MOUNTAIN WEST CREDIT UNION ASSOCIATION June 9, 2020 Special Agent - - PowerPoint PPT Presentation

mountain west credit union association june 9 2020
SMART_READER_LITE
LIVE PREVIEW

MOUNTAIN WEST CREDIT UNION ASSOCIATION June 9, 2020 Special Agent - - PowerPoint PPT Presentation

MOUNTAIN WEST CREDIT UNION ASSOCIATION June 9, 2020 Special Agent Lisa Palmer, IRS-CI Objectives Overview of Role of CI Special Agents Components & Importance of SARs Discuss Traditional Case Studies Emerging Cryptocurrency


slide-1
SLIDE 1

Special Agent Lisa Palmer, IRS-CI

MOUNTAIN WEST CREDIT UNION ASSOCIATION June 9, 2020

slide-2
SLIDE 2

Objectives

  • Overview of Role of CI Special Agents
  • Components & Importance of SARs
  • Discuss Traditional Case Studies
  • Emerging Cryptocurrency Trends
  • Discuss Cryptocurrency Cases
  • Discuss Role SARs Play in Investigations
slide-3
SLIDE 3

Who i

  • is

s IRS-CI a and W nd Wha hat Do Do The hey Do Do?

  • Approx. 2,200 Special Agents

Fraud Detection Centers Forensic Laboratory Computer Investigative Specialists Undercover Program Tech. Program Asset Forfeiture Coordinator

slide-4
SLIDE 4
  • Interview witnesses and subjects
  • Serve search, seizure and arrest warrants
  • Perform undercover operations
  • Armed Escorts/Building Security
  • Evaluate Information
  • Testifying - Grand Jury & Trial
  • Recommend Prosecution

Wha hat Do Do S Speci pecial Ag Agents Do Do?

slide-5
SLIDE 5

SAR AR Revie view T Tea eams

  • Includes FBI, IRS, USAO, ICE/HSI, DEA, ATF, USSS, USPS, CO

Dept of Rev., and SEC etc.

  • Meet once a quarter
  • Discuss SARs, cases, and trends
slide-6
SLIDE 6

So

  • Many SARs - How t

to

  • Chose
  • se
  • Different agencies have different priorities
slide-7
SLIDE 7
  • Investigative Authority:
  • Title 26 – Internal Revenue

Code

Who i

  • is

s IRS-CI a and W nd Wha hat Do Do The hey Do Do?

  • Legal Source Income
  • Illegal Source Income
  • Return Preparer Schemes
  • ID Theft
slide-8
SLIDE 8
  • Money Laundering

(Video Break!)

Who i

  • is

s IRS-CI a and W nd Wha hat Do Do The hey Do Do?

slide-9
SLIDE 9

SA SAR Analysi sis s Tool

slide-10
SLIDE 10
slide-11
SLIDE 11

Data Analytics

  • Are there individuals with multiple SARs this months?
  • Previous months? Outside this area?
  • Are there individuals with SARs who also have other BSA Documents
  • What specialized filers have filed in my area?
  • Are there new documents for existing cases?

Da Data Ana Analytics ics

slide-12
SLIDE 12

Preparing SAR Narratives

  • This is your chance to tell me, in plain English, what you THINK is suspicious.
  • Give me a summary in the first 1-2 sentences.
  • Provide a detailed description of the known or suspected criminal violation or

suspicious activity.

  • Add any information you have about the knowledge, mindset, or intent of the

subject.

  • Conversations, or statements from the subject are especially useful

Prepp epping g SAR AR N Narr rratives

slide-13
SLIDE 13

TELLER 08 AT 12:29 10/12/2010 TUESDAY CASH DEPOSIT $9,500.00 TELLER 08 AT 16:23 10/13/2010 WEDNESDAY CASH DEPOSIT $9,500.00 TELLER 10 AT 10:30 10/19/2010 TUESDAY CASH DEPOSIT $9,500.00 TELLER 08 AT 16:40 10/20/2010 WEDNESDAY CASH DEPOSIT $9,500.00 TELLER 11 AT 14:44 10/21/2010 THURSDAY CASH DEPOSIT $9,500.00 TELLER 08 AT 14:46 10/26/2010 TUESDAY CASH DEPOSIT $9,500.00 TELLER 04 AT 15:02 10/27/2010 WEDNESDAY CASH DEPOSIT $9,500.00 TELLER 04 AT 11:34 11/02/2010 TUESDAY CASH DEPOSIT $9,500.00 TELLER 11 AT 16:35

