retail loss information in mail theft investigations a
play

Retail Loss Information in Mail Theft Investigations A private - PowerPoint PPT Presentation

Retail Loss Information in Mail Theft Investigations A private public partnership benefiting the consumer. The OI e OIG Office ice of Inves estig igati tions ons OIs structure is designed to cover postal program vulnerabilities


  1. Retail Loss Information in Mail Theft Investigations A private public partnership benefiting the consumer.

  2. The OI e OIG Office ice of Inves estig igati tions ons • OI’s structure is designed to cover postal program vulnerabilities and are aligned geographically to the postal workforce. • Approximately 450 Special Agents stationed in more than 108 offices nationwide. • OI meets its statutory responsibility by investigating internal postal crimes involving: • Health Care Fraud • Contract Fraud • Financial Fraud • Internal Mail Theft • Official Misconduct • Specialized units in Headquarters include the Computer Crimes Unit and Cyber & Technical Operations Unit. 2

  3. 3

  4. What is Internal Mail Theft??? THE PARCEL COMPLAINT…WHERE DO YOU START?

  5. United States Postal Inspection Service Jurisdiction Military Personnel • Highway Contract Drivers (Dock to Dock) • Airline Employees • Bank/Firm Employees • • Mail Messenger/Courier • Mail Room Personnel • Anyone who has access to the mail for reasons of their employment (non-postal)

  6. Sanctity of the Seal • Sanctity of the Seal o No person in the USPS including contractors shall break, or permit to be broken, the seal of any mail sealed against inspection while in USPS custody.

  7. Wh What is is C CAPE? E? • Countermeasures And Performance Evaluations. • Our Mission: To provide visibility into data and deliver decision ready information to our stakeholders. • CAPE is staffed by: • Subject Matter Experts • Data Modelers • Information Technology Specialists 7

  8. Enterprise Customer Care (eCC) Data Mining Text Fields for Keywords

  9. eC eCC • USPS receives eCC complaints • Data Mining Text Search for Keywords brings actionable leads to our Mail Theft Agents around the country. • Keywords Used: • gift cards • greeting cards • cash • jewelry • prescriptions • Firearms • Agents are not limited to these keywords. Agents can search a specific date range, keyword, 3 or 5 digit zip code. 9

  10. Succ ccess ess Stori ries es • A mail theft investigation initiated in January 2015, determined a labor custodian, stole at least eight gift • cards with a total value of $210, as A mail theft investigation initiated well as two $5 dollar bonus cards in June 2015 revealed a rural and two $10 off coupons from the carrier associate was mail. responsible for the theft of gift cards from the mail. • During an interview with agents • from the USPS OIG, the labor In July 2015, the rural carrier custodian confessed to the thefts associate submitted her and wrote a sworn statement resignation from the postal acknowledging her activities. service effective immediately based upon the USPS OIG investigation 10

  11. RADR Risk Assessment Data Repository The OIG working closely with mailers to develop testing programs to deter employee theft.

  12. Data Analyti tics cs as a S a Ser ervic ice • The OIG Vision is to have analytics and data sharing services as the foundation of internal mail theft investigations. • Allows for allocation of time/resources • Allows the computer to identify the areas of concern • RADR transforms data into information • Comes at no cost to the retailer. 12

  13. RADR DR Mail il Theft Facts • Analyze reported losses from major mailers. • Identifies the most likely location for each loss: major mailer warehouse, plant, post office, route, carrier. • Groups location losses and trends over specific time periods - to identify hotspots. • Provides the agent with investigative guidance about the who, what, when, and where. Does not assume carriers are responsible for all losses. • For plant losses, identifies suspected machine type (SPBS, APPS, PSS) where losses are occurring. 13

  14. High-Level Model Architecture DOIS Data RADR Analytic Tool Postal AMS Data Data Facility Data RADR Reporting Tool External Data Mail Loss MT Model Records

  15. Mail Theft Model Retailer 1 Retailer 2 Retailer 3

  16. Tripwires Utilizing Retail Information in Mail Theft Investigations

  17. Pac Package ge Loss Trip ipwir ire e Similar to mailer loss analysis, but we focus on package losses • • Is it internal mail theft, external mail theft or consumer fraud? • By analyzing the last scan information, we focus on: Evidence of the package entering the Postal Service mail stream • • Evidence pointing to the package going missing inside the Postal Service Evidence of the package Scanned as Delivered • 17

  18. Exter ernal l Thef eft or Consumer umer Fraud • United States Postal Inspection Service • Jurisdiction involves external influences on USPS • Referral process and cooperation • Information will be available to your organization. • The goal is to protect the retailer and ultimately the customer 18

  19. Gif ift Card d Loss Trip ipwir ire e • Gift cards reported lost/stolen • Loss Metrics or Exceptions: • Identify multiple gift cards used in same transaction • EX: Four (4) $50 Gift Cards used in same transaction • Gift Cards fraudulently negotiated outside of intended destination • EX: Gift Card destined for Cincinnati used in Las Vegas 19

  20. Sharin ing g Data • The more loss data the OIG can obtain the better will help the Postal Service, the Mailing Industry, and the Customer. • The OIG needs this from you: give us your problem shipments, and we can work to determine the most likely points of loss. 20

  21. Secured File Transfer • Over 150 of the Fortune 1000, • Including the largest civilian federal agencies, • 6 of the top 12 private equity firms • Most of the 6 major Hollywood studios 21

  22. https://www.youtu be.com/watch?v= wwf8uVx2tyM&fe ature=player_deta ilpage

  23. 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend