SOP 316.1 Economic Crimes/ Identity Theft investigations Flashcards

1
Q

Economic Crimes specifically ________ are the fastest growing crimes in the United States, affecting financial institutions as well as innocent persons.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identity theft is a tool used by ________ and others attempting to evade the law.

A

terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The best way to approach any economic crime is to _________.

A

follow the money trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

By following the money charge you can

generally __________ where the illegal act occurred and who the actual victims are.

A

ascertain the jurisdiction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ultimately, the ______ is determined by whoever suffers the actual or potential loss.

A

victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

However, it must be kept in mind that although an individual may not suffer a financial loss they may still be a victim of __________.

A

identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Opening accounts at two or more financial institutions and using the “flat time” of available funds to create fraudulent balances

A

Check Kiting:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The manufacture of or arranging to manufacture a payment instrument without the permission of the financial institution, account holder, or organization whose name, routing or account number appears on the payment
instrument, or the manufacture of any payment instrument with a fictitious name,
routing or account number.

A

Counterfeit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Any credit card which is fictitious, altered, forged, any facsimile or false representation, depiction, component of a credit card, or any
stolen credit card, obtained as a part of a scheme to defraud or otherwise unlawfully obtained and which may or may not be embossed with account information or a company logo.

A

Counterfeit Credit Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Any instrument or device, whether known as a credit card, credit plate, bank service card, check guarantee card, electronic benefits transfer card (EBT), debit card, or any other instrument, issued by a financial institution for the use of the cardholder in obtaining money, goods, services or anything of value on
credit or for use in an automated banking device to obtain any of the services
provided through the device.

A

Credit Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person 60 years of age or older who is
suffering from the infirmities of aging as manifested by advanced age, organic
brain damage or other physical, mental or emotional dysfunction, to the extent that the person’s ability to provide for their own care or protection is impaired.

A

Elderly Person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A check, draft, money order, travelers check or other instrument for payment of money, whether or not negotiable

A

Payment Instrument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A device used to copy credit numbers typically used at hotels, restaurant or car rental agencies. The device captures a credit card number after it passes through the device. Devices hold between 20 – 100 credit card numbers.

A

Skimmer or Wedge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The whole or any portion or phase of any formula, pattern, device, combination of devices, or compilation of information which is for use, or is used, in the operation of a business and which provides the business an advantage or an to obtain an advantage over those who do not know it or use it.
Examples include: Any scientific, technical, or commercial information including
any design, process, procedure, list of suppliers, list of customers, business code
or improvement thereof.

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(F.S.§817.034) The deceiving a victim into parting with their monies by convincing them that they will receive a substantial financial
benefit in return for providing some modest payment to be made in advance

A

Advanced Fee Scheme:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Checks that are stolen, altered, forged, or counterfeit, written on a closed account, or that have had payment stopped that are uttered, cashed or deposited resulting in the theft of money, merchandise or services.

A

Check Fraud:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is unlawful for any person to have in their possession a counterfeit payment instrument or to counterfeit a payment instrument with the intent to defraud a financial institution, account
holder, any person or organization. These include forged checks, counterfeit bills,
deeds, money orders, traveler’s checks, and credit/debit cards.

A

Counterfeit Payment Instruments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Depositing counterfeit, stolen or other worthless checks for the purpose of fraudulently increasing the dollar amount posted to the account to which the individual then removes the monies before the financial institution discovers the checks are fraudulent.

A

Depositing Worthless Item with Intent to Defraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Knowingly, by deception or intimidation,
obtaining or using, or endeavoring to obtain or use a person over 60 years old funds or
assets with intent to temporarily or permanently deprive that person of the use,
benefit or possession of those assets by a person who: (a) stands in a position of
trust and confidence with the elderly person; (b) has a business relationship with
the elderly person; or (c) exploits an elderly person who lacks capacity to consent.

A

Elderly Exploitation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

________ relates directly to the theft statutes where a business has suffered a
substantial financial loss through a scheme to defraud involving a current or
former employee who was placed in a position of financial trust.

A

Embezzlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Financial Scams and Cons are commonly referred to as ?

A
Bank Examiner” scam,
 Pigeon Drop” scam,
 Canadian Lottery” scam,
 Spanish Lottery” scam 
 Nigerian Fraud” scam.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Whoever falsely makes (counterfeits), alters, forges an official public record, document or payment instrument, with intent to injure or to
defraud

A

Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Any person who: with intent to
defraud a purported issuer or a person or organization providing money, goods,
services, or anything of value; or any other person; falsely makes, embosses, or
alters in any manner a credit card or utters such a credit card or who, with intent
to defraud, has a counterfeit credit card or any invoice, voucher, sales draft, or
other representation or manifestation of a counterfeit credit card in his/her
possession, custody or control.

A

Forgery of a Credit Card:

24
Q

The use of credit cards, ATM cards or debit cards and/or ATM, credit debit account numbers, that are stolen, altered, forged, counterfeit or obtained through fraud, resulting in the theft of money, merchandise or services.

A

Fraudulent Use of Credit Card

25
Q

Any person who willfully and without authorization fraudulently uses
or possesses, with intent to fraudulently use, personal identification information
concerning an individual without first obtaining that individual’s consent.

A

Identity Theft (Criminal Use of Personal Identification Information

26
Q

(Also known as the Florida Communications Fraud Act). A systematic, ongoing course of conduct with intent to defraud one or more persons, or with intent to obtain something of value from one or more persons by false or fraudulent pretenses, representations, promises, or willful misrepresentations of a future act. These offenses include embezzlement, advanced fee schemes, financial scams/cons, financial elderly exploitation, check kiting, trade secret violations and computer-related financial crimes.

A

Scheme to Defraud

27
Q

Any person who, with intent to deprive
or withhold from the owner thereof the control of a trade secret or with intent to
appropriate to his/her own use or the use of another, steals an article representing
a trade secret, or without authority makes a copy.

A

Trade Secret Violations

28
Q

The passing and/or presenting of an official document or payment instrument which is counterfeit, having been altered or having a signature that has been forged, in the attempt or actual receipt of money, merchandise or services.

A

Uttering a Forged Instrument

29
Q

Which Schemes to defraud will not be investigated?

A

the ones over the internet or mail

30
Q

The department will only investigate embezzlement when the business suffers a loss of over what

A

$5000.00

31
Q

____________is responsible for investigating offenses involving stolen, forged or counterfeit postal money orders. That agency also investigates schemes and scams originating through the U.S. Mail

A

The United States Postal Inspector’s Office

32
Q

_______ investigates offenses involving stolen or forged U.S. Treasury checks as well as certain offenses involving counterfeit currency.

A

The United States Secret Service

33
Q

Schemes and scams originating via the Internet: Since these scams normally
originate from outside the United States the victims of these types of offenses
should be referred to the

A

FBI’s web site: www.ic3.gov:

34
Q

This department does not handle complaints of worthless checks. Both misdemeanor and felony worthless check cases will be referred to the “Worthless Checks Section” of the Hillsborough County State Attorney’s
Office: 700 E. Twiggs Street, Suite 711 on the

A

7th floor

35
Q

All check cases involving_________ and _______ shall be investigated by this department after __________ has been established. If there is doubt as to the intent initiate a report and refer the case to the Economic Crimes Unit.

A
  1. Stop Payment
  2. Account Closed
  3. intent to defraud
36
Q

Cases involving employee theft will normally be referred to the appropriate _________ for investigation.

A

District Latent Investigative Squad

37
Q

Embezzlement cases where a business has suffered a loss of at least $300.00, and where the suspect was in a position of financial trust (i.e. business manager, bookkeeper, chief financial officer), shall be referred to the

A

Economic Crimes Unit.

