Skip Header InformationSkip to navigation United States Secret Service USSS Star
   USSS Star

Financial Crimes Division

The Secret Service investigates crimes associated with financial institutions. Today, this jurisdiction includes bank fraud, access device fraud involving credit and debit cards, telecommunications and computer crimes, fraudulent identification, fraudulent government and commercial securities, and electronic funds transfer fraud.


Mission Statement

The Financial Crimes Division (FCD) plans, reviews, and coordinates criminal investigations involving Financial Systems Crimes, including bank fraud; access device fraud; telemarketing; telecommunications fraud (cellular and hard wire); computer fraud; automated payment systems and teller machines; direct deposit; investigations of forgery, uttering, alteration, false personation, or false claims involving U.S. Treasury Checks, U.S. Savings Bonds, U.S. Treasury Notes, bonds, and bills; electronic funds transfer (EFT) including Treasury disbursements and fraud within Treasury payment systems; fraud involving U.S. Department of Agriculture Food Coupons and Authority to Participate (ATP) cards; Federal Deposit Insurance Corporation investigations; Farm Credit Administration violations; fraud and related activity in connection with identification documents and fraudulent commercial, fictitious instruments,foreign securities. The Division also coordinates the activities of the U.S. Secret Service Organized Crimes Program, and oversees money laundering investigations.

Skip Past Table of Contents Table of Contents

Financial Institution Fraud (FIF) and Related Criminal Investigations

On November 5, 1990, the Congress enacted legislation that gave the Secret Service concurrent jurisdiction with the Department of Justice to investigate fraud, both civil and criminally against any federally insured financial institution or the Resolution Trust Corporation. Annually, agents of the Secret Service review thousands of criminal referrals submitted by Treasury Department regulators. The Secret Service promotes an aggressive policy toward conducting these investigations in an effort to safeguard the soundness of our financial institutions.

Major Initiatives:
  • The Secret Service has concurrent jurisdiction with the Department of Justice to investigate fraud, both civil and criminal, against federally insured financial(FIF) institutions. The Crime Bill of 1994 extended our FIF investigative authority to the year 2004.

  • Our FIF program distinguishes itself from other such programs by recognizing the need to balance traditional law enforcement operations with a program management approach designed to prevent recurring criminal activity.

  • We are encountering new criminal schemes which attack financial institutions, particularly those crimes being committed by organized ethnic criminal groups, such as the West Africans, Asians, and East Europeans.

  • A recent American Banking Association (ABA) survey concluded that the two major problems in the area of bank fraud today are: (1) the fraudulent production of negotiable instruments through the use of what has become known as "desktop publishing," and (2) access device fraud.

  • Recent Secret Service investigations indicate that there has been an increase in credit card fraud, fictitious document fraud, and fraud involving the counterfeiting of corporate checks and other negotiable instruments,as well as false identification documents created with the use of computer technology.

  • Title 18 United States Code, Section 514 was enacted into law in 1996 to prevent the increasing amount of fraud through the use of fictitious instruments. Congress passed this law through the joint efforts of the Department of Justice and the Department of Treasury. FCD is responsible for the investigations of Title 18, United States Code Section 514 (Fictitious Instruments).

Access Device Fraud

Financial industry sources estimate that losses associated with credit card fraud are in the billions of dollars annually. The Secret Service is the primary federal agency tasked with investigating access device fraud and its related activities under Title 18, United States Code, Section 1029. Although it is commonly called the credit card statute, this law also applies to other crimes involving access device numbers including debit cards, automated teller machine (ATM) cards, computer passwords, personal identification numbers (PINs) used to activate ATMs, credit card or debit card account numbers, long-distance access codes, and the computer chips in cellular phones that assign billing. During fiscal year 1996, the Secret Service opened 2,467 cases, closed 2,963 cases, and arrested 2,429 individuals for access device fraud. Industry sources estimate that losses associated with credit card fraud are in the billions of dollars annually.

What to do if you have been the victim of credit card fraud or identity theft:
  1. If your complaint is essentially a non-criminal dispute with a retailer or other business, you must immediately dispute the charge(s) in writing with the customer relations office of your credit card company.

  2. If you have been the victim of credit card fraud or identity theft, the following tips will assist you:

    • Report the crime to the police immediately. Get a copy of your police report or case number. Credit card companies, your bank, and the insurance company may ask you to reference the report to verify the crime.

    • Immediately contact your credit card issuers. Get replacement cards with new account numbers and ask that the old account be processed as "account closed at consumer’s request" for credit record purposes. You should also follow up this telephone conversation with a letter to the credit card company that summarizes your request in writing.

    • Call the fraud units of the three credit reporting bureaus. Report the theft of your credit cards and/or numbers. Ask that your accounts be flagged. Also, add a victim’s statement to your report that requests that they contact you to verify future credit applications. The following is a list of addresses and numbers to the three credit bureaus:

    Equifax Credit Information Services - Consumer Fraud Div.
    P.O. Box 105496
    Atlanta, Georgia 30348-5496
    Tel: (800) 997-2493
    www.equifax.com
    Experian
    P.O. Box 2104
    Allen, Texas 75013-2104
    Tel: (888) EXPERIAN (397-3742)
    www.experian.com
    Trans Union Fraud Victim Assistance Dept.
    P.O. Box 390
    Springfield, PA 19064-0390
    Tel: (800) 680-7289
    www.transunion.com

    • Keep a log of all conversations with authorities and financial entities.

    • As with any personal information, only provide your credit card number to merchants you know. Also, remember to protect your social security number. You have to give your social security number for employment and tax purposes, but it is not necessary for many businesses. Notify the Social Security Administration’s Office of Inspector General if your social security number has been used fraudulently.

    • The Federal Trade Commission (FTC) is the federal clearinghouse for complaints by victims of identity theft. Although the FTC does not have the authority to bring criminal cases, the Commission assists victims of identity theft by providing them with information to help them resolve the financial and other problems that can result from identity theft. The FTC also may refer victim complaints to other appropriate government agencies and private organizations for further action. If you have been a victim of identity theft, you can file a complaint with the FTC by contacting the FTC's Consumer Response Center.
By Phone: Toll-free 1-877-ID-THEFT (438-4338)
TDD 202-326-2502
By Mail: Consumer Response Center
Federal Trade Commission
600 Pennsylvania Ave, NW
Washington, DC 20580
On the Web: www.consumer.gov/idtheft
For Consumer Information: www.ftc.gov/ftc/consumer.htm


Counterfeit and Fraudulent Identification

Since 1982, the Secret Service has enforced laws involving counterfeit and fraudulent identification. Title 18, United States Code, Section 1028, defines this criminal act as someone who knowingly and without lawful authority produces, transfers, or possesses a false identification document to defraud the U.S. Government. The use of desktop publishing software/hardware to counterfeit and produce different forms of identification used to obtain funds illegally remains one of the Secret Service's strongest core violations.


Money Laundering

The Money Laundering Control Act makes it a crime to launder proceeds of certain criminal offenses called "specified unlawful activities" (SUA), which are defined in Title 18, United States Code,1956, 1957 and Title 18,United States Code, 1961, the Racketeer Influenced and Corrupt Organizations Act (RICO).

The Secret Service has observed an increase in money laundering activities as they relate to these specified unlawful activities. This is especially true in the area of financial institution fraud, access device fraud (credit card, telecommunications and computer investigations), food stamp fraud, and counterfeiting of U.S. currency.


Computer Fraud

In 1986, Congress revised Title 18 of the United States Code to include the investigation of fraud and related activities concerning computers that were described as "federal interest computers," as defined in Title 18, United States Code, Section 1030. The Secret Service has also investigated cases where computer technology has been used in traditional Secret Service violations, such as counterfeiting and the creation of false identification documents.

