Thursday, May 15, 2008

Phone Threats - Florida Private Investigator

FLORIDA MAN PLEADS GUILTY TO FEDERAL THREATENING CHARGE

Nora R. Dannehy, Acting United States Attorney for the District of Connecticut, announced that ARTHUR O'NEILL, 43, of Miramar, Florida, pleaded guilty today before United States District Judge Christopher F. Droney in Hartford to one count of threatening.

According to documents filed with the Court and statements made in court, on January 7, 2008, O'NEILL placed telephone calls to his sister, who resides in Connecticut, and left messages on his sister's answering machine in which he threatened to harm her. O'NEILL stated in these messages that, if his sister did not contact him within 24 hours, he would come to Connecticut to hurt or kill her and specifically threatened to cut his sister "to shreds with a knife."
O'NEILL has been detained since his arrest in Florida on February 19, 2008.

Judge Droney has scheduled sentencing for August 1, 2008, at which time O'NEILL faces a maximum term of imprisonment of five years and a fine of up to $250,000.

This case was investigated by the Federal Bureau of Investigation. The case is being prosecuted by Assistant United States Attorney Paul H. McConnell.

Health Care Fraud - South Florida Private Investigator

PALM BEACH COUNTY MAN SENTENCED IN HEALTH CARE FRAUD, BANKRUPTCY AND MORTGAGE FRAUD SCHEME

R. Alexander Acosta, United States Attorney for the Southern District of Florida, David W. Bourne, Special Agent in Charge, Food and Drug Administration, Office of Criminal Investigations, Miami Field Office, and Jonathan I. Solomon, Special Agent in Charge, Miami Field Office, Federal Bureau of Investigation, announced that defendant Domeneco Abate was sentenced on May 12, 2008 by the Honorable United States District Judge Donald M. Middlebrooks to 27 months’ imprisonment, to be followed by three years of supervised release. In addition, Abate was ordered to forfeit $155,000 and to pay an additional $278,813 in restitution.

On February 28, 2008, Abate pled guilty to a three-count Information, charging him with health care fraud, bankruptcy fraud and wire fraud. The health care fraud charges to which the defendants pled guilty stemmed from the defendants’ unlawful receipt of substantial health insurance benefits for themselves and their families. From June, 2001 through September, 2004, the defendants obtained insurance benefits by falsely claiming to be employees of The Medicine Shoppe, a retail pharmacy franchise in Palm Beach Gardens, Florida. In addition, with the defendants’ consent, the Medicine Shoppe used the defendants’ health insurance information and that of their families to file false prescription drug claims.

Abate also pled guilty to bankruptcy fraud. On or about August 12, 2004, Abate filed a bankruptcy petition and schedules on which he falsely listed his wife, co-defendant Eileen Abate, as being employed as the manager of The Medicine Shoppe, with a monthly gross income of approximately $17,714. Abate also pled guilty to wire fraud, in that he submitted false loan documentation to support the purchase of his home in Wellington, Florida. In the loan application, Abate falsely stated that his wife was an Office Manager at The Medicine Shoppe, with a gross monthly income of $9,864. In addition, the loan documentation falsely stated that approximately $165,000 of the down payment for the purchase of the home was a gift from relatives. Abate agreed to forfeit $155,000 for this mortgage fraud.

Also sentenced yesterday by the Honorable Donald M. Middlebrooks was co-defendant Vincent Trupia. Trupia, who pled guilty to a single count of health care fraud, was sentenced to 5 years of probation, with a special term of 180 days’ home confinement. He was also ordered to pay restitution in the amount of $83,545.75 for insurance benefits he received through The Medicine Shoppe.

Sentencing for co-defendant Diane Mangicapra is scheduled for Friday, May 16, 2008 at 11:30 a.m., and for Eileen Abate on Wednesday, May 21, 2008 at 4:45 p.m., before the Honorable Donald M. Middlebrooks in West Palm Beach, Florida.

Mr. Acosta commends the investigative efforts of the Food and Drug Administration, Office of Criminal Investigations, and the Federal Bureau of Investigations. This case is being handled by Assistant United States Attorneys Carolyn Bell, Lynn Rosenthal, and Antonia Barnes.

A copy of this press release may be found on the website of the United States Attorney's Office for the Southern District of Florida at www.usdoj.gov/usao/fls. Related court documents and information may be found on the website of the District Court for the Southern District of Florida at http://www.flsd.uscourts.gov/ or on http://pacer.flsd.uscourts.gov/.

E-Scams - South Florida Computer Forensics

New E-Scams & Warnings
PHISHING RELATED TO ISSUANCE OF ECONOMIC STIMULUS CHECKS


The FBI warns consumers of recently reported spam e-mail purportedly from the Internal Revenue Service (IRS) which is actually an attempt to steal consumer information. The e-mail advises the recipient that direct deposit is the fastest and easiest way to receive their economic stimulus tax rebate. The message contains a hyperlink to a fraudulent form which requests the recipient's personally identifiable information, including bank account information. To convince consumers to reply, the e-mail warns that a failure to complete the form in a timely manner will delay the issuance of the rebate check.

One example of this IRS spam e-mail message is as follows:

"Over 130 million Americans will receive refunds as part of President Bush's program to jumpstart the economy.

Our records indicate that you are qualified to receive the 2008 Economic Stimulus Refund.
The fastest and easiest way to receive your refund is by direct deposit to your checking/savings account.

Please follow the link and fill out the form and submit before May 10th, 2008 to ensure that your refund will be processed as soon as possible.

Submitting your form on May 10th, 2008 or later means that your refund will be delayed due to the volume of requests we anticipate for the Economic Stimulus Refund.

Consumers are advised that the IRS does not initiate taxpayer communications via e-mail. In addition, the IRS does not request detailed personal information via e-mail or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts.

Please be cautious of unsolicited e-mails. It is recommended not to open e-mails from unknown senders because they often contain viruses or other malicious software. It is also recommended to avoid clicking links in e-mails received from unknown senders as this is a popular method of directing victims to phishing websites.

If you have received an e-mail similar to this, please notify the IC3 by filing a complaint at http://www.ic3.gov/.




Cyber Investigations - Florida Private Investigator Computer Forensics

Cyber Investigations
How To Protect Your Computer


The same advice parents might deliver to young drivers on their first solo journey applies to everyone who wants to navigate safely online. A special agent in our Cyber Division offered the following:



- "Don't drive in bad neighborhoods." - "If you don't lock your car, it's vulnerable; if you don't secure your computer, it's vulnerable."- "Reduce your vulnerability and you reduce the threat."
Below are some key steps to protecting your computer from intrusion:



- Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.



- Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.



- Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries—shop where you trust.



- Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.



- Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.



- Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker's connection—be it spyware or a botnet that employs your computer's resources to reach out to other unwitting users.

Wi Fi Security Tips - Florida Private Investigator

Wi-Fi Security
FBI



You’re at the airport waiting for your flight. With time to kill, you’re thinking of connecting your laptop to the airport's Wi-Fi to check your office e-mail...do some personal banking...or shop for a gift for your spouse.




But first, consider this: odds are there’s a hacker nearby, with his own laptop, attempting to "eavesdrop" on your computer to obtain personal data that will provide access to your money or even to your company's sensitive information.




Here's something else to consider: there are 68,000 Wi-Fi "hot spots" in the U.S. (see the graphic below for the top Wi-Fi countries), at airports, coffee shops, hotels, bookstores, schools, and other locations where hundreds or thousands of people pass through every day. While many of these hot spots have secure networks, some do not, according to Supervisory Special Agent Donna Peterson of our Cyber Division. And connecting to an unsecure network can leave you vulnerable to attacks from hackers.




How do hackers grab your personal data out of thin air? Agent Peterson said one of the most common types of attack is this: a bogus but legitimate-looking Wi-Fi network with a strong signal is strategically set up in a known hot spot...and the hacker waits for nearby laptops to connect to it. At that point, your computer—and all your sensitive information, including user ID, passwords, credit card numbers, etc.—basically belongs to the hacker. The intruder can mine your computer for valuable data, direct you to phony webpages that look like ones you frequent, and record your every keystroke.




“Another thing to remember,” said Agent Peterson, “is that the connection between your laptop and the attacker's laptop runs both ways: while he's taking info from you, you may be unknowingly downloading viruses, worms, and other malware from him.”




Businesses that offer free or ad-hoc Wi-Fi often don't know their networks have been breached. Individual victims usually don't realize they've been targeted either until it's too late. That’s why, according to Agent Peterson, there aren't reliable stats on the number of these breaches, although the FBI does periodically receive reports on them. It's also very tough to trace a hack that originates on an open, unsecure network.




Agent Peterson explained that the criminal aspect comes into play once data taken by the hacker is used to commit a crime. If the hacker, armed with your personal or corporate information or access codes, tries to break into a secured network—whether it’s a case of intrusion, identity theft, bank fraud, theft of intellectual property, or any other type of crime—then law enforcement gets involved.




What can you do to protect yourself? Agent’s Peterson’s best advice is, don’t connect to an unknown Wi-Fi network. But if you have to, there are some precautions you can take to decrease the threat:




  • Make sure your laptop security is up to date, with current versions of your operating system, web browser, firewalls, and antivirus and anti-spyware software.
  • Don't conduct financial transactions or use applications like e-mail and instant messaging.
    Change the default setting on your laptop so you have to manually select the Wi-Fi network you’re connecting to.
  • Turn off your laptop's Wi-Fi capabilities when you're not using them.

Mortgage Fraud - Florida Private Investigator

MORTGAGE FRAUD
New Analysis of a Rising Threat

We’ve just released a comprehensive new report on mortgage fraud—now posted in full on this website. And, as you might expect given the downturn in the economy and all the troubles in the lending industry, it isn’t a pretty picture.

The information can get quite technical, with plenty of charts, graphs, and hard numbers. But we invite you to take a read if you’re interested in getting educated on the issue—and on emerging schemes that might impact your own pocketbook.
Among the key findings:

... Mortgage fraud is clearly on the rise. Although there is no central way to track the total extent of the problem, we received 46,717 Suspicious Activity Reports related to mortgage fraud last year—compared to 35,617 in 2006 and just 6,936 in 2003. Only seven percent of these reports documented an exact dollar amount in terms of losses, but even so, the total loss from this seven percent was $813 million. Our caseload has also escalated. By the end of fiscal year 2007, we were handling just over 1,200 mortgage fraud investigations—a 47 percent increase from 2006 and a whopping 176 percent increase from 2003.

... The downward trend in the housing market will continue (see forecasts provided by the Mortgage Bankers Association in the report), providing further incentive for shady real estate industry insiders to look for dishonest ways to turn a profit and growing opportunities for scam artists to prey on vulnerable homeowners.

... The subprime lending crisis is a contributing factor to mortgage fraud, both directly and indirectly. Subprime loans, designed for people with poor or limited credit histories, now represent more than 13 percent of all outstanding loans—double the percentage of five years ago. These high-interest, high-risk loans contributed to the 2.2 million foreclosures filed during 2007, up 75 percent from 2006. The trouble actually began when home prices were rising a few years ago, leading to relaxed lending practices throughout the industry and the exaggeration of assets by borrowers anxious to qualify for loans, both of which contributed to fraud.

... The top 10 hotspots nationwide for mortgage fraud in 2007, carefully mapped from multiple public and private sources, were: Florida, Georgia, Michigan, California, Illinois, Ohio, Texas, New York, Colorado, and Minnesota. The north-central region had the largest share of mortgage fraud, followed by the west and southeast regions.

.. The latest mortgage scams run the gamut: from “builder-bailout” schemes where developers unload excess inventory through financial trickery…to foreclosure rescue frauds that trick homeowners into signing over the deed to their house; from seller-assistance scams that use false appraisals to sell homes…to identity theft that leads to home equity credit lines being opened and drained. See the report for more details.

The report also briefly recounts our proactive response to the problem, including our participation in the Department of Justice's Mortgage Fraud Working Group, through which we are helping to identify large-scale industry insiders and criminal enterprises conducting systemic mortgage fraud...our work in multi-agency mortgage fraud task forces and working groups around the country...and our recent “Mortgage Fraud Summit” to discuss the issue with special agents nationwide.