Identity Theft

Wire Fraud Defined

Wire Fraud Defined

What is Wire Fraud?

Wire Fraud refers to a type of crime that is committed through the use of technologically-based communication system, including: telephones, computational systems, online networks, the Internet, or electronic databases.

The term ‘Wire Fraud’ originated from the term ‘wiring’ which is innate in modern technological devices. Due to the advancements in computer technology and the increased presence of information and financial data to exist in an intangible format, the potential of Wire Fraud has increased greatly.

Those who commit wire fraud typically do so by “hacking” into an individual’s personal computer or a network of computers. Regardless of the medium, those who participate in wire fraud typically usurp personal and financial information to commit subsequent forms of fraud. The exchange of such information on a technological device is susceptible to such illegal actions; when personal or financial information is breached it can be rapidly used to purchase items, open up new accounts, or commit identity theft.

To prevent wire fraud from taking place, an individual must understand and review the implications that enshroud online transactions. When purchasing a product online for instance, a consumer must be sure that the portal used to purchase the goods is a secured site and does not allow third parties to access the personal or financial information offered. Additionally, an individual should also download or purchase various security programs, such as firewalls, to prevent a hacker or third party from acquiring personal information.

Wire Fraud vs. Fraud 

Fraud encompasses any criminal act in which the intention of purposefully defrauding, deceiving or the misrepresentation of a product or service has taken place. That being said, Wire Fraud allows for anonymity of those who participate in the illegal action, regardless of the mechanism used or the medium where the fraud takes place.

The Nature of Wire Fraud

The following crimes are commonly classified as Wire Fraud:

Solicitation: Solicitation is classified as the intended recruitment of either knowing or unknowing participation in a criminal act

Identity Theft: The criminal act involving the illegal and unlawful acquiring of personal information belonging to another individual with the intent to commit a criminal act

Cyber Crime: A criminal genre in which crime is committed through the usage of computers, the Internet, or virtual networks; this can include – but is not limited to hacking, phishing, SPAM, email fraud, and online stalking

Reporting a Wire Fraud Offense

In the event that an individual has been made aware of an ongoing Wire Fraud, or has been party to a Wire Fraud that has occurred in the past, they are encouraged to contact their local authorities or law enforcement department in order to report the details of the offense. In the event that an individual wishes to do so in an anonymous fashion, they have to opportunity to contact the appropriate government department, such as the National Crime Prevention Council through their telephone number: (202) 466-6272.


Wire Fraud Defined: Exploring What it is and How to Stay Safe

Wire fraud has become a significant concern in today’s digital economy. This type of fraud occurs when a person uses electronic communication to trick someone into transferring money to a fraudulent account. It’s a lucrative way for scammers to profit from unsuspecting victims. In this article, we will define wire fraud, discuss the various types of wire fraud, and explore how to stay safe from wire fraud.

What is Wire Fraud?

Wire fraud is a form of financial fraud that occurs over electronic communication platforms, such as email or social media. The fraudster communicates with the victim, portraying themselves as a legitimate entity, to obtain confidential information, such as bank account details, which enables them to steal money through transfers.

Types of Wire Fraud

1. Business Email Compromise (BEC): This type of wire fraud targets businesses. Scammers typically impersonate executives, requesting the recipient to transfer funds to the wrong bank accounts.

2. Online Purchase Fraud: This scam targets individuals who make online purchases. The scammers deceive individuals into paying for goods or services that are never delivered.

3. Romance Scams: The scammers develop an online relationship with their victims before requesting for the money. Romance scams usually go unreported because often, the victims are embarrassed to admit to their family and friends.

4. Lottery Scams: This type of scam is designed to trick victims into believing they have won a significant sum of money and that they need to transfer a small amount of money as a processing fee.

How to Stay Safe from Wire Fraud

1. Verify the authenticity of the communication: Be skeptical when something seems too good to be true. Take a moment to fact-check the sender’s identity and communication details to check that they are legitimate and not fraudulent.

2. Keep personal information confidential: Regularly monitor credit reports to detect suspicious activity and avoid sharing sensitive information, such as passwords and account details.

3. Use two-factor authentication: This adds an additional layer of security when transferring money, particularly for high-value transactions.

4. Be cautious with public Wi-Fi: Public Wi-Fi networks are unsecured and therefore, make it easier for scammers to intercept and steal information. Avoid performing any financial transactions on public Wi-Fi networks.

5. Use Secure Payment Systems: When making online purchases, ensure that the payment system is secure. Avoid paying with money transfer services that cannot be tracked.

Conclusion

Wire fraud is a growing concern in the digital age and can target both businesses and individuals. Understanding the risks and different types of wire fraud is crucial to avoid falling victim to this scam. Always remember to verify the authenticity of any communication, keep personal information confidential and use secure payment systems when making online purchases. Finally, stay vigilant and suspicious of any request to transfer money and if you suspect any suspicious activity, report the incident immediately.

