Search Our Site

Check out our Youtube channel Check out the Real PI's TV Show Check out the latest PI News

Latest Blog Posts

August 15, 2019


August 15, 2019


August 15, 2019


Follow us on Facebook

Certification

CA Private Investigator
License No. 28286

PI Services

Locations Served

Intake Forms

Video Center

julisajossef

E-Mail Compromise

E-Mail Compromise

Global Business E-Mail Compromise Takedown

On 06/11/2018, federal authorities —including the Department of Justice and also the FBI—announced a serious coordinated enforcement effort to disrupt international business e-mail compromise (BEC) schemes that were designed to intercept and hijack wire transfers from businesses and people.

Operation WireWire—which conjointly enclosed the Department of Homeland Security, the Department of the Treasury, and the U.S. communicating examination Service—involved a six-month sweep that culminated in overtime period of intense enforcement activity leading to seventy four arrests within the U.S. and overseas, together with forty two within the U.S., twenty nine in African country, and 3 in North American nation, Mauritius, and Poland. The operation conjointly resulted within the seizure of nearly $2.4 million and also the disruption and recovery of roughly $14 million in dishonest wire transfers.

Number of cases

A number of cases charged during this operation concerned international criminal organizations that defrauded small- to large-sized businesses, whereas others concerned individual victims who transferred high-dollar amounts or sensitive records within the course of business. The devastating impacts these cases wear victims and victim firms have an effect on not solely the individual business however conjointly the world economy. Since the web Crime grievance Center (IC3) began formally keeping track of BEC and its variant, e-mail account compromise (EAC), there has been a loss of over $3.7 billion reportable to the IC3.

BEC, conjointly referred to as cyber-enabled money fraud, may be a subtle scam that always targets workers with access to company finances and trick them—using a range of strategies like social engineering and pc intrusions—into creating wire transfers to bank accounts thought to belong to trustworthy partners however instead belong to accounts controlled by the criminals themselves. And these same criminal organizations that act BEC schemes conjointly exploit individual victims—often property purchasers, the older, and others—by convincing them to create wire transfers to bank accounts controlled by the criminals.

Foreign voters act several of those schemes, that originated in African country however have unfold throughout the globe.

Operation WireWire

During Operation WireWire, U.S. enforcement agents completed quite fifty one domestic actions, together with search warrants, plus seizure warrants, and cash mule warning letters. And native and state enforcement partners on Federal Bureau of Investigation task forces across the country, with the help of multiple district attorney’s offices, charged fifteen alleged cash mules for his or her roles in defrauding victims.

FBI director – Christopher Wray

“We can still work at the side of our enforcement partners round the world to finish these fraud schemes and shield the hard-earned assets of our voters.”
Today’s announcement highlight this recent surge in enforcement resources targeting BEC schemes “demonstrates the FBI’s commitment to disrupt and dismantle criminal enterprises that focus on americans and their businesses,” in line with Federal Bureau of Investigation Director  – Christopher Wray.

And he additional, “We can still work at the side of our enforcement partners round the world to finish these fraud schemes and shield the hard-earned assets of our voters. the general public we have a tendency to serve deserves nothing less.”

Awareness of BEC Schemes will Safeguard Your Business
BEC schemes still evolve as criminals come back up with new and creative ways that to scam businesses.

Here are  the foremost current and frequent BEC situations known by the FBI:

Business Executive: Criminals spoof or compromise e-mail accounts of high-level business executives, together with chief data officers and chief money officers, that end in the process of a wire transfer to a dishonest account

Data and W-2 Theft: Criminals, employing a compromised business executive’s e-mail account, send dishonest requests for W-2 data or different in person diagnosable data to an entity in a company that habitually maintains that kind of knowledge

Supply Chain:

Criminals send dishonest requests to airt funds throughout a unfinished transaction, group action, or invoice payment to an account controlled by a cash mule or unhealthy actor
Law Firms: Criminals verify regarding trust accounts or proceeding and impersonate a house consumer to alter the recipient bank data to a dishonest account.
If you’re thinking that you are the victim in an exceedingly BEC theme, please file a grievance with the IC3. The additional data enforcement has on these scams, the higher equipped we’ll be to combat them.

