>> "What if the bank is the enabler, making it possible to gain access to someone's account only by publicly available social information?"
Using that logic, why would the scammer even need to call the victim?
>> "after the fraudsters were able to do multiple things that emulated the behavior of the bank - sending activation codes to her that were genuine, because they were able to get that from the bank."
According to the victim, who's story does not add up and appears to have been coached by the expert hired by the paper.
Feel free to look into it, but I'm not about to go auditing bank security measures without written permission.
>> "The exact sequence of events that led to her losses is complex, so Telegraph Money enlisted the help of fraud expert James Freedman to piece together with Ms Jefferys what is likely to have happened."
This is not how an investigation is done, regardless of if you're law enforcement or not.
Further, none of the statements from the victim support the speculation provide by the expert, nor does the experts speculative commentary appear to be based on investigation in how the bank process works, what information the bank provided, what information the bank has on record to recover an account, how the account was deactivated without information from the customer, etc.
-----
More importantly, this conflicting statement from the expert:
>> Mr Freedman added, “With these frauds, there always comes a point when the victim 'buys’ the story. From that point, evidence to the contrary is ignored or explained away. [...] In cases such as this, it is not the bank’s system that has been hacked, it is the victim.”
Using that logic, why would the scammer even need to call the victim?
>> "after the fraudsters were able to do multiple things that emulated the behavior of the bank - sending activation codes to her that were genuine, because they were able to get that from the bank."
According to the victim, who's story does not add up and appears to have been coached by the expert hired by the paper.
Feel free to look into it, but I'm not about to go auditing bank security measures without written permission.