Understanding Credit Card Fraud

Understanding Credit Card Fraud

Understanding Credit Card Fraud: What It Is and How to Protect Yourself

Credit card fraud is a growing problem, with billions of dollars lost annually due to fraudulent activities. It can happen to anyone, and the consequences can be severe. It is essential to understand what credit card fraud is, how it happens, and how to protect yourself from becoming a victim.

What is Credit Card Fraud?

Credit card fraud is when someone uses your credit card or credit card information without your permission. It can happen when a thief steals your credit card, when someone uses your credit card information online, or when a scam artist scams you into providing your credit card information.

Types of Credit Card Fraud

There are several types of credit card fraud, including:

1. Skimming: Skimming occurs when your card is run through a skimming device that records your credit card information. The thief later uses that information to make purchases.

2. Phishing: Phishing involves scammers who create fake websites or emails that look like legitimate ones. They ask for your credit card information, which they use to commit fraud.

3. Identity Theft: Identity theft occurs when someone steals your personal information and uses it to obtain credit cards or other loans.

4. Counterfeit Cards: Scammers can create counterfeit credit cards using your information or someone else’s, allowing them to make purchases in your name.

How to Protect Yourself from Credit Card Fraud

There are several steps you can take to protect yourself from credit card fraud, including:

1. Check your credit card statements regularly to ensure all charges are legitimate.

2. Be wary of any unsolicited emails, calls, or texts asking for your personal or credit card information.

3. Keep your credit card information safe and secure. Never give it out unless you know the recipient is legitimate.

4. Enable two-factor authentication on your accounts to add an extra layer of security.

5. Use strong passwords and change them regularly.

6. Use credit monitoring services to get alerts of any suspicious activity.

7. Report any lost or stolen credit cards immediately to your card issuer.

8. Use your credit card only on secure and reputable websites.

Conclusion

Credit card fraud can happen to anyone, but by understanding what it is and how it happens, you can take steps to protect yourself. Be vigilant with your personal and credit card information, monitor your accounts regularly, and report any suspicious activity immediately. Protecting yourself from credit card fraud is essential to ensure that you don’t become a victim of this growing problem.


What is Credit Card Fraud?

Credit Card Fraud is a type of purposeful misrepresentation involving the misuse credit cards – or similar credit-based monetary systems.  Credit Card Fraud can take place within a variety of settings, which include computer networks, the internet, E-Commerce and the online marketplace, and virtual-communicative activity; any or all of these methods may be undertaken in order to illicitly attain credit card information belonging to a victim of credit card fraud.

Due to the advent of technology, credit card fraud is not uncommon within a virtual setting, which can include the illegal and unlawful electronic access of personal financial information, the illicit attainment of personal electronic records or financial information, and the unethical and fraudulent misuse of credit cards belonging to other individuals.

Damage Caused by Credit Card Fraud

Although various means of Identity Theft exist, the multitude of results of this crime that span the severity of consequence are fairly uniform; victims of identity fraud my experience the loss of privacy, safety, security, and finances. Identity Theft undertaken by individuals engaging in credit card fraud may be committed over the computer with regard to the reception of stolen property purchased as a result of illegally obtaining another individual’s financial data and credit card information.

Due to the fact that the ability to purchase items and services through the internet creates a virtual marketplace in which credit card numbers – as well as other pertinent financial information – must be entered into a websites, the risk for hijacked information and subsequent Identity Theft is increased. The following are some measures taken by online marketplaces in order to avoid Identity Theft suffered by their customers and clients.

Credit Card Fraud Litigation

While the chance exists in which credit card fraud was committed without malicious or criminal intent, a prosecuting attorney engaging in criminal litigation must prove that criminal intent existed within an allegation of Credit Card Fraud.

In certain cases, commercial retailers – both physical and virtual – may require the production of accompanying identification in the midst of a credit card purchase. Furthermore, relatives and family members using credit cards belonging to other family members may be liable for credit card fraud charges.

How to Prevent Electronic Identity Theft

Methods undertaken in order to prevent Credit Card Fraud may include the implementation of Secured websites, required Passwords and heightened profile-based security measures, Telephone or email-based confirmation methods with regard to online purchases, the investigation of purchases or activities that do not follow specific – and individual – trends of behavior, and contractual compensatory means and financial restitution sponsored by the commercial operation in question.

Companies providing methods of Identity theft prevention – including Lifelock, which is one of the most widely-acclaimed and recognized – have employed protective measures ranging from securing online perimeters to communicative transmission inquiring about the validity of unsubstantiated activity; these types of companies have found their respective niche within the prevention of identity fraud upon providing protection in lieu of infringing on personal privacy.

What You Need To Know About Hacking

What You Need To Know About Hacking

What You Need To Know About Hacking: A Comprehensive Guide

Hacking has become a widespread issue in today’s digital age. Cybercriminals are constantly trying to breach security systems and steal personal information from individuals and organizations. It is essential to understand what hacking is, how it works, and how to protect yourself from it.

