Homeland Security Investigations Detroit, Michigan OPERATION ROLL OUT

Similar documents
Minnesota Financial Crimes Task Force

Crime Gun Intelligence Disrupting the Shooting Cycle

Agency (251-1,000 Officers) Recognition: Plano, Texas, Police Department, of which Gregory W. Rushin is the Chief

GRANT FRAUD. What is Fraud? What is Grant Fraud? Who is the Victim? Fraud is Not Good. We Must Prevent or Detect It Early ASSUMPTIONS.

Name of Instructor(s): Byron Boston Days/Hours of Course Proposed: 3 Days/24 Training Hours

Violent Crime Control and Law Enforcement Act of U.S. Department of Justice Fact Sheet

The Criminal Justice Information System at the Department of Public Safety and the Texas Department of Criminal Justice. May 2016 Report No.

United States Department of Justice Executive Office for United States Trustees. Report to Congress:

Cleveland Police Deployment

1. The Theft Team shall provide follow - up investigation in all reported cases of theft (vehicle, vehicle parts, retail, general and embezzlement).

Case 1:17-mj KSC Document 2 Filed 10/16/17 Page 1 of 13 PageID #: 1 BY ORDER OF THE COURT UNITED STATES DISTRICT COURT DISTRICT OF HAWAII

Auto Theft Prevention Grant Program

IN THE THIRD DISTRICT COURT - ALL DEPARTMENT IN AND FOR SALT LAKE COUNTY, STATE OF UTAH AFFIDAVIT FOR SEARCH WARRANT

SAN DIEGO POLICE DEPARTMENT PROCEDURE

September 2011 Report No

Office of Inspector General

Contents. Today s Presenters:

GUADALUPE COUNTY SHERIFF S OFFICE TRAINING FACILITY

May 27, RESOLUTION

TOWNSHIP OF EDISON POLICE DEPARTMENT

The FBI s Field Intelligence Groups and Police

National Intellectual Property Rights Squad: ASA ANNUAL CONFERENCE

ESSENTIAL JOB FUNCTIONS:

CAREER OPPORTUNITIES WORKSHEET

Federal Purpose Area 1 Law Enforcement Programs

Case 1:18-cr RP Document 29 Filed 04/11/18 Page 1 of 8 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF TEXAS AUSTIN DIVISION

Overview of NC GangNET

Austin Independent School District Police Department Policy and Procedure Manual

"Tag - A - Tagger" Graffiti Vandalism Reduction Program

U.S. Department of Education Office of Inspector General

BIOGRAPHICAL SKETCH. Telephone (800) Fax (661)

Virginia Beach Police Department General Order Chapter 8 - Criminal Investigations

U.S. Department of Justice United States Attorney Eastern District of Arkansas

CODE OF MARYLAND REGULATIONS (COMAR)

PHONE: (901)

partners for safer communities

2m3 OCT 24 pn 2: 19 TEXAS-EASTER:!

CODE OF MARYLAND REGULATIONS (COMAR)

Medicare Fraud Strike Force Teams Turn Up The HEAT. By Craig A. Conway, J.D., LL.M.

Sentinel Scheme Rules

FBI/U.S. Attorney s Office 39ers Gang. In 2010, the FBI s New Orleans Gang Task Force (NOGTF)

E P07C 0249 COUNT ONE (18 U.S.C. 371, 22 U.S.C. 2778(b)(2), 2778 (c»

Department of Defense INSTRUCTION

Testimony Before the United States Senate Committee on Homeland Security and Governmental Affairs

RISK MANAGEMENT BULLETIN

Top 12 Immigration Mistakes Employers Made in Presented by: Shanon R. Stevenson Phone: (404)

Applicable To: Central Records Unit employees, Records Section Communications, and SSD commander. Signature: Signed by GNT Date Signed: 11/18/13

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2017 HOUSE BILL DRH30179-MG-50A (02/10)

Secondary Metal Recyclers and Metal Thefts. Dallas City Council Briefing May 7, 2008

U.S. Department of Justice. Federal Bureau of Investigation. Los Angeles Division Wilshire Boulevard Suite # 1700 Los Angeles, California 90024

GENERAL ORDER May 1, 2014 CITY OF MARYLAND HEIGHTS OFFICE OF THE CHIEF OF POLICE COMPUTER ENTRIES

POSITION ANNOUNCEMENT

UNITED STATES OF AMERICA CRIMINAL COMPLAINT CASE NUMBER: BRENDOLYN HART-GLOVER UNDER SEAL

MISSOURI. Downloaded January 2011

Chairman Wolf, Ranking Member Fattah and Members of the Subcommittee,

NATIONAL CRIME INFORMATION CENTER (NCIC)

Police may conduct these checks. The following is a summary of various methods used for background checks and the requirements for each.

Department of Defense INSTRUCTION

Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training 2015

Protecting Ideas: Perspectives for Individuals and Companies

Criminal Justice Division

Department of Defense INSTRUCTION

GEORGIA PEACE OFFICER STANDARDS AND TRAINING COUNCIL

2014 CJIS TRAINING SYMPOSIUM. CJIS A Global Connection

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

BEVERLY HILLS POLICE DEPARTMENT MONTHLY REPORT APRIL 2017

Virginia Medicaid Fraud Control Unit

Department of Defense INSTRUCTION

Criminal Justice Division

Fraud, Waste, and Abuse of Title IV Money

43. Video Surveillance Policy

Public Safety Trends Report Year End Review

Department of Defense INSTRUCTION

BODY-WORN VIDEO PILOT PROGRAM

MAGLOCLEN IMPACT IN New Jersey

Joint Publication Operations Security

1/28/2015. James D. Varnado, Director Medicaid Fraud Control Unit (MFCU) Florida Office of the Attorney General

PROGRAM ANNOUNCEMENT

Case 1:17-mj JFK Document 1 Filed 02/04/17 Page 1 of 5 UNITED ST ATES DISTRICT COURT NORTHERN DISTRICT OF GEORGIA

ORDER TYPE: NEED TO KNOW. PURPOSE The purpose of this general order is to establish basic operational guidelines for members of the patrol division.

The Economic Impacts of the New Economy Initiative in Southeast Michigan

CONTEST RULES. To be valid, entries must be received by Thursday November 30, 2017 at 6:00 p.m.

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

YALE-NEW HAVEN HOSPITAL MEDICAL STAFF POLICY & PROCEDURE CONFLICT OF INTEREST

OFFICE OF THE DISTRICT OF COLUMBIA AUDITOR m STREET N.W., SUITE 900

Clinical and Compliance Bulletin

NCRIC ALPR FAQs. Page: FAQ:

IRA SOHN RESEARCH CONFERENCE FOUNDATION INVESTMENT IDEA CONTEST OFFICIAL RULES

DES PLAINES POLICE DEPARTMENT GENERAL ORDER Jim Prandini, Chief of Police

INTRADEPARTMENTAL CORRESPONDENCE SUBJECT: ASSESSMENT OF UNITS EXEMPTED FROM THE FINANCIAL DISCLOSURE PROGRAM

MOBILE AUDIO VIDEO POLICY DIRECTIVE

The OIG. What is the OIG

An Interview With. Thomas P. Lenox. Supervisory Special Agent, Drug Enforcement Administration. Interview by Roneet Lev, MD

The MICJIS Dilemma. Invisible but Invaluable

NEW CASTLE COUNTY POLICE

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

SAC (Senate Appropriations Committee) PROGRAM PRESIDENT HAC (House Appropriations Committee) DOJ Byrne Memorial Justice Assistance Grants Coverdell

MISSISSIPPI LEGISLATURE REGULAR SESSION 2017 COMMITTEE SUBSTITUTE FOR SENATE BILL NO. 2330

Minnesota Financial Crimes Task Force

GEORGIA PEACE OFFICER STANDARDS AND TRAINING COUNCIL

Transcription:

Homeland Security Investigations Detroit, Michigan OPERATION ROLL OUT THE INVESTIGATION In August, 2011 the Homeland Security Investigations (HSI) Detroit field office received a tip that a lawful permanent alien resident was selling motor vehicles that were acquired via credit fraud. This fraud involved aliens awaiting an immigration judge s decision on removal. HSI conducted an undercover investigation that resulted in the seizure of four vehicles. Postseizure identification of the vehicles revealed that they were stolen, carjacked, and/or taken by fraud utilizing multiple different methodologies. The true VIN of each vehicle was concealed with a cloned VIN that was adhered over the manufacturer's primary VIN plate and federal safety sticker with varying levels of quality (See Inset). Further analysis of the fraudulent VINs indicated that the organization also utilized an elaborate title-washing scheme that enabled disposal of whole functional vehicles as opposed to the standard practice of chopping and parting. The organization began the title washing process by creating counterfeit titles, purported to be issued out of the state of Texas. The organization

