Uploaded by goldendoodlelover2014

Fraud Chapter 9 Study Guide

advertisement
Chapter 9 - Conversion Investigative Methods
Conversion (how the perpetrators spend their money) Searches
1. Conversion searches are performed for two reasons:
a. Determine the extent of embezzlement
b. Gather evidence for interrogations
2. Interviews → try to have the suspect admit their only income is earned income, make it
difficult to explain lifestyle
3. How to investigate
a. www.howtoinvestigate.com
b. www.factfind.com
c. www.crime lynx.com
A. Sources of information
a. Government
i. Federal
1. Department of Defense - military records
2. Department of Justice - federal agency (criminal and civil laws)
a. The drug enforcement administration (DEA)
b. FBI
i. National Crime Information Center (NCIC)
ii. Interstate Identification Index (III) - nationwide
3. Federal Bureau of Prisons
a. www.bop.gov
4. IRS
a. Enforces all internal revenue laws except firearms, tobacco,
and explosives (Bureau of Alcohol, Tobacco, and Firearms)
5. Secret Service
a. Part of the Department of Homeland security
b. Safehands the payment and financial systems of US
6. U.S. Postal Service
a. Postal inspectors → most helpful investigators
7. CIA
a. Accountable to president
b. Investigates security matters outside the US whereas the
FBI works within
8. Social Security Administration
a. Information about individuals’ SSNs
b. Publishes list of dead SSNs
9. Other Federal Sources of Information
ii.
State
1. State attorney general
a. The attorney general for each state enforces all state, civil,
and criminal laws in cooperating with local law
enforcement agencies
2. State Prisons
3. Secretary of state
a. Maintains records relating to businesses and Uniform
Commercial Code filings (UCC)
b. Mortgages, equipment, personal property, collateral on
purchased and leased assets, the nature of the lending
company…
4. DMV
5. Department of Vital Statistics - birth records
6. Department of Business regulation - licensing info for
professionals / credentials/ complaints
iii. County/Local
1. County Clerk
a. Voter registration records and marriage licenses
2. County Land Office and tax assessor’s office
a. Real estate records for land located in the county
b. Owned assets, indebtedness, mortgage holders, trustees or
straw buyers
c. Tax records
3. County Sheriff
4. Other Officers
5. Local Courts
a. Records on past law violators, including pretrial inno like
personal history, employment history, personal and physical
information, prior charges, divorces and property
settlement agreements, personal injury lawsuits, financial
claims and litigation, fraud claims and co-conspirators,
bankruptcies, wills, and probates
b. Many perpetrators often justify their extravagant lifestyles
by claiming to have inherited money - claims can be
validated or dismissed form information contained in wills
and probate
6. Permit Departments
a. Fire permits, health permits, elevator permits, and building
permits
b. Private Sources
i.
Utility records
1. gas , electric, water, garbage, sewer → show the names of who was
billed, whether or not a persona lives or owns property in the area
ii.
Previous acquaintances
1. Testimony and documents
iii. Trash
1. Hard copies may be destroyed but remain digitally on other
devices
iv. Credit reporting companies
1. Private credit records for individuals and organizations
a. Consumer information, such as addresses, ages, family
members, and incomes
b. Account information, such as payment schedules, items
purchases, and buying habits
c. Marketing info, such as customer breakdowns by age, sex,
and income levels
d. Information on current and former employers
2. Fair Credit Reporting Act (FCRA) of 1971
a. Consumer-reporting agency must on request furnish info to
an individual that is also turned to a 3rd party
i. Experian
ii. Equifax
iii.
Transunion
v. Banks
1. Records obtained through subpoena, search warrants, civil
summons, or civil discovery
2. Gramm-Leach-Bliley Act – > using false pretenses is illegal but
banks and financial institution can share customer info if they
disclose it to customers
a. Option to opt out of information sharing
c. Online Sources
i. Online databases
ii.
Techniques for effective internet searches
1. Search by phrase
a. Words inn quotation marks
2. Minus search terms
a. Place a minus sign before unique terms found
3. Domain restrictions
4. Cashed results
a. Cached versions are extremely helpful when sites are
temporarily inaccessible or no longer available
5. Google news
6. Google images
7. Google earth
a. Satellite pictures
d. Net Worth Method → determining extent of stolen funds
i. Assets - liabilities = net worth
ii.
Net worth - prior year’s net worth = net worth increase
iii. Net worth increase + living expenses = net income
iv. Income - funds from known sources = funds from unknown sources
v. Verifying or eliminating other sources of funds→ estimate of amount of
stolen funds
**When people have income, they either purchase additional assets, pay off liabilities, or
improve their lifestyles, thus increasing their living expenses
**Known income subtracted from unknown income gives a reasonable estimate of unknown
funds
**Verifying or eliminated other sources of funds (such as inheritances, gambling, winnings, and
gifts, gives a good estimate of the amount of stolen funds
Download