What is Hacking?

Hacking is when someone attempts to gain unauthorized access to computer systems, networks, or data. The goal is to manipulate, alter, or steal data from the target system. Hacking can be done for various reasons, such as malicious intent, financial gain, or espionage.

Types of Hacking

There are various types of hacking, including:

1. Password Hacking: Password hacking is when hackers attempt to steal passwords or crack them using brute force or other techniques.

2. Email Hacking: Email hacking is when hackers gain access to an email account to steal personal or sensitive information.

3. Website Hacking: Website hacking is when hackers gain access to a website’s database to steal customer information, financial information, or other valuable data.

4. Network Hacking: Network hacking is when hackers try to gain access to a company’s network to steal private information or data.

5. Malware Hacking: Malware hacking is when hackers use malicious software to gain access to a system and steal information.

How to Protect Yourself from Hacking

There are several steps you can take to protect yourself from hacking, including:

1. Use strong passwords and change them regularly.

2. Keep your software and operating systems up to date with the latest security patches.

3. Use two-factor authentication on your accounts to add an extra layer of security.

4. Be cautious when clicking on links or downloading files from unknown sources.

5. Use antivirus software to protect against malware and viruses.

6. Regularly back up your data to prevent data loss if your system is hacked.

7. Educate yourself on hacking techniques and stay up to date on the latest hacking trends.

8. Avoid using public Wi-Fi for sensitive information.

Conclusion

Hacking is a widespread issue that affects individuals and organizations worldwide. By understanding what hacking is, how it works, and how to protect yourself from it, you can minimize the risk of becoming a victim. Take steps to secure your digital life, keep your systems updated, and be cautious when interacting online to stay safe from hackers. Educate yourself on hacking techniques, and report any suspicious activity to keep yourself and those around you safe.


What is Hacking?

Hacking crime is committed through the usage of computers, the Internet, or virtual networks, which is defined as the unlawful access of – or entry into – the computer terminal, database, or digital record system belonging to another individual; typically, hacking is conducted with the intent to commit a computer-based, electronic criminal act. Unlawfully, illegally, and harmfully collecting or amassing an individual’s private information with regards to the internet, a computer, or alternative electronic network may result the in the illicit possession and misuse of personal data without the consent of the victim.

Hacking into a computer – which can also be defined as virtual trespassing by means of collecting personal data in an intrusive manner – is one of the foremost means facilitated by individuals attempting to commit identity theft.

How is Hacking used for Identity Theft?

‘Hackers’ – the colloquial classification of individuals undertaking exploitative, manipulative, unethical, and illegal behavior or actions with the expressed intention to intrude on computer systems belonging to other individuals – may vary in experience, classification, and tactical maneuvering. While certain individuals undertaking hacking measures in order to commit identity theft may do so in obtrusive and purposeful means, other hackers may act in clandestine, illicit, and secretive manners.

However, the victim of identity theft may be impressionable, impressionable, and oftentimes vulnerable individuals unfamiliar with computational systems.  Upon this unlawful access of a computer terminal belonging to the victim, the perpetrator may facilitate methodology that includes the commandeering or illicit removal of personal, private, or financial information.

What is an Online Predator?

Financial Online Predators typically target unsuspecting or impressionable victims commonly unfamiliar with the Internet or computational systems; Financial Online Predators may attempt to extract personal and private information from their victims in order to commit fraud, cause destruction, or facilitate means of extortion.

Upon unlawfully accessing data stored in its electronic form, a victim may be unaware that any or all information has been repossessed – and subsequently misused within an identity fraud operation. Hackers acting as online predators may target a wide range of electronic networks, including commercial and residential computer systems.

How to Prevent Electronic Identity Theft

Due to technological innovation, electronic identity theft is considered by many to be one of the most recently-developed crimes, credited – in part – to the ongoing advent of computer-based technology.

This type of technology relies heavily on the Internet and online activity, and as a result, regulations and oversight of this type of activity has been expressed in the spectrum of preventative measures involving the cessation of electronic identity theft.

Companies providing methods of Identity theft prevention – including Lifelock, which is one of the most widely-acclaimed and recognized – have employed protective measures ranging from securing online perimeters to communicative transmission inquiring about the validity of unsubstantiated activity; these types of companies have found their respective niche within the prevention of identity fraud upon providing protection in lieu of infringing on personal privacy.

Barbados National Claimed $120M in False Tax Refunds

Barbados National Claimed $120M in False Tax Refunds

Barbados National Claimed $120M in False Tax Refunds

In what is believed to be one of the largest tax fraud cases in Barbados’ history, a national was recently arrested for allegedly claiming $120 million in false tax refunds. This case highlights the need for robust tax compliance systems and the potential consequences of tax fraud.

The Allegations

The man is alleged to have created fake invoices and purchase orders for non-existent goods and services as part of a scheme to claim false tax refunds. The scheme is believed to have been ongoing for several years, and the man allegedly defrauded the government of $120 million.

The Impact of Tax Fraud

Tax fraud has serious consequences for governments and taxpayers alike. Fraudulent claims result in reduced tax revenues, which can lead to cuts in public services, higher taxes for law-abiding citizens, and a lack of faith in the tax system.

The Importance of Tax Compliance

Tax compliance is critical for maintaining an effective tax system. Governments must implement measures to ensure that taxpayers are aware of the tax laws and regulations and are submitting accurate tax returns. This includes requiring taxpayers to keep accurate records, ensuring that tax returns are subject to appropriate scrutiny, and imposing penalties for non-compliance and fraudulent activity.

Law Enforcement Response

The man involved in the case was arrested and charged with multiple counts of fraud and money laundering. If convicted, he could face significant fines and a lengthy term of imprisonment. The case is an example of the importance of law enforcement agencies working to uncover and prosecute fraudsters to deter others from engaging in similar activity.

Preventing Tax Fraud

To prevent tax fraud, governments must implement robust tax compliance systems. This includes educating taxpayers about their obligations and the consequences of non-compliance, utilizing technology to detect fraudulent activity quickly, and imposing stiff penalties for fraudulent activity.

Conclusion

The case of the Barbados national who claimed $120 million in false tax refunds highlights the importance of robust tax compliance systems. Fraudulent activity has severe consequences for governments and taxpayers, and law enforcement agencies must work to uncover and prosecute fraudsters to deter others from engaging in similar activity. By implementing effective tax compliance measures, governments can ensure that taxpayers are aware of their obligations and are submitting accurate tax returns, leading to a fair and sustainable tax system.


On November 7, 2012, the Department of Justice reported that Andrew J Watts was sentenced to 114 months in prison by US District Judge Joan Gottschall in Chicago.  He was also ordered to pay $1.7 million in restitution for stealing identities and engaging in a federal income tax refund fraud scheme.  Watts is a Barbados national.

Court documents show that Watts filed the fraudulent federal income tax returns from 2007 to 2011.  He used the names of deceased taxpayers and forged their signatures to obtain the fraudulent refunds, and he even claimed himself as the deceased person’s representative in some cases.

In total, Watts filed more than 470 fraudulent federal income tax returns.  He is believed to have claimed about $120 million, and the Internal Revenue Service issued over $10 million in refunds.  In order to conceal the fraud, Watts instructed the IRS to send the refund checks to an electronic deposit or an address he controlled.

Kathryn Keneally, Assistant Attorney General for the Justice Department’s Tax Division, stated: “While all taxpayers are victims when criminals file false tax returns using stolen identities, those who falsely use the names of deceased individuals add to the grief and burdens of their families.”

Watts pleaded guilty on July 10, 2012, and he pleaded to one count of aggravated identity theft and one count of mail fraud.

IRS-Criminal Investigation Chief Richard Weber noted: “IRS-Criminal Investigation has made investigating refund fraud and identity theft a top priority and we will vigorously pursue those who undermine the integrity of the U.S. tax system.  Individuals who commit refund fraud and identity theft of this magnitude deserve to be punished to the fullest extent of the law.”

Assistant U.S. Attorney Patrick J. King, Jr. with the Northern District of Illinois and Trial Attorney Michelle Petersen with the Department of Justice’s Tax Division were in charge of prosecution.

Source: U.S. Department of Justice

Police Get Lucky Catching Repeat Identity Theft Offender

Police Get Lucky Catching Repeat Identity Theft Offender

Police Get Lucky Catching Repeat Identity Theft Offender

An identity theft offender was caught on October 16th, 2012, thanks to the quick actions of the police. The offender had been involved in multiple identity theft cases and had been on the run for some time. The police finally caught up with him and were able to bring him to justice.

Identity Theft Cases

The identity theft offender had been involved in multiple identity theft cases, stealing people’s personal information and using it to make fraudulent purchases. The victims of these crimes suffered losses amounting to thousands of dollars. The police had been on his trail for some time, but he had managed to evade them until October 16th, 2012.

Police Gets Lucky Break

The police were on patrol when they spotted the offender’s car. They followed him and observed him throwing out some papers from his car window. The police retrieved the papers and found that they contained the personal information of several people. The police then followed the offender and pulled him over.

Arrest and Conviction

The police arrested the offender and charged him with multiple counts of identity theft and fraud. The offender was convicted and sentenced to several years in prison. The victims of his crimes were reimbursed for their losses.

Lessons Learned

This case highlights the importance of being vigilant about personal information and protecting it from identity theft. The victims of the offender’s crimes suffered significant financial losses and had to endure long processes to rectify the damages to their credit history. It also shows the importance of the swift action of the police in catching identity thieves.

Conclusion

Identity theft is a growing problem that affects millions of people worldwide. The police play a vital role in catching identity theft offenders, and this case is an excellent example of their hard work and dedication. It is essential to be vigilant about personal information and take steps to protect against identity theft. By working together, we can prevent identity theft and ensure that offenders are brought to justice.


On October 16, 2012, the US Attorney’s Office for the District of Oregon announced that Tigran Khachatrian of Glendale, California, was sentenced to 70 months in federal prison for a huge identity theft scheme as well as for the possession of counterfeit devices.  The sentencing stems from a routine traffic stop that occurred in December of 2010.

During the traffic stop, an Oregon State Trooper stopped Khachatrian and the co-defendant, Arsen Dabaghyan, on Interstate 5 around the Medford area.  They state trooper asked to search the car, and the two defendants consented to the search.  The state trooper found a total of 139 credit cards, 123 gift cards, and false forms of identification.  Additionally, the state trooper found three laptop computers, four cell phones, an MSP digital card reader, a GPS device, a digital camera, and instructions for keypad configurations at gas stations in California and Washington.

After an investigation by the Southern Oregon High-Tech Crimes Task Force, it was determined that one of the laptops had software to create credit cards and debits cards.  Another program had the ability to pull information from skimmed bank cards.

The FBI led a further investigation and found that the defendants placed skimming devices at multiple gas stations in the state of Washington in order to steal account information from the victims.  The defendants were able to obtain the credit card numbers and card holder information and then create duplicate credit cards with their computer.

Khachatrian had multiple theft convictions in 1986.  He also had charges for identity theft, forgery and more in 2003.  After he serves his 70 months in federal prison, Khachatrian will receive three years of supervised release.  He is also ordered to pay restitution and forfeit all of the equipment that was used during the crimes.

Source: Federal Bureau of Investigation

40 Defendants, 20 Cases: Florida Identity Theft Widespread

40 Defendants, 20 Cases: Florida Identity Theft Widespread

40 Defendants, 20 Cases: Florida Identity Theft Widespread

Identity theft is a growing concern across the US, and Florida has been hit particularly hard. In recent years, law enforcement agencies have tackled large and widespread identity theft rings in the state, leading to the arrest and prosecution of several offenders. In one instance, 40 defendants were involved in 20 cases of identity theft in Florida.

The Cases

The cases involved a wide range of identity theft schemes, including credit card fraud, identity theft for tax fraud, and other financial crimes. The offenders used a variety of methods to steal personal information, including phishing scams, skimming devices, and hacking into computer networks and databases.

Law Enforcement Response

The investigations into the identity theft cases were complex and required significant resources from the law enforcement agencies involved. Law enforcement agencies collaborated across the state, pooling their resources and knowledge to bring down the offenders.

Prosecutions and Sentencing

The 40 defendants involved in the identity theft cases were prosecuted and found guilty of various charges ranging from identity theft to conspiracy to commit financial fraud. The offenders were sentenced to varying sentences ranging from probation to several years in prison.

Victims of Identity Theft

Identity theft can have a significant impact on the lives of the victims. In these cases, many victims were left with damaged credit ratings, lost money, and hours of time spent repairing the damages caused by the offenders. It is crucial to remain vigilant and take steps to safeguard personal information to reduce the risk of identity theft.

Preventing Identity Theft

To reduce the risk of identity theft, it is essential to take several precautions. Keeping personal information secure, using strong passwords, avoiding phishing scams, and regularly monitoring financial accounts for suspicious activity can all help reduce the risk of becoming a victim of identity theft.

Conclusion

Identity theft remains a significant threat to individuals and organizations across the US. The 40 defendants involved in the 20 cases of identity theft in Florida highlight the seriousness of the issue and the need for law enforcement agencies to work together to combat the problem. By taking steps to protect personal information and remaining vigilant, individuals can help reduce the risk of becoming a victim of identity theft.


On October 10, 2012, the US Attorney’s Office for the Southern District of Florida announced that 40 defendants were charged in 20 different cases for identity theft that resulted in millions of dollars of fraudulent tax filings.

The Federal Trade Commission declares that Florida had the highest identity theft rate in 2011.  The FTC reports that Miami is where most of the identity thefts occur in Florida.  For every 100,000 residents in the United States, about 178 complaints are filed for identity theft.  Miami makes this figure look small.  For every 100,000 residents in Miami, there are about 324.1 complaints.

The U.S. Treasury Inspector General for Tax Administration (TIGTA) also announces that Florida has the highest rate of tax refund fraud in the United States.  TIGTA estimates that about 74,496 fraudulent returns were filed in Miami alone and caused about $280 million in fake refunds.  The per capita of false returns in Miami is 46 times higher than the national average, and the epidemic is growing.  According to TIGTA, the IRS is projected to issue about $21 billion in fraudulent tax refunds in the next five years.

The U.S. Attorney’s Office for the Southern District of Florida recently created the Identity Theft Tax Fraud Strike Force to combat the epidemic.  The Strike Force is made up of multiple agencies and police departments around the Miami area.

