Private Security final exam
in the US there is an estimated ____ in cargo stolen annually
$30 billion
fraud steals about
$80 billion a year across all lines of insurance
how to detect insurance fraud
-a claimant who's totally calm and unflustered after submitting a large claim -a claimant who submit handwritten receipts for repairs on a covered its -a claimant who adds or increases homeowners or auto insurance coverage shortly before submitting a claim -a fire-damage claim for a home or auto where the fire started immediately after a family argument, or shorty after family members left the home/care -a medical claim submitted by a seasonal employee whose job is ending
how to make the perfect ghost persona
-an active investigator should have a generic account for basic collection and subject identification -once a subject is identified, ghost accounts that are tailored to the subject should be created to avoid suspicion -this account should ONLY be used for on investigation, then deactivated
make profiles for each type
-college kids -drug user -middle aged -employed/white collar -recruiter -high school kid repeat content make a blog ensure identities match, consider names that will have search results but aren't real
what are the 3 main goals of fraud
-detect fraud and pull potential fraudulent claims for in depth review -return non-fraudulent claims back into the claims cycle so honest customers are not upset -perform the first 2 operation as seamlessly in the business cycle as possible
tornados, hurricanes
-evacuate area if time. lock down building w alarm system up. and post notice on doors. -steel shutters cost $2500 per window. can be used in high crime areas for burglary deterrent. always look at adjacent businesses for access as well and adjust -if tornado get folks inside ad into shelter areas. use PA to get folks to where you are. if they want to leave do not stop them. -lock the doors for structural support. -count your pool, be aware that not everyone can recognize the danger of a tornado
the Facebook user ID
-everything on FB has a unique ID# -the FBID number is critical for evidence retention -the FBID gives access to additional content
floods, fires
-fix the root cause ex, fire extinguished, water mains shut off -inventory losses RGIS -insurance claim for every loss of $2500 -reorder product immediately -repair of floors, walls, area need to be started w in 24 hrs -normal business resumption asap -haul compactor away and replace. food spoilage
how to stop cargo theft
-high-tech GPS tracking tools -low-tech variety of locks -stay alert watch for signs -respond immediately report suspicious activity -know your supply chain -execute basic safety practices -screen and train employees
ghost accounts-personal identifiers
-names should match other identifiers for the account -the location should be close to the subject's location -use "fake name generator" -use "advanced options" to be able to select states and other key demographics
how to find a FBID
-navigate to profile -right click in the white space -select "view page source" -hit "ctrl+f" to open a search bar -type "profileID" without spaces
what are the hot spot states
-new york -florida -massachusetts -california
tornados and hurricanes cont'd
-once event passes take stock of site and surrounding area -look for power restoration updates using smart phones. these are not always right. -clearance of debris, removal of items to get business open -direct ship of all materials needed to get business open -trailers of vital march shipped ASAP -insurance clarims
the signs of a "fake profile"
-outdated layout -the "babe factor" -few photo uploads -inconsistent biography -blank "wall" -lots of "likes"
rules of writing a report
-reports should be well organized -reports should be factual, specific and detailed -reports should be written in past tense, first person, and active voice -reports should be accurate -reports should be objective -reports should be written in Standard written English
ghost accounts-education and employment
-schools should facilitate anonymity (online programs) -employments should be simple (self-employed), unemployed (actively looking), or generic (McDonalds, not White Lake,McDonalds)
behavior that can suggest possible victimization
-tardiness/unexplained absence -anxiety -lack of concentration -change in job performance -discomfort when communicating w others -disruptive phone calls or e-mail -sudden or unexplained requests to be moved from public locations in the workplace, such as sales or reception areas
Guidelines for investigators in creating effective testimony in court
-tell the truth -be prepared -stick to the facts -answer only the questions asked -be mindful of non-verbal communication -be respectful -speak directly, clearly, and confidently -listen and think before you speak -be professional
probable cause to arrest, search, or seize property exists when facts and circumstances known to the police officer would lead a reasonable person to believe:
-that the person to be arrested has committed a crime -that the police to be searched was the scene of a crime -that the place to be searched contains evidence of a crime; and/or -that property to be seized is contraband, stolen, or constitutes evidence of a crime
a good threat assessment will thoroughly analyze:
-the exact nature of he threat and/or threatening behavior -the identified target (general or specific) -the threatener's apparent motivation -the threatener's ability to carry to the threat -the threatener's background, including work history, criminal record, mental health history, and past behavior on the job
police ar allowed to search w out a warrant when
-they have consent from the person in charge of the premises -when conducting certain searches connected to a lawful arrest -in emergency situations which threaten public safety or the loss of evidence police also do not need a warrant to search or seize contraband "in plain site" when the officer has a right to be present
civil unrest
-tweetdeck -24 monitoring using investigation centers, news sites to follow path of impact -adjust team in buildings based on path and what is happening -merch protection use what is available -get the team out of the path -insurance claim, video review after the fact. use supplemental cameras if you have prewarnign of the event. ex. michael brown ferguson,MO 10 arrests
how are trailers are stolen for cargo theft
-wait until it is unattended -pay the drivers -steal the entire truck and make sure it is not being tracked -if trailer is already detached then they hook it up to their own truck
how many states make insurance fraud a specific crime
48 plus the District of Columbia
burglary question
48-72 hours rewind the tapes
U.S. vs. Josh Merigildo
4th amendment protections are not violated if you access a profile through a cooperating witness. If privacy settings allow for "friends" to view a site, government may access information through someone who is a "friend". Subjects have no justifiable expectation that "friends", the information is public and free to be used by "friends" in any way- including cooperating w LE. Posts that have more secure privacy settings may be constitutionally protected.
details of investigation ex. the retail equation (TRE)
It is "BLANK" policy to obtain a state/government issued ID to conduct any refund transaction for a customer at the point of sale. TRE is an online database that allows users to conduct queries using statistical information involving refunds conducted at "Blank" stores. This application contains personal information obtained from the identification provided by each customer who conducts a return. TRE generates a unique identification number for each customer, which allows the user to view the refund history details that include the name, address, refunding store, and merchandise being refunded
where are most of the ports
LA Houston New York
what 2 states do not have an insurance fraud law
Virginia and Oregon
open source
any publicly available information
why is New York a popular cargo theft port
because it is so popular
why is LA a popular cargo theft port
because it's closest to China
why is Houston a popular cargo theft port
closest to South America
medicare strike force
defendants collectively have billed Medicare more than $7 billion since Medicare Strike Force operations began in 2007. during this time the strike force has: charged more than 2,56 suspects involved in more than $8billion in fraud since 1997. largest ever takedown resulted in charges against a record 243 suspects for $712 million in false medicare and medicaid billing the medicare fraud strike force has 95% conviction rate and jail terms avg 4 years
body of your report
details of investigation -chronologicaly lays out the events -each event should have a dollar loss -can be divided into different jurisdictions if needed -should include definitions that will stand up in court -each incident documented should establish probable cause -use video snips to illustrate your points -embed video into the document if possible to facilitate ease of investigation
probable cause to seize property
exists when facts and circumstances known to the officer would lead a reasonable person to believe the the item is contraband, is stolen, or constitutes evidence of a crime -when a search warrant is in play police generally must search only for the items described in the warrant. however, any contraband or evidence of other crimes they come across amy for the most part be seized as well. should evidence prove to have resulted from an illegal search, it becomes subject to the "exclusionary rule" and cannot be used against the defendant in court. after hearing arguments fro the prosecuting and defense attorneys, the judge decides whether evidence should be excluded
probable cause for arrest
exists when facts and circumstances w in the police officer's knowledge would lead a reasonable person to believe that the suspect has committed, is committing, or is about to commit a crime. probable cause must come from specific facts and circumstances, rather than simply the officer's hunch or suspicion.
goods in peril
in the US the most highly sought after shipments are pharmaceuticals, consumer electronics, apparel, and food. as the demand and prices for certain goods rise, cargo thieves updat4e their lists of commodities to target and fence. for ex. when the price of metals such as gold , platinum, copper, or steel rises, their rate of theft increase
OSINT "mindset" evidence:
intelligence processed and collected for presentation
open source intelligence
intelligence that is the result of collecting and analyzing publicly available information
medicare
is designated as a high-risk program because of its size, complexity and vulnerability to improper payments
massachusetts
launched task forces in 13 communities that were successful
florida
no-fault auto insurance reforms
workplace violence
now recognized as a specific category of violent crime that calls for distinct responses from employers, law enforcement, and the community. this recognition is relatively recent. prior to the Edmond shootings, the few research and preventative efforts that existed were focused on particular issues-patient assaults on health care workers and the high robbery and murder risks facing taxi drivers and late-night convenience store clerks
what does OSINT stand for
open-source intelligence
how to write a report
proper spelling, grammar, chronological order, write it so that a kindergartener would be able to understand it
california
received 17,981 suspected fraudulent cases in 2012-13
building probable cause
refers to the requirement in criminal law that police have adequate reason to arrest someone, conduct a search, or seize property relating to an alleged crime -probable cause requirement comes from the 4th amendment
OSINT "mindset" intelligence:
reviewed, analyzed, and verified pieces of information
"detentions"
short of arrest do not require probable cause. such temporary detentions require only "reasonable suspicion" this includes: car stops, pedestrian stops and detention of occupants while officers execute a search warrant. "reasonable suspicion" means specific facts which would lead a reasonable person to believe criminal activity was at hand and further investigation was required. these can ripen into arrests, and the point where that happens in not always clear. Often police state that they are arresting person, place him/her in physical restraints or take other action crossing the line into arrest. these police actions may trigger the constitutional requirement of probable cause. someone arrested of charged w out probable cause may seek redress through a civil lawsuit or false arrest or malicious prosecution
cargo thieves are
sophisticated, organized, and generally, not home-grown. often recruited from theUS and trained by Cubans then sent to Florida to establish their operations
Katz vs. U.S.
the "voluntary disclosure" doctrine is highly cited as justification that heightened privacy setting are irrelevant, even if the agent used fictitious accounts to gain access. If a user accepts a friend/social connection through normal means, they no long have protection on what they share w those individuals. DEA and Mall of America learned the hard way.
the 4th amendment
the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated and no warrants shall issue but upon probable cause describing the place to be searched
warrants and probable cause
typically, to obtain a warrant an officer will sign an affidavit stating the facts as to why probable cause exists to arrest someone, conduct a search or seize property. judge issues warrants if they agree that probable cause exists. there are many instances where warrants are not required to arrest or search, such as arrests for felonies witnessed in public by an officer. here is more information on when warrants are not required if a warrantless arrest occurs, probable cause must still be shown after the fact, and will be required in order to prosecute a defendant
OSINT "mindset" information:
unverified data points relating to subject
the more popular insurance fraud scams involves
vehicle crashes that result in both legitimate and fake/exaggerate injuries
workplace violence type 1:
violence acts by criminals who have no other connection w the workplace but enter to commit robbery or another crime 80% the motive is usually theft, and typically the criminal is carrying a fun or other weapon
workplace violence type 3:
violence against coworkers, supervisors, or managers by a present or former employee
workplace violence type 4:
violence committed in the workplace by shoe who doesn't work there, but has a personal relationship with an employee-an abusive spouse or domestic partner
workplace violence type 2:
violence directed at employees by customers, clients, patients, students, inmates, or any others for whom an organization provides services the largest number of type 2 assaults are those in healthcare occupations who deal w psychiatric patients
intro of your report
who you are, what you do, geographical location being used, description of incidents and time and date of occurrences, brief and to the point of what your report will include
once you have the Facebook user ID
you can directly access a profile, even if display names change
what is different about a company/business search
you nee the PageID not ProfileID for a company page