38
Q

In those cases where identity, checks, or credit cards are stolen and no leads exist, the cases should be_________ .

A

inactivated

39
Q

If the owner of the property determines that someone used any of those items within a _____ the cases should be referred to the ________ for investigation.

A
  1. 48 hour period

2. District Latent Investigative Squad

40
Q

If identity, checks, or credit cards are used after the initial 48-hour period, the cases should be referred to the________ for latent investigation.

A

Economic Crimes Unit

41
Q

All sworn police personnel and ______ are authorized to take reports on any economic crime.

A

community service officers

42
Q

The ________ and district will primarily originate and collect all evidence pertaining to economic crimes.

A
  1. on-scene district unit

2. community service officers

43
Q

Identity Theft is punishable under ______ when any person knowingly transfers or uses without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a felony under applicable state or local law.

A

federal law

44
Q

Identity theft is punishable under _______ when any person who willfully and
without authorization fraudulently uses or possesses with intent to fraudulently
use, personal identification information concerning an individual without first
obtaining that individual’s consent

A

Florida State Statute

45
Q

Refer all identity theft reports to the Economic Crimes Unit. If it appears that the identity theft may have ________, immediately notify the Criminal Intelligence Bureau and appropriate
federal agencies.

A

national security implications

46
Q

Should the suspect, knowingly, be in possession of _______ he should be charged with possessing counterfeit bills under
F.S.§831.08 regardless of whether the suspect attempted to pass any of the
bills.

A

10 or more counterfeit bills

47
Q

Should the suspect, knowingly possess a counterfeit bill and attempt to pass that bill he should be charged with_________ under F.S.§831.09 regardless of the number of bills in that subject’s possession.

A

uttering a forged bill

48
Q

This administrative statute should be utilized when an officer comes in contact with a subject who unwittingly possesses counterfeit currency. It mandates all law enforcement officers to seize counterfeit currency

A

831.20

49
Q

Regardless of whether an arrest is made or not the officer shall seize the counterfeit bills, unless taken by the Secret Service agent, and placed the bills in a ________ before entering it into evidence. The officer shall initiate a report and obtain a written statement from all parties involved.

A

clear plastic envelope

50
Q

If investigating a financial crime where a personal computer or laptop computer is present and which may contain related evidence, do not touch it and do not allow the suspect access to it. If the computer is OFF LEAVE IT OFF. Do not turn the computer on for any reason. Unplug the computer by pulling the power cord __________, not at the wall.

A

out of the back of the computer

51
Q

If the computer is a part of a _____, contact the Economic Crimes Unit supervisor.

A

network

52
Q

The_______ acts as the nation’s clearinghouse for information related to identity crimes. The agency provides assistance from trained counselors in resolving credit related problems. The______also provides a comprehensive guidance for victims of identity theft titled, “When Bad Things Happen to Your Good Name.” The guide provides concrete steps of what to do when a person is a victim of identity theft.

A

Federal Trade Commission

53
Q

If the affidavit is notarized, it can be introduced to a grand jury in lieu of ________. It can also be used as part of a victim’s _____in later court proceedings.

A
  1. a victim having to appear

2. impact statement

54
Q

If a driver’s license is involved, contact the __________

A

state motor vehicle department.

55
Q

If a person has been a victim of identity theft and believe they have a record, they can request that the victim initiate a compromised identity claim through the __________. This service is only for individuals who believe they are victims and/or have had their personal identification information stolen or misused in the past.

A

Florida Department of Law Enforcement (FDLE)

56
Q

FDLE will only accept claim forms that are _____________

A

submitted by a law enforcement agency and in an official agency
envelope.

57
Q

Upon receipt of the __________, FDLE will compare the fingerprints of the person who was previously arrested, to the victim’s fingerprints. Once these prints reveal that the victim was not the person arrested, FDLE will provide the victim with a ____________.

A
  1. Compromised Identity Review Claim Form

2. Compromised Identity Certificate