U.S. Attorney Wifredo A. Ferrer stated, “So far this year, we have charged a total of 79 individuals responsible for almost $40 million in fraudulent tax refunds obtained through identity theft.  The cases being investigated and prosecuted include victims from all walks of life, including police officers, potential U.S. Marine recruits, members of the Armed Forces, holocaust survivors, school children, hospital patients, the elderly and infirm, incarcerated prisoners, and even the dead.”

Source: Federal Bureau of Investigation

Maryland Man Stole Identities of Mental Health Patients

Maryland Man Stole Identities of Mental Health Patients

Maryland Man Stole Identities of Mental Health Patients

In Maryland, a man was recently arrested and charged with stealing the identities of mental health patients. The man is alleged to have obtained personal information from medical records and used it to fraudulently obtain credit cards and make unauthorized purchases. This case highlights the importance of safeguarding personal information and the potential consequences of data breaches in the healthcare industry.

The Allegations

The man allegedly stole the identities of at least 26 patients from a healthcare facility where he had worked as a counselor. He then used this information to apply for credit cards and loans, which he used to make purchases and withdraw cash. The man is alleged to have stolen over $12,000 from the victim’s accounts.

The Consequences of Identity Theft

Identity theft can have severe consequences, particularly for individuals with mental health issues who may not have the resources or support to address the issue. Victims of identity theft can suffer financially and emotionally, and it can take years to repair the damages done to their credit rating and finances.

The Importance of Data Protection

The case highlights the need for strict data protection measures in the healthcare industry. Medical facilities must take measures to protect sensitive personal information, such as patients’ medical records, from unauthorized access and use. This includes implementing robust access controls, ensuring staff are properly trained on data security, and regularly reviewing and updating data protection policies.

Law Enforcement Response

The man involved in this case was arrested and charged with multiple counts of identity theft, fraud, and related crimes. If convicted, he could face significant fines, restitution, and time in prison.

Preventing Identity Theft

To prevent identity theft, individuals can take several steps, such as reviewing financial statements regularly, monitoring credit reports, and ensuring that personal information is stored securely. It is also important to report suspicious activity to the relevant authorities promptly.

Conclusion

The case of the Maryland man who stole the identities of mental health patients highlights the serious consequences of identity theft. The healthcare industry must take measures to prevent data breaches, and individuals must remain vigilant to protect their personal information. Law enforcement agencies must continue to work to bring identity thieves to justice and ensure that victims are appropriately compensated and protected from further harm.


On November 8, 2012, Immigration and Customs Enforcement (ICE) reported the Christopher Andre Devine from Philadelphia pleaded guilty to bank fraud and aggravated identity theft.  The stolen identities were used to open fake bank accounts.

During the plea agreement, Devine and co-defendants admitted that they opened bank accounts in order to get check cards.  The co-conspirators would then deposit fraudulent checks into the accounts and withdraw cash from ATM machines.  The co-defendants are Quanishia Williamson-Ross and Lenee E. Williamson.

Devine admitted that he stole identities from 21 people in an adult residential program for mental needs after he purchased the information from an employee with the program.  Devine used this information to open checking accounts over the telephone and internet.

Devine and the co-defendants bought items from restaurants, drug stores, grocery stores, convenience stores, gas stations, and numerous other businesses with the check cards.  They also used the check card to pay for utilities like cable and cell phones.

Devine was caught in December of 2011 when authorities searched a van and two different residences occupied by the defendants.  They found hundreds of credit cards, debit cards, social security cards, driver’s licenses, and personal information like names, addresses, credit information, and social security numbers.

About 300 people had their identities stolen in all, and 21 were from the mental health program.  There were a total of 73 fraudulent bank accounts opened.

Each of the defendants faces a maximum sentence of 30 years in prison for the bank fraud and two years in prison for the aggravated identity theft.

The investigation was led by ICE Homeland Security Investigations (HSI) in Baltimore, the Wicomico County Sheriff’s Office, the IRS’s Criminal Investigations, and the Social Security Administration in Philadelphia.  The enforcement was part of President Obama’s Financial Fraud Enforcement Task Force.

Source: U.S. Immigration and Customs Enforcement

Mexican National Participated in Identity Trafficking Scheme

Mexican National Participated in Identity Trafficking Scheme

Mexican National Participated in Identity Trafficking Scheme

A Mexican national was recently indicted for participating in an identity trafficking scheme. The scheme involved trafficking the identities of US citizens to other individuals living in the country illegally. This case highlights the severity of identity theft and the importance of safeguarding personal information.

The Allegations

The man is alleged to have been part of a scheme to sell the personal information of US citizens to individuals living in the country illegally. The scheme involved creating fake documents and using the stolen identities to obtain unauthorized employment and government benefits. The man allegedly profited from the scheme by receiving a cut of the proceeds from the sale of the stolen identities.

The Impact of Identity Trafficking

Identity trafficking has severe consequences for the victims whose identities are stolen. Identity theft can lead to financial ruin, loss of privacy, and damage to credit ratings. It is a type of crime that often goes undetected until it is too late, leaving victims with a lasting impact.

The Need for Identity Protection

Identity protection is critical for preventing identity theft and related crimes. Individuals must take measures to safeguard their personal and financial information, including using strong passwords, monitoring credit reports, and being cautious about sharing personal information online.

Law Enforcement Response

The man involved in the case was indicted on multiple counts related to identity trafficking. If convicted, he could face significant fines and a lengthy term of imprisonment. The case is an example of how law enforcement agencies are working to uncover and prosecute identity thieves and reduce the harm caused to innocent victims.

Preventing Identity Trafficking

To prevent identity trafficking, individuals and organizations must take robust measures to prevent data breaches and protect personal information. This includes implementing strict data protection policies, limiting employee access to sensitive information, and adopting encryption protocols to secure electronic data.

Conclusion

The case of the Mexican national involved in an identity trafficking scheme highlights the severity of identity theft and the importance of safeguarding personal information. Identity theft has severe consequences for victims and can lead to financial ruin and lasting damage to credit ratings. It is critical that individuals take measures to protect their personal and financial information, and that law enforcement agencies work to uncover and prosecute identity thieves to stop them from causing harm. By implementing robust identity protection measures, individuals and organizations can reduce their risk of becoming a victim of identity theft.


On November 26, 2012, the Department of Justice announced that Jose Sergio Garcia-Ramirez from Rockford, Illinois, received 58 months in prison for trafficking stolen identities and other identifying documents.  He was ordered to forfeit $35,900, and he will be removed from the United States after he serves time in prison.

According to court documents, individuals in the Savarona area of Caguas, Puerto Rico were able to obtain Puerto Rican identities and other identifying documents.  Conspirators also operated in the United States and sold social security cards and Puerto Rican birth certificates for $700 to $2,500.

The brokers asked for the identities from the Savarona suppliers by using coded telephone calls and text messages.  The calls initiated money transfers after which documents were sent by U.S. mail.

Court documents further indicate that some of the brokers used Puerto Rican identities to use in part with their trafficking operation as well.  Most of the customers, however, used the Puerto Rican identities to obtain state driver’s licenses.  Some of the customers went as far as committing financial fraud with the identities.

The Justice Department states that brokers in the scheme were operating in at least the following areas:

•    Rockford, IL
•    DeKalb, IL
•    Aurora, IL
•    Seymour, IN
•    Columbus, IN
•    Indianapolis, IN
•    Hartford, CT
•    Clewistown, FL
•    Lilburn, GA
•    Norcross, GA
•    Salisbury, MD
•    Columbus, OH
•    Fairfield, OH
•    Dorchester, MA
•    Lawrence, MA
•    Salem, MA
•    Worcester, MA
•    Grand Rapids, MI
•    Nebraska City, NE
•    Elizabeth, NJ
•    Burlington, NC
•    Hickory, NC
•    Hazleton, PA
•    Philadelphia, PA
•    Houston, TX
•    Abingdon, VA
•    Albertville, AL
•    Providence, RI

53 people have been charged for participating in the identity trafficking scheme, and 18 of the defendants have pleaded guilty so far.

Source: Department of Justice

Two Power Armenian Men Sentenced for Fraud Scheme

Two Power Armenian Men Sentenced for Fraud Scheme

Two Powerful Armenian Men Sentenced for Fraud Scheme

Introduction

On November 28, 2012, a significant legal case unfolded, leading to the sentencing of two influential Armenian men involved in a large-scale fraud scheme. This article delves into the background, investigation, trial, and sentencing of these individuals.

1. The Allegations

The case revolved around allegations of a sophisticated fraud scheme, with the accused individuals accused of orchestrating a complex financial fraud operation spanning multiple countries. Their actions were said to have defrauded numerous victims of substantial amounts of money.

2. The Investigation

The investigation into the alleged fraud scheme was extensive, involving law enforcement agencies and financial experts from multiple jurisdictions. The investigation revealed a network of financial transactions, shell companies, and complex money laundering efforts designed to conceal the ill-gotten gains.

3. The Legal Process

The legal process involved the arrest and subsequent trial of the two accused individuals. Legal authorities worked tirelessly to build a case against them, bringing forth evidence that included financial records, witness testimonies, and digital traces of their fraudulent activities.

4. The Trial

The trial of the two powerful Armenian men was closely watched by legal experts, the media, and the public. The prosecution presented a compelling case, highlighting the scale and sophistication of the fraud scheme. The accused individuals had a legal defense team that sought to challenge the evidence and provide an alternative narrative.

5. Verdict and Sentencing

The culmination of the trial was the verdict and subsequent sentencing. The court found the two individuals guilty of their involvement in the fraud scheme, concluding that they had exploited financial systems and defrauded innocent victims. As a result, they were sentenced to significant prison terms and ordered to pay restitution to the victims.

