Financial and Cyber Crime Investigations (2024)

Image

Financial and Cyber Crime Investigations (1)

Financial and Cyber Crime Investigations (2)

The U.S. Secret Service has a long and storied history of safeguarding America’s financial and payment systems from criminal exploitation. The agency was created in 1865 to combat the rise of counterfeit currency following the Civil War. As the U.S. financial system has evolved - from paper currency to plastic credit cards to, now, digital information - so too have our investigative responsibilities.

Today, Secret Service agents, professionals, and specialists work in field offices around the world to fight the 21st century’s financial crimes, which are increasingly conducted through cyberspace. These investigations continue to address counterfeit, which still undermines confidence in the U.S. dollar, but it is credit card fraud, wire and bank fraud, computer network breaches, ransomware, and other cyber-enabled financial crimes, that have become the focus of much of the Secret Service investigative work.

Types of Crimes We Investigate

Unauthorized access to computers or networks, using malware, compromised access credentials, phishing, or similar methods. Network intrusions are typically performed to gain access to systems and exfiltrate sensitive information to exploit for financial gain. Network intrusions are also used to block access to computers, networks, or critical infrastructure until a ransom is paid. Ransoms are typically demanded in cryptocurrency.

Counterfeiting of United States currency, bonds, checks, and other financial obligations and securities. Distributing or passing of counterfeited, forged, or altered U.S. currency and other financial obligations and securities. Criminals sometimes use online forums to sell bulk counterfeited U.S. or foreign currency.

Financial transactions that attempt to disguise the proceeds or nature of financial crimes, cyber fraud, or other illegal activities. Specialized criminal organizations may offer money laundering as a service to other criminals. Money laundering organizations sometimes use networks of witting and unwitting money mules, who become part of the process to disguise the flow of money. Money laundering often includes mixing traditional currencies and cryptocurrencies.

Unauthorized access to payment card processing terminals or cashier systems that facilitate electronic transactions for goods or services. These compromises typically focus on exfiltrating payment card data for exploitation of sensitive information for financial gain or resale to other criminals.

Fraud involving the use of payment cards, to include debit and credit cards, or other devices that enable electronic funds transfers. Relevant activities include ATM cashouts, skimming, and similar criminal exploitation of payment systems. Access device fraud also includes exploitation of public assistance programs, such as Electronic Benefits Transfers (EBTs).

Compromised networks or computer systems, typically large-scale, under the control of a cybercrime organization. Botnets may be used by criminal organizations to exploit the compromised host machines with an intent to steal sensitive banking information or register criminal accounts.

The theft and unauthorized use of Personally Identifiable Information (PII). This includes criminals utilizing other people’s identities for credit card and bank fraud, or other financial gain. Criminals also steal PII by compromising networks and exfiltrating sensitive information in bulk, which is then used or resold to other criminals for financial exploitation.

Unauthorized bank transfers to criminal accounts via means such as social engineering and phishing techniques. Criminals may deceive employees responsible for payments by impersonating executives or vendor representatives, who unwittingly transfer the funds to the criminals.

Crimes using social engineering and deception to entice or extort victims for financial gain. Enticement includes romance and investment schemes, while extortion involves threats to expose a victim, such as sexually compromising information.

Online exploitation of content involving children by sexual predators and other criminals for financial gain.

Financial and Cyber Crime Investigations (3)

Financial and Cyber Crime Investigations

Financial and Cyber Crime Investigations (4)

Our primary investigative mission is to protect the financial infrastructure of the United States by investigating complex, often cyber-enabled financial crimes.

Counterfeit Investigations

Financial and Cyber Crime Investigations (5)

The threat of counterfeit U.S. currency to the financial system of the United States continues to evolve.

Financial and Cyber Crime Investigations (6)

counterfeit-investigations.jpg

Financial and Cyber Crime Investigations (7)

Forensic Expertise

Financial and Cyber Crime Investigations (8)

We are home to expert forensic analysts who employ advanced investigative and technological capabilities in support of the Secret Service integrated mission and law enforcement partners.

Don't be a Victim of a Scam

Strategy FY 2021 - 2027

Financial and Cyber Crime Investigations (2024)

FAQs

What is financial crime investigation? ›

Understanding financial crime investigations is crucial for organizations as it involves a meticulous process of identifying risk indicators, researching, and applying a range of expertise, all aimed towards gathering conclusive evidence, revealing fraudulent activities, and promoting financial integrity.

What does a cyber crime investigator do? ›

A cybercrime investigator investigates several crimes that range from recovering file systems on computers that have been hacked or damaged to investigating crimes against children. In addition, cybercrime investigators also recover data from computers that can be used in prosecuting crimes.

What is financial cybercrime? ›

CYBERCRIME IN FINANCE

In other words: Financial cybercrime includes activities such as stealing payment card information, gaining access to financial accounts in order to initiate unauthorized transactions, extortion, identity fraud in order to apply for financial products, and so on.

What federal agency investigates cyber crimes? ›

It is run by the FBI, the lead federal agency for investigating cyber crime. Here on our website, you can take two vital steps to protecting cyberspace and your own online security.

Does the FBI investigate financial crimes? ›

In today's FBI, criminal investigators scrutinize cases from credit card fraud to food stamp scams for any nexus to terrorism, particularly any terrorist-related financing. You do the same.

What are three examples of cyber crime? ›

Common forms of cybercrime include:
  • phishing: using fake email messages to get personal information from internet users;
  • misusing personal information (identity theft);
  • hacking: shutting down or misusing websites or computer networks;
  • spreading hate and inciting terrorism;
  • distributing child p*rnography;

How much does a cybercrime investigator in the FBI make? ›

Fbi Cyber Security Salary
Annual SalaryMonthly Pay
Top Earners$172,500$14,375
75th Percentile$150,000$12,500
Average$132,962$11,080
25th Percentile$111,000$9,250

What do cyber spies do? ›

Cyber espionage is a type of cyberattack conducted by a threat actor (or cyber spy) who accesses, steals, or exposes classified data or intellectual property (IP) with malicious intent, in order to gain an economic, political, or competitive advantage in a corporate or government setting.

What cybercrime is one of the most financially damaging online crimes? ›

Business email compromise (BEC)—also known as email account compromise (EAC)—is one of the most financially damaging online crimes. It exploits the fact that so many of us rely on email to conduct business—both personal and professional.

Who prosecutes financial crime? ›

FinCEN is a bureau of the U.S. Department of the Treasury. The Director of FinCEN is appointed by the Secretary of the Treasury and reports to the Treasury Under Secretary for Terrorism and Financial Intelligence.

Is cyber scamming a crime? ›

The term "internet fraud" generally covers cybercrime activity that takes place over the internet or on email, including crimes like identity theft, phishing, and other hacking activities designed to scam people out of money.

What happens when you report cyber crime to FBI? ›

After you file a complaint with the IC3, the information is reviewed by an analyst and forwarded to federal, state, local, or international law enforcement or regulatory agencies with jurisdiction, as appropriate.

What are 5 cyber crimes? ›

5 Types of Cyber Crime
  • Hacking. Criminal hacking is the act of gaining unauthorized access to data in a computer or network. ...
  • Malware. Malware, or malicious software, refers to any code designed to interfere with a computer's normal functioning or commit a cyber crime. ...
  • Identity Theft. ...
  • Social Engineering. ...
  • Software Piracy.

What is the most commonly prosecuted federal cybercrime statute? ›

The Computer Fraud and Abuse Act (“CFAA”), codified at Title 18, United States Code, Section 1030, is an important law for prosecutors to address cyber-based crimes.

What happens during a financial investigation? ›

It involves collecting evidence and analysing information to determine if there has been any illegal activity or misappropriation of funds. A financial investigation aims to uncover problems that may have occurred and to identify those responsible and hold them accountable.

What is financial crime process? ›

Financial crime compliance is the process in which financial institutions meet and act in accordance with the policies and regulations set out by relevant authorities or governments. For example, by implementing governance structures and financial crime strategies to reduce financial crime.

Are financial crimes serious? ›

While organisations and institutions are typical targets of financial crime, many individuals are also affected, being defrauded out of their savings and also suffering emotional consequences.

Top Articles
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 6132

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.