly litigation.

The Investigation Process

When families suspect elder financial exploitation, the investigative process can seem overwhelming. However, Harold's experience demonstrates that ordinary people can uncover complex financial crimes using publicly available resources and systematic documentation. The key lies in understanding that a successful investigation requires patience, organization, and a methodical approach to gathering evidence rather than advanced technical skills or legal training.

The foundation of any investigation should be comprehensive documentation organized in chronological order. Harold emphasized that every piece of evidence, e.g., email correspondence, bank statements, legal documents, even photographs taken with smartphone, should be saved with dates as the first part of the filename. This creates a timeline that allows patterns to emerge and helps legal professionals and bank fraud investigators to understand the sequence of events. Modern technology makes this process much easier than it was in the past, as smartphones can scan documents and upload them directly to cloud storage systems.

Public records research forms another critical component of the investigation process. County deed records, property tax assessments, and business registration databases are all accessible online in most jurisdictions. While privacy laws prevent access to detailed financial records such loan applications and ultimate beneficial owners (UBOS) of shell companies, the existence of loans and the respective dollar amounts are typically matters of public record. Investigators should also be aware of specialized databases like MERS that may contain records not found in traditional County systems.

Essential Investigation Steps for Families:

  1. Document Everything Chronologically - Save all communications, financial statements, and legal documents with dates in the first portion of the filename (for example, "YYYYMMDD - Victim John Doe - XYZ Brokerage Statement JUNE2025")

  2. Search Public Property Records - Check county websites for deed transfers, tax assessments, and lien recordings

  3. Monitor Credit Reports - Look for unauthorized accounts (including the elderly person as a co-signer), unknown addresses or hard inquiries that might indicate identity theft

  4. Review Bank Statements - Identify unusual transactions, especially large withdrawals or transfers and unknown locations (for example, Trustee lives in Tampa, FL and withdrawal was made in Las Vegas, NV)

  5. Photograph Physical Evidence - Use smartphone scanning features to capture documents and communications

  6. Create a Timeline - Organize all evidence chronologically to identify patterns and sequences

  7. Contact Financial Institutions - Report suspicious activity that might warrant suspicious activity reports (SAR) filings to US Department of Treasury FinCEN

Why Legal Remedies Often Fall Short  

The intersection of elder financial exploitation with the legal and financial systems reveals fundamental flaws in how these institutions protect vulnerable seniors. Traditional legal remedies often prove inadequate because they're designed for disputes between equal parties, not for situations where one party has cognitive impairment and/or has been deceived about their respective legal rights. Harold's experience with courts that allowed attorneys to negotiate settlements with a person diagnosed with dementia illustrates how the legal system has become complicit in elder abuse.

Financial institutions present another layer of complexity in combating elder financial exploitation. While banks are required to file Suspicious Activity Reports (SARs) with the US Department of Treasury's Financial Crimes Enforcement Network (FinCEN) for transactions that meet certain financial crime (FinCrime) thresholds or patterns, the criteria for reporting these may exclude sophisticated schemes orchestrated by family members with legitimate account access. The challenge lies in distinguishing between legitimate family financial management and exploitation, especially when the perpetrator has legal authority to make transactions.

The most frustrating aspect for families dealing with elder financial exploitation is the resource allocation problem within law enforcement and prosecutorial agencies. Complex financial crimes require significant investigative resources and specialized expertise, which many agencies lack. Unless the dollar amounts reach substantial thresholds or the case involves multiple victims, prosecutors may be reluctant to pursue charges. This creates a situation where criminals can steal substantial amounts from individual families while staying below the radar of serious law enforcement attention and subsequent criminal prosecution.

Protecting Your Family and Seeking Justice  

The fight against elder financial exploitation requires both proactive protection measures and reactive investigation techniques when abuse is suspected. Families must recognize that traditional approaches—hiring expensive attorneys or relying solely on law enforcement—may not be sufficient to recover stolen assets or prevent future exploitation. Instead, a multi-faceted approach that combines careful documentation, strategic use of regulatory reporting systems, and coordination with multiple agencies offers the best chance of success.

Prevention remains the most effective strategy for protecting elderly family members from financial exploitation. This includes maintaining family involvement in seniors' financial affairs, implementing appropriate oversight mechanisms for trustees and power of attorney holders, and educating elderly family members about common exploitation tactics. Regular family meetings to review financial situations and decision-making processes can help identify problems before they become severe.

When exploitation is discovered, families should consider multiple avenues for seeking justice beyond traditional civil litigation. Federal agencies like the IRS may be interested in cases where stolen funds represent unreported income by the perpetrator. The U.S. Postal Inspection Service has jurisdiction over mail fraud cases, while the Secret Service handles wire fraud investigations. State-level resources include attorney general offices that may have specialized elder abuse units and state banking regulators who can investigate financial institution compliance issues.

This premiere episode serves as both a wake-up call about the scope of elder financial exploitation and a roadmap for families facing these challenges. By combining Dorothy Hill's expertise in financial crime investigation with Chuck Harold's real-world experience as both a law enforcement professional and a victim's family member, the podcast provides practical guidance that can help families protect their elderly relatives and seek justice when crimes occur. The key message is clear: while the system has significant flaws, informed and protective family members can fight back against elder financial exploitation and hold perpetrators accountable for their crimes.

Don't let your family become another statistic in the $32 billion elder abuse crisis. Listen to the full premiere episode of From the Hill to the Trenches (Add Hyperlink) to learn the investigative techniques that could protect your loved ones from financial predators (including in your own family).

EndFragment

What Our
Customers Are Saying

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English.

It is a long established fact that a reader will be distracted by the readable of a page when looking at its layout.

- Brian E. Sumlin

Comments