6. Impact and Implications

The sentencing of these powerful Armenian men had several significant implications:

a. Deterrence: The case sent a strong message that even individuals with considerable influence and resources would be held accountable for their fraudulent actions.

b. Justice for Victims: The victims of the fraud scheme finally received justice through the legal process, with the restitution helping to recover some of their losses.

c. Legal Precedent: The case established a legal precedent for dealing with complex financial fraud schemes, offering guidance for future investigations and prosecutions.

d. Strengthening Legal Systems: The successful resolution of this case demonstrated the effectiveness of legal systems in combating financial crimes and protecting the interests of the public.

Conclusion

The sentencing of the two powerful Armenian men in the 2012 fraud scheme case was a significant legal milestone. It showcased the determination of legal authorities to bring perpetrators of financial fraud to justice, regardless of their influence or resources. This case served as a reminder that the rule of law prevails, and those who engage in fraudulent activities will ultimately be held accountable for their actions.


On November 28, 2012, the US Attorney’s Office for the Central District of California stated that Angus Brown, aka “Homicide,” and Arman Sharopetrosian, aka “Horse,” received additional prison sentences for operating a identity theft scheme out of the Avenal State Prison.

The two men and other Armenian Power gang members worked with African-American street gang members and bribed co-conspirators at banks in order to gain control of bank accounts.  The scheme caused at least $8 million in losses.

United States District Judge David O. Carter said it was one of the most sophisticated fraud schemes he’s seen in his time as a judge.

Angus Brown was serving a prison term for identity theft at the time of his arrest, and Arman Sharopetrosian was serving a 10-year sentence for shooting at a car and carrying a concealed weapon.

During the scheme, Brown and Sharopetrosian were able to steal bank information from mostly elderly victims and forged signatures of the victims.  Checks worth large amounts of money were then deposited in bank accounts set up the conspirators.  Recruited bank employees identified accounts and victims that were less likely to notice their identities were stolen.

During the case, prosecutors stated: “[The defendants’] express purpose was to target bank customers with large-value accounts who were not proficient in checking up on their accounts via the Internet [and] sought to use that information to plunder the victims’ life savings.”

Sharopetrosian was found guilty of bank fraud conspiracy, four counts of bank fraud, and seven counts of aggravated identity fraud.  Brown pleaded guilty to bank fraud conspiracy, bank fraud, and 17 counts of aggravated identity theft.

20 defendants were named in the indictment, and most of the defendants will be sentenced in the next couple of months.  Some of the defendants have already received 51 months in prison.

Source: Federal Bureau of Investigation

Protecting your Debit and Credit Cards

Protecting Your Debit and Credit Cards: Tips and Best Practices

Debit and credit cards are an essential part of modern banking and financial transactions. While they can make our lives easier and more convenient, they can also pose a risk to our finances and personal information if not handled correctly. Protecting your debit and credit cards is critical to prevent fraud and unauthorized transactions. This article will explore tips and best practices for safeguarding your cards.

Protecting Your Debit Card

o Sign Your Card: Sign the back of your debit card as soon as you receive it to prevent someone else from using it.

o Keep Your PIN Secure: Protect your PIN from theft or observation by covering the keypad when entering it and not sharing it with anyone.

o Regularly Review Account Activity: Check your bank statements and account activity regularly to detect and report any unauthorized transactions.

o Notify Your Bank of Changes: Inform your bank if you change your address or phone number to ensure that your account information is accurate.

o Use Secure ATMs: Use ATMs in secure locations and ensure that the machine has not been tampered with.

Protecting Your Credit Card

o Sign Your Card: Sign the back of your credit card as soon as you receive it to prevent someone else from using it.

o Protect Your Card Information: Do not give out credit card information over the phone or email, unless you initiated the call or contact.

o Check Your Credit Report: Check your credit report regularly to ensure that there are no unauthorized accounts or activity.

o Monitor Account Activity: Regularly review your credit card statements and account activity online to detect and report any unauthorized transactions.

o Use Secure Websites: Only use websites that are secure and have an HTTPS in the URL to prevent card information theft.

General Tips for Protecting Debit and Credit Cards

o Keep Your Cards Safe: Keep your cards and card information in a secure location, such as a wallet or in a locked drawer.

o Check for Skimming Devices: Skimming devices can be used to steal card information at gas pumps and other card readers. Check the card reader for any suspicious attachments.

o Use Contactless Payments: Contactless payments use NFC technology and are highly secure against fraudulent activity.

o Use Digital Wallets: Digital wallets, such as Apple Pay or Google Pay, use tokenization technology that provides an extra layer of security to card transactions.

Conclusion

Protecting your debit and credit cards is crucial to prevent unauthorized transactions and financial loss. Regularly monitoring account activity, using secure ATMs, protecting PINs, and checking for skimming devices are a few ways to safeguard your cards. General tips include using contactless payments, digital wallets, and keeping cards and information in a secure location. By following these tips and best practices, individuals can reduce the risk of card fraud and protect their finances and personal information.