1 / 20

Operation Homeless: Preventing Identity Theft and Fraud

Join us in our ongoing prevention campaign against identity crimes. Learn about the modus operandi of criminals using homeless individuals to cash stolen checks and other fraudulent activities. Protect yourself and your community from financial fraud.

andrec
Download Presentation

Operation Homeless: Preventing Identity Theft and Fraud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Who We Are… • One of America’s oldest law enforcement agencies. • Approximately 1400 Federal Agents nationally and internationally. • Mission: To protect the U.S. Mail, the USPS, its employees and customers from criminal attack. • Investigate crimes such as: Mail Theft, Mail Fraud, ID Theft, Dangerous Mails, Narcotics/Child Pornography in the Mail, etc.

  2. OPERATION HOMELESS Modus Operandi 1. Homeless/indigent persons are used to cash the counterfeit versions of the stolen checks. They pass the checks using their true names and government identification 2. Checks are usually cashed inside the bank lobby, not drive- through. 3. Check cashers are usually dropped off away from the bank, cash the check, then walk to a meeting point. 4. The cashers are sometimes cleaned up, provided a meal, and even given new clothes to wear at the bank.

  3. COMPLICATIONS • Checks Are Stolen in One Geographic Location • Check Cashers Are Recruited From a Second Location • Check Cashers are Transported to a Third Location to Cash the Checks

  4. RICHMOND, VA

  5. Ongoing Prevention Campaign

  6. NDCBU CONVERSION PROJECT IN BUSINESS PARKS

  7. IDENTITY CRIMES ARE ATTRACTIVE • Information is plentiful • Absence of face-to-face contact with victims • Jurisdictional complications • Easy to do • “Less jail time than robbery”

  8. Aggravated Identity Theft Penalty 18 USC 1028A – Whoever, during and in relation to any felony violation enumerated… knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person . . . . The MANDATORY 2 year term of imprisonment is CONSECUTIVE to any other imprisonment imposed.

  9. ACCOUNT TAKEOVERS • Personal and account information of a true person is compromised. • Victim’s documents, statements and identifying cards are diverted by changing the address with custodian. • Account “kiting” may follow.

  10. Automobile dealers, retailers, restaurants Custodians Positions of Trust/Personnel Files/Bookkeepers Dumpster Diving Stolen Wallets and Checkbooks Healthcare Records Large Data Breaches SOURCES OF COMPROMISE

  11. RESHIPPING FRAUDExample of Work At Home Scheme • Operated Out of Eastern Europe & Nigeria • High-Dollar Merchandise & Electronics Bought With Stolen Credit Cards • Merchandise is Shipped to Unsuspecting “Reshipper” • The Reshipper Repackages Merchandise and Mails it Overseas

  12. FOREIGN LOTTERIES • It’s Illegal in the United States To Mail: • Lottery Tickets, Advertisements, or Payments to Purchase Tickets in a Foreign Lottery • They Will Say You’ve Won, But Fees Are Required

  13. WORK AT HOME SCHEMES • Usually found on an internet ad • May Require an Upfront Investment • May Involve The “Processing” of Checks • Ask for your personal info so you can get paid.

  14. Dave CunninghamRichmond, VA Washington Division 804.418.6140 drcunningham@uspis.gov

More Related