Computers are being used extensively in financial crimes, not only as an instrument of the crime, but to "hack" into data bases to retrieve account information; store account information; clone microchips for cellular telephones; and scan corporate checks, bonds and negotiable instruments, that are later counterfeited using desktop publishing methods.

Because computers are a tremendous source of both investigative leads and evidentiary material, the Secret Service has established the Electronic Crimes Special Agent Program (ECSAP), that trains agents to conduct forensic examinations of computers that were used in criminal endeavors. So trained, these agents can preserve any investigative leads within the computer, as well as any evidence needed for subsequent prosecutions.


Telecommunications Fraud

Telecommunication fraud losses are estimated at more than a billion dollars yearly. One of the largest "markets" for this type of fraud is the cloning of cellular telephones, a relatively simple procedure that can be done with the purchase of over-the-counter electronic equipment. When an individual transmits with a cellular telephone, the telephone emits a burst of electronic information. Within this burst of information is the electronic serial number (ESN), the mobile identification number (MIN) and other electronic identification signals, all of which can be illegally captured through the use of an ESN reader. Once captured, this information is transported through a computer onto microchips in the cellular telephones. These new telephones can be used for up to 30 days before the fraudulent charges are discovered. Cell telephones are being used extensively by organized criminal groups and drug cartels, as well as several Middle Eastern groups. Using acquired investigative expertise and state-of-the-art electronic equipment, the Secret Service now has the ability to effectively investigate the use of such telephones. This is another example of law enforcement using technology to target criminal enterprise.

The Secret Service has become the recognized law enforcement expert in the field of telecommunications fraud. It works closely with other law enforcement agencies, as well as representatives of the telecommunications industry in conducting telecommunications fraud investigations. These types of investigations, in many instances, act as a nexus to other criminal enterprises, such as access device fraud, counterfeiting, money laundering, and the trafficking of narcotics. During fiscal year 1996, the Secret Service opened 555 cases and arrested 556 individuals for telecommunications fraud.


Program Fraud Investigations

The Program Fraud Investigations Branch was created to coordinate investigations related to fraud committed against government programs that are within the investigative jurisdiction of the Secret Service. This Branch is responsible for identifying systemic weaknesses in government programs that permit recurring criminal activity, and recommend corrective measures to strengthen these systems, (e.g., EBT, food stamps), During fiscal year 1996, the Secret Service arrested 1,102 individuals in all areas of program fraud.


Forgery

Hundreds of millions of government checks and bonds are issued by the United States each year. This large number attracts criminals who specialize in stealing and forging checks/bonds from mail boxes in apartment houses and private homes. During a fraudulent transaction, a check/bond thief usually forges the payee's signature and presents false identification.


Operation TRIP (Treasury Recipient Integrity Program)

In March 1994, the Secret Service established "Operation TRIP," which was created to identify systemic weaknesses in the Treasury Department's disbursement systems and to subsequently suppress the associated fraudulent activities involving these systems worldwide.

In a cooperative effort with other government agencies, the Financial Crimes Division has assisted in establishing uniform standards of benefit recipient verification, developed anti-fraud disbursement procedures, and identified weaknesses in current verification systems and proposed acceptable alternatives to eliminate program fraud in this country and abroad.

To date, the Financial Crimes Division has assisted Operation TRIP, in the Philippines, Canada, Guam, Puerto Rico, Spain, Italy, Germany, Japan, Korea, and the United Kingdom.


Food Stamp Violation

Congress enacted the Food Stamp Act of 1977 to provide nutritional food to low-income families. It further directed the Secret Service to aggressively pursue fraud in the food stamp program. The possession or use of Food Stamp Coupons, Authorization to Participate cards, or Electronic Benefit Transfer cards by unauthorized persons compromises the integrity of the Food Stamp Program and is a criminal violation of the Food Stamp Act.


Electronic Benefits Transfer (EBT) Card

The Vice President's National Performance Review has designated the Electronic Benefits Transfer (EBT) card as the method of payment for the delivery of recurring government cash benefit payments to individuals without a bank account and for the delivery of non­cash benefits such as Food Stamps. For individuals with bank accounts, Electronic Funds Transfer will continue as the preferred method of making federal benefit payments. The National Performance Review has created the Federal EBT Task Force to design and implement the new nationwide program which will annually deliver over $111 billion in benefits from government agencies, such as the US Department of Agriculture, Health and Human Services, Veterans Administration, Office of Personnel Management, and the Railroad Retirement Board.

The Federal EBT Task Force is attempting to design a system that will piggyback on the existing commercial credit/debit card infrastructure. The task force has proposed EBT payment services be provided by financial institutions designated as financial agents of the government. The new EBT card will be an on­line debit system with benefits periodically placed in a customer's account. Customers will use their cards to retrieve the cash benefits from Automated Teller Machines and food benefits from point-of-sale terminals at participating retail stores.

As with any recurring payment system, EBT is open to a wide variety of fraud, including multiple false applications for benefits, counterfeiting of the EBT card and trafficking of non­cash benefits for cash or contraband. The Financial Crimes Division is taking a proactive approach by recommending fraud deterrent features to this new system as it is designed.

In an attempt to combat potential attacks, Financial Crimes Division has suggested the use of: biometric identifiers to verify applicants' identities and prevent application fraud; counterfeit deterrents such as four-color graphics and fine-line printing, and the use of holograms and embossing in the design of the card; and features that allow investigators to monitor transactions and use the audit trail to identify criminals who illegally traffic food benefit payments.

Although the new EBT system design is still evolving, one can be assured that criminals with expertise in credit/debit card fraud will attack a program of this magnitude. Fraud associated with EBT programs is a violation of two of the Secret Service's primary jurisdictions: Title 18, United States Code, Section 1029, Access Device Fraud and United States Code, Section 1030, Computer Fraud.


Task Forces

The Secret Service is involved in numerous task forces with federal, state, county, city, and local law enforcement agencies nationwide. Several of these task forces specifically target international organized crime groups and the proceeds of their criminal enterprises. All assets forfeited are shared with agencies represented on the task force.

These groups are not only involved in financial crimes, but investigations indicate that the proceeds obtained from financial fraud are being diverted toward other criminal enterprise.

Examples of Secret Service involvment in a variety of task forces:

  • West African Task Force
  • Metro Alien Task Force
  • Financial Crimes Task Force
  • Asian Organized Crime Task Force
  • Violent Crimes Task Force
  • HIDTA (High Intensity Drug Trafficking Area)
  • INTERPOL(International Criminal Police Organization)
  • IBFWG (Interagency Bank Fraud Working Group)
  • CABINET (Combined Agency Interdiction Network)

Asset Seizures and Forfeitures

Provides assistance to investigative offices by supplying counsel, direction, expertise and temporary support personnel as needed in terms of criminal investigations and the seizure and forfeiture of assets.

Major Initiatives:

  • Continued emphasis on forfeiture actions involving program fraud (e.g. food stamp fraud and Medicare fraud). This emphasis is underscored by specialized training of Secret Service personnel and proactive involvement in these investigations from onset to criminal prosecution.
  • Continued funding of task forces that have prioritized the use of asset forfeiture as a significant criminal deterrent. Funding is provided for the purchase of investigative equipment and state/local law enforcement overtime costs.
  • Continuation of an aggressive training program to enhance the quality and quantity of Secret Service seizures involving fraud and money laundering. Continued training of field investigators and support components, emphasizing basic asset forfeiture skills, and providing skill enhancement to those already possessing a basic knowledge of the program.
  • As a funding source for the Service, allocates monies for the purchase of items having intrinsic law enforcement benefit and which perpetuate forfeiture investigations. Such items include vehicles, communications systems, law enforcement/forensic technologies, the purchase of evidence/information and other special initiative considerations.
  • Coordination of the distribution of forfeited property requested for official use by Secret Service field offices, as well as other federal,state,and local law enforcement agencies participating in joint investigations resulting in the seizure and forfeiture of assets.