And to additional educate yourself on BEC schemes to assist shield your business, scan additional regarding however BEC schemes work and the way you’ll be able to avoid being misused. You’ll be able to conjointly take a glance at this IC3 public service announcement on BEC schemes.

15 Aug, 2019
Medical malpractice is skilled negligence by act or omission by a health care supplier within which the treatment provided falls below the accepted normal of observe within the medical profession and causes injury or death to the patient, with most cases involving medical error. Claims of medical malpractice, once pursued in US courts, are processed [..] The post Medical Malpractice appeared first on Blue Systems International.
08 Jul, 2019
Burglars are typically opportunist thieves who go after homes and apartments. They hunt down any gap that they will profit off, specifically doors and windows that are left open or unbolted or are simple to force. Something valuable that they could spot through a window can solely spur them on. However it doesn’t take abundant [..] The post Keeping Your Home Safe appeared first on Blue Systems International.
05 Jul, 2019
Missing Lady Please Help and share with everyone.  Nina’s husband is crying and begging for help to find his beloved wife.  Antoinette (NINA ) Lonigro has brown shoulder length hair with grey on top White Female Caucasian lady  approximately 100-110 lbs Age:  56 years old  Caucasian lady , approximately 100-110 lbs The missing lady named [..] The post Missing Lady from Los Angeles appeared first on Blue Systems International.
By info 10 Jun, 2019
Fundamentally, stalking could be a series of actions that puts an individual in worry for his or her safety. The stalker could follow you, harass you, decision you on the phone, watch your house, send you mail you do not need, or act in another method that frightens you. The exact legal definition varies from [..] The post What is Stalking? appeared first on Blue Systems International.
By julisajossef 07 Mar, 2019
Imagine you’re working to hire a security officer. As you work on hiring them, questions arise about the person working to keep you and others safe. Do they have a criminal history? Are they who they say they are? Do they pose a threat to anyone? Luckily, background checks can provide answers to all these [..] The post Pre-employment history checks appeared first on Blue Systems International.
By julisajossef 01 Mar, 2019
Companies conducting a background check during the pre-screening employment process on prospective candidates looking to enter the security field is as crucial as an interview. How a security company goes about its background check makes all the difference in the world. There are a plethora of internet sites that claim to deliver a complete gamut [..] The post Importance of background checks appeared first on Blue Systems International.
By pimj 15 Feb, 2019
The truth can be a gift that includes a surprise and devastating at the same time; Especially when you learn that the closest person to you is the one betraying and making you sick. What I have learned from the wise words of his holiness Pope SHENOUDA 3 rd; The blessed, late Coptic Orthodox Pope [..] The post Private Investigator Finds the Truth appeared first on Blue Systems International.
By julisajossef 04 Feb, 2019
  Nothing in this world is more important to us than our children. Their health, good mood, success in school and, of course, their safety. How much the state takes care of the children is clear to every adult person. And the huge number of adults with the temptation that surrounds our children at school, [..] The post Children and safety appeared first on Blue Systems International.
By julisajossef 23 Jan, 2019
  Detective Agency | History Two people stood at the origins of a private investigation as a business: the former head of the French criminal police, Eugene Francois Vidocq (1775-1857) and the American citizen –  Alan Nathaniel Pinkerton (1819-1884). The subjects of private investigation were not only lonely detectives but also detective agencies. As already [..] The post Detective Agency | History appeared first on Blue Systems International.
By julisajossef 12 Jan, 2019
Services for the investigation of criminal cases, assistance in investigating crimes. The detective agency can offer assistance in investigating crimes (including criminal cases of any complexity). Our detectives have experience in investigating crimes. If you want an objective and impartial investigation, which will establish all the circumstances of the case and restore justice, then asking [..] The post Services for the investigation of criminal cases, assistance in investigating crimes appeared first on Blue Systems International.
More Posts
Share by: