Time Share Fraud Investigations

Slides:



Advertisements
Similar presentations
Part IV. MONEY SERVICE BUSINESSES Another Money Laundering Trend.
Advertisements

1 2 Note: The following slides represent suggestions to enhance the writing of a SAR narrative. This information should be used in conjunction with the.
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
© Family Economics & Financial Education – October 2010 – The Essentials to Take Charge of Your Finances – Depository Institution Essentials – Slide 1.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
African Dialogue Livingstone Zambia Charles Harwood U.S. Federal Trade Commission.
07-08Available from BankersOnline.com Bank Secrecy Act (BSA) For New Hires.
Personal Financial Management
Anti-Money Laundering (AML)
INTERNATIONAL COOPERATION Daniel H. Claman Senior Trial Attorney U.S. Department of Justice.
POCA - A Local Authority View. Local Authorities & POCA What asset recovery offers Contributes to your Councils Strategic Priorities To protect the most.
This tool can be found in the Banker Tools section of BankersOnline.com. 1 Bank Secrecy, Anti-Money Laundering & OFAC Director Education.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Chapter 4 Billing Schemes.
1.7.3.G1 © Family Economics & Financial Education – Revised March 2008 – Financial Institutions Unit – Depository Institutions Funded by a grant from Take.
4.01 Accounting and Finance. What is Accounting? Method of reporting financial activity of a business Financial transactions recorded in an orderly fashion.
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
February 10, 2012 Michelle Hemerley Director, Compliance Consulting
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
AMLA Mid-Atlantic Chapter Event
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
1.7.2.G1 © Family Economics & Financial Education – Revised February 2008 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take.
Obtaining Evidence through Discovery & Witnesses John W. McReynolds Assistant Chief New York Field Office Antitrust Division U.S. Department of Justice.
Federal Bureau of Investigation
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Law Enforcement Cases Supported by FinCEN Data Information Published in The SAR Activity Review - Trends, Tips & Issues, 21, May 2012.
1 U. S. Department of Transportation: Office of Inspector General Office of Investigations and Illinois Department of Transportation: Financial Review.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
WHEN THE DEPARTMENT OF JUSTICE KNOCKS DOJ Enforcement Trends: What to Expect and How to Respond Jacqueline Arango Shareholder Akerman Senterfitt.
Major Case Unit John Dormin Michelle Martone Executive Director Associate Investigator Office of Special investigations Office of Special Investigations.
SSA, Todd Petrie The AMLA Presentation: 3/18/2009.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Cyber Security Nevada Businesses Overview June, 2014.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
St Paul Police Department’s Criminal Proceeds Unit
Session 5 Anti-Money Laundering & Financial Crime Conducting or Supporting the Investigation Process Presented by ERM Institute Monday, 24 February 2014.
MLA FOR ASSET TRACING & RECOVERY INVESTIGATIONS: INTELLIGENCE & EVIDENCE.
Town of Brookfield, CT (“TOB”) Public School System Presentation to First Selectman and Board of Finance June 10, 2015 Attorney Work Product Privileged.
Chapter 4 Billing Schemes.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
AML Compliance Findings & Observations Wyn Clark U.S. Treasury.
Managing Your Money Chapter 23.
“The entire essence of America is the hope to first make money—then make money with money—then make lots of money with lots of money.” Paul Erdman.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Copyright 2007 Thomson South-Western Chapter 5 Banking Procedures.
Immediate Issues & Tasks after the discovery of Occupational Fraud March 17, 2016.
Small Enterprise Embezzlement Presented by: Michael “MIKE” Leonard Michael Leonard & Associates.
More bankingChecks, etc. Check types ServicesMisc. Banking Banking Services Game.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Cash Management and Banking Relationships Nicole Hackmann Director of Banking Office of Missouri State Treasurer, Clint Zweifel.
Early Warning Law Enforcement Insights on Emerging Trends and Typologies 11:10 – 12:15 PM, Yale Club, New York.
May 2016U.S. Securities and Exchange Commission1 INSIDER TRADING Matthew B. Greiner Branch Chief Office of International Affairs U.S. Securities and Exchange.
Bank Secrecy Act The Currency and Foreign Transactions Reporting Act of 1970 Choice Lending Corp Training.
Teresa Brown Open Records Supervisor Plano Police Department
Building a Narcotics Case
Bank Secrecy Act SCEFCU June 21, 2005.
Approach to itinerant groups
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
Depository Institution Essentials
Depository Institution Essentials
Depository Institution Essentials
On-Site Investigations
Presentation transcript:

Time Share Fraud Investigations Detective Michael Stevens Detective Hilary Bledsoe Orlando Police Department

PROBLEM: Organized Criminal Groups Conducting Wire Fraud Companies based in Central Florida that utilize satellite offices/ drop boxes all over the US Thousands of victims worldwide Fictitious companies that rename every 60-90 days Difficult to infiltrate into the inner group Very little law enforcement knowledge of the groups Incorporated company is different from company pitched to victims Large profits allow groups to finance widespread fraud

RESPONSE: OPD dedicates two detectives full time for three months on investigation Develop contact with Department of Agriculture and Consumer Affairs, State Attorney Generals Office and other law enforcement agencies both State and Federal Detectives research timeshare industry and develop a basis of knowledge Review of crimeline complaints and tips in an attempt to identify organizations operating within the 9th Judicial circuit Statewide prosecution focus Long term investigation targeting upper level subjects

PHASE 1: Gather, develop and analyze intelligence and information on groups Review of Crime Line tips, public records, state corporate records, internet sites and social networking sites Contact with other Central Florida Law Enforcement agencies Identify target for investigation

PHASE 2: Develop an operational plan for the course of the investigation Surveillance Trash pulls Development of sources of information Use of confidential informants Law enforcement information Public records search Interview of witnesses and victims Contact with prosecutor Decision of prosecution before or after search warrants

PHASE 3: Identification of Assets Bank accounts linked to business and subjects Homes Vehicles Businesses Other

PHASE 3 CONTINUED: Use of investigative subpoena Show the money flow Use of law enforcement databases and communications Examination of documents linking assets to illegal conduct Contacts with financial institutions Coordinating account seizures within the investigation

PHASE 4: Determine charges based upon the investigation to date Aggressive use of search and seizure warrants Target “boiler/phone rooms” Residences Financial institutions Documents, documents, documents (nothing is too small) Computer systems and storage devices

PHASE 5: Document review and exploitation Immediate action at the scene (bank accounts, other search/seizure warrants, identification of assets) Historical document review Every document is important- Case agents should review ALL evidence Use of documents to corroborate SOI, CI, witness and victim information Length, scope, size and amount of fraudulent activity

PHASE 6: Secondary interviews and Proffers Defendants Witnesses Ex-employees Current employees New victims

PHASE 7: Financial Investigations Identify corporate and personal bank accounts for the organization Identify host financial institutions Use of investigative subpoena Examination of subpoenaed documents Statement review Identification of additional corporate entities and co-conspirators Identification of money laundering counts

Clues for the AML Investigator Corporate accounts with limited shelf life Activity inconsistent with normal account activity for the type of business No previous banking history for the company Wide spread deposits into the account from multiple subjects via wire, check and direct cash deposits Corporate accounts associated with large ACH dumps Rapid withdrawals and transfers to associated accounts under different corporate names or individuals

Clues for the AML Investigator continued Fraud complaints made to the host financial institution Widespread use of bank of cashiers checks Multiple corporate accounts with the same signatories

What We Need From You Identify accounts Your professional experience as subject matter experts Movement of funds Corporate entities and individuals attached to the accounts SAR and CTR activity Information on bank and cashiers checks Identification of major purchase and/or luxury items This may come from subpoenaed documents or a phone call

KEY POINTS TO REMEMBER TREAT THE INVESTIGATION AS A RICO DOCUMENTS ARE KEY DEVELOP COOPERATING DEFENDANTS WORK WITH YOUR PROSECUTOR USE SEARCH WARRANTS AS A TOOL NOT AN END RESULT CHOOSE EVIDENCE OVER MONEY WORK TOGETHER/ASK FOR ASSISTANCE GO UP THE FOOD CHAIN NOT DOWN IT

Case Studies Vacation Realty International Account seizure Car Furniture Homes $ payments to straw nominee Bank of America Fifth Third Sun Trust

Case Studies JAMS Management Purchases 15 million in fraud over two years Widespread ACH dumps into corporate accounts and personal checks Funds transferred to other corporate accounts all within the organization Purchases Cars Homes Horses

How they see themselves…..

DOCUMENTS LOCATED INSIDE THE BOILER ROOM