then acquired blank genuine Michigan titles that were stolen from a Michigan Secretary of State satellite office sometime between April and June, 2011. Unlike the counterfeit Texas titles, the Michigan titles bore all of the correct security features and had embossed control numbers in the lower right-hand corner. Based on a Michigan State Police investigation into the stolen title stock, the range of control numbers was known. In October, 2011, HSI s investigation was merged with investigations being conducted by the Federal Bureau of Investigation, Detroit Police Department, Michigan Secretary of State, Ohio Bureau of Motor Vehicles, Ohio State Highway Patrol, and the Toledo Police Department. The combined investigation revealed that the vehicles were being acquired by Bernard EDMOND via proxy, utilizing people and a criminal street gang who dubbed themselves the S550 Boyz due to their ability to target high-end luxury vehicles. HSI led the white collar portion of the investigation, analyzing EDMOND's pattern of practice and including the identities of known title runners, shell companies, and addresses of abandoned properties. The analysis resulted in the identification of approximately 200 vehicles tied to EDMOND's title-washing scheme. Informant information regarding EDMOND's operation indicated that these discoveries comprised approximately ten percent of the actual volume of vehicles trafficked by EDMOND. On September 17, 2013, a federal petit jury seated in the Eastern District of Michigan returned guilty verdicts on various counts for Bernard EDMOND and two members of the S550 Boyz. EDMOND and his coconspirators were convicted for multiple federal crimes including conspiracy, trafficking in motor vehicles with altered VINs, operating a chop shop, carjacking, and associated firearms offenses. The three defendants received sentences totaling 230 years federal confinement.

THE METHODOLOGY This investigation involved multiple coconspirators, shell corporations, and appointed agents. As such, it posed numerous investigative and administrative challenges. This was especially true in instances where a vehicle was identified but not recovered. Throughout the investigation there were noted vulnerabilities to EDMOND's process that were successfully exploited. One such vulnerability was EDMOND utilized cloned. as opposed to fraudulent, VINs to clean the history on the stolen vehicles. The investigation revealed that the clean VINs, in order to appropriately match paint, trim, etc., were direct duplicates of existing vehicles acquired through open source Internet queries. This methodology resulted in duplicate registration records existing simultaneously in multiple states, or registration post-export. The methodology also resulted in a skewed registration and service record in CarFax query results. A vehicle with a cloned VIN will show ownership and service records consistently occurring in one state or region only to be interrupted part way through the report with the fraudulent registration records before resuming the legitimate record. (See Inset above) Each identified vehicle included multiple documents in multiple states designed to obscure the true origin of the vehicle. (See Inset below) The ultimate goal of the process was to begin with a stolen or counterfeit title and end with a clean Michigan title. Using the counterfeit or stolen

titles was a simple process: EDMOND would send one of his coconspirators to the Michigan Secretary of State with the counterfeit title to serve as the beginning of the Michigan title chain. Utilizing the stolen Michigan titles presented an additional logistical challenge in that the stolen title could not be presented in the same state in which it was lifted. To combat this, EDMOND utilized title runners in the Toledo, Ohio area who acquired clean Ohio titles with the stolen Michigan paper. The Ohio title was then returned to Michigan to acquire the final clean Michigan title. Exploiting this information resulted in the identification of additional title runners and shell corporations which, in turn, resulted in the identification of additional vehicles. LESSONS LEARNED While the investigation highlighted vulnerabilities in EDMOND's title-washing system, it also revealed weaknesses in the manner in which vehicle title and registration operations are conducted. EDMOND exploited these weaknesses in order to conceal the totality of his organization's operations. An all-inclusive information-sharing program and proper data warehousing could have sealed both of these vulnerabilities. The first vulnerability allowed EDMOND's title-washing system to thrive unchecked for years while causing issues for legitimate vehicle owners throughout the United States. Because EDMOND's system relied on cloned VIN numbers derived from Internet searches to ensure that the theft vehicle fraud VIN was properly coded for color, trim, etc., this resulted in duplicate registration records across states. If the states shared their registration information and did not allow for duplicate VIN registrations and/or titling without the previous document being canceled, EDMOND would have been forced to utilize a different method of title-washing. A second vulnerability stemmed from not fully utilizing the control numbers on vehicle titles. The investigation revealed that while control numbers were embossed on the title stock, these numbers were not being electronically captured or data-warehoused at the time of titling. The ability to query these numbers would have resulted in the identification of significantly more vehicles which, in the event of a purely-white collar prosecution absent firearms charges, would have been important to determining the appropriate federal sentencing level that is dependent on the determination of value. The more damage done, measured in dollars, the harsher the sentence. CONCLUSION We, as investigators, will be perpetually entangled with the criminal element in a proverbial game of cat and mouse. As we evolve, so too will those who endeavor to profit from illegal activity. For example, after the conclusion of Operation Roll Out, the criminal element evolved their methods to evade detection. While VIN cloning still occurs, technological advances at CarFax as well as multi-state initiatives have aimed to identify red flag indicators for the practice. To this effect, vehicle theft organizations have begun to learn the VIN numbering limitations of vehicle manufacturers and exceed those limits in creating counterfeit VINs that still match all of the necessary color/trim formatting parameters. In order to further evolve to combat these practices, manufacturers and states will need to communicate with each other in

order to design information systems that reject attempts to title and register vehicles outside of those ranges. Author: David J. Gibson