How We S e See S ee SAR AR Narr rratives es

slide-14
SLIDE 14

Attach Transaction Charts to SAR

DEPOSIT Teller Time Day of Week Date $9,500.00 08 16:23 WEDNESDAY 10/13/2010 $9,500.00 10 10:30 TUESDAY 10/19/2010 $9,500.00 08 16:40 WEDNESDAY 10/20/2010 $9,500.00 11 14:44 THURSDAY 10/21/2010 $9,500.00 08 14:46 TUESDAY 10/26/2010 $9,500.00 04 15:02 WEDNESDAY 10/27/2010 $9,500.00 04 11:34 TUESDAY 11/02/2010 $9,500.00 11 16:35 THURSDAY 11/04/2010

slide-15
SLIDE 15

Example 1

Excerpt from a SAR

This SAR is being filed for suspicious incoming funds, a suspicious use

  • f funds and a suspicious movement of funds conducted in personal

checking account… …[the bank] considers this activity suspicious because the true source

  • f the electronic credits and incoming wires is undetermined. Also,

the inability to determine the true use of the visa debit card purchases and electronic debits is suspicious. Additionally, the inability to determine the source and use of funds indicates a suspicious movement of activity. Online research supporting this customer is buying and selling bitcoins adds to this suspicious nature.

Example e 1

slide-16
SLIDE 16

Example 1

Excerpt from a SAR

This SAR is being filed for suspicious incoming funds, a suspicious use

  • f funds and a suspicious movement of funds conducted in personal

checking account… …[the bank] considers this activity suspicious because the true source

  • f the electronic credits and incoming wires is undetermined. Also,

the inability to determine the true use of the visa debit card purchases and electronic debits is suspicious. Additionally, the inability to determine the source and use of funds indicates a suspicious movement of activity. Online research supporting this customer is buying and selling bitcoins adds to this suspicious nature.

Example e 1

slide-17
SLIDE 17

Limited Use of SAR Information

  • Back-up documentation
  • Transactions are great but context ALWAYS helps
  • More is better…additional account activity and history, conversations

with subject, video, and pictures

  • We cannot directly use any of the information in the SAR
  • Follow-up with subpoena, summons, court order
  • Interview employees of the financial institution who were

involved/witness to the suspicious activity

Limited Us d Use e of S SAR AR I Inform rmation

slide-18
SLIDE 18

Red Flags Depository Accounts

  • Structuring
  • Large amount of cash deposits
  • International wires
  • Activity out of the ordinary for customer
  • Customer inquiring about BSA laws
  • Business activity in personal accounts
  • Multiple U.S. Treasury checks in various names in single account
  • Recycling of Cashier’s Checks to keep account balance low

Red F ed Flags – Depo Depository Ac Accoun unts

slide-19
SLIDE 19

Reach Out to Law Enforcement

  • Thousands of SARs are filed each month in Colorado - don’t be scared

to reach out

  • Time sensitive
  • Out of the ordinary
  • Trust your instincts
  • You are the boots on the ground, much of our financial intelligence

comes from you

Rea each Out ch Out to Law E Enforcemen ent

slide-20
SLIDE 20

Tax Evasion in a nutshell

This boils down to intent to defraud the United States by concealing income from being taxed or concealing assets so as not to pay an

  • utstanding tax.
  • Evasion of Assessment vs. Evasion of Payment

Applies to all types of federal taxes: income, employment, etc.

Tax E x Evasion i n in n a Nut utshell

slide-21
SLIDE 21
  • Structured cash deposit/withdrawals
  • Using nominees (shell corporations, nominee signor, stamped signature)
  • Business activity in a personal bank account
  • Comingling business and personal funds/expenses
  • Sweeping accounts regularly (i.e.: depositing funds, purchasing cashier’s

checks, then redepositing cashier’s checks at a later date)

  • Cash intensive businesses with no cash activity in business bank account

(i.e.: retail, bars, dry cleaners, etc.)

  • Admissions or statements from account holders

What Can Tax Evasion/Fraud Look Like in a Bank Account?

slide-22
SLIDE 22

Return Preparers

  • No Licensing Rules for Return Preparers
  • Make up Information on Returns
  • Charge a Percentage of the Refund

Return Preparers

slide-23
SLIDE 23

Tax Fraud ID Theft

  • Stolen SSN
  • Fabricate income – Refundable credits
  • Use last year’s income numbers
  • Business Email Compromise
  • ITIN Fraud
  • Create an account
  • Receive Additional Child Tax Credit
  • The gift that keeps on giving

Fraud – ID Theft

slide-24
SLIDE 24
  • Direct Deposit into Bank Account
  • Limit of three
  • Prepaid Debit Card
  • Also a limit of three
  • Debit cards have AML programs
  • Checks
  • You need an ID to cash the checks

MONEY: From the IRS to the Criminal

slide-25
SLIDE 25

IRS Impersonation Schemes

  • Phone and email (mostly phone)
  • Threaten arrest
  • Action required immediately
  • Send money through MSB, gift cards, or cryptocurrency
  • Not limited to IRS
  • Social Security Administration
  • Utility Companies

IRS I Impersonation S Schemes

slide-26
SLIDE 26

Case Studies

slide-27
SLIDE 27

Case Study #1 – The Home Healthcare Providers

  • SARs filed by local CU stating two new

business accounts just received over $3 million from the Treasure Department related to claims with the VA

  • Businesses registered to same

residential addresses

  • Majority of the funds were quickly

transferred to personal accounts.

  • Funds largely used for what appear to

be personal expenses

slide-28
SLIDE 28

Case Study #1 – The Home Healthcare Providers

  • The businesses’ claims with the VA

were analyzed and outliers were identified for patient care

  • Interviews showed business owner had

cold called patients with a chronic condition, and helped care takers fraudulently enroll as certified healthcare workers.

  • Subject’s businesses kept 80% of the

money

  • Found guilty – subjects are awaiting

sentencing

slide-29
SLIDE 29

Case Study #2 The Landlord

  • Multiple SARs filed on local landlord
  • Subject would bring in an empty bag,

go to their safe deposit box and then buy a large cashier’s check with cash from the bag

  • Subject would cash checks regularly

with memos for “Rent” or an address

  • Kept low balances in personal accounts
slide-30
SLIDE 30

Case Study #2 The Landlord

  • Follow up documentation requested, and

agents interviewed bank personnel

  • Subject told tellers she didn’t trust

banks, and preferred to use cash

  • Review SAR support and public records

showed she was buying inexpensive properties and renting them

  • Review of tax returns showed income was

reported

slide-31
SLIDE 31

CRYPTOCURRENCY

  • History of Cryptocurrency
  • Components of a Cryptocurrency Transaction
  • Role of Cryptocurrency in Financial Crimes
  • Emerging Trends

Cryptocurrency

slide-32
SLIDE 32

Cryptocurrency SARs: Volume

Cryptocurrency S SARs Rs: V Volume

slide-33
SLIDE 33

Cryptocurrency SARs: Filers

Cryptocurrency S SARs Rs: F Filers

slide-34
SLIDE 34

Cryptocurrencies

Cryptocurrenies

slide-35
SLIDE 35

ADDS TO NARRATIVE

  • Public Key (a/k/a “account number”)
  • Email Address(es)
  • Conversations RE: cryptocurrency exchangers used
  • Other cryptocurrencies used
  • Bank photographs during the transaction
  • Device Information
  • IP Addresses

Add dds t s to N Narrative

slide-36
SLIDE 36

IMPORTANCE for LE & BSA

  • Threats to integrity
  • More difficult to ID (anonymity)
  • More difficult to detect by LE (avoidance)
  • More difficult to trace & track (3 stages of ML)
  • Counting on LE & Regulators being novices
  • Threats to safety

Imp mpor

  • rtan

ance f e for LE a and B BSA

slide-37
SLIDE 37

Cryptocurrency kiosks

ATMs sell and buy cryptocurrencies for cash

  • Different companies deal in different

currencies

  • High fees
  • Some are legitimate, others less so

These can, and are frequently used to launder money

Cryp yptocu curr rrency K cy Kios

  • sks
slide-38
SLIDE 38

Contact Info

  • lisa.palmer@ci.irs.gov

303-603-4940

Conta tact I Info