Electronic Crimes Branch

Confiscated equipment used in cellular phone fraud. The passage of the Omnibus Crime Control Act of 1984 brought to the Secret Service investigative jurisdiction for violations of Title 18 United States Code 1029 (credit card and access devices) and in 1986 Title 18,United States Code 1030 (computer fraud). The Financial Crimes Division's Electronic Crimes Branch houses the equipment and personnel devoted to these jurisdictions.

Between 1985 and the present, we have seen rapid growth of the number and type of criminal misuses of electronic technology investigated by the Service. The degree of sophistication of today's criminal has advanced at an accelerated rate over the past few years.

Electron Crimes Branch equipment. Our electronic investigations have involved credit card fraud, unauthorized computer access, cellular and land line telephone service tampering, the production of false identification, counterfeit currency, threats made against the President, narcotics, illegal firearms trafficking, and even homicides. Computers are now used extensively in facilitating many crimes investgated by the Secret Service.

The Electronic Crimes Branch provides service to our special agents, who are located in more than 125 domestic and foreign offices.

What does the ECB do?

  • We provide administrative control of all computer-related and telecommunications investigations.
  • We provide technical assistance to our special agents in the development of their cases, including the preparation and service of search warrants on electronic storage devices.
  • We provide laboratory analysis and courtroom testimony concerning the evidentiary contents of electronic storage devices seized during criminal investigations.
  • We provide educational presentations to classes and seminars for law enforcement officers, other government agencies, and private industry.
  • We meet regularly with other government agencies, hardware manufacturers, and software publishers to stay at the leading edge of this quickly changing technology.
  • We conduct research and development projects in order to address new problem areas, linked to new technology.

Electronic Evidence Seizure

As computers and related storage and communication devices proliferate in our society, so does the use of those devices in conducting criminal activities. Technology is employed by criminals as a means of communication, a tool for theft and extortion, and a repository to hide incriminating evidence or contraband materials. Law enforcement officers must possess up-to-date knowledge and equipment to effectively investigate today's criminal activity. The law enforcement community is challenged by the task of identifying, investigating and prosecuting individuals and organizations that use these and other emerging technologies to support their illicit operations.

Please see our Best Practices for Seizing Electronic Evidence reference guide for more information.


Training

The Financial Crimes Division has become involved in the training of foreign law enforcement officials in the areas of investigative techniques, types of international fraud schemes, and identification of systemic weaknesses in their financial systems that lead to fraudulent activity. Financial Crimes Division has provided training for more than 2,000 foreign law enforcement and banking officials from the following countries: Latvia, Russia, Japan, Slovenia, Cyprus, Ukraine, Pakistan, Australia, China, Peru, Korea, France, Aruba, South Africa, Mexico and Spain.


Investigative Mission | Counterfeit | Financial Crimes | Forensic Services

 USSS Star

About
» Home
» Mission
» Director
» History
» Strategic Plan
» Contact Information
» Field Offices
» Business Opportunities
» FAQs
» Kid's FAQs

Press Room
» Advisories
» Photos
» Press Releases
» FOIA
» Information Quality
» EEO Data Posted Pursuant to the No FEAR Act

Protection
» Protective Mission
» How Protection Works
» Protective Research
» Uniformed Division
» National Special Security Events
» National Threat Assessment Center

Investigations
» Investigative Mission
» Counterfeiting
» Financial Crimes
» Forensics
» Know Your Money
» Cyber Threat/Network Incident Reporting

Employment
» Opportunities
» Current Vacancies
» Career Fairs
» Application Forms

Partnerships
» NPC 50
» Boys and Girls Club Partnership
» Center for Missing and Exploited Children

Search


Powered by FirstGov.gov





Copyright © 2002 United States Secret Service. All rights reserved.
http://www.secretservice.gov
Home | Privacy Policy | Security Notice | Section 508 | Department of Homeland Security | FirstGov.gov